IOC Report
VJoillkb6X.exe

loading gif

Files

File Path
Type
Category
Malicious
VJoillkb6X.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\VJoillkb6X.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\VJoillkb6X.exe
"C:\Users\user\Desktop\VJoillkb6X.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
https://discord.com/api/v9/users/
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/example/Field1Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://www.w3.oh
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://tempuri.org/example/Field1
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://tempuri.org/example/Field2
unknown
http://tempuri.org/example/Field3
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
http://tempuri.org/example/Field3Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
4.251.123.83:6677
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
unknown
http://schemas.xmlsoap.org/ws/2002/12/policy
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
4.251.123.83
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
462000
unkown
page readonly
malicious
2704000
trusted library allocation
page read and write
malicious
1BDDB000
heap
page read and write
7FFD3460F000
trusted library allocation
page read and write
2A20000
trusted library allocation
page read and write
1C260000
heap
page read and write
1B5BB000
heap
page read and write
2AED000
trusted library allocation
page read and write
7FFD34607000
trusted library allocation
page read and write
7FFD34340000
trusted library allocation
page read and write
2ADC000
trusted library allocation
page read and write
7FFD3445B000
trusted library allocation
page read and write
2C3C000
trusted library allocation
page read and write
2D37000
trusted library allocation
page read and write
7FFD34630000
trusted library allocation
page read and write
12864000
trusted library allocation
page read and write
2E66000
trusted library allocation
page read and write
1BCA5000
heap
page read and write
2B67000
trusted library allocation
page read and write
7FFD34420000
trusted library allocation
page read and write
127D3000
trusted library allocation
page read and write
2E1E000
trusted library allocation
page read and write
12856000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
2A69000
trusted library allocation
page read and write
2E6A000
trusted library allocation
page read and write
1B99A000
stack
page read and write
1BE60000
heap
page read and write
2C7A000
trusted library allocation
page read and write
12697000
trusted library allocation
page read and write
1B5AC000
heap
page read and write
1BD6E000
heap
page read and write
12775000
trusted library allocation
page read and write
7FFD343F0000
trusted library allocation
page read and write
2E7B000
trusted library allocation
page read and write
25DE000
stack
page read and write
7FFD34276000
trusted library allocation
page execute and read and write
2C29000
trusted library allocation
page read and write
2B7F000
trusted library allocation
page read and write
12810000
trusted library allocation
page read and write
12816000
trusted library allocation
page read and write
870000
heap
page read and write
1BADE000
stack
page read and write
2D1F000
trusted library allocation
page read and write
2E53000
trusted library allocation
page read and write
2D55000
trusted library allocation
page read and write
7FFD34620000
trusted library allocation
page read and write
2BB2000
trusted library allocation
page read and write
2C58000
trusted library allocation
page read and write
2B44000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
1C85D000
stack
page read and write
2CAF000
trusted library allocation
page read and write
1BDDE000
heap
page read and write
127BB000
trusted library allocation
page read and write
2CA2000
trusted library allocation
page read and write
12850000
trusted library allocation
page read and write
12A8C000
trusted library allocation
page read and write
1277B000
trusted library allocation
page read and write
2F04000
trusted library allocation
page read and write
2B79000
trusted library allocation
page read and write
12706000
trusted library allocation
page read and write
2BF2000
trusted library allocation
page read and write
95A000
heap
page read and write
890000
heap
page read and write
2AF1000
trusted library allocation
page read and write
12739000
trusted library allocation
page read and write
1BE7F000
heap
page read and write
2ECA000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
2EBD000
trusted library allocation
page read and write
2EBF000
trusted library allocation
page read and write
2BAE000
trusted library allocation
page read and write
2AFE000
trusted library allocation
page read and write
126F9000
trusted library allocation
page read and write
2DFE000
trusted library allocation
page read and write
2A2B000
trusted library allocation
page read and write
1B5F1000
heap
page read and write
2BDF000
trusted library allocation
page read and write
1BCD0000
heap
page read and write
C35000
heap
page read and write
7FFD343B0000
trusted library allocation
page read and write
2B62000
trusted library allocation
page read and write
BE0000
trusted library allocation
page read and write
7FFD34246000
trusted library allocation
page read and write
2C4F000
trusted library allocation
page read and write
7FFD345BA000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
5F4000
stack
page read and write
2CA0000
trusted library allocation
page read and write
2D12000
trusted library allocation
page read and write
2B53000
trusted library allocation
page read and write
1BBFD000
heap
page read and write
7FFD34330000
trusted library allocation
page read and write
127C5000
trusted library allocation
page read and write
12823000
trusted library allocation
page read and write
1AFB0000
heap
page execute and read and write
2D0C000
trusted library allocation
page read and write
7FFD34193000
trusted library allocation
page execute and read and write
2B00000
trusted library allocation
page read and write
8F0000
heap
page read and write
2E6E000
trusted library allocation
page read and write
1BCC1000
heap
page read and write
2C5A000
trusted library allocation
page read and write
7FFD343C0000
trusted library allocation
page read and write
2E24000
trusted library allocation
page read and write
2CAB000
trusted library allocation
page read and write
2A3C000
trusted library allocation
page read and write
930000
heap
page read and write
7FFD34430000
trusted library allocation
page read and write
2A51000
trusted library allocation
page read and write
1278A000
trusted library allocation
page read and write
7FFD344D0000
trusted library allocation
page execute and read and write
2BFF000
trusted library allocation
page read and write
2C1A000
trusted library allocation
page read and write
7FFD34640000
trusted library allocation
page read and write
2E5C000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
2A27000
trusted library allocation
page read and write
1BBDB000
stack
page read and write
BBE000
stack
page read and write
2ACC000
trusted library allocation
page read and write
1B170000
heap
page read and write
127B4000
trusted library allocation
page read and write
2E57000
trusted library allocation
page read and write
7FFD345B0000
trusted library allocation
page read and write
12745000
trusted library allocation
page read and write
1BCFC000
heap
page read and write
2C01000
trusted library allocation
page read and write
12818000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
2D23000
trusted library allocation
page read and write
128D2000
trusted library allocation
page read and write
127D0000
trusted library allocation
page read and write
2BA5000
trusted library allocation
page read and write
1B64D000
heap
page read and write
1BCE1000
heap
page read and write
12747000
trusted library allocation
page read and write
1BE74000
heap
page read and write
2E55000
trusted library allocation
page read and write
128AE000
trusted library allocation
page read and write
7FFD34460000
trusted library allocation
page read and write
2C6D000
trusted library allocation
page read and write
7FFD341EC000
trusted library allocation
page execute and read and write
2E46000
trusted library allocation
page read and write
C10000
heap
page read and write
1276E000
trusted library allocation
page read and write
7FFD343D0000
trusted library allocation
page read and write
2E7F000
trusted library allocation
page read and write
2BCE000
trusted library allocation
page read and write
2C23000
trusted library allocation
page read and write
1AFB4000
heap
page execute and read and write
1268B000
trusted library allocation
page read and write
2B55000
trusted library allocation
page read and write
1B65A000
heap
page read and write
2B90000
trusted library allocation
page read and write
1BC67000
heap
page read and write
7FFD343E0000
trusted library allocation
page read and write
2E9E000
trusted library allocation
page read and write
2A5A000
trusted library allocation
page read and write
2D21000
trusted library allocation
page read and write
2AF3000
trusted library allocation
page read and write
1CFE0000
heap
page read and write
2B31000
trusted library allocation
page read and write
1B5A9000
heap
page read and write
2DB2000
trusted library allocation
page read and write
1BD3A000
heap
page read and write
2A5C000
trusted library allocation
page read and write
7FFD34250000
trusted library allocation
page execute and read and write
2BD2000
trusted library allocation
page read and write
1BC99000
heap
page read and write
2D2E000
trusted library allocation
page read and write
2E95000
trusted library allocation
page read and write
2C38000
trusted library allocation
page read and write
7FFD345C3000
trusted library allocation
page read and write
12A77000
trusted library allocation
page read and write
2BC3000
trusted library allocation
page read and write
2A2D000
trusted library allocation
page read and write
1277F000
trusted library allocation
page read and write
7FFD345E6000
trusted library allocation
page read and write
1B5DA000
heap
page read and write
12736000
trusted library allocation
page read and write
2EDB000
trusted library allocation
page read and write
7FFD345AE000
trusted library allocation
page read and write
2C25000
trusted library allocation
page read and write
2E6C000
trusted library allocation
page read and write
2DDE000
trusted library allocation
page read and write
7FFD34580000
trusted library allocation
page read and write
BC0000
trusted library allocation
page read and write
7FF468670000
trusted library allocation
page execute and read and write
2AC2000
trusted library allocation
page read and write
12A99000
trusted library allocation
page read and write
7FFD34690000
trusted library allocation
page read and write
1BC76000
heap
page read and write
2E22000
trusted library allocation
page read and write
2DF3000
trusted library allocation
page read and write
128A1000
trusted library allocation
page read and write
1BD0F000
heap
page read and write
12A92000
trusted library allocation
page read and write
12807000
trusted library allocation
page read and write
7FFD34490000
trusted library allocation
page read and write
2D52000
trusted library allocation
page read and write
12870000
trusted library allocation
page read and write
2C6B000
trusted library allocation
page read and write
1BD2D000
heap
page read and write
2D45000
trusted library allocation
page read and write
2DAD000
trusted library allocation
page read and write
2BF4000
trusted library allocation
page read and write
2DEF000
trusted library allocation
page read and write
1BD4A000
heap
page read and write
7FFD345B5000
trusted library allocation
page read and write
2D94000
trusted library allocation
page read and write
2BEE000
trusted library allocation
page read and write
2600000
heap
page execute and read and write
2BE5000
trusted library allocation
page read and write
1C15E000
stack
page read and write
7FFD344A0000
trusted library allocation
page read and write
12AA5000
trusted library allocation
page read and write
126F2000
trusted library allocation
page read and write
2BF0000
trusted library allocation
page read and write
2A4D000
trusted library allocation
page read and write
1B5A0000
heap
page read and write
C30000
heap
page read and write
12813000
trusted library allocation
page read and write
2E4B000
trusted library allocation
page read and write
2B59000
trusted library allocation
page read and write
1CFEC000
heap
page read and write
2D97000
trusted library allocation
page read and write
1BC48000
heap
page read and write
1A9F1000
heap
page read and write
1BD20000
heap
page read and write
7FFD34660000
trusted library allocation
page read and write
1283F000
trusted library allocation
page read and write
12846000
trusted library allocation
page read and write
2D25000
trusted library allocation
page read and write
127FA000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
126FF000
trusted library allocation
page read and write
7FFD34594000
trusted library allocation
page read and write
2C36000
trusted library allocation
page read and write
12715000
trusted library allocation
page read and write
1B584000
heap
page read and write
2B3E000
trusted library allocation
page read and write
7FFD346A0000
trusted library allocation
page read and write
9E4000
heap
page read and write
1272F000
trusted library allocation
page read and write
9EB000
heap
page read and write
2A5E000
trusted library allocation
page read and write
1B57B000
stack
page read and write
127CE000
trusted library allocation
page read and write
2B8C000
trusted library allocation
page read and write
7FFD34587000
trusted library allocation
page read and write
2C67000
trusted library allocation
page read and write
2D14000
trusted library allocation
page read and write
7FFD34610000
trusted library allocation
page read and write
2610000
heap
page read and write
2B92000
trusted library allocation
page read and write
2B22000
trusted library allocation
page read and write
7FFD34570000
trusted library allocation
page read and write
1B5C7000
heap
page read and write
7FFD345F1000
trusted library allocation
page read and write
1A6A0000
trusted library allocation
page read and write
2DEB000
trusted library allocation
page read and write
840000
heap
page read and write
7FFD34670000
trusted library allocation
page read and write
1BC93000
heap
page read and write
2D50000
trusted library allocation
page read and write
1BCB5000
heap
page read and write
C13000
heap
page read and write
8F6000
heap
page read and write
12A9C000
trusted library allocation
page read and write
2E48000
trusted library allocation
page read and write
7FFD345E1000
trusted library allocation
page read and write
2C05000
trusted library allocation
page read and write
2C3A000
trusted library allocation
page read and write
1B37E000
stack
page read and write
12AB5000
trusted library allocation
page read and write
1BC5E000
heap
page read and write
2C9A000
trusted library allocation
page read and write
12800000
trusted library allocation
page read and write
2EAC000
trusted library allocation
page read and write
7FFD341B4000
trusted library allocation
page read and write
7FFD34590000
trusted library allocation
page read and write
12AA2000
trusted library allocation
page read and write
1BCCA000
heap
page read and write
7FFD34350000
trusted library allocation
page read and write
7FFD3419D000
trusted library allocation
page execute and read and write
2DCF000
trusted library allocation
page read and write
1B27E000
stack
page read and write
7FFD34680000
trusted library allocation
page read and write
12AA8000
trusted library allocation
page read and write
12859000
trusted library allocation
page read and write
7FFD3424C000
trusted library allocation
page execute and read and write
1BC3E000
heap
page read and write
7FFD345FA000
trusted library allocation
page read and write
1285E000
trusted library allocation
page read and write
9E0000
heap
page read and write
127DD000
trusted library allocation
page read and write
2A29000
trusted library allocation
page read and write
1B700000
heap
page execute and read and write
2AE4000
trusted library allocation
page read and write
12742000
trusted library allocation
page read and write
127CA000
trusted library allocation
page read and write
2EAE000
trusted library allocation
page read and write
1271D000
trusted library allocation
page read and write
12717000
trusted library allocation
page read and write
2D74000
trusted library allocation
page read and write
7FFD34480000
trusted library allocation
page read and write
2D83000
trusted library allocation
page read and write
1284C000
trusted library allocation
page read and write
7FFD34380000
trusted library allocation
page execute and read and write
1B582000
heap
page read and write
2B07000
trusted library allocation
page read and write
2BCC000
trusted library allocation
page read and write
2B11000
trusted library allocation
page read and write
271D000
trusted library allocation
page read and write
2DD5000
trusted library allocation
page read and write
2BB4000
trusted library allocation
page read and write
12691000
trusted library allocation
page read and write
1BC3A000
heap
page read and write
2EA6000
trusted library allocation
page read and write
7FFD34190000
trusted library allocation
page read and write
2671000
trusted library allocation
page read and write
1BCF1000
heap
page read and write
12729000
trusted library allocation
page read and write
7FFD341A3000
trusted library allocation
page read and write
2E15000
trusted library allocation
page read and write
1270F000
trusted library allocation
page read and write
2C8F000
trusted library allocation
page read and write
128A8000
trusted library allocation
page read and write
460000
unkown
page readonly
7FFD34392000
trusted library allocation
page read and write
1285B000
trusted library allocation
page read and write
850000
heap
page read and write
12722000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
7FFD343AB000
trusted library allocation
page read and write
1C05C000
stack
page read and write
2D70000
trusted library allocation
page read and write
2BD4000
trusted library allocation
page read and write
1BC08000
heap
page read and write
2E2F000
trusted library allocation
page read and write
1B47E000
stack
page read and write
2C78000
trusted library allocation
page read and write
1278D000
trusted library allocation
page read and write
7FFD34360000
trusted library allocation
page read and write
2CA7000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
7FFD344C0000
trusted library allocation
page read and write
2660000
heap
page read and write
7FFD34616000
trusted library allocation
page read and write
8E0000
heap
page read and write
126AF000
trusted library allocation
page read and write
7FFD342B0000
trusted library allocation
page execute and read and write
2E99000
trusted library allocation
page read and write
7FFD34618000
trusted library allocation
page read and write
2E97000
trusted library allocation
page read and write
2A4F000
trusted library allocation
page read and write
2E7D000
trusted library allocation
page read and write
7FFD34470000
trusted library allocation
page execute and read and write
7FFD3458D000
trusted library allocation
page read and write
2D85000
trusted library allocation
page read and write
2D90000
trusted library allocation
page read and write
2B37000
trusted library allocation
page read and write
2E68000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
12881000
trusted library allocation
page read and write
2C9E000
trusted library allocation
page read and write
2D1D000
trusted library allocation
page read and write
7FFD34440000
trusted library allocation
page read and write
2E9B000
trusted library allocation
page read and write
7FFD34194000
trusted library allocation
page read and write
12752000
trusted library allocation
page read and write
2DBC000
trusted library allocation
page read and write
2B94000
trusted library allocation
page read and write
12709000
trusted library allocation
page read and write
2C2B000
trusted library allocation
page read and write
1ABFC000
stack
page read and write
2A3A000
trusted library allocation
page read and write
D3F000
stack
page read and write
2DAF000
trusted library allocation
page read and write
7FFD345BF000
trusted library allocation
page read and write
7FFD34560000
trusted library allocation
page read and write
2DC2000
trusted library allocation
page read and write
2D72000
trusted library allocation
page read and write
2A30000
trusted library allocation
page read and write
7FFD34400000
trusted library allocation
page execute and read and write
7FFD34450000
trusted library allocation
page read and write
127C1000
trusted library allocation
page read and write
1B6FE000
stack
page read and write
2AF6000
trusted library allocation
page read and write
12AAA000
trusted library allocation
page read and write
7FFD345BD000
trusted library allocation
page read and write
7FFD341AD000
trusted library allocation
page execute and read and write
2EC8000
trusted library allocation
page read and write
2E26000
trusted library allocation
page read and write
963000
heap
page read and write
2E33000
trusted library allocation
page read and write
2C87000
trusted library allocation
page read and write
7FFD344AA000
trusted library allocation
page read and write
12AB0000
trusted library allocation
page read and write
2AE2000
trusted library allocation
page read and write
1BC8C000
heap
page read and write
7FFD341B0000
trusted library allocation
page read and write
90F000
heap
page read and write
7FFD34399000
trusted library allocation
page read and write
2D87000
trusted library allocation
page read and write
2B2F000
trusted library allocation
page read and write
8E5000
heap
page read and write
12792000
trusted library allocation
page read and write
7FFD343DC000
trusted library allocation
page read and write
1273F000
trusted library allocation
page read and write
1BC45000
heap
page read and write
7FFD3442F000
trusted library allocation
page read and write
2D02000
trusted library allocation
page read and write
12797000
trusted library allocation
page read and write
460000
unkown
page readonly
1B75E000
stack
page read and write
7FFD345AB000
trusted library allocation
page read and write
2A4B000
trusted library allocation
page read and write
2D4C000
trusted library allocation
page read and write
2B25000
trusted library allocation
page read and write
1BC50000
heap
page read and write
1281E000
trusted library allocation
page read and write
1274D000
trusted library allocation
page read and write
2B47000
trusted library allocation
page read and write
7FFD34410000
trusted library allocation
page read and write
2E35000
trusted library allocation
page read and write
2D61000
trusted library allocation
page read and write
2C7C000
trusted library allocation
page read and write
12671000
trusted library allocation
page read and write
1280A000
trusted library allocation
page read and write
2D6E000
trusted library allocation
page read and write
7FFD341BB000
trusted library allocation
page execute and read and write
2B13000
trusted library allocation
page read and write
2640000
trusted library allocation
page read and write
127D8000
trusted library allocation
page read and write
2BC1000
trusted library allocation
page read and write
7FFD345A0000
trusted library allocation
page read and write
7FFD345E4000
trusted library allocation
page read and write
2DF1000
trusted library allocation
page read and write
7FFD344B0000
trusted library allocation
page read and write
1BCDA000
heap
page read and write
2BDD000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
7FFD34650000
trusted library allocation
page read and write
12788000
trusted library allocation
page read and write
7FFD343A5000
trusted library allocation
page read and write
12784000
trusted library allocation
page read and write
2ECC000
trusted library allocation
page read and write
933000
heap
page read and write
1BBE0000
heap
page read and write
2B60000
trusted library allocation
page read and write
2DBE000
trusted library allocation
page read and write
12712000
trusted library allocation
page read and write
1B5D3000
heap
page read and write
2ED9000
trusted library allocation
page read and write
2C98000
trusted library allocation
page read and write
2DA9000
trusted library allocation
page read and write
7FFD34550000
trusted library allocation
page read and write
1289C000
trusted library allocation
page read and write
7FFD34240000
trusted library allocation
page read and write
There are 452 hidden memdumps, click here to show them.