IOC Report
j0GOUGjcJD.exe

loading gif

Files

File Path
Type
Category
Malicious
j0GOUGjcJD.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\vxPvY9xhrB.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Windows\Cursors\SearchApp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\winSaves\0VySiddKAXOECI1ul.vbe
data
dropped
malicious
C:\winSaves\TGdhCspOsuwHWHVRmOneCNdUUqTS.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\winSaves\fontsavesbroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\TGdhCspOsuwHWHVRmOneCNdUUqTS.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fontsavesbroker.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\4ty73C4Ot0
ASCII text, with no line terminators
dropped
C:\Windows\Cursors\38384e6a620884
ASCII text, with no line terminators
dropped
C:\winSaves\UEmczQViUsQALT5sK5Im3o.bat
ASCII text, with no line terminators
dropped
C:\winSaves\d8d5508f805aac
ASCII text, with very long lines (680), with no line terminators
dropped
\Device\Null
ASCII text
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\j0GOUGjcJD.exe
"C:\Users\user\Desktop\j0GOUGjcJD.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\winSaves\0VySiddKAXOECI1ul.vbe"
malicious
C:\winSaves\fontsavesbroker.exe
"C:\winSaves\fontsavesbroker.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 13 /tr "'C:\Windows\Cursors\SearchApp.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\Cursors\SearchApp.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 8 /tr "'C:\Windows\Cursors\SearchApp.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "TGdhCspOsuwHWHVRmOneCNdUUqTST" /sc MINUTE /mo 11 /tr "'C:\winSaves\TGdhCspOsuwHWHVRmOneCNdUUqTS.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "TGdhCspOsuwHWHVRmOneCNdUUqTS" /sc ONLOGON /tr "'C:\winSaves\TGdhCspOsuwHWHVRmOneCNdUUqTS.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "TGdhCspOsuwHWHVRmOneCNdUUqTST" /sc MINUTE /mo 13 /tr "'C:\winSaves\TGdhCspOsuwHWHVRmOneCNdUUqTS.exe'" /rl HIGHEST /f
malicious
C:\winSaves\TGdhCspOsuwHWHVRmOneCNdUUqTS.exe
C:\winSaves\TGdhCspOsuwHWHVRmOneCNdUUqTS.exe
malicious
C:\winSaves\TGdhCspOsuwHWHVRmOneCNdUUqTS.exe
C:\winSaves\TGdhCspOsuwHWHVRmOneCNdUUqTS.exe
malicious
C:\winSaves\fontsavesbroker.exe
"C:\winSaves\fontsavesbroker.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\winSaves\UEmczQViUsQALT5sK5Im3o.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\vxPvY9xhrB.bat"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://ch67763.tw1.ru/@==gbJBzYuFDT
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\000559980964f84fb2a50c07dedc03a1aecddec7
8eb5ede3783261911661fdf2040ce2ff2b814dc4
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany

Memdumps

Base Address
Regiontype
Protect
Malicious
2A65000
trusted library allocation
page read and write
malicious
2EC7000
trusted library allocation
page read and write
malicious
2E81000
trusted library allocation
page read and write
malicious
2D91000
trusted library allocation
page read and write
malicious
303E000
trusted library allocation
page read and write
malicious
2ED2000
trusted library allocation
page read and write
malicious
2FF1000
trusted library allocation
page read and write
malicious
2EE3000
trusted library allocation
page read and write
malicious
2A98000
trusted library allocation
page read and write
malicious
7FFD9B813000
trusted library allocation
page read and write
336D000
heap
page read and write
1530000
heap
page read and write
3399000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
7FFD9B67D000
trusted library allocation
page execute and read and write
1B20D000
stack
page read and write
FEA000
heap
page read and write
6D60000
heap
page read and write
2D80000
heap
page execute and read and write
F30000
heap
page read and write
124D000
heap
page read and write
2BB0000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page execute and read and write
548F000
stack
page read and write
2ED7000
trusted library allocation
page read and write
DE0000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
1BB38000
heap
page read and write
7FFD9B66D000
trusted library allocation
page execute and read and write
7FFD9B791000
trusted library allocation
page execute and read and write
26D2A7C8000
heap
page read and write
A10000
heap
page read and write
33EF000
heap
page read and write
1BB66000
heap
page read and write
3044000
heap
page read and write
12FE000
stack
page read and write
B07000
heap
page read and write
2BD0000
trusted library allocation
page read and write
1C394000
heap
page read and write
1BBA9000
heap
page read and write
7FFD9B746000
trusted library allocation
page execute and read and write
7FFD9B670000
trusted library allocation
page read and write
1052000
heap
page read and write
336C000
heap
page read and write
33FB000
heap
page read and write
1B6E0000
heap
page execute and read and write
306B000
heap
page read and write
12E83000
trusted library allocation
page read and write
2A40000
heap
page execute and read and write
7FFD9B6BC000
trusted library allocation
page execute and read and write
12D91000
trusted library allocation
page read and write
1305000
heap
page read and write
1B830000
heap
page read and write
12E8D000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
2E80000
heap
page execute and read and write
306C000
heap
page read and write
7FFD9B68B000
trusted library allocation
page execute and read and write
3399000
heap
page read and write
1454000
heap
page read and write
577E000
stack
page read and write
304E000
heap
page read and write
2D70000
heap
page read and write
7FFD9B746000
trusted library allocation
page execute and read and write
7FFD9B664000
trusted library allocation
page read and write
7FFD9B673000
trusted library allocation
page read and write
10F8000
heap
page read and write
D6E000
stack
page read and write
3052000
heap
page read and write
1BA3F000
stack
page read and write
7FFD9B823000
trusted library allocation
page read and write
7FFD9B78A000
trusted library allocation
page execute and read and write
12D9D000
trusted library allocation
page read and write
304C000
heap
page read and write
306A000
heap
page read and write
DF4000
heap
page read and write
3021000
heap
page read and write
7FFD9B663000
trusted library allocation
page read and write
3028000
heap
page read and write
2870000
heap
page read and write
30C6000
stack
page read and write
33FB000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
3087000
heap
page read and write
599E000
stack
page read and write
3385000
heap
page read and write
3060000
heap
page read and write
33EF000
heap
page read and write
AD0000
heap
page read and write
33EF000
heap
page read and write
7FFD9B746000
trusted library allocation
page execute and read and write
7FFD9B67D000
trusted library allocation
page execute and read and write
514000
unkown
page read and write
7FFD9B66D000
trusted library allocation
page execute and read and write
1BB11000
heap
page read and write
11D0000
heap
page read and write
DA0000
trusted library allocation
page read and write
7FFD9B844000
trusted library allocation
page read and write
352E000
stack
page read and write
7FFD9B650000
trusted library allocation
page read and write
32CE000
stack
page read and write
2F5B000
stack
page read and write
DB0000
heap
page read and write
2F04000
trusted library allocation
page read and write
7FFD9B706000
trusted library allocation
page read and write
14F0000
heap
page read and write
3052000
heap
page read and write
538E000
stack
page read and write
12E81000
trusted library allocation
page read and write
12FD000
heap
page read and write
A20000
unkown
page readonly
7FFD9B791000
trusted library allocation
page execute and read and write
7FFD9B716000
trusted library allocation
page read and write
7FFD9B677000
trusted library allocation
page read and write
33FB000
heap
page read and write
33FB000
heap
page read and write
7FFD9B847000
trusted library allocation
page read and write
1BBBE000
stack
page read and write
7FFD9B823000
trusted library allocation
page read and write
3327000
heap
page read and write
3064000
heap
page read and write
1C38B000
stack
page read and write
3038000
trusted library allocation
page read and write
3087000
heap
page read and write
7FFD9B654000
trusted library allocation
page read and write
3220000
heap
page read and write
1BAF0000
heap
page read and write
3320000
heap
page read and write
2F4E000
trusted library allocation
page read and write
12EF000
stack
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B78F000
trusted library allocation
page execute and read and write
320E000
stack
page read and write
573E000
stack
page read and write
2860000
heap
page execute and read and write
AA0000
heap
page read and write
F51000
heap
page read and write
7FFD9B65D000
trusted library allocation
page execute and read and write
33FB000
heap
page read and write
3053000
heap
page read and write
3358000
heap
page read and write
7FFD9B673000
trusted library allocation
page read and write
30D7000
stack
page read and write
5234000
heap
page read and write
786F000
stack
page read and write
7FFD9B800000
trusted library allocation
page read and write
33F1000
heap
page read and write
5431000
trusted library allocation
page read and write
3044000
heap
page read and write
520E000
stack
page read and write
1BB68000
heap
page read and write
5A1E000
stack
page read and write
1B93F000
stack
page read and write
3066000
heap
page read and write
532000
unkown
page write copy
1BB18000
heap
page read and write
7FFD9B7FC000
trusted library allocation
page read and write
1430000
heap
page read and write
1B390000
heap
page read and write
7FFD9B716000
trusted library allocation
page read and write
A20000
unkown
page readonly
7FFD9B677000
trusted library allocation
page read and write
1BF3E000
stack
page read and write
1BBA1000
heap
page read and write
7FFD9B68B000
trusted library allocation
page execute and read and write
4DFE000
stack
page read and write
50E000
unkown
page read and write
5D6D000
stack
page read and write
1240000
heap
page read and write
1BB74000
heap
page read and write
7FFD9B803000
trusted library allocation
page read and write
12A5D000
trusted library allocation
page read and write
7FFD9B66D000
trusted library allocation
page execute and read and write
2A51000
trusted library allocation
page read and write
105E000
heap
page read and write
7FFD9B710000
trusted library allocation
page read and write
3000000
heap
page read and write
3047000
heap
page read and write
26D2A8D0000
heap
page read and write
332B000
heap
page read and write
328E000
stack
page read and write
3365000
heap
page read and write
12A51000
trusted library allocation
page read and write
305C000
heap
page read and write
2CDE000
stack
page read and write
4E10000
heap
page read and write
3031000
heap
page read and write
FA0000
heap
page read and write
3396000
heap
page read and write
DF5000
heap
page read and write
5230000
heap
page read and write
334E000
stack
page read and write
30D0000
stack
page read and write
2F01000
trusted library allocation
page read and write
7FFD9B78A000
trusted library allocation
page execute and read and write
108F000
heap
page read and write
7FFD9B673000
trusted library allocation
page read and write
1287000
heap
page read and write
3046000
heap
page read and write
7FFD9B684000
trusted library allocation
page read and write
4D1000
unkown
page execute read
3470000
heap
page read and write
2DC6000
stack
page read and write
7FFD9B68D000
trusted library allocation
page execute and read and write
1B793000
stack
page read and write
4D0000
unkown
page readonly
5880000
heap
page read and write
3008000
heap
page read and write
A22000
unkown
page readonly
7FFD9B80C000
trusted library allocation
page read and write
7FFD9B67C000
trusted library allocation
page read and write
1B64F000
stack
page read and write
11F0000
heap
page read and write
26D2A9B0000
heap
page read and write
2FD0000
heap
page read and write
1535000
heap
page read and write
7FFD9B664000
trusted library allocation
page read and write
3057000
heap
page read and write
1BCB4000
stack
page read and write
125C000
heap
page read and write
3065000
heap
page read and write
304A000
heap
page read and write
5590000
trusted library allocation
page read and write
344E000
stack
page read and write
33EF000
heap
page read and write
306C000
heap
page read and write
304C000
heap
page read and write
1B8EE000
stack
page read and write
BF4000
heap
page read and write
A60000
heap
page read and write
7FFD9B667000
trusted library allocation
page read and write
7FFD9B720000
trusted library allocation
page execute and read and write
33EF000
heap
page read and write
1BB7B000
heap
page read and write
2D10000
heap
page read and write
1BDBE000
stack
page read and write
12A58000
trusted library allocation
page read and write
335E000
heap
page read and write
1020000
heap
page read and write
304F000
heap
page read and write
7FFD9B6BC000
trusted library allocation
page execute and read and write
50E000
unkown
page write copy
1B49F000
stack
page read and write
1B80F000
stack
page read and write
1310000
trusted library allocation
page read and write
3071000
heap
page read and write
7FFD9B78F000
trusted library allocation
page execute and read and write
12A53000
trusted library allocation
page read and write
30E8000
stack
page read and write
7FFD9B67C000
trusted library allocation
page read and write
141E000
stack
page read and write
7FFD9B660000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
532000
unkown
page readonly
BA0000
heap
page read and write
3058000
heap
page read and write
1B59F000
stack
page read and write
7FFD9B80E000
trusted library allocation
page read and write
7FFD9B67C000
trusted library allocation
page read and write
7FFD9B80B000
trusted library allocation
page read and write
13A5000
heap
page read and write
102C000
heap
page read and write
3070000
heap
page read and write
531000
unkown
page read and write
544A000
trusted library allocation
page read and write
12E88000
trusted library allocation
page read and write
7570000
heap
page read and write
7FFD9B70C000
trusted library allocation
page execute and read and write
9E5E8FE000
stack
page read and write
563E000
stack
page read and write
33F1000
heap
page read and write
1BB27000
heap
page read and write
7FFD9B680000
trusted library allocation
page read and write
12FF1000
trusted library allocation
page read and write
3030000
heap
page read and write
2AAC000
trusted library allocation
page read and write
7FFD9B666000
trusted library allocation
page read and write
BF0000
heap
page read and write
7FFD9B823000
trusted library allocation
page read and write
7FFD9B684000
trusted library allocation
page read and write
3028000
heap
page read and write
7FFD9B780000
trusted library allocation
page execute and read and write
3240000
heap
page read and write
9E5E87E000
stack
page read and write
3051000
heap
page read and write
1B89E000
stack
page read and write
ADD000
heap
page read and write
104A000
heap
page read and write
1B57E000
stack
page read and write
330D000
stack
page read and write
FA9000
heap
page read and write
5591000
heap
page read and write
2D00000
trusted library allocation
page read and write
5AE0000
heap
page read and write
1026000
heap
page read and write
1340000
trusted library allocation
page read and write
1BB49000
heap
page read and write
1061000
heap
page read and write
347A000
heap
page read and write
7FFD9B710000
trusted library allocation
page execute and read and write
D90000
heap
page read and write
1B9BF000
stack
page read and write
1B9E4000
stack
page read and write
7FFD9B811000
trusted library allocation
page read and write
1BFC0000
heap
page read and write
7FFD9B653000
trusted library allocation
page execute and read and write
1220000
heap
page read and write
3399000
heap
page read and write
DD0000
trusted library allocation
page read and write
3330000
heap
page read and write
7FFD9B66C000
trusted library allocation
page read and write
3049000
heap
page read and write
1BABF000
stack
page read and write
1BB29000
heap
page read and write
796C000
stack
page read and write
7FFD9B652000
trusted library allocation
page read and write
5580000
heap
page read and write
1BB34000
stack
page read and write
2E70000
heap
page execute and read and write
163F000
stack
page read and write
533000
unkown
page readonly
305E000
heap
page read and write
305F000
heap
page read and write
1BE3E000
stack
page read and write
6D63000
heap
page read and write
3087000
heap
page read and write
7FF49F190000
trusted library allocation
page execute and read and write
B09000
heap
page read and write
2E5B000
stack
page read and write
5594000
heap
page read and write
3048000
heap
page read and write
1BB5E000
heap
page read and write
3130000
heap
page read and write
4D90000
heap
page read and write
3020000
heap
page read and write
1245000
heap
page read and write
3061000
heap
page read and write
2EDC000
trusted library allocation
page read and write
589E000
stack
page read and write
1360000
trusted library allocation
page read and write
27FE000
stack
page read and write
1289000
heap
page read and write
3338000
heap
page read and write
7FFD9B68D000
trusted library allocation
page execute and read and write
AF2000
unkown
page readonly
2D10000
trusted library allocation
page read and write
3354000
heap
page read and write
33F1000
heap
page read and write
330E000
stack
page read and write
26D2A7B0000
heap
page read and write
7FFD9B663000
trusted library allocation
page execute and read and write
30F2000
stack
page read and write
304F000
heap
page read and write
7FFD9B844000
trusted library allocation
page read and write
2EE0000
heap
page read and write
102D000
heap
page read and write
1ADC0000
trusted library allocation
page read and write
7FFD9B663000
trusted library allocation
page execute and read and write
7FFD9B830000
trusted library allocation
page read and write
1B68E000
stack
page read and write
7FFD9B674000
trusted library allocation
page read and write
4D0000
unkown
page readonly
309C000
heap
page read and write
A20000
heap
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
1BEB3000
stack
page read and write
1C18E000
stack
page read and write
7FFD9B816000
trusted library allocation
page read and write
10F6000
stack
page read and write
7FFD9B710000
trusted library allocation
page read and write
7FFD9B6AC000
trusted library allocation
page execute and read and write
7FFD9B80C000
trusted library allocation
page read and write
26D2A8B0000
heap
page read and write
12F7000
heap
page read and write
12FF3000
trusted library allocation
page read and write
306C000
heap
page read and write
3054000
heap
page read and write
BC0000
heap
page read and write
D46000
stack
page read and write
1B30F000
stack
page read and write
3065000
heap
page read and write
1BD3E000
stack
page read and write
309C000
heap
page read and write
362E000
stack
page read and write
7FFD9B677000
trusted library allocation
page read and write
776F000
stack
page read and write
7FFD9B82B000
trusted library allocation
page read and write
1BB52000
heap
page read and write
33BE000
heap
page read and write
30BC000
stack
page read and write
F71000
heap
page read and write
F65000
heap
page read and write
1BB93000
heap
page read and write
12D98000
trusted library allocation
page read and write
F75000
heap
page read and write
7FFD9B80E000
trusted library allocation
page read and write
5B2E000
stack
page read and write
1BB3A000
heap
page read and write
3369000
heap
page read and write
54A0000
heap
page read and write
3368000
heap
page read and write
B70000
heap
page read and write
2F90000
heap
page read and write
304C000
heap
page read and write
7FFD9B67D000
trusted library allocation
page execute and read and write
E54000
heap
page read and write
1C390000
heap
page read and write
30FA000
stack
page read and write
2F54000
trusted library allocation
page read and write
7FFD9B71C000
trusted library allocation
page execute and read and write
1300000
heap
page read and write
AA9000
heap
page read and write
3040000
heap
page read and write
30E3000
stack
page read and write
1B020000
trusted library allocation
page read and write
305A000
heap
page read and write
2FC0000
heap
page read and write
2F2C000
trusted library allocation
page read and write
7FFD9B827000
trusted library allocation
page read and write
14AF000
stack
page read and write
5C2F000
stack
page read and write
1BC33000
stack
page read and write
12DA1000
trusted library allocation
page read and write
26D2A7B9000
heap
page read and write
5890000
heap
page read and write
33F1000
heap
page read and write
3065000
heap
page read and write
2DF9000
trusted library allocation
page read and write
12FFD000
trusted library allocation
page read and write
1B700000
heap
page execute and read and write
26D2A6C0000
heap
page read and write
7FFD9B662000
trusted library allocation
page read and write
125E000
heap
page read and write
26D2A9B4000
heap
page read and write
123B000
heap
page read and write
7FFD9B841000
trusted library allocation
page read and write
1AEB0000
trusted library allocation
page read and write
2FEE000
stack
page read and write
108B000
heap
page read and write
305D000
heap
page read and write
7FFD9B800000
trusted library allocation
page read and write
7FFD9B660000
trusted library allocation
page read and write
7FFD9B736000
trusted library allocation
page execute and read and write
7FFD9B780000
trusted library allocation
page execute and read and write
B47000
heap
page read and write
9E5E5DC000
stack
page read and write
3368000
heap
page read and write
7FFD9B680000
trusted library allocation
page read and write
6D63000
heap
page read and write
3245000
heap
page read and write
2B11000
trusted library allocation
page read and write
1AECD000
stack
page read and write
2F95000
heap
page read and write
3044000
heap
page read and write
7FFD9B71C000
trusted library allocation
page execute and read and write
7678000
heap
page read and write
7FFD9B684000
trusted library allocation
page read and write
1BAE3000
stack
page read and write
52A0000
heap
page read and write
12FF8000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
F3C000
heap
page read and write
3368000
heap
page read and write
335F000
heap
page read and write
7FFD9B720000
trusted library allocation
page execute and read and write
1B7EF000
stack
page read and write
7FFD9B664000
trusted library allocation
page read and write
D80000
heap
page read and write
306C000
heap
page read and write
E50000
heap
page read and write
306A000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
14B0000
trusted library allocation
page read and write
3368000
heap
page read and write
F5E000
stack
page read and write
587E000
stack
page read and write
2DE3000
trusted library allocation
page read and write
3041000
heap
page read and write
ADB000
heap
page read and write
3045000
heap
page read and write
7FFD9B67B000
trusted library allocation
page execute and read and write
7FFD9B700000
trusted library allocation
page read and write
309C000
heap
page read and write
DF0000
heap
page read and write
534F000
stack
page read and write
7FFD9B780000
trusted library allocation
page execute and read and write
1380000
heap
page execute and read and write
7FFD9B66D000
trusted library allocation
page execute and read and write
503000
unkown
page readonly
5A5B000
stack
page read and write
F5D000
heap
page read and write
1BB1D000
heap
page read and write
D80000
trusted library allocation
page read and write
DD0000
heap
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
7FFD9B840000
trusted library allocation
page read and write
1AA80000
trusted library allocation
page read and write
DD0000
heap
page read and write
5C6C000
stack
page read and write
304F000
heap
page read and write
5592000
heap
page read and write
1BBC6000
heap
page read and write
EF6000
stack
page read and write
140F000
stack
page read and write
3066000
heap
page read and write
1450000
heap
page read and write
3070000
heap
page read and write
7FFD9B716000
trusted library allocation
page read and write
7FFD9B80A000
trusted library allocation
page read and write
3358000
heap
page read and write
33F1000
heap
page read and write
7FFD9B800000
trusted library allocation
page read and write
503000
unkown
page readonly
11FE000
stack
page read and write
7FFD9B6BC000
trusted library allocation
page execute and read and write
7FFD9B663000
trusted library allocation
page execute and read and write
6D70000
trusted library allocation
page read and write
304E000
trusted library allocation
page read and write
1BB81000
heap
page read and write
7D6000
stack
page read and write
1228000
heap
page read and write
3210000
heap
page readonly
F20000
trusted library allocation
page read and write
A40000
heap
page read and write
13A0000
heap
page read and write
7FFD9B67D000
trusted library allocation
page execute and read and write
59DE000
stack
page read and write
1B2FD000
stack
page read and write
1C28E000
stack
page read and write
1BFBE000
stack
page read and write
DF0000
heap
page read and write
7FFD9B80C000
trusted library allocation
page read and write
7FFD9B860000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
1B69B000
stack
page read and write
4D1000
unkown
page execute read
B80000
heap
page read and write
There are 528 hidden memdumps, click here to show them.