IOC Report
DraftBl10101.exe

loading gif

Files

File Path
Type
Category
Malicious
DraftBl10101.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DraftBl10101.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DraftBl10101.exe
"C:\Users\user\Desktop\DraftBl10101.exe"
malicious
C:\Users\user\Desktop\DraftBl10101.exe
C:\Users\user\Desktop\DraftBl10101.exe
malicious

URLs

Name
IP
Malicious
147.124.209.128:7847
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
https://duckduckgo.com/chrome_newtabS
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://tempuri.org/Entity/Id3ResponseD
unknown
http://tempuri.org/Entity/Id23Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
147.124.209.128
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
3A8D000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3405000
trusted library allocation
page read and write
malicious
4FD0000
heap
page read and write
4805000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
2A8F000
trusted library allocation
page read and write
6DBE000
stack
page read and write
449A000
trusted library allocation
page read and write
5A3A000
trusted library allocation
page read and write
3543000
trusted library allocation
page read and write
450C000
trusted library allocation
page read and write
348E000
trusted library allocation
page read and write
97AD000
stack
page read and write
2AAE000
trusted library allocation
page read and write
3240000
trusted library allocation
page read and write
4515000
trusted library allocation
page read and write
288E000
stack
page read and write
2B0B000
trusted library allocation
page read and write
173B000
trusted library allocation
page execute and read and write
4F9E000
stack
page read and write
29C9000
trusted library allocation
page read and write
3826000
trusted library allocation
page read and write
34F9000
trusted library allocation
page read and write
5B8E000
stack
page read and write
2AA2000
trusted library allocation
page read and write
65AF000
stack
page read and write
2A14000
trusted library allocation
page read and write
2A7E000
trusted library allocation
page read and write
8730000
heap
page read and write
479B000
trusted library allocation
page read and write
4410000
trusted library allocation
page read and write
B85000
heap
page read and write
4E10000
trusted library allocation
page read and write
1824000
heap
page read and write
1720000
trusted library allocation
page read and write
3895000
trusted library allocation
page read and write
898F000
trusted library allocation
page read and write
358B000
trusted library allocation
page read and write
35BA000
trusted library allocation
page read and write
28AB000
trusted library allocation
page read and write
8717000
heap
page read and write
372B000
trusted library allocation
page read and write
2A09000
trusted library allocation
page read and write
15F5000
heap
page read and write
2AC6000
trusted library allocation
page read and write
451B000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
4425000
trusted library allocation
page read and write
4569000
trusted library allocation
page read and write
29F8000
trusted library allocation
page read and write
98CE000
stack
page read and write
532E000
stack
page read and write
34ED000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
2AA4000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
28C1000
trusted library allocation
page read and write
1735000
trusted library allocation
page execute and read and write
446E000
trusted library allocation
page read and write
1980000
heap
page execute and read and write
E40000
heap
page read and write
47DF000
trusted library allocation
page read and write
59A0000
trusted library allocation
page read and write
34CA000
trusted library allocation
page read and write
893F000
trusted library allocation
page read and write
2AAA000
trusted library allocation
page read and write
44FF000
trusted library allocation
page read and write
88B0000
trusted library allocation
page read and write
35E2000
trusted library allocation
page read and write
5DFE000
stack
page read and write
2982000
trusted library allocation
page read and write
86CA000
heap
page read and write
394D000
trusted library allocation
page read and write
2A62000
trusted library allocation
page read and write
2AB6000
trusted library allocation
page read and write
38E2000
trusted library allocation
page read and write
37D6000
trusted library allocation
page read and write
299F000
trusted library allocation
page read and write
2AB1000
trusted library allocation
page read and write
69EE000
stack
page read and write
29B6000
trusted library allocation
page read and write
484A000
trusted library allocation
page read and write
47C1000
trusted library allocation
page read and write
29F4000
trusted library allocation
page read and write
37E1000
trusted library allocation
page read and write
35C5000
trusted library allocation
page read and write
4634000
trusted library allocation
page read and write
86DE000
heap
page read and write
6A10000
trusted library allocation
page execute and read and write
2A72000
trusted library allocation
page read and write
19CE000
stack
page read and write
4395000
trusted library allocation
page read and write
3811000
trusted library allocation
page read and write
4555000
trusted library allocation
page read and write
572000
unkown
page readonly
2AB3000
trusted library allocation
page read and write
DF7000
trusted library allocation
page execute and read and write
DF2000
trusted library allocation
page read and write
8C82000
heap
page read and write
2A91000
trusted library allocation
page read and write
8720000
heap
page read and write
3964000
trusted library allocation
page read and write
185D000
heap
page read and write
3A57000
trusted library allocation
page read and write
86C2000
heap
page read and write
8939000
trusted library allocation
page read and write
DD0000
trusted library allocation
page read and write
2A24000
trusted library allocation
page read and write
29DB000
trusted library allocation
page read and write
A6CA000
heap
page read and write
15E0000
trusted library allocation
page read and write
11C7000
stack
page read and write
2AA8000
trusted library allocation
page read and write
29B8000
trusted library allocation
page read and write
1730000
trusted library allocation
page read and write
448A000
trusted library allocation
page read and write
47C7000
trusted library allocation
page read and write
2A70000
trusted library allocation
page read and write
29D9000
trusted library allocation
page read and write
34B0000
trusted library allocation
page read and write
6CC6000
trusted library allocation
page read and write
455E000
trusted library allocation
page read and write
3250000
trusted library allocation
page read and write
2ACE000
trusted library allocation
page read and write
4E05000
trusted library allocation
page read and write
3206000
trusted library allocation
page read and write
3801000
trusted library allocation
page read and write
37FD000
trusted library allocation
page read and write
43A1000
trusted library allocation
page read and write
3509000
trusted library allocation
page read and write
444B000
trusted library allocation
page read and write
5870000
trusted library allocation
page read and write
444000
remote allocation
page execute and read and write
47D1000
trusted library allocation
page read and write
1580000
heap
page read and write
2A5F000
trusted library allocation
page read and write
5C1A000
stack
page read and write
5A30000
trusted library allocation
page read and write
482B000
trusted library allocation
page read and write
35B2000
trusted library allocation
page read and write
97B0000
trusted library allocation
page execute and read and write
2972000
trusted library allocation
page read and write
36DF000
trusted library allocation
page read and write
2A0D000
trusted library allocation
page read and write
29BA000
trusted library allocation
page read and write
2AE3000
trusted library allocation
page read and write
E30000
trusted library allocation
page execute and read and write
2A87000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
4552000
trusted library allocation
page read and write
35D2000
trusted library allocation
page read and write
43E9000
trusted library allocation
page read and write
4AAE000
stack
page read and write
2AD0000
trusted library allocation
page read and write
3486000
trusted library allocation
page read and write
1838000
heap
page read and write
396B000
trusted library allocation
page read and write
2ACC000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
171D000
trusted library allocation
page execute and read and write
3970000
trusted library allocation
page read and write
DFB000
trusted library allocation
page execute and read and write
38EE000
trusted library allocation
page read and write
1732000
trusted library allocation
page read and write
2A7A000
trusted library allocation
page read and write
8701000
heap
page read and write
A60000
heap
page read and write
2988000
trusted library allocation
page read and write
536E000
stack
page read and write
4835000
trusted library allocation
page read and write
897A000
trusted library allocation
page read and write
2961000
trusted library allocation
page read and write
8749000
heap
page read and write
5C30000
heap
page read and write
8C18000
heap
page read and write
34A9000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
28F0000
heap
page read and write
4563000
trusted library allocation
page read and write
3223000
heap
page read and write
4FB0000
trusted library allocation
page read and write
2965000
trusted library allocation
page read and write
9C4E000
stack
page read and write
3656000
trusted library allocation
page read and write
2A22000
trusted library allocation
page read and write
47CE000
trusted library allocation
page read and write
2B00000
trusted library allocation
page read and write
38F9000
trusted library allocation
page read and write
8735000
heap
page read and write
3255000
trusted library allocation
page read and write
29D1000
trusted library allocation
page read and write
8C55000
heap
page read and write
395E000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
17FF000
heap
page read and write
276D000
stack
page read and write
1770000
heap
page read and write
1A2B000
stack
page read and write
980D000
stack
page read and write
39F4000
trusted library allocation
page read and write
58C2000
trusted library allocation
page read and write
36E9000
trusted library allocation
page read and write
5D7E000
stack
page read and write
6890000
trusted library allocation
page read and write
5A38000
trusted library allocation
page read and write
35D7000
trusted library allocation
page read and write
6850000
trusted library allocation
page execute and read and write
3721000
trusted library allocation
page read and write
4E82000
trusted library allocation
page read and write
2993000
trusted library allocation
page read and write
2A0F000
trusted library allocation
page read and write
1778000
heap
page read and write
5B6C000
stack
page read and write
8962000
trusted library allocation
page read and write
34FE000
trusted library allocation
page read and write
872A000
heap
page read and write
47DD000
trusted library allocation
page read and write
4464000
trusted library allocation
page read and write
6870000
trusted library allocation
page execute and read and write
4506000
trusted library allocation
page read and write
430000
remote allocation
page execute and read and write
86F6000
heap
page read and write
441E000
trusted library allocation
page read and write
38DE000
trusted library allocation
page read and write
28F3000
heap
page read and write
10CA000
stack
page read and write
34DB000
trusted library allocation
page read and write
2ACA000
trusted library allocation
page read and write
35CC000
trusted library allocation
page read and write
2A5D000
trusted library allocation
page read and write
1A30000
heap
page read and write
3996000
trusted library allocation
page read and write
29FB000
trusted library allocation
page read and write
3725000
trusted library allocation
page read and write
1726000
trusted library allocation
page execute and read and write
38E4000
trusted library allocation
page read and write
298C000
trusted library allocation
page read and write
5030000
heap
page execute and read and write
2911000
trusted library allocation
page read and write
296B000
trusted library allocation
page read and write
5A35000
trusted library allocation
page read and write
34D4000
trusted library allocation
page read and write
6A6E000
stack
page read and write
4573000
trusted library allocation
page read and write
8978000
trusted library allocation
page read and write
6B6E000
stack
page read and write
44A8000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
DDD000
trusted library allocation
page execute and read and write
2A78000
trusted library allocation
page read and write
44A0000
trusted library allocation
page read and write
3962000
trusted library allocation
page read and write
4469000
trusted library allocation
page read and write
8CA2000
heap
page read and write
3599000
trusted library allocation
page read and write
DE6000
trusted library allocation
page execute and read and write
2AFA000
trusted library allocation
page read and write
29D7000
trusted library allocation
page read and write
2A8B000
trusted library allocation
page read and write
3220000
heap
page read and write
2A11000
trusted library allocation
page read and write
15F0000
heap
page read and write
170D000
trusted library allocation
page execute and read and write
178E000
heap
page read and write
43FA000
trusted library allocation
page read and write
456F000
trusted library allocation
page read and write
8690000
heap
page read and write
8E9B000
trusted library allocation
page read and write
64AE000
stack
page read and write
2770000
trusted library allocation
page read and write
4528000
trusted library allocation
page read and write
DB0000
trusted library allocation
page read and write
2A8D000
trusted library allocation
page read and write
29D5000
trusted library allocation
page read and write
8E30000
trusted library allocation
page read and write
8E34000
trusted library allocation
page read and write
987000
stack
page read and write
4794000
trusted library allocation
page read and write
299D000
trusted library allocation
page read and write
455B000
trusted library allocation
page read and write
8C05000
heap
page read and write
157E000
stack
page read and write
28A0000
trusted library allocation
page read and write
44C2000
trusted library allocation
page read and write
884F000
stack
page read and write
8E42000
trusted library allocation
page read and write
8985000
trusted library allocation
page read and write
4418000
trusted library allocation
page read and write
86F1000
heap
page read and write
2A93000
trusted library allocation
page read and write
873D000
heap
page read and write
28C6000
trusted library allocation
page read and write
19D0000
trusted library allocation
page read and write
3919000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
2AC8000
trusted library allocation
page read and write
8E45000
trusted library allocation
page read and write
47DA000
trusted library allocation
page read and write
3916000
trusted library allocation
page read and write
A6E000
heap
page read and write
29D3000
trusted library allocation
page read and write
29B2000
trusted library allocation
page read and write
1710000
trusted library allocation
page read and write
8969000
trusted library allocation
page read and write
39F0000
trusted library allocation
page read and write
501E000
stack
page read and write
5370000
trusted library allocation
page read and write
39CD000
trusted library allocation
page read and write
35ED000
trusted library allocation
page read and write
17A7000
heap
page read and write
6BAC000
stack
page read and write
8BF0000
heap
page read and write
47A5000
trusted library allocation
page read and write
5A4E000
stack
page read and write
29B4000
trusted library allocation
page read and write
2A59000
trusted library allocation
page read and write
1420000
heap
page read and write
4E00000
trusted library allocation
page read and write
34BD000
trusted library allocation
page read and write
345E000
trusted library allocation
page read and write
5C20000
trusted library allocation
page read and write
31EB000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
43A3000
trusted library allocation
page read and write
1784000
heap
page read and write
4E30000
trusted library allocation
page read and write
172A000
trusted library allocation
page execute and read and write
43D4000
trusted library allocation
page read and write
6CAC000
stack
page read and write
2A74000
trusted library allocation
page read and write
8B9C000
stack
page read and write
8C66000
heap
page read and write
68E0000
trusted library allocation
page execute and read and write
E26000
heap
page read and write
86B1000
heap
page read and write
1722000
trusted library allocation
page read and write
898A000
trusted library allocation
page read and write
3468000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
68C0000
trusted library allocation
page read and write
2A7C000
trusted library allocation
page read and write
2AED000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
994E000
stack
page read and write
E29000
heap
page read and write
298F000
trusted library allocation
page read and write
A3AE000
stack
page read and write
43BB000
trusted library allocation
page read and write
2AE9000
trusted library allocation
page read and write
16FE000
stack
page read and write
4519000
trusted library allocation
page read and write
29BC000
trusted library allocation
page read and write
3371000
trusted library allocation
page read and write
2B02000
trusted library allocation
page read and write
2A83000
trusted library allocation
page read and write
4E90000
trusted library allocation
page execute and read and write
AA4000
heap
page read and write
DC3000
trusted library allocation
page execute and read and write
8850000
heap
page read and write
2900000
heap
page execute and read and write
2A95000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
47F8000
trusted library allocation
page read and write
1703000
trusted library allocation
page execute and read and write
272E000
stack
page read and write
2AAC000
trusted library allocation
page read and write
2AE1000
trusted library allocation
page read and write
358D000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
43F3000
trusted library allocation
page read and write
8980000
trusted library allocation
page read and write
59EE000
stack
page read and write
4E70000
heap
page read and write
34F4000
trusted library allocation
page read and write
3479000
trusted library allocation
page read and write
153E000
stack
page read and write
DCD000
trusted library allocation
page execute and read and write
A3E000
stack
page read and write
28E4000
trusted library allocation
page read and write
47D7000
trusted library allocation
page read and write
1750000
trusted library allocation
page read and write
443E000
trusted library allocation
page read and write
A95000
heap
page read and write
5020000
trusted library allocation
page read and write
44EA000
trusted library allocation
page read and write
28CD000
trusted library allocation
page read and write
2AD2000
trusted library allocation
page read and write
3A17000
trusted library allocation
page read and write
8C00000
heap
page read and write
43DE000
trusted library allocation
page read and write
68D3000
trusted library allocation
page read and write
396E000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
1859000
heap
page read and write
2AE7000
trusted library allocation
page read and write
6CBB000
trusted library allocation
page read and write
5F2000
unkown
page readonly
29EE000
trusted library allocation
page read and write
4670000
trusted library allocation
page read and write
4819000
trusted library allocation
page read and write
893B000
trusted library allocation
page read and write
15B0000
heap
page read and write
44AE000
trusted library allocation
page read and write
2967000
trusted library allocation
page read and write
889000
stack
page read and write
2890000
trusted library allocation
page read and write
4490000
trusted library allocation
page read and write
2780000
heap
page read and write
4830000
trusted library allocation
page read and write
8861000
trusted library allocation
page read and write
8C78000
heap
page read and write
B60000
heap
page read and write
B80000
heap
page read and write
984E000
stack
page read and write
522E000
stack
page read and write
8EB0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
451E000
trusted library allocation
page read and write
4479000
trusted library allocation
page read and write
2A5B000
trusted library allocation
page read and write
8965000
trusted library allocation
page read and write
4561000
trusted library allocation
page read and write
3A6A000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
4775000
trusted library allocation
page read and write
88A0000
trusted library allocation
page execute and read and write
2B11000
trusted library allocation
page read and write
8E2C000
stack
page read and write
3633000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
19EA000
heap
page read and write
6CDE000
trusted library allocation
page read and write
887E000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
19E0000
heap
page read and write
3974000
trusted library allocation
page read and write
39EE000
trusted library allocation
page read and write
29F6000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
6860000
trusted library allocation
page execute and read and write
2A76000
trusted library allocation
page read and write
DEA000
trusted library allocation
page execute and read and write
324E000
trusted library allocation
page read and write
3911000
trusted library allocation
page read and write
38F4000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
39E2000
trusted library allocation
page read and write
4483000
trusted library allocation
page read and write
36A8000
trusted library allocation
page read and write
2AC4000
trusted library allocation
page read and write
299B000
trusted library allocation
page read and write
296F000
trusted library allocation
page read and write
8C11000
heap
page read and write
34E2000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
2B04000
trusted library allocation
page read and write
4416000
trusted library allocation
page read and write
2B07000
trusted library allocation
page read and write
8E80000
trusted library allocation
page read and write
381B000
trusted library allocation
page read and write
47E5000
trusted library allocation
page read and write
2A57000
trusted library allocation
page read and write
5D3E000
stack
page read and write
3719000
trusted library allocation
page read and write
3583000
trusted library allocation
page read and write
8650000
heap
page read and write
3230000
trusted library allocation
page read and write
8CB2000
heap
page read and write
1704000
trusted library allocation
page read and write
4840000
trusted library allocation
page read and write
5B70000
trusted library allocation
page execute and read and write
1970000
trusted library allocation
page read and write
4545000
trusted library allocation
page read and write
8940000
trusted library allocation
page read and write
E20000
heap
page read and write
43D9000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
435000
remote allocation
page execute and read and write
3B19000
trusted library allocation
page read and write
68A0000
trusted library allocation
page execute and read and write
4812000
trusted library allocation
page read and write
9E0000
heap
page read and write
8706000
heap
page read and write
2AEB000
trusted library allocation
page read and write
44A6000
trusted library allocation
page read and write
47EC000
trusted library allocation
page read and write
6880000
trusted library allocation
page read and write
39EB000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
437F000
trusted library allocation
page read and write
4824000
trusted library allocation
page read and write
5A50000
heap
page execute and read and write
2AD7000
trusted library allocation
page read and write
3A4E000
trusted library allocation
page read and write
8950000
heap
page read and write
4400000
trusted library allocation
page read and write
44A3000
trusted library allocation
page read and write
29AC000
trusted library allocation
page read and write
3979000
trusted library allocation
page read and write
58D0000
trusted library allocation
page execute and read and write
2AA0000
trusted library allocation
page read and write
1737000
trusted library allocation
page execute and read and write
4371000
trusted library allocation
page read and write
6CC1000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
8C6F000
heap
page read and write
6DC0000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
38D5000
trusted library allocation
page read and write
4782000
trusted library allocation
page read and write
181C000
heap
page read and write
39E4000
trusted library allocation
page read and write
4497000
trusted library allocation
page read and write
47BA000
trusted library allocation
page read and write
38EB000
trusted library allocation
page read and write
58B0000
heap
page read and write
320D000
trusted library allocation
page read and write
4789000
trusted library allocation
page read and write
86B9000
heap
page read and write
5D2E000
stack
page read and write
5A2E000
stack
page read and write
29A1000
trusted library allocation
page read and write
2A20000
trusted library allocation
page read and write
296D000
trusted library allocation
page read and write
4452000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
5D80000
trusted library allocation
page execute and read and write
988E000
stack
page read and write
400000
remote allocation
page execute and read and write
3728000
trusted library allocation
page read and write
3499000
trusted library allocation
page read and write
39F9000
trusted library allocation
page read and write
3834000
trusted library allocation
page read and write
3515000
trusted library allocation
page read and write
35A6000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
454B000
trusted library allocation
page read and write
19E6000
heap
page read and write
67AE000
stack
page read and write
196F000
stack
page read and write
336E000
stack
page read and write
3840000
trusted library allocation
page read and write
357A000
trusted library allocation
page read and write
4DFF000
trusted library allocation
page read and write
43CD000
trusted library allocation
page read and write
4510000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
5378000
trusted library allocation
page read and write
DC4000
trusted library allocation
page read and write
4523000
trusted library allocation
page read and write
29DD000
trusted library allocation
page read and write
891E000
stack
page read and write
28A6000
trusted library allocation
page read and write
A6C1000
heap
page read and write
31FE000
trusted library allocation
page read and write
1760000
trusted library allocation
page execute and read and write
38F0000
trusted library allocation
page read and write
2AA6000
trusted library allocation
page read and write
2AFC000
trusted library allocation
page read and write
887B000
trusted library allocation
page read and write
3201000
trusted library allocation
page read and write
5C20000
heap
page read and write
43AE000
trusted library allocation
page read and write
43C2000
trusted library allocation
page read and write
8CC1000
heap
page read and write
2984000
trusted library allocation
page read and write
DD2000
trusted library allocation
page read and write
7EF00000
trusted library allocation
page execute and read and write
445D000
trusted library allocation
page read and write
440A000
trusted library allocation
page read and write
A6A000
heap
page read and write
9F0000
heap
page read and write
3716000
trusted library allocation
page read and write
4413000
trusted library allocation
page read and write
8875000
trusted library allocation
page read and write
462C000
trusted library allocation
page read and write
4431000
trusted library allocation
page read and write
D5E000
stack
page read and write
990F000
stack
page read and write
346C000
trusted library allocation
page read and write
2AE5000
trusted library allocation
page read and write
6CD2000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
28BE000
trusted library allocation
page read and write
3212000
trusted library allocation
page read and write
37FB000
trusted library allocation
page read and write
38CB000
trusted library allocation
page read and write
4391000
trusted library allocation
page read and write
2A55000
trusted library allocation
page read and write
A6B0000
heap
page read and write
37F0000
trusted library allocation
page read and write
4407000
trusted library allocation
page read and write
550C000
stack
page read and write
A88000
heap
page read and write
4FC0000
trusted library allocation
page execute and read and write
A1B0000
heap
page read and write
5850000
trusted library allocation
page read and write
570000
unkown
page readonly
97C0000
trusted library allocation
page execute and read and write
DC0000
trusted library allocation
page read and write
39DE000
trusted library allocation
page read and write
8C39000
heap
page read and write
8870000
trusted library allocation
page read and write
31E4000
trusted library allocation
page read and write
8C23000
heap
page read and write
67B0000
trusted library allocation
page read and write
2969000
trusted library allocation
page read and write
34A5000
trusted library allocation
page read and write
66AC000
stack
page read and write
3260000
heap
page read and write
There are 603 hidden memdumps, click here to show them.