IOC Report
xMYbN0Yd2a.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\xMYbN0Yd2a.exe
"C:\Users\user\Desktop\xMYbN0Yd2a.exe"
malicious

URLs

Name
IP
Malicious
4.251.123.83:6677
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
https://discord.com/api/v9/users/
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/example/Field1Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://www.w3.oh
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://tempuri.org/example/Field1
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://tempuri.org/example/Field2
unknown
http://tempuri.org/example/Field3
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
unknown
http://www.w3.o
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
http://tempuri.org/example/Field3Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
unknown
http://schemas.xmlsoap.org/ws/2002/12/policy
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
4.251.123.83
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2340000
trusted library allocation
page read and write
malicious
12000
unkown
page readonly
malicious
284A000
trusted library allocation
page read and write
7FFE165A0000
trusted library allocation
page read and write
1268D000
trusted library allocation
page read and write
7FFE16874000
trusted library allocation
page read and write
2A71000
trusted library allocation
page read and write
7FFE16720000
trusted library allocation
page read and write
7FFE16660000
trusted library allocation
page execute and read and write
263A000
trusted library allocation
page read and write
126A1000
trusted library allocation
page read and write
12647000
trusted library allocation
page read and write
2A9C000
trusted library allocation
page read and write
26FC000
trusted library allocation
page read and write
7FFE164A0000
trusted library allocation
page read and write
289B000
trusted library allocation
page read and write
274A000
trusted library allocation
page read and write
7FFE16817000
trusted library allocation
page read and write
2658000
trusted library allocation
page read and write
26A8000
trusted library allocation
page read and write
2673000
trusted library allocation
page read and write
26DB000
trusted library allocation
page read and write
1B834000
heap
page read and write
2677000
trusted library allocation
page read and write
1B24C000
heap
page read and write
286E000
trusted library allocation
page read and write
122BE000
trusted library allocation
page read and write
2220000
heap
page read and write
29C0000
trusted library allocation
page read and write
28BD000
trusted library allocation
page read and write
2625000
trusted library allocation
page read and write
1B864000
heap
page read and write
281D000
trusted library allocation
page read and write
1B751000
heap
page read and write
7FFE16700000
trusted library allocation
page read and write
27A1000
trusted library allocation
page read and write
7FFE1684D000
trusted library allocation
page read and write
1263D000
trusted library allocation
page read and write
12451000
trusted library allocation
page read and write
7FFE166A0000
trusted library allocation
page read and write
2914000
trusted library allocation
page read and write
7FFE16605000
trusted library allocation
page read and write
1B22C000
heap
page read and write
1B8C5000
heap
page read and write
7FFE16414000
trusted library allocation
page read and write
2627000
trusted library allocation
page read and write
1B7BF000
heap
page read and write
5FC000
heap
page read and write
275D000
trusted library allocation
page read and write
7FFE16839000
trusted library allocation
page read and write
285F000
trusted library allocation
page read and write
1B21E000
stack
page read and write
2250000
trusted library allocation
page read and write
7FFE16710000
trusted library allocation
page read and write
1260A000
trusted library allocation
page read and write
7FFE16715000
trusted library allocation
page read and write
1CE4D000
heap
page read and write
295C000
trusted library allocation
page read and write
12689000
trusted library allocation
page read and write
2807000
trusted library allocation
page read and write
1C5000
heap
page read and write
122CB000
trusted library allocation
page read and write
124F5000
trusted library allocation
page read and write
7FFE168F0000
trusted library allocation
page read and write
25CB000
trusted library allocation
page read and write
2929000
trusted library allocation
page read and write
1B77F000
heap
page read and write
2779000
trusted library allocation
page read and write
7FFE167C0000
trusted library allocation
page read and write
265A000
trusted library allocation
page read and write
1AC20000
heap
page read and write
1B63B000
stack
page read and write
295E000
trusted library allocation
page read and write
65C000
heap
page read and write
1B920000
heap
page read and write
1B22E000
heap
page read and write
2675000
trusted library allocation
page read and write
7FFE16800000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
1B79A000
heap
page read and write
124F0000
trusted library allocation
page read and write
1B25A000
heap
page read and write
2759000
trusted library allocation
page read and write
26C4000
trusted library allocation
page read and write
8EE000
stack
page read and write
2A6D000
trusted library allocation
page read and write
274C000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
264F000
trusted library allocation
page read and write
9E000
unkown
page readonly
2682000
trusted library allocation
page read and write
28EE000
trusted library allocation
page read and write
28AC000
trusted library allocation
page read and write
12497000
trusted library allocation
page read and write
662000
heap
page read and write
7FFE166B0000
trusted library allocation
page read and write
27AC000
trusted library allocation
page read and write
294F000
trusted library allocation
page read and write
7FFE163F3000
trusted library allocation
page execute and read and write
10000
unkown
page readonly
1CE41000
heap
page read and write
1245D000
trusted library allocation
page read and write
26CA000
trusted library allocation
page read and write
28B9000
trusted library allocation
page read and write
7FFE167D0000
trusted library allocation
page read and write
12619000
trusted library allocation
page read and write
1B28C000
heap
page read and write
262B000
trusted library allocation
page read and write
287D000
trusted library allocation
page read and write
7FFE165F9000
trusted library allocation
page read and write
2AF1000
trusted library allocation
page read and write
5F0000
heap
page read and write
2839000
trusted library allocation
page read and write
7FFE1640D000
trusted library allocation
page execute and read and write
12606000
trusted library allocation
page read and write
1AE1E000
stack
page read and write
1B26A000
heap
page read and write
125F7000
trusted library allocation
page read and write
22A0000
heap
page execute and read and write
7FFE16670000
trusted library allocation
page read and write
7FFE16510000
trusted library allocation
page execute and read and write
28E5000
trusted library allocation
page read and write
2704000
trusted library allocation
page read and write
1B856000
heap
page read and write
263C000
trusted library allocation
page read and write
5F6000
heap
page read and write
2647000
trusted library allocation
page read and write
29C8000
trusted library allocation
page read and write
7FFE16824000
trusted library allocation
page read and write
2A9E000
trusted library allocation
page read and write
7FFE16610000
trusted library allocation
page read and write
124A6000
trusted library allocation
page read and write
12652000
trusted library allocation
page read and write
65A000
heap
page read and write
2ADA000
trusted library allocation
page read and write
2781000
trusted library allocation
page read and write
2875000
trusted library allocation
page read and write
296F000
trusted library allocation
page read and write
1B74B000
heap
page read and write
125E4000
trusted library allocation
page read and write
29E8000
trusted library allocation
page read and write
7FFE1683B000
trusted library allocation
page read and write
2629000
trusted library allocation
page read and write
273F000
trusted library allocation
page read and write
29B1000
trusted library allocation
page read and write
29F5000
trusted library allocation
page read and write
1AC23000
heap
page read and write
26D9000
trusted library allocation
page read and write
20E0000
heap
page execute and read and write
29C2000
trusted library allocation
page read and write
124B3000
trusted library allocation
page read and write
2918000
trusted library allocation
page read and write
1245F000
trusted library allocation
page read and write
28CA000
trusted library allocation
page read and write
7FFE166D0000
trusted library allocation
page read and write
7FFE165B0000
trusted library allocation
page read and write
29A6000
trusted library allocation
page read and write
1B740000
heap
page read and write
1265A000
trusted library allocation
page read and write
125F0000
trusted library allocation
page read and write
7FFE16881000
trusted library allocation
page read and write
279F000
trusted library allocation
page read and write
1A638000
heap
page read and write
7FFE168A6000
trusted library allocation
page read and write
1B7A4000
heap
page read and write
7FFE16910000
trusted library allocation
page read and write
27B0000
trusted library allocation
page read and write
2998000
trusted library allocation
page read and write
25CF000
trusted library allocation
page read and write
264D000
trusted library allocation
page read and write
29D7000
trusted library allocation
page read and write
2A04000
trusted library allocation
page read and write
7FFE16830000
trusted library allocation
page read and write
7FFE168C0000
trusted library allocation
page read and write
126F3000
trusted library allocation
page read and write
26EA000
trusted library allocation
page read and write
2667000
trusted library allocation
page read and write
288A000
trusted library allocation
page read and write
1C83D000
stack
page read and write
29BE000
trusted library allocation
page read and write
277D000
trusted library allocation
page read and write
26F9000
trusted library allocation
page read and write
2835000
trusted library allocation
page read and write
2679000
trusted library allocation
page read and write
7FFE16680000
trusted library allocation
page read and write
12692000
trusted library allocation
page read and write
2699000
trusted library allocation
page read and write
2975000
trusted library allocation
page read and write
7FFE166E0000
trusted library allocation
page execute and read and write
2A5C000
trusted library allocation
page read and write
125C7000
trusted library allocation
page read and write
25C9000
trusted library allocation
page read and write
278C000
trusted library allocation
page read and write
1249A000
trusted library allocation
page read and write
2AA4000
trusted library allocation
page read and write
7FFE166F0000
trusted library allocation
page read and write
28EB000
trusted library allocation
page read and write
2837000
trusted library allocation
page read and write
122D1000
trusted library allocation
page read and write
2A7E000
trusted library allocation
page read and write
2859000
trusted library allocation
page read and write
7FFE164A6000
trusted library allocation
page read and write
7FFE16920000
trusted library allocation
page read and write
7FFE16690000
trusted library allocation
page read and write
2AE7000
trusted library allocation
page read and write
7FFE16876000
trusted library allocation
page read and write
7FFE167B0000
trusted library allocation
page read and write
2984000
trusted library allocation
page read and write
2777000
trusted library allocation
page read and write
2879000
trusted library allocation
page read and write
126C9000
trusted library allocation
page read and write
7FFE16630000
trusted library allocation
page read and write
7FFE16640000
trusted library allocation
page read and write
1CE000
heap
page read and write
12643000
trusted library allocation
page read and write
1244A000
trusted library allocation
page read and write
29C4000
trusted library allocation
page read and write
125D6000
trusted library allocation
page read and write
1B7EB000
heap
page read and write
291A000
trusted library allocation
page read and write
7FFE167F0000
trusted library allocation
page read and write
7FFE1681D000
trusted library allocation
page read and write
1B11B000
stack
page read and write
1250C000
trusted library allocation
page read and write
1B27E000
heap
page read and write
2AAF000
trusted library allocation
page read and write
2AA2000
trusted library allocation
page read and write
12454000
trusted library allocation
page read and write
1C0000
heap
page read and write
7FF4C42F0000
trusted library allocation
page execute and read and write
29A4000
trusted library allocation
page read and write
126D3000
trusted library allocation
page read and write
1B8A0000
heap
page read and write
21FE000
stack
page read and write
282C000
trusted library allocation
page read and write
12655000
trusted library allocation
page read and write
1B7D8000
heap
page read and write
2A60000
trusted library allocation
page read and write
7FFE16650000
trusted library allocation
page read and write
126DE000
trusted library allocation
page read and write
2861000
trusted library allocation
page read and write
1B84E000
heap
page read and write
294B000
trusted library allocation
page read and write
1B7BC000
heap
page read and write
2ADE000
trusted library allocation
page read and write
2848000
trusted library allocation
page read and write
7FFE16730000
trusted library allocation
page execute and read and write
2669000
trusted library allocation
page read and write
12703000
trusted library allocation
page read and write
125CD000
trusted library allocation
page read and write
674000
heap
page read and write
1B7B6000
heap
page read and write
124A0000
trusted library allocation
page read and write
1269B000
trusted library allocation
page read and write
1B240000
heap
page read and write
2695000
trusted library allocation
page read and write
29C6000
trusted library allocation
page read and write
2728000
trusted library allocation
page read and write
1E0000
heap
page read and write
1265F000
trusted library allocation
page read and write
283B000
trusted library allocation
page read and write
29F8000
trusted library allocation
page read and write
7FFE166D6000
trusted library allocation
page read and write
124A8000
trusted library allocation
page read and write
2636000
trusted library allocation
page read and write
1B86C000
heap
page read and write
1B7CD000
heap
page read and write
284C000
trusted library allocation
page read and write
7FFE168D0000
trusted library allocation
page read and write
277B000
trusted library allocation
page read and write
1BC3C000
stack
page read and write
28FF000
trusted library allocation
page read and write
2936000
trusted library allocation
page read and write
124EA000
trusted library allocation
page read and write
28F8000
trusted library allocation
page read and write
28DA000
trusted library allocation
page read and write
20F0000
heap
page read and write
273D000
trusted library allocation
page read and write
631000
heap
page read and write
2958000
trusted library allocation
page read and write
29F3000
trusted library allocation
page read and write
7FFE16620000
trusted library allocation
page read and write
1232C000
trusted library allocation
page read and write
2751000
trusted library allocation
page read and write
2A73000
trusted library allocation
page read and write
1B97F000
stack
page read and write
2726000
trusted library allocation
page read and write
2971000
trusted library allocation
page read and write
291E000
trusted library allocation
page read and write
126DC000
trusted library allocation
page read and write
2A82000
trusted library allocation
page read and write
1260C000
trusted library allocation
page read and write
7FFE1684A000
trusted library allocation
page read and write
124FC000
trusted library allocation
page read and write
2748000
trusted library allocation
page read and write
126A5000
trusted library allocation
page read and write
290D000
trusted library allocation
page read and write
291C000
trusted library allocation
page read and write
5E0000
trusted library allocation
page read and write
29E6000
trusted library allocation
page read and write
7EE000
stack
page read and write
1267C000
trusted library allocation
page read and write
2724000
trusted library allocation
page read and write
7FFE1663C000
trusted library allocation
page read and write
7FFE165F2000
trusted library allocation
page read and write
1B8FB000
heap
page read and write
126C2000
trusted library allocation
page read and write
126D8000
trusted library allocation
page read and write
7FFE16897000
trusted library allocation
page read and write
7FFE1641B000
trusted library allocation
page execute and read and write
1B7E6000
heap
page read and write
29A8000
trusted library allocation
page read and write
276E000
trusted library allocation
page read and write
12650000
trusted library allocation
page read and write
12601000
trusted library allocation
page read and write
269C000
trusted library allocation
page read and write
27AE000
trusted library allocation
page read and write
7FFE163FD000
trusted library allocation
page execute and read and write
28AE000
trusted library allocation
page read and write
1A2E0000
trusted library allocation
page read and write
7FFE16853000
trusted library allocation
page read and write
2AB3000
trusted library allocation
page read and write
287B000
trusted library allocation
page read and write
1B73B000
stack
page read and write
7FFE163F4000
trusted library allocation
page read and write
2708000
trusted library allocation
page read and write
1B400000
heap
page execute and read and write
1B226000
heap
page read and write
1B79D000
heap
page read and write
61000
unkown
page readonly
7FFE16870000
trusted library allocation
page read and write
7FFE16403000
trusted library allocation
page read and write
29AA000
trusted library allocation
page read and write
125DC000
trusted library allocation
page read and write
2688000
trusted library allocation
page read and write
1B896000
heap
page read and write
2A00000
trusted library allocation
page read and write
1E5000
heap
page read and write
268A000
trusted library allocation
page read and write
160000
heap
page read and write
7FFE165C0000
trusted library allocation
page read and write
12698000
trusted library allocation
page read and write
126E1000
trusted library allocation
page read and write
1260F000
trusted library allocation
page read and write
294D000
trusted library allocation
page read and write
1CE30000
heap
page read and write
26EE000
trusted library allocation
page read and write
26CC000
trusted library allocation
page read and write
2684000
trusted library allocation
page read and write
22B1000
trusted library allocation
page read and write
124A3000
trusted library allocation
page read and write
126E7000
trusted library allocation
page read and write
150000
heap
page read and write
1242C000
trusted library allocation
page read and write
125DA000
trusted library allocation
page read and write
180000
heap
page read and write
26F7000
trusted library allocation
page read and write
1AF1F000
stack
page read and write
7FFE166C0000
trusted library allocation
page read and write
264B000
trusted library allocation
page read and write
7FFE164B0000
trusted library allocation
page execute and read and write
284F000
trusted library allocation
page read and write
28D4000
trusted library allocation
page read and write
2AC2000
trusted library allocation
page read and write
1B90D000
heap
page read and write
2AE2000
trusted library allocation
page read and write
2A64000
trusted library allocation
page read and write
1B8CD000
heap
page read and write
7FFE16810000
trusted library allocation
page read and write
28F6000
trusted library allocation
page read and write
1A0000
heap
page read and write
7FFE167E0000
trusted library allocation
page read and write
1C90C000
heap
page read and write
1B29D000
heap
page read and write
1B247000
heap
page read and write
26C6000
trusted library allocation
page read and write
2AB1000
trusted library allocation
page read and write
20E4000
heap
page execute and read and write
1B7A2000
heap
page read and write
7FFE16820000
trusted library allocation
page read and write
29EA000
trusted library allocation
page read and write
1B879000
heap
page read and write
1246D000
trusted library allocation
page read and write
2A02000
trusted library allocation
page read and write
26C8000
trusted library allocation
page read and write
4F4000
stack
page read and write
12444000
trusted library allocation
page read and write
1A83C000
stack
page read and write
2697000
trusted library allocation
page read and write
26C2000
trusted library allocation
page read and write
2A75000
trusted library allocation
page read and write
12636000
trusted library allocation
page read and write
10000
unkown
page readonly
2AC4000
trusted library allocation
page read and write
265C000
trusted library allocation
page read and write
2739000
trusted library allocation
page read and write
1B7AF000
heap
page read and write
2927000
trusted library allocation
page read and write
297E000
trusted library allocation
page read and write
2799000
trusted library allocation
page read and write
7FFE16590000
trusted library allocation
page read and write
262E000
trusted library allocation
page read and write
26B5000
trusted library allocation
page read and write
126CF000
trusted library allocation
page read and write
12490000
trusted library allocation
page read and write
26AC000
trusted library allocation
page read and write
2813000
trusted library allocation
page read and write
27A3000
trusted library allocation
page read and write
7FFE163F0000
trusted library allocation
page read and write
28E7000
trusted library allocation
page read and write
293C000
trusted library allocation
page read and write
1BB3E000
stack
page read and write
7FFE1689F000
trusted library allocation
page read and write
275F000
trusted library allocation
page read and write
28E9000
trusted library allocation
page read and write
278A000
trusted library allocation
page read and write
2AD1000
trusted library allocation
page read and write
12462000
trusted library allocation
page read and write
7FFE1688A000
trusted library allocation
page read and write
1B83F000
heap
page read and write
122EA000
trusted library allocation
page read and write
7FFE164D6000
trusted library allocation
page execute and read and write
1B7F4000
heap
page read and write
2A62000
trusted library allocation
page read and write
7FFE168A8000
trusted library allocation
page read and write
7FFE168B0000
trusted library allocation
page read and write
20A0000
trusted library allocation
page read and write
2290000
heap
page read and write
282A000
trusted library allocation
page read and write
122B1000
trusted library allocation
page read and write
7FFE1668F000
trusted library allocation
page read and write
1C900000
heap
page read and write
125D1000
trusted library allocation
page read and write
124AE000
trusted library allocation
page read and write
1B8A8000
heap
page read and write
7FFE1644C000
trusted library allocation
page execute and read and write
1248A000
trusted library allocation
page read and write
12683000
trusted library allocation
page read and write
1264C000
trusted library allocation
page read and write
7FFE1684F000
trusted library allocation
page read and write
125FD000
trusted library allocation
page read and write
28A1000
trusted library allocation
page read and write
12468000
trusted library allocation
page read and write
287F000
trusted library allocation
page read and write
29D5000
trusted library allocation
page read and write
1B01E000
stack
page read and write
2991000
trusted library allocation
page read and write
1B7DC000
heap
page read and write
7FFE16840000
trusted library allocation
page read and write
2899000
trusted library allocation
page read and write
1B907000
heap
page read and write
7FFE165E0000
trusted library allocation
page execute and read and write
275B000
trusted library allocation
page read and write
1B278000
heap
page read and write
7FFE168A0000
trusted library allocation
page read and write
125DF000
trusted library allocation
page read and write
28D6000
trusted library allocation
page read and write
28DC000
trusted library allocation
page read and write
7FFE16845000
trusted library allocation
page read and write
263E000
trusted library allocation
page read and write
1B8BA000
heap
page read and write
279B000
trusted library allocation
page read and write
1245A000
trusted library allocation
page read and write
2AD5000
trusted library allocation
page read and write
28D8000
trusted library allocation
page read and write
2A6F000
trusted library allocation
page read and write
2AC6000
trusted library allocation
page read and write
28B7000
trusted library allocation
page read and write
7FFE164AC000
trusted library allocation
page execute and read and write
62F000
heap
page read and write
2956000
trusted library allocation
page read and write
125EA000
trusted library allocation
page read and write
1B9BF000
stack
page read and write
1B2F3000
heap
page read and write
125C0000
trusted library allocation
page read and write
26AA000
trusted library allocation
page read and write
12696000
trusted library allocation
page read and write
7FFE1660B000
trusted library allocation
page read and write
7FFE168E0000
trusted library allocation
page read and write
12502000
trusted library allocation
page read and write
283D000
trusted library allocation
page read and write
235D000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
7FFE16410000
trusted library allocation
page read and write
2AD7000
trusted library allocation
page read and write
2706000
trusted library allocation
page read and write
28B0000
trusted library allocation
page read and write
28AA000
trusted library allocation
page read and write
1B251000
heap
page read and write
2A91000
trusted library allocation
page read and write
12614000
trusted library allocation
page read and write
27B9000
trusted library allocation
page read and write
272C000
trusted library allocation
page read and write
28BF000
trusted library allocation
page read and write
7FFE16900000
trusted library allocation
page read and write
26AE000
trusted library allocation
page read and write
There are 486 hidden memdumps, click here to show them.