IOC Report
Z4uyrnCQ8L.exe

loading gif

Files

File Path
Type
Category
Malicious
Z4uyrnCQ8L.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Z4uyrnCQ8L.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Z4uyrnCQ8L.exe
"C:\Users\user\Desktop\Z4uyrnCQ8L.exe"
malicious

URLs

Name
IP
Malicious
4.251.123.83:6677
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
https://discord.com/api/v9/users/
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/example/Field1Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://www.w3.oh
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://tempuri.org/example/Field1
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://tempuri.org/example/Field2
unknown
http://tempuri.org/example/Field3
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
http://tempuri.org/example/Field3Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
unknown
http://schemas.xmlsoap.org/ws/2002/12/policy
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
4.251.123.83
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2944000
trusted library allocation
page read and write
malicious
4C2000
unkown
page readonly
malicious
2FF7000
trusted library allocation
page read and write
2CAD000
trusted library allocation
page read and write
2F3A000
trusted library allocation
page read and write
2CFC000
trusted library allocation
page read and write
1B8A0000
heap
page read and write
7FF7BFF50000
trusted library allocation
page read and write
12931000
trusted library allocation
page read and write
2E54000
trusted library allocation
page read and write
2D7F000
trusted library allocation
page read and write
2F75000
trusted library allocation
page read and write
12A68000
trusted library allocation
page read and write
97F000
heap
page read and write
2F25000
trusted library allocation
page read and write
1BD90000
heap
page read and write
2C27000
trusted library allocation
page read and write
2DF6000
trusted library allocation
page read and write
7FF7BFF99000
trusted library allocation
page read and write
1B8AB000
heap
page read and write
12CC9000
trusted library allocation
page read and write
2DD7000
trusted library allocation
page read and write
1B750000
heap
page execute and read and write
7FF7C0260000
trusted library allocation
page read and write
12B10000
trusted library allocation
page read and write
2FB7000
trusted library allocation
page read and write
3028000
trusted library allocation
page read and write
2EE3000
trusted library allocation
page read and write
12AE0000
trusted library allocation
page read and write
129B6000
trusted library allocation
page read and write
1B54F000
stack
page read and write
91C000
heap
page read and write
12944000
trusted library allocation
page read and write
1BEC5000
heap
page read and write
2EE1000
trusted library allocation
page read and write
2C94000
trusted library allocation
page read and write
7FF7BFDA3000
trusted library allocation
page read and write
7FF7BFE76000
trusted library allocation
page execute and read and write
2FC4000
trusted library allocation
page read and write
12A27000
trusted library allocation
page read and write
12A9D000
trusted library allocation
page read and write
1BF18000
heap
page read and write
2F07000
trusted library allocation
page read and write
AF0000
heap
page read and write
2D9F000
trusted library allocation
page read and write
2E74000
trusted library allocation
page read and write
2FC6000
trusted library allocation
page read and write
C10000
heap
page read and write
3090000
trusted library allocation
page read and write
AE5000
heap
page read and write
2D1A000
trusted library allocation
page read and write
2E43000
trusted library allocation
page read and write
1BE51000
heap
page read and write
2FC0000
trusted library allocation
page read and write
2CDE000
trusted library allocation
page read and write
12A04000
trusted library allocation
page read and write
D30000
heap
page read and write
AE0000
heap
page read and write
1B8D4000
heap
page read and write
2F67000
trusted library allocation
page read and write
12CE4000
trusted library allocation
page read and write
7FF7BFD9D000
trusted library allocation
page execute and read and write
1B8E9000
heap
page read and write
1B9EF000
stack
page read and write
2FEA000
trusted library allocation
page read and write
1BD8B000
stack
page read and write
12981000
trusted library allocation
page read and write
2D1C000
trusted library allocation
page read and write
129EB000
trusted library allocation
page read and write
12997000
trusted library allocation
page read and write
7FF7C0080000
trusted library allocation
page read and write
129B1000
trusted library allocation
page read and write
7FF7C0240000
trusted library allocation
page read and write
3031000
trusted library allocation
page read and write
1D13D000
heap
page read and write
1BF3A000
heap
page read and write
12A7B000
trusted library allocation
page read and write
1B64E000
stack
page read and write
2EE8000
trusted library allocation
page read and write
27F0000
trusted library allocation
page read and write
1B8E4000
heap
page read and write
2E25000
trusted library allocation
page read and write
12ABE000
trusted library allocation
page read and write
1BEB9000
heap
page read and write
12AA6000
trusted library allocation
page read and write
900000
heap
page read and write
7FF7C0238000
trusted library allocation
page read and write
7FF7C01B4000
trusted library allocation
page read and write
30A1000
trusted library allocation
page read and write
12A11000
trusted library allocation
page read and write
7FF7C01DD000
trusted library allocation
page read and write
295D000
trusted library allocation
page read and write
128D8000
trusted library allocation
page read and write
1295B000
trusted library allocation
page read and write
7FF7BFFDC000
trusted library allocation
page read and write
12AC8000
trusted library allocation
page read and write
3054000
trusted library allocation
page read and write
12991000
trusted library allocation
page read and write
129FE000
trusted library allocation
page read and write
3092000
trusted library allocation
page read and write
129C1000
trusted library allocation
page read and write
1B896000
heap
page read and write
7FF7C0000000
trusted library allocation
page execute and read and write
128B1000
trusted library allocation
page read and write
1BDDE000
heap
page read and write
1BDFD000
heap
page read and write
1B344000
heap
page execute and read and write
7FF7C0040000
trusted library allocation
page read and write
129A8000
trusted library allocation
page read and write
7FF7C01E3000
trusted library allocation
page read and write
12A51000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
129E1000
trusted library allocation
page read and write
2D57000
trusted library allocation
page read and write
2FF5000
trusted library allocation
page read and write
12CD6000
trusted library allocation
page read and write
2F98000
trusted library allocation
page read and write
7FF7C0070000
trusted library allocation
page execute and read and write
2DC1000
trusted library allocation
page read and write
97D000
heap
page read and write
27CE000
stack
page read and write
12A38000
trusted library allocation
page read and write
2F93000
trusted library allocation
page read and write
1B8DC000
heap
page read and write
2F4B000
trusted library allocation
page read and write
2D9B000
trusted library allocation
page read and write
12AA1000
trusted library allocation
page read and write
2F32000
trusted library allocation
page read and write
2D22000
trusted library allocation
page read and write
129BB000
trusted library allocation
page read and write
12A08000
trusted library allocation
page read and write
2D55000
trusted library allocation
page read and write
2E65000
trusted library allocation
page read and write
2CE2000
trusted library allocation
page read and write
2F73000
trusted library allocation
page read and write
2D6F000
trusted library allocation
page read and write
7FF7C00B0000
trusted library allocation
page read and write
1B876000
heap
page read and write
12961000
trusted library allocation
page read and write
28A0000
heap
page execute and read and write
1C20E000
stack
page read and write
2C21000
trusted library allocation
page read and write
2DCC000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
3017000
trusted library allocation
page read and write
F20000
heap
page read and write
1297D000
trusted library allocation
page read and write
2F18000
trusted library allocation
page read and write
2E67000
trusted library allocation
page read and write
7FF7C00C0000
trusted library allocation
page read and write
128CB000
trusted library allocation
page read and write
7FF7C0170000
trusted library allocation
page read and write
7FF7C01B0000
trusted library allocation
page read and write
7FF7BFF40000
trusted library allocation
page read and write
128DD000
trusted library allocation
page read and write
2E76000
trusted library allocation
page read and write
7FF7BFE40000
trusted library allocation
page read and write
1BEEF000
heap
page read and write
3004000
trusted library allocation
page read and write
1BE0E000
heap
page read and write
3006000
trusted library allocation
page read and write
1BE84000
heap
page read and write
2D8E000
trusted library allocation
page read and write
2ED2000
trusted library allocation
page read and write
2CCB000
trusted library allocation
page read and write
7FF7C01CB000
trusted library allocation
page read and write
1299E000
trusted library allocation
page read and write
2D6A000
trusted library allocation
page read and write
4C0000
unkown
page readonly
306C000
trusted library allocation
page read and write
2E29000
trusted library allocation
page read and write
2DDD000
trusted library allocation
page read and write
12AD1000
trusted library allocation
page read and write
2CBA000
trusted library allocation
page read and write
1B8E7000
heap
page read and write
7FF7C0290000
trusted library allocation
page read and write
2EDF000
trusted library allocation
page read and write
30AC000
trusted library allocation
page read and write
910000
heap
page read and write
1BDF7000
heap
page read and write
2F49000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
129E6000
trusted library allocation
page read and write
7FF7BFF60000
trusted library allocation
page read and write
7FF7C0150000
trusted library allocation
page read and write
129AD000
trusted library allocation
page read and write
7FF7C01C9000
trusted library allocation
page read and write
12B06000
trusted library allocation
page read and write
7FF7BFE50000
trusted library allocation
page execute and read and write
7FF7C01AD000
trusted library allocation
page read and write
7FF7BFFAB000
trusted library allocation
page read and write
2E56000
trusted library allocation
page read and write
12A64000
trusted library allocation
page read and write
1BE2C000
heap
page read and write
1BF12000
heap
page read and write
2E16000
trusted library allocation
page read and write
304C000
trusted library allocation
page read and write
4C0000
unkown
page readonly
12A76000
trusted library allocation
page read and write
1B44F000
stack
page read and write
7FF7BFDB4000
trusted library allocation
page read and write
1BA70000
heap
page read and write
2D59000
trusted library allocation
page read and write
12AA3000
trusted library allocation
page read and write
7FF7BFFF0000
trusted library allocation
page read and write
12AB7000
trusted library allocation
page read and write
2D6C000
trusted library allocation
page read and write
988000
heap
page read and write
511000
unkown
page readonly
12937000
trusted library allocation
page read and write
2CB8000
trusted library allocation
page read and write
309D000
trusted library allocation
page read and write
129D4000
trusted library allocation
page read and write
3039000
trusted library allocation
page read and write
1D120000
heap
page read and write
1294D000
trusted library allocation
page read and write
2E08000
trusted library allocation
page read and write
D2E000
stack
page read and write
12CF7000
trusted library allocation
page read and write
12A94000
trusted library allocation
page read and write
2CB6000
trusted library allocation
page read and write
1B86E000
stack
page read and write
2C9D000
trusted library allocation
page read and write
12A4B000
trusted library allocation
page read and write
12A21000
trusted library allocation
page read and write
2DF2000
trusted library allocation
page read and write
2EF8000
trusted library allocation
page read and write
7FF7C0190000
trusted library allocation
page read and write
2EF6000
trusted library allocation
page read and write
7FF7C0030000
trusted library allocation
page read and write
A0D000
heap
page read and write
7FF7BFFE0000
trusted library allocation
page read and write
7FF7C0060000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
2EFA000
trusted library allocation
page read and write
2F38000
trusted library allocation
page read and write
12A57000
trusted library allocation
page read and write
1BDD4000
heap
page read and write
F10000
heap
page read and write
1296E000
trusted library allocation
page read and write
2D01000
trusted library allocation
page read and write
12ADB000
trusted library allocation
page read and write
1BE7D000
heap
page read and write
2F27000
trusted library allocation
page read and write
1B74B000
stack
page read and write
12A16000
trusted library allocation
page read and write
2E12000
trusted library allocation
page read and write
2D48000
trusted library allocation
page read and write
302C000
trusted library allocation
page read and write
2D68000
trusted library allocation
page read and write
12A1B000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
12A43000
trusted library allocation
page read and write
30AE000
trusted library allocation
page read and write
1D131000
heap
page read and write
7FF7C0211000
trusted library allocation
page read and write
2D4C000
trusted library allocation
page read and write
2CFE000
trusted library allocation
page read and write
2CEF000
trusted library allocation
page read and write
7FF7C02B0000
trusted library allocation
page read and write
F25000
heap
page read and write
7FF485320000
trusted library allocation
page execute and read and write
2F2A000
trusted library allocation
page read and write
1BA2E000
stack
page read and write
2CBC000
trusted library allocation
page read and write
12A2E000
trusted library allocation
page read and write
2F65000
trusted library allocation
page read and write
2E41000
trusted library allocation
page read and write
1AC36000
heap
page read and write
7FF7C01A7000
trusted library allocation
page read and write
2E83000
trusted library allocation
page read and write
2FE4000
trusted library allocation
page read and write
2F09000
trusted library allocation
page read and write
1BEA0000
heap
page read and write
12951000
trusted library allocation
page read and write
7FF7C0020000
trusted library allocation
page read and write
7FF7BFDEC000
trusted library allocation
page execute and read and write
1BA7C000
heap
page read and write
7FF7BFDAD000
trusted library allocation
page execute and read and write
12A71000
trusted library allocation
page read and write
1BF23000
heap
page read and write
7FF7BFDB0000
trusted library allocation
page read and write
7FF7C00A8000
trusted library allocation
page read and write
7FF7C021A000
trusted library allocation
page read and write
2D5D000
trusted library allocation
page read and write
2F87000
trusted library allocation
page read and write
2FA6000
trusted library allocation
page read and write
2E45000
trusted library allocation
page read and write
7FF7BFF80000
trusted library allocation
page execute and read and write
7FF7BFEB0000
trusted library allocation
page execute and read and write
1A8E0000
trusted library allocation
page read and write
2F82000
trusted library allocation
page read and write
1B943000
heap
page read and write
2E03000
trusted library allocation
page read and write
12A5E000
trusted library allocation
page read and write
1B340000
heap
page execute and read and write
7FF7BFFD0000
trusted library allocation
page read and write
2F71000
trusted library allocation
page read and write
3073000
trusted library allocation
page read and write
E4F000
stack
page read and write
2D2D000
trusted library allocation
page read and write
2DBF000
trusted library allocation
page read and write
309F000
trusted library allocation
page read and write
2DEE000
trusted library allocation
page read and write
2ED4000
trusted library allocation
page read and write
7FF7C0227000
trusted library allocation
page read and write
308E000
trusted library allocation
page read and write
12A34000
trusted library allocation
page read and write
1BE3E000
heap
page read and write
7FF7C01D0000
trusted library allocation
page read and write
2E69000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
7FF7BFFC0000
trusted library allocation
page read and write
2F23000
trusted library allocation
page read and write
7FF7C0206000
trusted library allocation
page read and write
129D8000
trusted library allocation
page read and write
1BE2F000
heap
page read and write
1BE1D000
heap
page read and write
2D3E000
trusted library allocation
page read and write
129DD000
trusted library allocation
page read and write
307F000
trusted library allocation
page read and write
2EF4000
trusted library allocation
page read and write
2E6B000
trusted library allocation
page read and write
1BE72000
heap
page read and write
1C10C000
stack
page read and write
F2E000
heap
page read and write
2F91000
trusted library allocation
page read and write
1BF34000
heap
page read and write
28B1000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
2D3C000
trusted library allocation
page read and write
12A6D000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
7FF7C0180000
trusted library allocation
page read and write
2FE8000
trusted library allocation
page read and write
12A81000
trusted library allocation
page read and write
1B8B1000
heap
page read and write
12CC4000
trusted library allocation
page read and write
302A000
trusted library allocation
page read and write
7FF7BFF30000
trusted library allocation
page read and write
EA0000
trusted library allocation
page read and write
2FC8000
trusted library allocation
page read and write
C0E000
stack
page read and write
1293E000
trusted library allocation
page read and write
7FF7C01DA000
trusted library allocation
page read and write
2FD1000
trusted library allocation
page read and write
7FF7BFF92000
trusted library allocation
page read and write
7FF7C0050000
trusted library allocation
page read and write
129B3000
trusted library allocation
page read and write
12ACD000
trusted library allocation
page read and write
12A3D000
trusted library allocation
page read and write
128EA000
trusted library allocation
page read and write
2870000
heap
page read and write
7FF7C02A0000
trusted library allocation
page read and write
2D81000
trusted library allocation
page read and write
2D99000
trusted library allocation
page read and write
2E27000
trusted library allocation
page read and write
7FF7BFD94000
trusted library allocation
page read and write
12CF1000
trusted library allocation
page read and write
7FF7C01DF000
trusted library allocation
page read and write
2CC9000
trusted library allocation
page read and write
2E47000
trusted library allocation
page read and write
7FF7BFE46000
trusted library allocation
page read and write
3019000
trusted library allocation
page read and write
12AD6000
trusted library allocation
page read and write
2F54000
trusted library allocation
page read and write
1B8BD000
heap
page read and write
7FF7C01D5000
trusted library allocation
page read and write
1B96D000
heap
page read and write
7FF7BFD90000
trusted library allocation
page read and write
7FF7C0204000
trusted library allocation
page read and write
93D000
heap
page read and write
2FD7000
trusted library allocation
page read and write
7FF7C0200000
trusted library allocation
page read and write
2D2F000
trusted library allocation
page read and write
7FF7C00D0000
trusted library allocation
page execute and read and write
1BE94000
heap
page read and write
129E3000
trusted library allocation
page read and write
12AAB000
trusted library allocation
page read and write
3094000
trusted library allocation
page read and write
12A87000
trusted library allocation
page read and write
1BE28000
heap
page read and write
7FF7C0160000
trusted library allocation
page read and write
7FF7BFFA5000
trusted library allocation
page read and write
129F7000
trusted library allocation
page read and write
129CE000
trusted library allocation
page read and write
7FF7C01A0000
trusted library allocation
page read and write
128D1000
trusted library allocation
page read and write
2D7D000
trusted library allocation
page read and write
7FF7C01C0000
trusted library allocation
page read and write
2D11000
trusted library allocation
page read and write
7FF7C0010000
trusted library allocation
page read and write
7FF7BFDBB000
trusted library allocation
page execute and read and write
27D0000
heap
page read and write
12A46000
trusted library allocation
page read and write
12A13000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
2E4A000
trusted library allocation
page read and write
2F56000
trusted library allocation
page read and write
2F7E000
trusted library allocation
page read and write
306E000
trusted library allocation
page read and write
2DDB000
trusted library allocation
page read and write
2FAA000
trusted library allocation
page read and write
2CF8000
trusted library allocation
page read and write
2C29000
trusted library allocation
page read and write
7FF7BFFB0000
trusted library allocation
page read and write
3052000
trusted library allocation
page read and write
916000
heap
page read and write
2E23000
trusted library allocation
page read and write
2FC2000
trusted library allocation
page read and write
2DAF000
trusted library allocation
page read and write
7FF7C0280000
trusted library allocation
page read and write
12967000
trusted library allocation
page read and write
2CA9000
trusted library allocation
page read and write
12978000
trusted library allocation
page read and write
7FF7C0236000
trusted library allocation
page read and write
12AD3000
trusted library allocation
page read and write
2DCA000
trusted library allocation
page read and write
129C7000
trusted library allocation
page read and write
2DCE000
trusted library allocation
page read and write
2F21000
trusted library allocation
page read and write
12A8E000
trusted library allocation
page read and write
2F58000
trusted library allocation
page read and write
12A41000
trusted library allocation
page read and write
1B87E000
heap
page read and write
12953000
trusted library allocation
page read and write
1BE89000
heap
page read and write
8F4000
stack
page read and write
12948000
trusted library allocation
page read and write
128E4000
trusted library allocation
page read and write
12A98000
trusted library allocation
page read and write
2FE2000
trusted library allocation
page read and write
1298B000
trusted library allocation
page read and write
7FF7C022F000
trusted library allocation
page read and write
2CBF000
trusted library allocation
page read and write
301B000
trusted library allocation
page read and write
2883000
heap
page read and write
2E2B000
trusted library allocation
page read and write
1BC8B000
stack
page read and write
7FF7C0250000
trusted library allocation
page read and write
2D4A000
trusted library allocation
page read and write
952000
heap
page read and write
129A4000
trusted library allocation
page read and write
1AE3C000
stack
page read and write
7FF7C0090000
trusted library allocation
page read and write
1B890000
heap
page read and write
12A0D000
trusted library allocation
page read and write
2EF2000
trusted library allocation
page read and write
2DFF000
trusted library allocation
page read and write
7FF7C00A0000
trusted library allocation
page read and write
1C5E0000
heap
page read and write
1BEDF000
heap
page read and write
A06000
heap
page read and write
2F0B000
trusted library allocation
page read and write
2F84000
trusted library allocation
page read and write
1B95F000
heap
page read and write
2880000
heap
page read and write
12986000
trusted library allocation
page read and write
2D0F000
trusted library allocation
page read and write
12A73000
trusted library allocation
page read and write
2E14000
trusted library allocation
page read and write
1BF26000
heap
page read and write
7FF7C003C000
trusted library allocation
page read and write
12AC4000
trusted library allocation
page read and write
12CEA000
trusted library allocation
page read and write
307D000
trusted library allocation
page read and write
954000
heap
page read and write
2D09000
trusted library allocation
page read and write
1B878000
heap
page read and write
7FF7BFD93000
trusted library allocation
page execute and read and write
1CC0D000
stack
page read and write
2FF3000
trusted library allocation
page read and write
12CB9000
trusted library allocation
page read and write
12CD0000
trusted library allocation
page read and write
12974000
trusted library allocation
page read and write
7FF7BFE4C000
trusted library allocation
page execute and read and write
306A000
trusted library allocation
page read and write
12AB1000
trusted library allocation
page read and write
301F000
trusted library allocation
page read and write
1BEDD000
heap
page read and write
7FF7C0230000
trusted library allocation
page read and write
54E000
unkown
page readonly
2CAB000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
2D97000
trusted library allocation
page read and write
304E000
trusted library allocation
page read and write
7FF7C0270000
trusted library allocation
page read and write
12956000
trusted library allocation
page read and write
1BEAB000
heap
page read and write
2D95000
trusted library allocation
page read and write
2ED6000
trusted library allocation
page read and write
2E78000
trusted library allocation
page read and write
2F43000
trusted library allocation
page read and write
2DA8000
trusted library allocation
page read and write
12983000
trusted library allocation
page read and write
2D2B000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
129F1000
trusted library allocation
page read and write
12AF6000
trusted library allocation
page read and write
There are 489 hidden memdumps, click here to show them.