IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\gdi32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
4.251.123.83:6677
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faulth
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
https://discord.com/api/v9/users/
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/example/Field1Response
unknown
http://tempuri.org/example/Field1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/example/Field3ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://tempuri.org/example/Field1
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://tempuri.org/example/Field2
unknown
http://tempuri.org/example/Field3
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://tempuri.org/D
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
unknown
http://www.w3.o
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
http://tempuri.org/example/Field3Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
unknown
http://schemas.xmlsoap.org/ws/2002/12/policy
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
4.251.123.83
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2A91000
trusted library allocation
page read and write
malicious
B02000
remote allocation
page execute and read and write
malicious
6CF1B000
unkown
page read and write
malicious
2E2C000
trusted library allocation
page read and write
DE0000
heap
page execute and read and write
8B0000
heap
page read and write
2757000
trusted library allocation
page read and write
A5F000
heap
page read and write
3751000
trusted library allocation
page read and write
726E000
stack
page read and write
615A000
trusted library allocation
page read and write
73D0000
heap
page read and write
3BFE000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
72EE000
stack
page read and write
2CE0000
trusted library allocation
page read and write
A34E000
stack
page read and write
7000000
trusted library allocation
page read and write
2D48000
trusted library allocation
page read and write
2FCE000
trusted library allocation
page read and write
B00000
remote allocation
page execute and read and write
7CEA000
heap
page read and write
50B0000
trusted library allocation
page read and write
2F7E000
trusted library allocation
page read and write
3B22000
trusted library allocation
page read and write
509D000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
72AF000
stack
page read and write
6EE0000
trusted library allocation
page execute and read and write
30BE000
trusted library allocation
page read and write
3BE9000
trusted library allocation
page read and write
3F5E000
trusted library allocation
page read and write
7E0000
heap
page read and write
5ED0000
trusted library allocation
page read and write
A2C000
heap
page read and write
30D3000
trusted library allocation
page read and write
62A0000
trusted library allocation
page execute and read and write
601F000
stack
page read and write
2D59000
trusted library allocation
page read and write
3116000
trusted library allocation
page read and write
2ECD000
trusted library allocation
page read and write
5060000
heap
page read and write
5303000
heap
page execute and read and write
4419000
trusted library allocation
page read and write
3A40000
trusted library allocation
page read and write
2762000
trusted library allocation
page read and write
5605000
trusted library allocation
page read and write
3043000
trusted library allocation
page read and write
A0E000
heap
page read and write
3019000
trusted library allocation
page read and write
2FB2000
trusted library allocation
page read and write
CE7000
heap
page read and write
3C59000
trusted library allocation
page read and write
6280000
trusted library allocation
page execute and read and write
746A000
heap
page read and write
3B81000
trusted library allocation
page read and write
7461000
heap
page read and write
EB8000
heap
page read and write
DA2000
trusted library allocation
page read and write
3060000
trusted library allocation
page read and write
2EAA000
trusted library allocation
page read and write
F2E000
heap
page read and write
2CFD000
trusted library allocation
page read and write
7D0000
heap
page read and write
311A000
trusted library allocation
page read and write
715E000
stack
page read and write
5050000
trusted library allocation
page read and write
2D27000
trusted library allocation
page read and write
3000000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page execute and read and write
3B7B000
trusted library allocation
page read and write
2E73000
trusted library allocation
page read and write
2CDC000
trusted library allocation
page read and write
55F0000
trusted library allocation
page execute and read and write
2BE2000
trusted library allocation
page read and write
2C66000
trusted library allocation
page read and write
2FAA000
trusted library allocation
page read and write
7190000
trusted library allocation
page read and write
2C5C000
trusted library allocation
page read and write
3BC8000
trusted library allocation
page read and write
2EE6000
trusted library allocation
page read and write
2D25000
trusted library allocation
page read and write
A6D000
heap
page read and write
E88000
heap
page read and write
2F6B000
trusted library allocation
page read and write
3D92000
trusted library allocation
page read and write
6180000
trusted library allocation
page execute and read and write
30F9000
trusted library allocation
page read and write
6FF0000
trusted library allocation
page execute and read and write
30F7000
trusted library allocation
page read and write
2C49000
trusted library allocation
page read and write
536E000
stack
page read and write
2C20000
trusted library allocation
page read and write
2F0C000
trusted library allocation
page read and write
A44E000
stack
page read and write
71D0000
trusted library allocation
page read and write
7403000
heap
page read and write
DAB000
trusted library allocation
page execute and read and write
6CFD2000
unkown
page readonly
2F78000
trusted library allocation
page read and write
5B69000
trusted library allocation
page read and write
E50000
heap
page read and write
7380000
heap
page read and write
D64000
trusted library allocation
page read and write
409B000
trusted library allocation
page read and write
30A9000
trusted library allocation
page read and write
30FD000
trusted library allocation
page read and write
2C73000
trusted library allocation
page read and write
643E000
stack
page read and write
2F1A000
trusted library allocation
page read and write
2E5A000
trusted library allocation
page read and write
484E000
stack
page read and write
2E32000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
3D81000
trusted library allocation
page read and write
2CAD000
trusted library allocation
page read and write
2CD8000
trusted library allocation
page read and write
26BE000
stack
page read and write
2E34000
trusted library allocation
page read and write
2FFE000
trusted library allocation
page read and write
4C70000
heap
page execute and read and write
5A56000
trusted library allocation
page read and write
5581000
trusted library allocation
page read and write
3D21000
trusted library allocation
page read and write
705E000
stack
page read and write
7499000
heap
page read and write
603C000
heap
page read and write
D96000
trusted library allocation
page execute and read and write
585D000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
44EB000
trusted library allocation
page read and write
6195000
trusted library allocation
page read and write
2F31000
trusted library allocation
page read and write
2E66000
trusted library allocation
page read and write
2EFD000
trusted library allocation
page read and write
3013000
trusted library allocation
page read and write
2CAF000
trusted library allocation
page read and write
2D42000
trusted library allocation
page read and write
2F16000
trusted library allocation
page read and write
30C6000
trusted library allocation
page read and write
6CF01000
unkown
page execute read
2F46000
trusted library allocation
page read and write
6160000
trusted library allocation
page read and write
560B000
trusted library allocation
page read and write
63D0000
trusted library allocation
page read and write
3C66000
trusted library allocation
page read and write
301E000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
3D49000
trusted library allocation
page read and write
3C43000
trusted library allocation
page read and write
310E000
trusted library allocation
page read and write
748E000
heap
page read and write
3B6F000
trusted library allocation
page read and write
6210000
trusted library allocation
page read and write
6CF69000
unkown
page read and write
6025000
heap
page read and write
D50000
heap
page read and write
6038000
heap
page read and write
602D000
heap
page read and write
3C11000
trusted library allocation
page read and write
66C000
stack
page read and write
2EC9000
trusted library allocation
page read and write
30AD000
trusted library allocation
page read and write
EE9000
heap
page read and write
2D00000
trusted library allocation
page read and write
2C43000
trusted library allocation
page read and write
2C79000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
2F82000
trusted library allocation
page read and write
30A1000
trusted library allocation
page read and write
2CAB000
trusted library allocation
page read and write
3C2E000
trusted library allocation
page read and write
2C41000
trusted library allocation
page read and write
3D2D000
trusted library allocation
page read and write
2E1B000
trusted library allocation
page read and write
3032000
trusted library allocation
page read and write
30F3000
trusted library allocation
page read and write
2C62000
trusted library allocation
page read and write
5CCE000
stack
page read and write
7300000
trusted library allocation
page read and write
7CCD000
stack
page read and write
6046000
heap
page read and write
D6D000
trusted library allocation
page execute and read and write
7204000
trusted library allocation
page read and write
6460000
trusted library allocation
page execute and read and write
7212000
trusted library allocation
page read and write
6230000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
3C5F000
trusted library allocation
page read and write
2E45000
trusted library allocation
page read and write
6FAE000
stack
page read and write
2FA8000
trusted library allocation
page read and write
5300000
heap
page execute and read and write
2CFB000
trusted library allocation
page read and write
3E5C000
trusted library allocation
page read and write
3C00000
trusted library allocation
page read and write
25B0000
heap
page read and write
30A7000
trusted library allocation
page read and write
769000
stack
page read and write
B51000
remote allocation
page execute and read and write
7481000
heap
page read and write
2C95000
trusted library allocation
page read and write
742F000
heap
page read and write
55EE000
stack
page read and write
619E000
trusted library allocation
page read and write
2E99000
trusted library allocation
page read and write
66EC000
trusted library allocation
page read and write
66AE000
stack
page read and write
44C2000
trusted library allocation
page read and write
605A000
heap
page read and write
2751000
trusted library allocation
page read and write
4F40000
heap
page read and write
4295000
trusted library allocation
page read and write
8317000
heap
page read and write
2E19000
trusted library allocation
page read and write
2F4C000
trusted library allocation
page read and write
CCD000
stack
page read and write
76B000
stack
page read and write
469A000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
3C14000
trusted library allocation
page read and write
2F65000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
312F000
trusted library allocation
page read and write
2700000
trusted library allocation
page execute and read and write
61C0000
trusted library allocation
page read and write
2BF0000
trusted library allocation
page read and write
2E41000
trusted library allocation
page read and write
666C000
stack
page read and write
30D6000
trusted library allocation
page read and write
5096000
trusted library allocation
page read and write
428E000
trusted library allocation
page read and write
2EE8000
trusted library allocation
page read and write
117E000
stack
page read and write
390000
unkown
page readonly
2EA8000
trusted library allocation
page read and write
74CB000
heap
page read and write
3C1A000
trusted library allocation
page read and write
2C8A000
trusted library allocation
page read and write
30AB000
trusted library allocation
page read and write
71B0000
heap
page read and write
D90000
trusted library allocation
page read and write
3DA5000
trusted library allocation
page read and write
107E000
stack
page read and write
7210000
trusted library allocation
page read and write
5130000
heap
page read and write
2E47000
trusted library allocation
page read and write
6CF14000
unkown
page readonly
30C8000
trusted library allocation
page read and write
73FE000
heap
page read and write
6136000
trusted library allocation
page read and write
5E60000
heap
page execute and read and write
6450000
trusted library allocation
page execute and read and write
3D37000
trusted library allocation
page read and write
30F5000
trusted library allocation
page read and write
507B000
trusted library allocation
page read and write
61B0000
trusted library allocation
page read and write
2CBA000
trusted library allocation
page read and write
3C36000
trusted library allocation
page read and write
74E7000
heap
page read and write
2CA1000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
30A5000
trusted library allocation
page read and write
565D000
trusted library allocation
page read and write
2D3C000
trusted library allocation
page read and write
9F0000
heap
page read and write
4704000
trusted library allocation
page read and write
7412000
heap
page read and write
3BF8000
trusted library allocation
page read and write
2C26000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
6720000
trusted library allocation
page execute and read and write
D5D000
heap
page read and write
66D0000
trusted library allocation
page read and write
2FE7000
trusted library allocation
page read and write
2D17000
trusted library allocation
page read and write
2F4E000
trusted library allocation
page read and write
2BDD000
trusted library allocation
page read and write
D2E000
stack
page read and write
2F44000
trusted library allocation
page read and write
3D44000
trusted library allocation
page read and write
2E1F000
trusted library allocation
page read and write
24A0000
trusted library allocation
page read and write
612B000
trusted library allocation
page read and write
2FE9000
trusted library allocation
page read and write
F7C000
heap
page read and write
309F000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
71F5000
trusted library allocation
page read and write
E80000
heap
page read and write
D60000
trusted library allocation
page read and write
6E5D000
stack
page read and write
3A53000
trusted library allocation
page read and write
71D9000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
5074000
trusted library allocation
page read and write
44BB000
trusted library allocation
page read and write
3D60000
trusted library allocation
page read and write
54AE000
stack
page read and write
6200000
trusted library allocation
page read and write
2CBE000
trusted library allocation
page read and write
3007000
trusted library allocation
page read and write
5675000
trusted library allocation
page read and write
2CCE000
trusted library allocation
page read and write
3C27000
trusted library allocation
page read and write
6050000
heap
page read and write
2F12000
trusted library allocation
page read and write
F36000
heap
page read and write
3D53000
trusted library allocation
page read and write
3D65000
trusted library allocation
page read and write
304B000
trusted library allocation
page read and write
2EF5000
trusted library allocation
page read and write
4BCE000
stack
page read and write
2C13000
trusted library allocation
page read and write
730A000
trusted library allocation
page read and write
6104000
heap
page read and write
3D75000
trusted library allocation
page read and write
304D000
trusted library allocation
page read and write
A00000
heap
page read and write
6FB0000
trusted library allocation
page execute and read and write
2C75000
trusted library allocation
page read and write
6142000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
656C000
stack
page read and write
2E2E000
trusted library allocation
page read and write
2C92000
trusted library allocation
page read and write
743E000
heap
page read and write
E30000
trusted library allocation
page read and write
2F0E000
trusted library allocation
page read and write
71FF000
stack
page read and write
74AA000
heap
page read and write
DC0000
trusted library allocation
page read and write
9C3000
trusted library allocation
page execute and read and write
7409000
heap
page read and write
2CDA000
trusted library allocation
page read and write
2F63000
trusted library allocation
page read and write
6290000
trusted library allocation
page read and write
7434000
heap
page read and write
55AE000
stack
page read and write
2FDF000
trusted library allocation
page read and write
2F52000
trusted library allocation
page read and write
7546000
heap
page read and write
6131000
trusted library allocation
page read and write
74A7000
heap
page read and write
3A35000
trusted library allocation
page read and write
7517000
heap
page read and write
619B000
trusted library allocation
page read and write
2FEC000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
3BD5000
trusted library allocation
page read and write
2D3E000
trusted library allocation
page read and write
6028000
heap
page read and write
90E000
stack
page read and write
2E62000
trusted library allocation
page read and write
2CF9000
trusted library allocation
page read and write
3E57000
trusted library allocation
page read and write
A34000
heap
page read and write
F79000
heap
page read and write
2F69000
trusted library allocation
page read and write
2ECB000
trusted library allocation
page read and write
71EF000
trusted library allocation
page read and write
546E000
stack
page read and write
3B28000
trusted library allocation
page read and write
2720000
trusted library allocation
page read and write
2C31000
trusted library allocation
page read and write
7479000
heap
page read and write
6100000
heap
page read and write
2CF3000
trusted library allocation
page read and write
76CE000
stack
page read and write
2FC3000
trusted library allocation
page read and write
71E8000
trusted library allocation
page read and write
66E0000
trusted library allocation
page read and write
4AFC000
stack
page read and write
5040000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
30FB000
trusted library allocation
page read and write
980000
heap
page read and write
2D5D000
trusted library allocation
page read and write
2CE5000
trusted library allocation
page read and write
F12000
heap
page read and write
71C0000
trusted library allocation
page read and write
8311000
heap
page read and write
3C05000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
5A4F000
trusted library allocation
page read and write
7CE0000
heap
page read and write
61D0000
trusted library allocation
page execute and read and write
2FFC000
trusted library allocation
page read and write
9B0000
trusted library allocation
page read and write
2AA6000
trusted library allocation
page read and write
71D5000
trusted library allocation
page read and write
3131000
trusted library allocation
page read and write
3C68000
trusted library allocation
page read and write
3D3D000
trusted library allocation
page read and write
D7D000
trusted library allocation
page execute and read and write
2D12000
trusted library allocation
page read and write
30A3000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
2CA7000
trusted library allocation
page read and write
3DF1000
trusted library allocation
page read and write
2BDB000
trusted library allocation
page read and write
3F55000
trusted library allocation
page read and write
3B74000
trusted library allocation
page read and write
7307000
trusted library allocation
page read and write
5120000
heap
page read and write
2C0B000
trusted library allocation
page read and write
50A2000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
3D50000
trusted library allocation
page read and write
2FB4000
trusted library allocation
page read and write
3045000
trusted library allocation
page read and write
2A21000
trusted library allocation
page read and write
2E5E000
trusted library allocation
page read and write
2EB4000
trusted library allocation
page read and write
2F4A000
trusted library allocation
page read and write
6042000
heap
page read and write
3D6C000
trusted library allocation
page read and write
2D57000
trusted library allocation
page read and write
2C1E000
trusted library allocation
page read and write
2F97000
trusted library allocation
page read and write
305C000
trusted library allocation
page read and write
3C0B000
trusted library allocation
page read and write
3BE4000
trusted library allocation
page read and write
26FE000
stack
page read and write
392000
unkown
page readonly
7D0000
heap
page read and write
4A28000
trusted library allocation
page read and write
3D88000
trusted library allocation
page read and write
404A000
trusted library allocation
page read and write
3A4D000
trusted library allocation
page read and write
2D55000
trusted library allocation
page read and write
2C3D000
trusted library allocation
page read and write
71D2000
trusted library allocation
page read and write
2F36000
trusted library allocation
page read and write
2EC7000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
4D7E000
stack
page read and write
30C4000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
7523000
heap
page read and write
6440000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
D63000
trusted library allocation
page execute and read and write
60A7000
heap
page read and write
6120000
trusted library allocation
page read and write
3D59000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
2F25000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
560A000
trusted library allocation
page read and write
9D4000
trusted library allocation
page read and write
5070000
trusted library allocation
page read and write
2C58000
trusted library allocation
page read and write
3D78000
trusted library allocation
page read and write
2F18000
trusted library allocation
page read and write
2C09000
trusted library allocation
page read and write
505E000
trusted library allocation
page read and write
42BE000
trusted library allocation
page read and write
24A7000
trusted library allocation
page execute and read and write
3D24000
trusted library allocation
page read and write
614E000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
4C10000
trusted library section
page read and write
6064000
heap
page read and write
6F6D000
stack
page read and write
3D28000
trusted library allocation
page read and write
73C0000
trusted library allocation
page execute and read and write
E40000
trusted library allocation
page read and write
73E7000
heap
page read and write
2C7B000
trusted library allocation
page read and write
508E000
trusted library allocation
page read and write
2E71000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
6CF00000
unkown
page readonly
24C0000
trusted library allocation
page read and write
2A1F000
stack
page read and write
3BCD000
trusted library allocation
page read and write
2EE4000
trusted library allocation
page read and write
63F0000
trusted library allocation
page execute and read and write
6FE0000
trusted library allocation
page read and write
5140000
trusted library allocation
page execute and read and write
744F000
heap
page read and write
74C2000
heap
page read and write
737B000
stack
page read and write
7310000
trusted library allocation
page read and write
2C24000
trusted library allocation
page read and write
2C3F000
trusted library allocation
page read and write
305E000
trusted library allocation
page read and write
2766000
trusted library allocation
page read and write
7200000
trusted library allocation
page read and write
2E28000
trusted library allocation
page read and write
2E4C000
trusted library allocation
page read and write
6CFA7000
unkown
page read and write
D57000
heap
page read and write
3C1C000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page execute and read and write
AF7000
stack
page read and write
3A92000
trusted library allocation
page read and write
3D6F000
trusted library allocation
page read and write
3BDA000
trusted library allocation
page read and write
F6C000
heap
page read and write
3E4A000
trusted library allocation
page read and write
250E000
stack
page read and write
2C22000
trusted library allocation
page read and write
2BF2000
trusted library allocation
page read and write
5E5D000
stack
page read and write
5A7F000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
3DFE000
trusted library allocation
page read and write
3B1B000
trusted library allocation
page read and write
7215000
trusted library allocation
page read and write
D40000
trusted library allocation
page read and write
3118000
trusted library allocation
page read and write
6710000
trusted library allocation
page execute and read and write
3DAA000
trusted library allocation
page read and write
94E000
stack
page read and write
D92000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
46EC000
trusted library allocation
page read and write
2C0F000
trusted library allocation
page read and write
2EE0000
trusted library allocation
page read and write
3BE2000
trusted library allocation
page read and write
2E13000
trusted library allocation
page read and write
3A31000
trusted library allocation
page read and write
DA5000
trusted library allocation
page execute and read and write
3034000
trusted library allocation
page read and write
8C0000
heap
page read and write
5EDC000
trusted library allocation
page read and write
A41000
heap
page read and write
3002000
trusted library allocation
page read and write
30FF000
trusted library allocation
page read and write
5F1E000
stack
page read and write
2F61000
trusted library allocation
page read and write
DD0000
trusted library allocation
page execute and read and write
CFF000
stack
page read and write
2D5B000
trusted library allocation
page read and write
2C2E000
trusted library allocation
page read and write
960000
heap
page read and write
3050000
trusted library allocation
page read and write
AA5000
heap
page read and write
D80000
heap
page read and write
6190000
trusted library allocation
page read and write
5063000
heap
page read and write
2740000
heap
page execute and read and write
2E15000
trusted library allocation
page read and write
73E1000
heap
page read and write
2FE3000
trusted library allocation
page read and write
2ED1000
trusted library allocation
page read and write
2CBC000
trusted library allocation
page read and write
5B2C000
trusted library allocation
page read and write
2F27000
trusted library allocation
page read and write
3B16000
trusted library allocation
page read and write
74B6000
heap
page read and write
3C3D000
trusted library allocation
page read and write
71FA000
trusted library allocation
page read and write
2FB6000
trusted library allocation
page read and write
2E1D000
trusted library allocation
page read and write
50B5000
trusted library allocation
page read and write
2D44000
trusted library allocation
page read and write
3DF7000
trusted library allocation
page read and write
59AD000
trusted library allocation
page read and write
FFAA0000
trusted library allocation
page execute and read and write
5D5E000
stack
page read and write
3E03000
trusted library allocation
page read and write
2C5E000
trusted library allocation
page read and write
30D8000
trusted library allocation
page read and write
3A3B000
trusted library allocation
page read and write
71FF000
trusted library allocation
page read and write
2E64000
trusted library allocation
page read and write
E60000
heap
page read and write
2D40000
trusted library allocation
page read and write
5875000
trusted library allocation
page read and write
2CE2000
trusted library allocation
page read and write
E2E000
stack
page read and write
A2FD000
stack
page read and write
2EB6000
trusted library allocation
page read and write
301B000
trusted library allocation
page read and write
3BF5000
trusted library allocation
page read and write
2CA5000
trusted library allocation
page read and write
2C0D000
trusted library allocation
page read and write
3D7C000
trusted library allocation
page read and write
A9C000
heap
page read and write
2E36000
trusted library allocation
page read and write
60F6000
heap
page read and write
2E60000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
2F33000
trusted library allocation
page read and write
3C54000
trusted library allocation
page read and write
A08000
heap
page read and write
4C5E000
stack
page read and write
2CDE000
trusted library allocation
page read and write
74AC000
heap
page read and write
2F10000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
3C21000
trusted library allocation
page read and write
6220000
trusted library allocation
page read and write
3047000
trusted library allocation
page read and write
3E50000
trusted library allocation
page read and write
2FAE000
trusted library allocation
page read and write
30BC000
trusted library allocation
page read and write
2C47000
trusted library allocation
page read and write
7429000
heap
page read and write
4BFC000
stack
page read and write
2EAC000
trusted library allocation
page read and write
D73000
trusted library allocation
page read and write
2F95000
trusted library allocation
page read and write
2C07000
trusted library allocation
page read and write
D85000
heap
page read and write
2EB2000
trusted library allocation
page read and write
DA7000
trusted library allocation
page execute and read and write
24AB000
trusted library allocation
page execute and read and write
EAA000
heap
page read and write
3C4C000
trusted library allocation
page read and write
2F2B000
trusted library allocation
page read and write
5091000
trusted library allocation
page read and write
41EC000
trusted library allocation
page read and write
580B000
trusted library allocation
page read and write
2710000
trusted library allocation
page read and write
6151000
trusted library allocation
page read and write
2F7C000
trusted library allocation
page read and write
6020000
heap
page read and write
745C000
heap
page read and write
BFF000
stack
page read and write
5781000
trusted library allocation
page read and write
5ECC000
stack
page read and write
8B5000
heap
page read and write
40B3000
trusted library allocation
page read and write
2F50000
trusted library allocation
page read and write
2F29000
trusted library allocation
page read and write
6171000
trusted library allocation
page read and write
3D34000
trusted library allocation
page read and write
3C72000
trusted library allocation
page read and write
8300000
heap
page read and write
4C0E000
stack
page read and write
2FC1000
trusted library allocation
page read and write
2F5F000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
3BEF000
trusted library allocation
page read and write
7509000
heap
page read and write
50E0000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
3C4A000
trusted library allocation
page read and write
7010000
trusted library allocation
page execute and read and write
5E80000
trusted library allocation
page read and write
3A47000
trusted library allocation
page read and write
3C38000
trusted library allocation
page read and write
4F50000
heap
page read and write
B8E000
remote allocation
page execute and read and write
F46000
heap
page read and write
2FE1000
trusted library allocation
page read and write
9C4000
trusted library allocation
page read and write
CE0000
heap
page read and write
3D5C000
trusted library allocation
page read and write
30F1000
trusted library allocation
page read and write
2EAE000
trusted library allocation
page read and write
2CA3000
trusted library allocation
page read and write
305A000
trusted library allocation
page read and write
There are 648 hidden memdumps, click here to show them.