IOC Report
vhFZk5qPZd.exe

loading gif

Files

File Path
Type
Category
Malicious
vhFZk5qPZd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vhFZk5qPZd.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\vhFZk5qPZd.exe
"C:\Users\user\Desktop\vhFZk5qPZd.exe"
malicious
C:\Users\user\Desktop\vhFZk5qPZd.exe
"C:\Users\user\Desktop\vhFZk5qPZd.exe"
malicious
C:\Users\user\Desktop\vhFZk5qPZd.exe
"C:\Users\user\Desktop\vhFZk5qPZd.exe"
malicious
C:\Users\user\Desktop\vhFZk5qPZd.exe
"C:\Users\user\Desktop\vhFZk5qPZd.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://purl.oen
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
188.190.10.19
unknown
Ukraine
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
3B29000
trusted library allocation
page read and write
malicious
3C47000
trusted library allocation
page read and write
malicious
3BFC000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
61D0000
trusted library allocation
page read and write
6512000
heap
page read and write
4F38000
trusted library allocation
page read and write
2A7C000
stack
page read and write
3C92000
trusted library allocation
page read and write
7060000
trusted library allocation
page read and write
5A7E000
stack
page read and write
2B21000
trusted library allocation
page read and write
50CC000
stack
page read and write
4189000
trusted library allocation
page read and write
3F99000
trusted library allocation
page read and write
74E0000
trusted library allocation
page execute and read and write
3F61000
trusted library allocation
page read and write
415A000
trusted library allocation
page read and write
3F3F000
trusted library allocation
page read and write
527E000
stack
page read and write
12C0000
trusted library allocation
page read and write
1013000
trusted library allocation
page read and write
15C0000
heap
page read and write
2D00000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
34A4000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
447D000
trusted library allocation
page read and write
1032000
trusted library allocation
page read and write
310A000
trusted library allocation
page read and write
A250000
trusted library allocation
page read and write
2C1E000
stack
page read and write
557E000
stack
page read and write
64F9000
heap
page read and write
30F0000
trusted library allocation
page read and write
3432000
trusted library allocation
page read and write
B50000
heap
page read and write
FF0000
heap
page read and write
1580000
trusted library allocation
page read and write
62B0000
trusted library allocation
page read and write
1022000
trusted library allocation
page read and write
2F31000
trusted library allocation
page read and write
61AA000
trusted library allocation
page read and write
2D15000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
572E000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
4108000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
F87000
stack
page read and write
5DE0000
heap
page read and write
2AD0000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
617B000
trusted library allocation
page read and write
796E000
stack
page read and write
3F94000
trusted library allocation
page read and write
3F55000
trusted library allocation
page read and write
4146000
trusted library allocation
page read and write
4489000
trusted library allocation
page read and write
104E000
stack
page read and write
64A0000
heap
page read and write
2FC6000
trusted library allocation
page read and write
2B9A000
trusted library allocation
page read and write
43E4000
trusted library allocation
page read and write
30BB000
trusted library allocation
page read and write
31B9000
trusted library allocation
page read and write
74D0000
trusted library section
page read and write
6555000
heap
page read and write
2D20000
heap
page read and write
2F2E000
stack
page read and write
107A000
heap
page read and write
50C0000
heap
page read and write
12B2000
trusted library allocation
page read and write
713B000
trusted library allocation
page read and write
64DB000
heap
page read and write
10F0000
heap
page read and write
3204000
trusted library allocation
page read and write
EF4000
trusted library allocation
page read and write
34DF000
trusted library allocation
page read and write
111E000
heap
page read and write
5490000
trusted library allocation
page execute and read and write
7346000
trusted library allocation
page read and write
435A000
trusted library allocation
page read and write
5CA0000
trusted library allocation
page execute and read and write
1136000
heap
page read and write
4453000
trusted library allocation
page read and write
BF8000
heap
page read and write
32A2000
trusted library allocation
page read and write
744F000
stack
page read and write
40FD000
trusted library allocation
page read and write
12C7000
trusted library allocation
page execute and read and write
34CF000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
43FE000
trusted library allocation
page read and write
40C2000
trusted library allocation
page read and write
7164000
heap
page read and write
52BE000
stack
page read and write
EF0000
trusted library allocation
page read and write
4115000
trusted library allocation
page read and write
2CB4000
trusted library allocation
page read and write
3103000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
412F000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
4026000
trusted library allocation
page read and write
740E000
stack
page read and write
786E000
stack
page read and write
34C3000
trusted library allocation
page read and write
EBE000
stack
page read and write
6526000
heap
page read and write
6FB0000
heap
page read and write
B9E000
stack
page read and write
4421000
trusted library allocation
page read and write
4466000
trusted library allocation
page read and write
7359000
trusted library allocation
page read and write
74DE000
stack
page read and write
701C000
stack
page read and write
1064000
heap
page read and write
7375000
trusted library allocation
page read and write
339A000
trusted library allocation
page read and write
51FE000
stack
page read and write
5700000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
A49E000
stack
page read and write
C33000
heap
page read and write
4456000
trusted library allocation
page read and write
7B30000
trusted library allocation
page execute and read and write
3509000
trusted library allocation
page read and write
5BBE000
stack
page read and write
2CB0000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
6240000
trusted library allocation
page read and write
6F60000
heap
page read and write
7480000
trusted library allocation
page read and write
2878000
trusted library allocation
page read and write
782E000
stack
page read and write
54AA000
trusted library allocation
page read and write
443D000
trusted library allocation
page read and write
7B2F000
stack
page read and write
61C0000
trusted library allocation
page read and write
414B000
trusted library allocation
page read and write
5482000
trusted library allocation
page read and write
739E000
stack
page read and write
5200000
heap
page read and write
7662000
trusted library allocation
page read and write
62A0000
trusted library allocation
page execute and read and write
646C000
stack
page read and write
3F7B000
trusted library allocation
page read and write
737F000
trusted library allocation
page read and write
436D000
trusted library allocation
page read and write
2AB2000
trusted library allocation
page read and write
E8A000
stack
page read and write
7C7E000
stack
page read and write
669C000
stack
page read and write
4F80000
heap
page read and write
33DA000
trusted library allocation
page read and write
32EB000
trusted library allocation
page read and write
3F51000
trusted library allocation
page read and write
656C000
heap
page read and write
F00000
heap
page read and write
A260000
heap
page read and write
61E0000
trusted library allocation
page execute and read and write
43BA000
trusted library allocation
page read and write
31F3000
trusted library allocation
page read and write
593E000
stack
page read and write
79EE000
stack
page read and write
3162000
trusted library allocation
page read and write
5210000
heap
page read and write
5220000
trusted library allocation
page execute and read and write
7FAE0000
trusted library allocation
page execute and read and write
50B0000
trusted library section
page readonly
30C9000
trusted library allocation
page read and write
312A000
trusted library allocation
page read and write
32C5000
trusted library allocation
page read and write
4473000
trusted library allocation
page read and write
7355000
trusted library allocation
page read and write
5730000
heap
page read and write
3342000
trusted library allocation
page read and write
3F63000
trusted library allocation
page read and write
33C1000
trusted library allocation
page read and write
3481000
trusted library allocation
page read and write
30B8000
trusted library allocation
page read and write
411A000
trusted library allocation
page read and write
415E000
trusted library allocation
page read and write
7384000
trusted library allocation
page read and write
651F000
heap
page read and write
5430000
trusted library allocation
page read and write
129D000
trusted library allocation
page execute and read and write
41A3000
trusted library allocation
page read and write
330C000
trusted library allocation
page read and write
7140000
trusted library allocation
page execute and read and write
7392000
trusted library allocation
page read and write
1250000
heap
page read and write
6181000
trusted library allocation
page read and write
4151000
trusted library allocation
page read and write
7A2E000
stack
page read and write
B10000
heap
page read and write
12C5000
trusted library allocation
page execute and read and write
1086000
heap
page read and write
6519000
heap
page read and write
4389000
trusted library allocation
page read and write
4FE0000
heap
page execute and read and write
66DE000
stack
page read and write
41C1000
trusted library allocation
page read and write
3253000
trusted library allocation
page read and write
6480000
trusted library allocation
page execute and read and write
6EAC000
stack
page read and write
4436000
trusted library allocation
page read and write
3301000
trusted library allocation
page read and write
1037000
trusted library allocation
page execute and read and write
EFD000
trusted library allocation
page execute and read and write
43CB000
trusted library allocation
page read and write
B20000
heap
page read and write
33A7000
trusted library allocation
page read and write
71BC000
heap
page read and write
6507000
heap
page read and write
4062000
trusted library allocation
page read and write
4459000
trusted library allocation
page read and write
4154000
trusted library allocation
page read and write
711E000
stack
page read and write
41BC000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
5CD5000
heap
page read and write
410F000
trusted library allocation
page read and write
3F8D000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
2CF4000
trusted library allocation
page read and write
445B000
trusted library allocation
page read and write
8031000
heap
page read and write
736A000
trusted library allocation
page read and write
7F950000
trusted library allocation
page execute and read and write
7148000
heap
page read and write
5ABE000
stack
page read and write
8036000
heap
page read and write
559E000
stack
page read and write
736F000
trusted library allocation
page read and write
43D1000
trusted library allocation
page read and write
1026000
trusted library allocation
page execute and read and write
34D4000
trusted library allocation
page read and write
63F0000
trusted library allocation
page read and write
6FD0000
heap
page read and write
7395000
trusted library allocation
page read and write
433A000
trusted library allocation
page read and write
6584000
heap
page read and write
405A000
trusted library allocation
page read and write
6542000
heap
page read and write
3F31000
trusted library allocation
page read and write
3024000
trusted library allocation
page read and write
3392000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
79AE000
stack
page read and write
15B0000
trusted library allocation
page read and write
4417000
trusted library allocation
page read and write
4483000
trusted library allocation
page read and write
3519000
trusted library allocation
page read and write
3FDD000
trusted library allocation
page read and write
15C6000
heap
page read and write
3525000
trusted library allocation
page read and write
2CE2000
trusted library allocation
page read and write
441C000
trusted library allocation
page read and write
C81000
heap
page read and write
437A000
trusted library allocation
page read and write
4405000
trusted library allocation
page read and write
8020000
heap
page read and write
61B0000
trusted library allocation
page read and write
40EA000
trusted library allocation
page read and write
4052000
trusted library allocation
page read and write
43C6000
trusted library allocation
page read and write
311F000
trusted library allocation
page read and write
A39E000
stack
page read and write
7142000
heap
page read and write
10EC000
heap
page read and write
4135000
trusted library allocation
page read and write
4307000
trusted library allocation
page read and write
401A000
trusted library allocation
page read and write
716000
unkown
page readonly
6400000
trusted library allocation
page read and write
6410000
trusted library allocation
page execute and read and write
43AD000
trusted library allocation
page read and write
66E0000
trusted library allocation
page read and write
729E000
stack
page read and write
B55000
heap
page read and write
673E000
stack
page read and write
15A0000
trusted library allocation
page read and write
2AAD000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
3200000
trusted library allocation
page read and write
5DDE000
stack
page read and write
442C000
trusted library allocation
page read and write
4073000
trusted library allocation
page read and write
4009000
trusted library allocation
page read and write
619E000
trusted library allocation
page read and write
43F1000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
7B40000
heap
page read and write
2CA0000
heap
page execute and read and write
110E000
heap
page read and write
2AA6000
trusted library allocation
page read and write
41D1000
trusted library allocation
page read and write
FF5000
heap
page read and write
30E3000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
652C000
heap
page read and write
446D000
trusted library allocation
page read and write
5CD0000
heap
page read and write
41B5000
trusted library allocation
page read and write
C25000
heap
page read and write
653D000
heap
page read and write
2B89000
trusted library allocation
page read and write
4125000
trusted library allocation
page read and write
6220000
trusted library allocation
page read and write
34B8000
trusted library allocation
page read and write
1058000
heap
page read and write
4015000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
3489000
trusted library allocation
page read and write
32F5000
trusted library allocation
page read and write
4030000
trusted library allocation
page read and write
3B21000
trusted library allocation
page read and write
64F6000
heap
page read and write
7368000
trusted library allocation
page read and write
13DE000
stack
page read and write
30D6000
trusted library allocation
page read and write
6186000
trusted library allocation
page read and write
4043000
trusted library allocation
page read and write
31C7000
trusted library allocation
page read and write
1590000
trusted library allocation
page execute and read and write
413C000
trusted library allocation
page read and write
4443000
trusted library allocation
page read and write
103B000
trusted library allocation
page execute and read and write
444D000
trusted library allocation
page read and write
102A000
trusted library allocation
page execute and read and write
1280000
trusted library allocation
page read and write
652E000
heap
page read and write
74F0000
trusted library allocation
page read and write
31E1000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2CDD000
trusted library allocation
page read and write
7160000
heap
page read and write
7343000
trusted library allocation
page read and write
403D000
trusted library allocation
page read and write
12BA000
trusted library allocation
page execute and read and write
34CA000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
7120000
heap
page read and write
43B3000
trusted library allocation
page read and write
42FB000
trusted library allocation
page read and write
BF0000
heap
page read and write
15CE000
heap
page read and write
5C6B000
stack
page read and write
3F9E000
trusted library allocation
page read and write
3F82000
trusted library allocation
page read and write
55E0000
heap
page execute and read and write
4010000
trusted library allocation
page read and write
31B2000
trusted library allocation
page read and write
64E8000
heap
page read and write
100F000
stack
page read and write
2CBB000
trusted library allocation
page read and write
4344000
trusted library allocation
page read and write
6740000
trusted library allocation
page read and write
34B1000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
670000
unkown
page readonly
101D000
trusted library allocation
page execute and read and write
737A000
trusted library allocation
page read and write
4333000
trusted library allocation
page read and write
414F000
trusted library allocation
page read and write
32AC000
trusted library allocation
page read and write
31FA000
trusted library allocation
page read and write
33C8000
trusted library allocation
page read and write
437F000
trusted library allocation
page read and write
55DE000
stack
page read and write
350D000
trusted library allocation
page read and write
2CCE000
trusted library allocation
page read and write
1290000
trusted library allocation
page read and write
63D0000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
5410000
trusted library allocation
page read and write
672000
unkown
page readonly
50C3000
heap
page read and write
3210000
trusted library allocation
page read and write
12B6000
trusted library allocation
page execute and read and write
C31000
heap
page read and write
6780000
trusted library allocation
page read and write
1000000
heap
page read and write
7474000
trusted library allocation
page read and write
5DF0000
heap
page read and write
7470000
trusted library allocation
page read and write
32D2000
trusted library allocation
page read and write
5470000
heap
page read and write
7130000
heap
page read and write
583F000
stack
page read and write
3478000
trusted library allocation
page read and write
43BD000
trusted library allocation
page read and write
2AA1000
trusted library allocation
page read and write
41AA000
trusted library allocation
page read and write
6290000
trusted library allocation
page execute and read and write
BFE000
heap
page read and write
2910000
trusted library allocation
page read and write
6FAD000
stack
page read and write
597E000
stack
page read and write
31A8000
trusted library allocation
page read and write
1294000
trusted library allocation
page read and write
33FB000
trusted library allocation
page read and write
10C0000
heap
page read and write
12D0000
heap
page read and write
659C000
heap
page read and write
30AC000
trusted library allocation
page read and write
2CD6000
trusted library allocation
page read and write
3299000
trusted library allocation
page read and write
4461000
trusted library allocation
page read and write
1293000
trusted library allocation
page execute and read and write
30AF000
trusted library allocation
page read and write
3FA9000
trusted library allocation
page read and write
33B4000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page read and write
111B000
heap
page read and write
433F000
trusted library allocation
page read and write
432000
remote allocation
page execute and read and write
109E000
stack
page read and write
4196000
trusted library allocation
page read and write
2AF0000
trusted library allocation
page read and write
7C0E000
stack
page read and write
4321000
trusted library allocation
page read and write
42DC000
trusted library allocation
page read and write
10A0000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
4350000
trusted library allocation
page read and write
572B000
trusted library allocation
page read and write
651C000
heap
page read and write
34EB000
trusted library allocation
page read and write
54A8000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
3FFE000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
657D000
heap
page read and write
5C90000
trusted library allocation
page read and write
6548000
heap
page read and write
30F8000
trusted library allocation
page read and write
2CD1000
trusted library allocation
page read and write
54A5000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
7122000
heap
page read and write
7AA000
stack
page read and write
3497000
trusted library allocation
page read and write
2A9E000
trusted library allocation
page read and write
31BB000
trusted library allocation
page read and write
12AD000
trusted library allocation
page execute and read and write
7340000
trusted library allocation
page read and write
BDD000
stack
page read and write
33E5000
trusted library allocation
page read and write
64D2000
heap
page read and write
2A3E000
stack
page read and write
7352000
trusted library allocation
page read and write
4360000
trusted library allocation
page read and write
4491000
trusted library allocation
page read and write
4F90000
trusted library allocation
page execute and read and write
348B000
trusted library allocation
page read and write
2930000
heap
page read and write
715A000
heap
page read and write
7350000
trusted library allocation
page read and write
4328000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
43C3000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page execute and read and write
417D000
trusted library allocation
page read and write
32E4000
trusted library allocation
page read and write
7D7E000
stack
page read and write
AF7000
stack
page read and write
4055000
trusted library allocation
page read and write
7490000
trusted library allocation
page execute and read and write
4047000
trusted library allocation
page read and write
41DB000
trusted library allocation
page read and write
3FB3000
trusted library allocation
page read and write
6561000
heap
page read and write
3FC7000
trusted library allocation
page read and write
3FF7000
trusted library allocation
page read and write
4314000
trusted library allocation
page read and write
6230000
trusted library allocation
page read and write
7170000
heap
page read and write
1010000
trusted library allocation
page read and write
5600000
heap
page read and write
3FD1000
trusted library allocation
page read and write
6537000
heap
page read and write
4410000
trusted library allocation
page read and write
444A000
trusted library allocation
page read and write
448B000
trusted library allocation
page read and write
32D9000
trusted library allocation
page read and write
31D4000
trusted library allocation
page read and write
4486000
trusted library allocation
page read and write
C18000
heap
page read and write
6420000
trusted library allocation
page execute and read and write
404C000
trusted library allocation
page read and write
43D8000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
4371000
trusted library allocation
page read and write
10C7000
heap
page read and write
12CB000
trusted library allocation
page execute and read and write
5230000
heap
page read and write
716A000
heap
page read and write
2E2E000
stack
page read and write
447A000
trusted library allocation
page read and write
33D4000
trusted library allocation
page read and write
43C9000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
6210000
trusted library allocation
page read and write
6192000
trusted library allocation
page read and write
2C9B000
stack
page read and write
2AC0000
trusted library allocation
page read and write
2C5E000
stack
page read and write
C36000
heap
page read and write
5480000
trusted library allocation
page read and write
7450000
trusted library allocation
page execute and read and write
31E8000
trusted library allocation
page read and write
52D0000
trusted library section
page read and write
64B7000
heap
page read and write
4367000
trusted library allocation
page read and write
32AA000
trusted library allocation
page read and write
33F0000
trusted library allocation
page read and write
4C1C000
stack
page read and write
310F000
trusted library allocation
page read and write
12C2000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
4142000
trusted library allocation
page read and write
658D000
heap
page read and write
7D0E000
stack
page read and write
63E0000
trusted library allocation
page execute and read and write
73A0000
trusted library allocation
page read and write
1220000
heap
page read and write
32B8000
trusted library allocation
page read and write
EF3000
trusted library allocation
page execute and read and write
41C6000
trusted library allocation
page read and write
4036000
trusted library allocation
page read and write
64BB000
heap
page read and write
1050000
heap
page read and write
2AC5000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
5725000
trusted library allocation
page read and write
5603000
heap
page read and write
61A1000
trusted library allocation
page read and write
4384000
trusted library allocation
page read and write
3114000
trusted library allocation
page read and write
74F3000
trusted library allocation
page read and write
4376000
trusted library allocation
page read and write
437C000
trusted library allocation
page read and write
567E000
stack
page read and write
7460000
trusted library allocation
page read and write
5E16000
heap
page read and write
EE0000
trusted library allocation
page read and write
321B000
trusted library allocation
page read and write
716D000
heap
page read and write
3388000
trusted library allocation
page read and write
547F000
stack
page read and write
EC0000
heap
page read and write
4050000
trusted library allocation
page read and write
2B10000
heap
page execute and read and write
3FEA000
trusted library allocation
page read and write
3F6E000
trusted library allocation
page read and write
There are 548 hidden memdumps, click here to show them.