IOC Report
rePERU8VUs.exe

loading gif

Files

File Path
Type
Category
Malicious
rePERU8VUs.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\rePERU8VUs.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rePERU8VUs.exe
"C:\Users\user\Desktop\rePERU8VUs.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
https://discord.com/api/v9/users/
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/example/Field1Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://www.w3.oh
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://tempuri.org/example/Field1
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://tempuri.org/example/Field2
unknown
http://tempuri.org/example/Field3
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
unknown
http://www.w3.o
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
http://tempuri.org/example/Field3Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
4.251.123.83:6677
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
unknown
http://schemas.xmlsoap.org/ws/2002/12/policy
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
4.251.123.83
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
172000
unkown
page readonly
malicious
27F4000
trusted library allocation
page read and write
malicious
129BC000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
2F0C000
trusted library allocation
page read and write
7FFD34ACD000
trusted library allocation
page read and write
1B982000
heap
page read and write
2DA6000
trusted library allocation
page read and write
2DC2000
trusted library allocation
page read and write
2FFA000
trusted library allocation
page read and write
2C52000
trusted library allocation
page read and write
7FE000
heap
page read and write
7FFD348C5000
trusted library allocation
page read and write
2DF9000
trusted library allocation
page read and write
7FFD346B0000
trusted library allocation
page read and write
7FFD347D0000
trusted library allocation
page execute and read and write
7FFD348F0000
trusted library allocation
page read and write
2CDE000
trusted library allocation
page read and write
2E7E000
trusted library allocation
page read and write
2E5E000
trusted library allocation
page read and write
12AE3000
trusted library allocation
page read and write
12B45000
trusted library allocation
page read and write
7FFD34AF5000
trusted library allocation
page read and write
7FFD34B24000
trusted library allocation
page read and write
1CAF0000
heap
page read and write
3018000
trusted library allocation
page read and write
2D97000
trusted library allocation
page read and write
1B5A9000
heap
page read and write
2F68000
trusted library allocation
page read and write
7FFD34AE0000
trusted library allocation
page read and write
2D53000
trusted library allocation
page read and write
2C9F000
trusted library allocation
page read and write
2FC5000
trusted library allocation
page read and write
7FFD348B9000
trusted library allocation
page read and write
2F0A000
trusted library allocation
page read and write
2B84000
trusted library allocation
page read and write
1B050000
heap
page read and write
2CEF000
trusted library allocation
page read and write
7FFD34B70000
trusted library allocation
page read and write
7FFD34760000
trusted library allocation
page read and write
2DD7000
trusted library allocation
page read and write
2550000
heap
page read and write
12818000
trusted library allocation
page read and write
2EBC000
trusted library allocation
page read and write
1281D000
trusted library allocation
page read and write
7FFD34AF0000
trusted library allocation
page read and write
2F19000
trusted library allocation
page read and write
12A97000
trusted library allocation
page read and write
2B86000
trusted library allocation
page read and write
1A790000
trusted library allocation
page read and write
1B61B000
heap
page read and write
2F4E000
trusted library allocation
page read and write
7FFD34796000
trusted library allocation
page execute and read and write
2E5C000
trusted library allocation
page read and write
2B8C000
trusted library allocation
page read and write
7FFD34B60000
trusted library allocation
page read and write
7FFD34AD0000
trusted library allocation
page read and write
2EAB000
trusted library allocation
page read and write
12813000
trusted library allocation
page read and write
2ED3000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
1B5BE000
heap
page read and write
2F59000
trusted library allocation
page read and write
1B15F000
stack
page read and write
1BB01000
heap
page read and write
2BAC000
trusted library allocation
page read and write
1B45B000
stack
page read and write
885000
heap
page read and write
7FFD34B20000
trusted library allocation
page read and write
1B9FC000
heap
page read and write
2F46000
trusted library allocation
page read and write
7FF48A860000
trusted library allocation
page execute and read and write
12AF9000
trusted library allocation
page read and write
2D29000
trusted library allocation
page read and write
1BA94000
heap
page read and write
2FA5000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
2761000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page read and write
1285B000
trusted library allocation
page read and write
7FFD348B2000
trusted library allocation
page read and write
2BB7000
trusted library allocation
page read and write
2FD6000
trusted library allocation
page read and write
300A000
trusted library allocation
page read and write
2D1C000
trusted library allocation
page read and write
7FFD34AA0000
trusted library allocation
page read and write
12B01000
trusted library allocation
page read and write
12822000
trusted library allocation
page read and write
2E6D000
trusted library allocation
page read and write
7FFD346B4000
trusted library allocation
page read and write
7FFD346B3000
trusted library allocation
page execute and read and write
2F4A000
trusted library allocation
page read and write
2D5C000
trusted library allocation
page read and write
2EE2000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
1BA74000
heap
page read and write
2D5A000
trusted library allocation
page read and write
2C81000
trusted library allocation
page read and write
2D0F000
trusted library allocation
page read and write
2F5B000
trusted library allocation
page read and write
1BA9D000
heap
page read and write
B6E000
heap
page read and write
1BB15000
heap
page read and write
12806000
trusted library allocation
page read and write
12880000
trusted library allocation
page read and write
2C7D000
trusted library allocation
page read and write
1B97B000
stack
page read and write
2CB0000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
2E69000
trusted library allocation
page read and write
12B0C000
trusted library allocation
page read and write
706000
heap
page read and write
2F88000
trusted library allocation
page read and write
2CE7000
trusted library allocation
page read and write
1BA80000
heap
page read and write
2C50000
trusted library allocation
page read and write
2DC6000
trusted library allocation
page read and write
1277B000
trusted library allocation
page read and write
2DFB000
trusted library allocation
page read and write
2BAA000
trusted library allocation
page read and write
12AAA000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD34B58000
trusted library allocation
page read and write
2F8E000
trusted library allocation
page read and write
2F8A000
trusted library allocation
page read and write
12AAE000
trusted library allocation
page read and write
1BA32000
heap
page read and write
7FFD34B31000
trusted library allocation
page read and write
2CEB000
trusted library allocation
page read and write
741000
heap
page read and write
7FFD348E0000
trusted library allocation
page read and write
1BB21000
heap
page read and write
70C000
heap
page read and write
1C1000
unkown
page readonly
3007000
trusted library allocation
page read and write
12800000
trusted library allocation
page read and write
2F17000
trusted library allocation
page read and write
2D31000
trusted library allocation
page read and write
2BBB000
trusted library allocation
page read and write
250E000
stack
page read and write
1BB43000
heap
page read and write
1B9F1000
heap
page read and write
775000
heap
page read and write
2FF4000
trusted library allocation
page read and write
7FFD346C3000
trusted library allocation
page read and write
12A6D000
trusted library allocation
page read and write
744000
heap
page read and write
2D61000
trusted library allocation
page read and write
170000
unkown
page readonly
76E000
heap
page read and write
7FFD34870000
trusted library allocation
page read and write
2CBD000
trusted library allocation
page read and write
1BA53000
heap
page read and write
2F7D000
trusted library allocation
page read and write
280D000
trusted library allocation
page read and write
7FFD34A90000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
AB0000
heap
page read and write
1B55E000
stack
page read and write
7FFD34910000
trusted library allocation
page read and write
12AC6000
trusted library allocation
page read and write
2D86000
trusted library allocation
page read and write
12A8C000
trusted library allocation
page read and write
7FFD346DB000
trusted library allocation
page execute and read and write
72A000
heap
page read and write
1B5B6000
heap
page read and write
2C63000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page read and write
7FFD34AEA000
trusted library allocation
page read and write
2CA3000
trusted library allocation
page read and write
1C27E000
stack
page read and write
2FF2000
trusted library allocation
page read and write
7FFD3470C000
trusted library allocation
page execute and read and write
2F28000
trusted library allocation
page read and write
1B5D1000
heap
page read and write
1B030000
heap
page execute and read and write
2CB5000
trusted library allocation
page read and write
98E000
stack
page read and write
1B580000
heap
page read and write
2FB0000
trusted library allocation
page read and write
2F06000
trusted library allocation
page read and write
7FFD34770000
trusted library allocation
page execute and read and write
2E6F000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
12ABC000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
12B52000
trusted library allocation
page read and write
7FFD34AFD000
trusted library allocation
page read and write
2CBB000
trusted library allocation
page read and write
2C93000
trusted library allocation
page read and write
2E7C000
trusted library allocation
page read and write
12AC1000
trusted library allocation
page read and write
7FFD34B03000
trusted library allocation
page read and write
7FFD34900000
trusted library allocation
page read and write
2FDC000
trusted library allocation
page read and write
1B566000
heap
page read and write
2D80000
trusted library allocation
page read and write
2D0B000
trusted library allocation
page read and write
2DFE000
trusted library allocation
page read and write
2ECD000
trusted library allocation
page read and write
2CDA000
trusted library allocation
page read and write
2B97000
trusted library allocation
page read and write
1B75A000
stack
page read and write
2C8C000
trusted library allocation
page read and write
2FA1000
trusted library allocation
page read and write
2D0D000
trusted library allocation
page read and write
2D95000
trusted library allocation
page read and write
2FCA000
trusted library allocation
page read and write
12B36000
trusted library allocation
page read and write
2BA4000
trusted library allocation
page read and write
2CA1000
trusted library allocation
page read and write
1BA3C000
heap
page read and write
2F1D000
trusted library allocation
page read and write
7FFD34BD0000
trusted library allocation
page read and write
1BAC9000
heap
page read and write
3B0000
heap
page read and write
1280F000
trusted library allocation
page read and write
7FFD34BB0000
trusted library allocation
page read and write
2D84000
trusted library allocation
page read and write
2B88000
trusted library allocation
page read and write
2DDB000
trusted library allocation
page read and write
1280A000
trusted library allocation
page read and write
1BB79000
heap
page read and write
2CD6000
trusted library allocation
page read and write
2CED000
trusted library allocation
page read and write
2FF6000
trusted library allocation
page read and write
1BAFF000
heap
page read and write
7FFD3497B000
trusted library allocation
page read and write
2567000
heap
page read and write
1BA49000
heap
page read and write
1BA70000
heap
page read and write
12A87000
trusted library allocation
page read and write
7FFD348CB000
trusted library allocation
page read and write
2D93000
trusted library allocation
page read and write
2B82000
trusted library allocation
page read and write
2E06000
trusted library allocation
page read and write
127DC000
trusted library allocation
page read and write
2FC1000
trusted library allocation
page read and write
1ABDB000
stack
page read and write
2F81000
trusted library allocation
page read and write
2FB6000
trusted library allocation
page read and write
12855000
trusted library allocation
page read and write
1B5CB000
heap
page read and write
7FFD348A0000
trusted library allocation
page execute and read and write
2FB2000
trusted library allocation
page read and write
2D2F000
trusted library allocation
page read and write
2F91000
trusted library allocation
page read and write
2B95000
trusted library allocation
page read and write
2CC3000
trusted library allocation
page read and write
B60000
heap
page read and write
7FFD34AB0000
trusted library allocation
page read and write
7FFD34AFF000
trusted library allocation
page read and write
1BA55000
heap
page read and write
1BA85000
heap
page read and write
AE0000
trusted library allocation
page read and write
1B033000
heap
page execute and read and write
12AA4000
trusted library allocation
page read and write
12980000
trusted library allocation
page read and write
1B564000
heap
page read and write
2EEB000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page read and write
12B3F000
trusted library allocation
page read and write
2CAC000
trusted library allocation
page read and write
2D2D000
trusted library allocation
page read and write
3C0000
heap
page read and write
1BAAB000
heap
page read and write
12863000
trusted library allocation
page read and write
2B79000
trusted library allocation
page read and write
2F3F000
trusted library allocation
page read and write
12858000
trusted library allocation
page read and write
2FF8000
trusted library allocation
page read and write
3012000
trusted library allocation
page read and write
7FFD34AFA000
trusted library allocation
page read and write
2FD8000
trusted library allocation
page read and write
2EAD000
trusted library allocation
page read and write
2EDC000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
B40000
heap
page read and write
2F7F000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page read and write
7FFD346D0000
trusted library allocation
page read and write
2E81000
trusted library allocation
page read and write
1B58E000
heap
page read and write
1B641000
heap
page read and write
2E6B000
trusted library allocation
page read and write
1BB73000
heap
page read and write
1B5B3000
heap
page read and write
1B980000
heap
page read and write
2CFA000
trusted library allocation
page read and write
7FFD3495F000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page read and write
364000
stack
page read and write
7FFD34BA0000
trusted library allocation
page read and write
1279F000
trusted library allocation
page read and write
12AB7000
trusted library allocation
page read and write
2E93000
trusted library allocation
page read and write
2D3A000
trusted library allocation
page read and write
7FFD34880000
trusted library allocation
page read and write
2EEF000
trusted library allocation
page read and write
1B25E000
stack
page read and write
7FFD34940000
trusted library allocation
page read and write
1B99D000
heap
page read and write
2750000
heap
page execute and read and write
7FFD34B50000
trusted library allocation
page read and write
12A74000
trusted library allocation
page read and write
1B985000
heap
page read and write
2C48000
trusted library allocation
page read and write
820000
trusted library allocation
page read and write
2A2D000
trusted library allocation
page read and write
2EAF000
trusted library allocation
page read and write
12AB9000
trusted library allocation
page read and write
2E67000
trusted library allocation
page read and write
1BB0B000
heap
page read and write
2BB9000
trusted library allocation
page read and write
2FA7000
trusted library allocation
page read and write
12787000
trusted library allocation
page read and write
2D9A000
trusted library allocation
page read and write
2DC8000
trusted library allocation
page read and write
1B61E000
heap
page read and write
7FFD349CA000
trusted library allocation
page read and write
2C4E000
trusted library allocation
page read and write
1284C000
trusted library allocation
page read and write
1283F000
trusted library allocation
page read and write
12B4D000
trusted library allocation
page read and write
2EFC000
trusted library allocation
page read and write
2FA3000
trusted library allocation
page read and write
2FDA000
trusted library allocation
page read and write
2E0B000
trusted library allocation
page read and write
2F1B000
trusted library allocation
page read and write
2CAE000
trusted library allocation
page read and write
12A91000
trusted library allocation
page read and write
12AFC000
trusted library allocation
page read and write
1BBBF000
stack
page read and write
2FE3000
trusted library allocation
page read and write
12A7E000
trusted library allocation
page read and write
7FFD34BC0000
trusted library allocation
page read and write
1B56C000
heap
page read and write
2F2A000
trusted library allocation
page read and write
2D4D000
trusted library allocation
page read and write
2F08000
trusted library allocation
page read and write
1BC80000
heap
page read and write
2E91000
trusted library allocation
page read and write
2D1F000
trusted library allocation
page read and write
2CC1000
trusted library allocation
page read and write
2F31000
trusted library allocation
page read and write
1BA22000
heap
page read and write
7FFD34B4F000
trusted library allocation
page read and write
2B9B000
trusted library allocation
page read and write
2FC7000
trusted library allocation
page read and write
6D0000
heap
page read and write
1BA5F000
heap
page read and write
2FC3000
trusted library allocation
page read and write
2F0E000
trusted library allocation
page read and write
2D88000
trusted library allocation
page read and write
2BC4000
trusted library allocation
page read and write
7FFD346CD000
trusted library allocation
page execute and read and write
12B2F000
trusted library allocation
page read and write
2CF8000
trusted library allocation
page read and write
2ECF000
trusted library allocation
page read and write
2C3D000
trusted library allocation
page read and write
12AE9000
trusted library allocation
page read and write
12815000
trusted library allocation
page read and write
7FFD34B47000
trusted library allocation
page read and write
1CAFC000
heap
page read and write
12B42000
trusted library allocation
page read and write
1BBFF000
stack
page read and write
7FFD3476C000
trusted library allocation
page execute and read and write
2EE9000
trusted library allocation
page read and write
7FFD34920000
trusted library allocation
page execute and read and write
1BA69000
heap
page read and write
1B5DB000
heap
page read and write
12AFF000
trusted library allocation
page read and write
2C6C000
trusted library allocation
page read and write
76C000
heap
page read and write
1B9A0000
heap
page read and write
7FFD349F0000
trusted library allocation
page execute and read and write
2EF1000
trusted library allocation
page read and write
1B59B000
heap
page read and write
2A37000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
1C991000
heap
page read and write
12870000
trusted library allocation
page read and write
7FFD34B90000
trusted library allocation
page read and write
2EDE000
trusted library allocation
page read and write
1BAD6000
heap
page read and write
2EA0000
trusted library allocation
page read and write
7FFD34B56000
trusted library allocation
page read and write
A8E000
stack
page read and write
7DF000
heap
page read and write
1285D000
trusted library allocation
page read and write
880000
heap
page read and write
2E8B000
trusted library allocation
page read and write
12A9D000
trusted library allocation
page read and write
127F9000
trusted library allocation
page read and write
12761000
trusted library allocation
page read and write
7FFD34AD4000
trusted library allocation
page read and write
2E7A000
trusted library allocation
page read and write
2C8A000
trusted library allocation
page read and write
1C37D000
stack
page read and write
1BB37000
heap
page read and write
1BAAE000
heap
page read and write
1BAD9000
heap
page read and write
2A39000
trusted library allocation
page read and write
2FB8000
trusted library allocation
page read and write
26B0000
heap
page execute and read and write
12A89000
trusted library allocation
page read and write
7FFD346D4000
trusted library allocation
page read and write
2EB1000
trusted library allocation
page read and write
1BA59000
heap
page read and write
C6F000
stack
page read and write
B65000
heap
page read and write
12B47000
trusted library allocation
page read and write
12B29000
trusted library allocation
page read and write
2D91000
trusted library allocation
page read and write
7FFD348FC000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page execute and read and write
12A7A000
trusted library allocation
page read and write
2C6E000
trusted library allocation
page read and write
7FFD34A80000
trusted library allocation
page read and write
7FFD34B26000
trusted library allocation
page read and write
1B35E000
stack
page read and write
7FFD34B3A000
trusted library allocation
page read and write
12AF0000
trusted library allocation
page read and write
12AB3000
trusted library allocation
page read and write
12B39000
trusted library allocation
page read and write
2EE0000
trusted library allocation
page read and write
2C61000
trusted library allocation
page read and write
1B053000
heap
page read and write
840000
trusted library allocation
page read and write
2F1F000
trusted library allocation
page read and write
3E0000
heap
page read and write
12A83000
trusted library allocation
page read and write
2D4F000
trusted library allocation
page read and write
1B588000
heap
page read and write
1C99D000
heap
page read and write
1BA6C000
heap
page read and write
2DF5000
trusted library allocation
page read and write
7FFD348D0000
trusted library allocation
page read and write
2C37000
trusted library allocation
page read and write
2BA6000
trusted library allocation
page read and write
12845000
trusted library allocation
page read and write
7FFD34AC7000
trusted library allocation
page read and write
7FFD34B80000
trusted library allocation
page read and write
12AF3000
trusted library allocation
page read and write
7FFD346BD000
trusted library allocation
page execute and read and write
2C4C000
trusted library allocation
page read and write
2DD3000
trusted library allocation
page read and write
2D2B000
trusted library allocation
page read and write
12B07000
trusted library allocation
page read and write
2F4C000
trusted library allocation
page read and write
1C980000
heap
page read and write
1BAFB000
heap
page read and write
170000
unkown
page readonly
12781000
trusted library allocation
page read and write
700000
heap
page read and write
7FFD34766000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
1FE000
unkown
page readonly
2A3B000
trusted library allocation
page read and write
1284F000
trusted library allocation
page read and write
2C3B000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page read and write
2A33000
trusted library allocation
page read and write
7FFD34A70000
trusted library allocation
page read and write
1C17C000
stack
page read and write
There are 455 hidden memdumps, click here to show them.