IOC Report
j7movK82QT.exe

loading gif

Files

File Path
Type
Category
Malicious
j7movK82QT.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\j7movK82QT.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\j7movK82QT.exe
"C:\Users\user\Desktop\j7movK82QT.exe"
malicious

URLs

Name
IP
Malicious
4.251.123.83:6677
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
https://discord.com/api/v9/users/
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/example/Field1Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://www.w3.oh
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://tempuri.org/example/Field1
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://tempuri.org/example/Field2
unknown
http://tempuri.org/example/Field3
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
unknown
http://www.w3.o
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
http://tempuri.org/example/Field3Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
unknown
http://schemas.xmlsoap.org/ws/2002/12/policy
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
4.251.123.83
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3154000
trusted library allocation
page read and write
malicious
DA2000
unkown
page readonly
malicious
35F2000
trusted library allocation
page read and write
1C98E000
stack
page read and write
13105000
trusted library allocation
page read and write
7FFE7CDD4000
trusted library allocation
page read and write
131CB000
trusted library allocation
page read and write
386C000
trusted library allocation
page read and write
369E000
trusted library allocation
page read and write
131F4000
trusted library allocation
page read and write
13145000
trusted library allocation
page read and write
3874000
trusted library allocation
page read and write
1349D000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
37E8000
trusted library allocation
page read and write
1BDDE000
stack
page read and write
13495000
trusted library allocation
page read and write
1BBDE000
stack
page read and write
1C5A0000
heap
page read and write
7FFE7CFD9000
trusted library allocation
page read and write
1314E000
trusted library allocation
page read and write
370A000
trusted library allocation
page read and write
3664000
trusted library allocation
page read and write
1D700000
heap
page read and write
38B6000
trusted library allocation
page read and write
3666000
trusted library allocation
page read and write
373B000
trusted library allocation
page read and write
36E8000
trusted library allocation
page read and write
396D000
trusted library allocation
page read and write
161E000
stack
page read and write
13217000
trusted library allocation
page read and write
130E1000
trusted library allocation
page read and write
7FFE7D280000
trusted library allocation
page read and write
149E000
heap
page read and write
3887000
trusted library allocation
page read and write
37E4000
trusted library allocation
page read and write
36FD000
trusted library allocation
page read and write
36E0000
trusted library allocation
page read and write
133FD000
trusted library allocation
page read and write
134DA000
trusted library allocation
page read and write
3710000
trusted library allocation
page read and write
36CF000
trusted library allocation
page read and write
3904000
trusted library allocation
page read and write
37B9000
trusted library allocation
page read and write
360D000
trusted library allocation
page read and write
7FF46FDB0000
trusted library allocation
page execute and read and write
14F0000
heap
page read and write
1C11B000
heap
page read and write
7FFE7D010000
trusted library allocation
page read and write
13479000
trusted library allocation
page read and write
1C590000
heap
page read and write
38DA000
trusted library allocation
page read and write
3574000
trusted library allocation
page read and write
1C59B000
heap
page read and write
37CD000
trusted library allocation
page read and write
1B9E0000
heap
page read and write
7FFE7CE86000
trusted library allocation
page read and write
37EA000
trusted library allocation
page read and write
1C7CF000
stack
page read and write
1C6CD000
heap
page read and write
37B3000
trusted library allocation
page read and write
7FFE7D261000
trusted library allocation
page read and write
13186000
trusted library allocation
page read and write
1C77C000
heap
page read and write
7FFE7CFD2000
trusted library allocation
page read and write
3852000
trusted library allocation
page read and write
133EA000
trusted library allocation
page read and write
1C5B2000
heap
page read and write
34E1000
trusted library allocation
page read and write
13233000
trusted library allocation
page read and write
7FFE7CFC0000
trusted library allocation
page execute and read and write
35D2000
trusted library allocation
page read and write
3631000
trusted library allocation
page read and write
1C70B000
heap
page read and write
13262000
trusted library allocation
page read and write
35E5000
trusted library allocation
page read and write
133F2000
trusted library allocation
page read and write
13190000
trusted library allocation
page read and write
3797000
trusted library allocation
page read and write
13374000
trusted library allocation
page read and write
133F0000
trusted library allocation
page read and write
13227000
trusted library allocation
page read and write
34DF000
trusted library allocation
page read and write
7FFE7D1B0000
trusted library allocation
page read and write
38C7000
trusted library allocation
page read and write
3795000
trusted library allocation
page read and write
34EA000
trusted library allocation
page read and write
7FFE7D22D000
trusted library allocation
page read and write
7FFE7D225000
trusted library allocation
page read and write
7FFE7CDF4000
trusted library allocation
page read and write
7FFE7D277000
trusted library allocation
page read and write
1C5A2000
heap
page read and write
134E0000
trusted library allocation
page read and write
13492000
trusted library allocation
page read and write
3843000
trusted library allocation
page read and write
132AF000
trusted library allocation
page read and write
1C6A9000
heap
page read and write
365E000
trusted library allocation
page read and write
133E1000
trusted library allocation
page read and write
35D4000
trusted library allocation
page read and write
130E9000
trusted library allocation
page read and write
7FFE7D286000
trusted library allocation
page read and write
13107000
trusted library allocation
page read and write
3913000
trusted library allocation
page read and write
36FB000
trusted library allocation
page read and write
1C0B4000
heap
page read and write
1C090000
heap
page read and write
3953000
trusted library allocation
page read and write
360F000
trusted library allocation
page read and write
37A6000
trusted library allocation
page read and write
7FFE7CEF0000
trusted library allocation
page execute and read and write
1369000
heap
page read and write
7FFE7CDF0000
trusted library allocation
page read and write
37A4000
trusted library allocation
page read and write
1C609000
heap
page read and write
3911000
trusted library allocation
page read and write
13180000
trusted library allocation
page read and write
7FFE7D219000
trusted library allocation
page read and write
34AA000
trusted library allocation
page read and write
34D9000
trusted library allocation
page read and write
13235000
trusted library allocation
page read and write
7FFE7D250000
trusted library allocation
page read and write
37F5000
trusted library allocation
page read and write
34B9000
trusted library allocation
page read and write
385A000
trusted library allocation
page read and write
131EA000
trusted library allocation
page read and write
3695000
trusted library allocation
page read and write
3960000
trusted library allocation
page read and write
1DC20000
heap
page read and write
7FFE7D020000
trusted library allocation
page read and write
1314A000
trusted library allocation
page read and write
37FC000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
131E7000
trusted library allocation
page read and write
12DA000
heap
page read and write
1276000
heap
page read and write
1323B000
trusted library allocation
page read and write
7FFE7D0C0000
trusted library allocation
page execute and read and write
36C6000
trusted library allocation
page read and write
36EA000
trusted library allocation
page read and write
3646000
trusted library allocation
page read and write
7FFE7D256000
trusted library allocation
page read and write
380C000
trusted library allocation
page read and write
1321D000
trusted library allocation
page read and write
7FFE7D1FD000
trusted library allocation
page read and write
134DE000
trusted library allocation
page read and write
1C65E000
heap
page read and write
357F000
trusted library allocation
page read and write
1C09F000
heap
page read and write
7FFE7D0D0000
trusted library allocation
page read and write
34AE000
trusted library allocation
page read and write
35C5000
trusted library allocation
page read and write
7FFE7D1D0000
trusted library allocation
page read and write
38F3000
trusted library allocation
page read and write
14E0000
heap
page execute and read and write
34B7000
trusted library allocation
page read and write
13240000
trusted library allocation
page read and write
134E9000
trusted library allocation
page read and write
13158000
trusted library allocation
page read and write
7FFE7D0F0000
trusted library allocation
page read and write
3560000
trusted library allocation
page read and write
7FFE7D220000
trusted library allocation
page read and write
1C770000
heap
page read and write
35E9000
trusted library allocation
page read and write
7FFE7D1C0000
trusted library allocation
page read and write
36B9000
trusted library allocation
page read and write
1C69E000
heap
page read and write
362D000
trusted library allocation
page read and write
7FFE7D2A0000
trusted library allocation
page read and write
3834000
trusted library allocation
page read and write
7FFE7D2F0000
trusted library allocation
page read and write
1B9D0000
heap
page read and write
35F6000
trusted library allocation
page read and write
13224000
trusted library allocation
page read and write
1BCDE000
stack
page read and write
1326F000
trusted library allocation
page read and write
35A7000
trusted library allocation
page read and write
1C663000
heap
page read and write
1319C000
trusted library allocation
page read and write
7FFE7CF90000
trusted library allocation
page read and write
1313B000
trusted library allocation
page read and write
3739000
trusted library allocation
page read and write
1450000
trusted library allocation
page read and write
3644000
trusted library allocation
page read and write
35A9000
trusted library allocation
page read and write
3915000
trusted library allocation
page read and write
1327C000
trusted library allocation
page read and write
38AC000
trusted library allocation
page read and write
36D9000
trusted library allocation
page read and write
3804000
trusted library allocation
page read and write
1B9E3000
heap
page read and write
7FFE7D200000
trusted library allocation
page read and write
1C5E9000
heap
page read and write
365C000
trusted library allocation
page read and write
7FFE7D000000
trusted library allocation
page read and write
133F8000
trusted library allocation
page read and write
3717000
trusted library allocation
page read and write
34BF000
trusted library allocation
page read and write
1B990000
heap
page read and write
1C0CF000
heap
page read and write
7FFE7D1A0000
trusted library allocation
page read and write
1337F000
trusted library allocation
page read and write
1C76D000
heap
page read and write
36B5000
trusted library allocation
page read and write
7FFE7D22F000
trusted library allocation
page read and write
7FFE7D290000
trusted library allocation
page read and write
3856000
trusted library allocation
page read and write
7FFE7D288000
trusted library allocation
page read and write
1C6D3000
heap
page read and write
1310D000
trusted library allocation
page read and write
133DA000
trusted library allocation
page read and write
13278000
trusted library allocation
page read and write
F94000
stack
page read and write
1270000
heap
page read and write
1B9C0000
trusted library allocation
page read and write
13134000
trusted library allocation
page read and write
7FFE7CFE5000
trusted library allocation
page read and write
38C9000
trusted library allocation
page read and write
130EF000
trusted library allocation
page read and write
7FFE7D190000
trusted library allocation
page read and write
37C4000
trusted library allocation
page read and write
396F000
trusted library allocation
page read and write
3837000
trusted library allocation
page read and write
7FFE7D100000
trusted library allocation
page read and write
3854000
trusted library allocation
page read and write
1C68C000
heap
page read and write
3894000
trusted library allocation
page read and write
1B0F0000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
131DC000
trusted library allocation
page read and write
131A9000
trusted library allocation
page read and write
3869000
trusted library allocation
page read and write
389A000
trusted library allocation
page read and write
135C000
heap
page read and write
382A000
trusted library allocation
page read and write
14D4000
heap
page execute and read and write
7FFE7CDED000
trusted library allocation
page execute and read and write
134D5000
trusted library allocation
page read and write
12AF000
heap
page read and write
7FFE7D2E0000
trusted library allocation
page read and write
3719000
trusted library allocation
page read and write
3653000
trusted library allocation
page read and write
7FFE7D210000
trusted library allocation
page read and write
1C626000
heap
page read and write
360B000
trusted library allocation
page read and write
1C0EA000
heap
page read and write
38B8000
trusted library allocation
page read and write
3935000
trusted library allocation
page read and write
133ED000
trusted library allocation
page read and write
3845000
trusted library allocation
page read and write
131A4000
trusted library allocation
page read and write
34DD000
trusted library allocation
page read and write
13102000
trusted library allocation
page read and write
1318D000
trusted library allocation
page read and write
7FFE7D2C0000
trusted library allocation
page read and write
390D000
trusted library allocation
page read and write
13230000
trusted library allocation
page read and write
36A0000
trusted library allocation
page read and write
3601000
trusted library allocation
page read and write
3728000
trusted library allocation
page read and write
3620000
trusted library allocation
page read and write
1C48B000
stack
page read and write
30BE000
stack
page read and write
7FFE7D01C000
trusted library allocation
page read and write
3660000
trusted library allocation
page read and write
1C07C000
heap
page read and write
7FFE7CE2C000
trusted library allocation
page execute and read and write
339A000
trusted library allocation
page read and write
133D4000
trusted library allocation
page read and write
3673000
trusted library allocation
page read and write
134E3000
trusted library allocation
page read and write
38A3000
trusted library allocation
page read and write
3817000
trusted library allocation
page read and write
3609000
trusted library allocation
page read and write
7FFE7D0F5000
trusted library allocation
page read and write
13273000
trusted library allocation
page read and write
3885000
trusted library allocation
page read and write
1495000
heap
page read and write
7FFE7CF80000
trusted library allocation
page read and write
3686000
trusted library allocation
page read and write
381B000
trusted library allocation
page read and write
1C152000
heap
page read and write
1C5B9000
heap
page read and write
7FFE7D040000
trusted library allocation
page execute and read and write
181E000
stack
page read and write
3940000
trusted library allocation
page read and write
1327E000
trusted library allocation
page read and write
35A1000
trusted library allocation
page read and write
3819000
trusted library allocation
page read and write
1220000
heap
page read and write
361C000
trusted library allocation
page read and write
37B7000
trusted library allocation
page read and write
1322D000
trusted library allocation
page read and write
3691000
trusted library allocation
page read and write
1C0E3000
heap
page read and write
FE0000
heap
page read and write
1490000
heap
page read and write
7FFE7D2B0000
trusted library allocation
page read and write
38ED000
trusted library allocation
page read and write
36BD000
trusted library allocation
page read and write
13112000
trusted library allocation
page read and write
1C0C6000
heap
page read and write
13498000
trusted library allocation
page read and write
388A000
trusted library allocation
page read and write
7FFE7D050000
trusted library allocation
page read and write
1470000
trusted library allocation
page read and write
7FFE7D0B6000
trusted library allocation
page read and write
3662000
trusted library allocation
page read and write
1CACC000
stack
page read and write
316D000
trusted library allocation
page read and write
36CC000
trusted library allocation
page read and write
1C620000
heap
page read and write
1C652000
heap
page read and write
7FFE7CEB6000
trusted library allocation
page execute and read and write
37EC000
trusted library allocation
page read and write
38A5000
trusted library allocation
page read and write
131E5000
trusted library allocation
page read and write
371D000
trusted library allocation
page read and write
392B000
trusted library allocation
page read and write
372C000
trusted library allocation
page read and write
1C78C000
heap
page read and write
13281000
trusted library allocation
page read and write
1C074000
heap
page read and write
13609000
trusted library allocation
page read and write
130F6000
trusted library allocation
page read and write
37B5000
trusted library allocation
page read and write
1319E000
trusted library allocation
page read and write
7FFE7CF70000
trusted library allocation
page read and write
356E000
trusted library allocation
page read and write
3720000
trusted library allocation
page read and write
37E6000
trusted library allocation
page read and write
7FFE7D26A000
trusted library allocation
page read and write
3951000
trusted library allocation
page read and write
1510000
heap
page read and write
13199000
trusted library allocation
page read and write
7FFE7D06F000
trusted library allocation
page read and write
7FFE7CDD0000
trusted library allocation
page read and write
35C1000
trusted library allocation
page read and write
1C63E000
heap
page read and write
1515000
heap
page read and write
1C6DE000
heap
page read and write
37A2000
trusted library allocation
page read and write
13386000
trusted library allocation
page read and write
1C9CE000
stack
page read and write
7FFE7D060000
trusted library allocation
page read and write
34EE000
trusted library allocation
page read and write
3693000
trusted library allocation
page read and write
13150000
trusted library allocation
page read and write
7FFE7D0E0000
trusted library allocation
page read and write
1C661000
heap
page read and write
373F000
trusted library allocation
page read and write
3931000
trusted library allocation
page read and write
357D000
trusted library allocation
page read and write
3633000
trusted library allocation
page read and write
7FFE7D22A000
trusted library allocation
page read and write
38DC000
trusted library allocation
page read and write
13141000
trusted library allocation
page read and write
35A3000
trusted library allocation
page read and write
358E000
trusted library allocation
page read and write
7FFE7D030000
trusted library allocation
page read and write
13153000
trusted library allocation
page read and write
1338C000
trusted library allocation
page read and write
37BB000
trusted library allocation
page read and write
7FFE7CFEB000
trusted library allocation
page read and write
7FFE7D254000
trusted library allocation
page read and write
1C669000
heap
page read and write
38FC000
trusted library allocation
page read and write
392D000
trusted library allocation
page read and write
130FF000
trusted library allocation
page read and write
1C160000
heap
page read and write
35BF000
trusted library allocation
page read and write
1C58B000
stack
page read and write
3586000
trusted library allocation
page read and write
3956000
trusted library allocation
page read and write
7FFE7D0B0000
trusted library allocation
page read and write
1C6D1000
heap
page read and write
1D68D000
stack
page read and write
37CA000
trusted library allocation
page read and write
1C0AB000
heap
page read and write
3942000
trusted library allocation
page read and write
7FFE7D080000
trusted library allocation
page read and write
133CD000
trusted library allocation
page read and write
37AA000
trusted library allocation
page read and write
1240000
heap
page read and write
367E000
trusted library allocation
page read and write
1DD33000
heap
page read and write
36D7000
trusted library allocation
page read and write
3847000
trusted library allocation
page read and write
1499000
heap
page read and write
3708000
trusted library allocation
page read and write
35F4000
trusted library allocation
page read and write
1C614000
heap
page read and write
1347F000
trusted library allocation
page read and write
38EB000
trusted library allocation
page read and write
1B64C000
stack
page read and write
7FFE7CFA0000
trusted library allocation
page read and write
13489000
trusted library allocation
page read and write
171F000
stack
page read and write
1315D000
trusted library allocation
page read and write
1C6A5000
heap
page read and write
1DD41000
heap
page read and write
7FFE7D110000
trusted library allocation
page execute and read and write
35E3000
trusted library allocation
page read and write
38EF000
trusted library allocation
page read and write
1C781000
heap
page read and write
1348F000
trusted library allocation
page read and write
129A000
heap
page read and write
1BF2B000
stack
page read and write
35C8000
trusted library allocation
page read and write
34BB000
trusted library allocation
page read and write
7FFE7D204000
trusted library allocation
page read and write
DA0000
unkown
page readonly
1D70C000
heap
page read and write
35C3000
trusted library allocation
page read and write
12B2000
heap
page read and write
1337A000
trusted library allocation
page read and write
34D0000
trusted library allocation
page read and write
130F9000
trusted library allocation
page read and write
134CB000
trusted library allocation
page read and write
7FFE7D1F7000
trusted library allocation
page read and write
13269000
trusted library allocation
page read and write
3732000
trusted library allocation
page read and write
7FFE7D1E0000
trusted library allocation
page read and write
36BB000
trusted library allocation
page read and write
130C1000
trusted library allocation
page read and write
DA0000
unkown
page readonly
14D0000
heap
page execute and read and write
3863000
trusted library allocation
page read and write
1C06E000
stack
page read and write
1DD46000
heap
page read and write
DF1000
unkown
page readonly
133E4000
trusted library allocation
page read and write
7FFE7CE90000
trusted library allocation
page execute and read and write
132C2000
trusted library allocation
page read and write
1C6B6000
heap
page read and write
7FFE7D27F000
trusted library allocation
page read and write
134D1000
trusted library allocation
page read and write
3581000
trusted library allocation
page read and write
1C7D0000
heap
page execute and read and write
7FFE7CDFB000
trusted library allocation
page execute and read and write
7FFE7D0A0000
trusted library allocation
page read and write
7FFE7D300000
trusted library allocation
page read and write
1C5DC000
heap
page read and write
3841000
trusted library allocation
page read and write
3962000
trusted library allocation
page read and write
1DC31000
heap
page read and write
1C692000
heap
page read and write
7FFE7CDD3000
trusted library allocation
page execute and read and write
131D2000
trusted library allocation
page read and write
390F000
trusted library allocation
page read and write
3964000
trusted library allocation
page read and write
3824000
trusted library allocation
page read and write
38A7000
trusted library allocation
page read and write
36EC000
trusted library allocation
page read and write
7FFE7CDDD000
trusted library allocation
page execute and read and write
7FFE7D233000
trusted library allocation
page read and write
1C5C6000
heap
page read and write
1C5F2000
heap
page read and write
1C6EA000
heap
page read and write
36CA000
trusted library allocation
page read and write
128E000
heap
page read and write
356C000
trusted library allocation
page read and write
1DD20000
heap
page read and write
1DC3D000
heap
page read and write
7FFE7CE8C000
trusted library allocation
page execute and read and write
7FFE7CDE3000
trusted library allocation
page read and write
30C1000
trusted library allocation
page read and write
7FFE7D21B000
trusted library allocation
page read and write
1C0BC000
heap
page read and write
13486000
trusted library allocation
page read and write
38BA000
trusted library allocation
page read and write
3933000
trusted library allocation
page read and write
1C709000
heap
page read and write
7FFE7D090000
trusted library allocation
page read and write
134ED000
trusted library allocation
page read and write
35A5000
trusted library allocation
page read and write
13196000
trusted library allocation
page read and write
394D000
trusted library allocation
page read and write
131D8000
trusted library allocation
page read and write
1200000
heap
page read and write
3922000
trusted library allocation
page read and write
3682000
trusted library allocation
page read and write
7FFE7D070000
trusted library allocation
page read and write
7FFE7CE80000
trusted library allocation
page read and write
37E2000
trusted library allocation
page read and write
372E000
trusted library allocation
page read and write
131E1000
trusted library allocation
page read and write
130DB000
trusted library allocation
page read and write
1B447000
heap
page read and write
1C078000
heap
page read and write
13287000
trusted library allocation
page read and write
3883000
trusted library allocation
page read and write
38C3000
trusted library allocation
page read and write
3642000
trusted library allocation
page read and write
7FFE7D1F0000
trusted library allocation
page read and write
392F000
trusted library allocation
page read and write
134C4000
trusted library allocation
page read and write
35E7000
trusted library allocation
page read and write
131EF000
trusted library allocation
page read and write
362F000
trusted library allocation
page read and write
3624000
trusted library allocation
page read and write
3556000
trusted library allocation
page read and write
3828000
trusted library allocation
page read and write
7FFE7D2D0000
trusted library allocation
page read and write
1C644000
heap
page read and write
E2E000
unkown
page readonly
3671000
trusted library allocation
page read and write
38D8000
trusted library allocation
page read and write
1C680000
heap
page read and write
134A2000
trusted library allocation
page read and write
7FFE7CFF0000
trusted library allocation
page read and write
1328B000
trusted library allocation
page read and write
There are 502 hidden memdumps, click here to show them.