IOC Report
gC0jV08bP3.exe

loading gif

Files

File Path
Type
Category
Malicious
gC0jV08bP3.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\gC0jV08bP3.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\gC0jV08bP3.exe
"C:\Users\user\Desktop\gC0jV08bP3.exe"
malicious

URLs

Name
IP
Malicious
66.63.187.209:6677
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
https://discord.com/api/v9/users/
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/example/Field1Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://www.w3.oh
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://tempuri.org/example/Field1
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://tempuri.org/example/Field2
unknown
http://tempuri.org/example/Field3
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
unknown
http://www.w3.o
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
http://tempuri.org/example/Field3Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
unknown
http://schemas.xmlsoap.org/ws/2002/12/policy
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
66.63.187.209
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2581000
trusted library allocation
page read and write
malicious
242000
unkown
page readonly
malicious
2614000
trusted library allocation
page read and write
malicious
2AF4000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1CE50000
heap
page read and write
2DC7000
trusted library allocation
page read and write
12739000
trusted library allocation
page read and write
1B60F000
heap
page read and write
7FFD9B6E3000
trusted library allocation
page read and write
1B38E000
stack
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
1B5DA000
heap
page read and write
2B1C000
trusted library allocation
page read and write
C4E000
heap
page read and write
2B4F000
trusted library allocation
page read and write
1BA05000
heap
page read and write
128D4000
trusted library allocation
page read and write
2C24000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
794000
heap
page read and write
1A905000
heap
page read and write
128CF000
trusted library allocation
page read and write
2A21000
trusted library allocation
page read and write
720000
heap
page read and write
1BA56000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FFD9B8D2000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
287A000
trusted library allocation
page read and write
2A23000
trusted library allocation
page read and write
12900000
trusted library allocation
page read and write
2B9E000
trusted library allocation
page read and write
291000
unkown
page readonly
2CD3000
trusted library allocation
page read and write
12797000
trusted library allocation
page read and write
29B9000
trusted library allocation
page read and write
127C8000
trusted library allocation
page read and write
127AE000
trusted library allocation
page read and write
7FFD9BB1A000
trusted library allocation
page read and write
128C7000
trusted library allocation
page read and write
7FFD9B7B6000
trusted library allocation
page execute and read and write
7FFD9BA00000
trusted library allocation
page read and write
128EB000
trusted library allocation
page read and write
12AB9000
trusted library allocation
page read and write
7FFD9B91C000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
2B3E000
trusted library allocation
page read and write
29E5000
trusted library allocation
page read and write
1B5B0000
heap
page read and write
2B0B000
trusted library allocation
page read and write
2A6C000
trusted library allocation
page read and write
1B596000
heap
page read and write
1BA87000
heap
page read and write
127DC000
trusted library allocation
page read and write
7FFD9B72C000
trusted library allocation
page execute and read and write
7FFD9B6FB000
trusted library allocation
page execute and read and write
2845000
trusted library allocation
page read and write
2BD5000
trusted library allocation
page read and write
2B18000
trusted library allocation
page read and write
2AB2000
trusted library allocation
page read and write
7FFD9B99B000
trusted library allocation
page read and write
2D94000
trusted library allocation
page read and write
2DD4000
trusted library allocation
page read and write
2AF6000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9B7F0000
trusted library allocation
page execute and read and write
7FFD9B8C0000
trusted library allocation
page execute and read and write
29A7000
trusted library allocation
page read and write
2B5C000
trusted library allocation
page read and write
2BB5000
trusted library allocation
page read and write
2CB7000
trusted library allocation
page read and write
29E3000
trusted library allocation
page read and write
2B80000
trusted library allocation
page read and write
1BA30000
heap
page read and write
1293D000
trusted library allocation
page read and write
29B6000
trusted library allocation
page read and write
12693000
trusted library allocation
page read and write
1BA20000
heap
page read and write
2BF3000
trusted library allocation
page read and write
2847000
trusted library allocation
page read and write
1BA43000
heap
page read and write
2CE000
unkown
page readonly
2E16000
trusted library allocation
page read and write
128B1000
trusted library allocation
page read and write
2AEA000
trusted library allocation
page read and write
2A7B000
trusted library allocation
page read and write
2B69000
trusted library allocation
page read and write
1B48B000
stack
page read and write
2A01000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
2A14000
trusted library allocation
page read and write
1BB25000
heap
page read and write
128B3000
trusted library allocation
page read and write
2C8D000
trusted library allocation
page read and write
7FFD9B6D4000
trusted library allocation
page read and write
125B2000
trusted library allocation
page read and write
7FFD9B97F000
trusted library allocation
page read and write
1BAD7000
heap
page read and write
2DE7000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page read and write
1BB60000
heap
page read and write
72C000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page execute and read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
1BACB000
heap
page read and write
1B0D0000
heap
page execute and read and write
2C7A000
trusted library allocation
page read and write
128E4000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
2A9F000
trusted library allocation
page read and write
1B59E000
heap
page read and write
7FFD9BB46000
trusted library allocation
page read and write
128FD000
trusted library allocation
page read and write
2ACE000
trusted library allocation
page read and write
1B58E000
stack
page read and write
763000
heap
page read and write
240000
unkown
page readonly
2B7C000
trusted library allocation
page read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
2A59000
trusted library allocation
page read and write
1BA60000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
2A55000
trusted library allocation
page read and write
2D56000
trusted library allocation
page read and write
2DDC000
trusted library allocation
page read and write
1B0D3000
heap
page execute and read and write
2B72000
trusted library allocation
page read and write
2B47000
trusted library allocation
page read and write
1AF43000
heap
page read and write
126F2000
trusted library allocation
page read and write
1BA7F000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
1B5C2000
heap
page read and write
7FFD9BB40000
trusted library allocation
page read and write
127BF000
trusted library allocation
page read and write
2CD5000
trusted library allocation
page read and write
BA0000
heap
page read and write
2AE1000
trusted library allocation
page read and write
2DDA000
trusted library allocation
page read and write
7FFD9BB78000
trusted library allocation
page read and write
2D1D000
trusted library allocation
page read and write
1289C000
trusted library allocation
page read and write
2B20000
trusted library allocation
page read and write
2B49000
trusted library allocation
page read and write
12895000
trusted library allocation
page read and write
2A09000
trusted library allocation
page read and write
1B050000
heap
page execute and read and write
2C8B000
trusted library allocation
page read and write
2B7E000
trusted library allocation
page read and write
1B78A000
stack
page read and write
1296B000
trusted library allocation
page read and write
283E000
trusted library allocation
page read and write
1B280000
heap
page read and write
9F0000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
2DF8000
trusted library allocation
page read and write
12897000
trusted library allocation
page read and write
2C9C000
trusted library allocation
page read and write
7FFD9B78C000
trusted library allocation
page execute and read and write
2992000
trusted library allocation
page read and write
1290C000
trusted library allocation
page read and write
29A3000
trusted library allocation
page read and write
2B6D000
trusted library allocation
page read and write
1B5BE000
heap
page read and write
12938000
trusted library allocation
page read and write
2DA1000
trusted library allocation
page read and write
2CCD000
trusted library allocation
page read and write
125A7000
trusted library allocation
page read and write
128A2000
trusted library allocation
page read and write
2B32000
trusted library allocation
page read and write
2A8C000
trusted library allocation
page read and write
2570000
heap
page execute and read and write
125AD000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
2DCB000
trusted library allocation
page read and write
2C93000
trusted library allocation
page read and write
2C08000
trusted library allocation
page read and write
2A8A000
trusted library allocation
page read and write
C40000
heap
page read and write
127E3000
trusted library allocation
page read and write
2AD2000
trusted library allocation
page read and write
2B09000
trusted library allocation
page read and write
29F4000
trusted library allocation
page read and write
1B27C000
heap
page read and write
A95000
heap
page read and write
2CB3000
trusted library allocation
page read and write
12687000
trusted library allocation
page read and write
29C5000
trusted library allocation
page read and write
2B8B000
trusted library allocation
page read and write
726000
heap
page read and write
2CF8000
trusted library allocation
page read and write
2D81000
trusted library allocation
page read and write
2BE6000
trusted library allocation
page read and write
7FFD9BAE7000
trusted library allocation
page read and write
12699000
trusted library allocation
page read and write
2AAA000
trusted library allocation
page read and write
2D75000
trusted library allocation
page read and write
2DC9000
trusted library allocation
page read and write
7FFD9B8D9000
trusted library allocation
page read and write
126E5000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
2DFA000
trusted library allocation
page read and write
2C13000
trusted library allocation
page read and write
1B9B0000
heap
page read and write
2D72000
trusted library allocation
page read and write
240000
unkown
page readonly
2E2B000
trusted library allocation
page read and write
2C2A000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
128AB000
trusted library allocation
page read and write
7FFD9BB1F000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
BC0000
trusted library allocation
page read and write
2D52000
trusted library allocation
page read and write
283A000
trusted library allocation
page read and write
1BAA2000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
1B5F7000
heap
page read and write
7FFD9B790000
trusted library allocation
page execute and read and write
1B04E000
stack
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
761000
heap
page read and write
7FFD9BB67000
trusted library allocation
page read and write
2D90000
trusted library allocation
page read and write
7FFD9B9EA000
trusted library allocation
page read and write
1BB2D000
heap
page read and write
128B8000
trusted library allocation
page read and write
1B1DF000
stack
page read and write
2D02000
trusted library allocation
page read and write
1268C000
trusted library allocation
page read and write
2BF7000
trusted library allocation
page read and write
129A5000
trusted library allocation
page read and write
1BB72000
heap
page read and write
1BA50000
heap
page read and write
2BB9000
trusted library allocation
page read and write
2BDB000
trusted library allocation
page read and write
298C000
trusted library allocation
page read and write
C45000
heap
page read and write
2BD9000
trusted library allocation
page read and write
29C9000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
128C5000
trusted library allocation
page read and write
1BB78000
heap
page read and write
1B5CA000
heap
page read and write
2D3F000
trusted library allocation
page read and write
2C26000
trusted library allocation
page read and write
29C7000
trusted library allocation
page read and write
128E9000
trusted library allocation
page read and write
125A1000
trusted library allocation
page read and write
12581000
trusted library allocation
page read and write
29D6000
trusted library allocation
page read and write
2CA6000
trusted library allocation
page read and write
298E000
trusted library allocation
page read and write
299F000
trusted library allocation
page read and write
128E1000
trusted library allocation
page read and write
1B9DE000
heap
page read and write
2AF8000
trusted library allocation
page read and write
2D1B000
trusted library allocation
page read and write
2CF1000
trusted library allocation
page read and write
2D41000
trusted library allocation
page read and write
2C82000
trusted library allocation
page read and write
7FFD9BAF4000
trusted library allocation
page read and write
128BE000
trusted library allocation
page read and write
7FFD9BB76000
trusted library allocation
page read and write
1BA48000
heap
page read and write
2E09000
trusted library allocation
page read and write
1BA9A000
heap
page read and write
2C17000
trusted library allocation
page read and write
2A5B000
trusted library allocation
page read and write
380000
heap
page read and write
2A57000
trusted library allocation
page read and write
2D6C000
trusted library allocation
page read and write
2D4E000
trusted library allocation
page read and write
2CAF000
trusted library allocation
page read and write
1291C000
trusted library allocation
page read and write
2CF3000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
2D2A000
trusted library allocation
page read and write
2B2F000
trusted library allocation
page read and write
1B5B8000
heap
page read and write
1CE6D000
heap
page read and write
12928000
trusted library allocation
page read and write
2CE2000
trusted library allocation
page read and write
2C0A000
trusted library allocation
page read and write
1BE6E000
stack
page read and write
2A90000
trusted library allocation
page read and write
2AAC000
trusted library allocation
page read and write
29DF000
trusted library allocation
page read and write
262D000
trusted library allocation
page read and write
128F0000
trusted library allocation
page read and write
2DED000
trusted library allocation
page read and write
2D9F000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
1BBAB000
heap
page read and write
2BB1000
trusted library allocation
page read and write
2D3D000
trusted library allocation
page read and write
12905000
trusted library allocation
page read and write
1BC6E000
stack
page read and write
2AFD000
trusted library allocation
page read and write
7FFD9BB0A000
trusted library allocation
page read and write
2CCF000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
1AF40000
heap
page read and write
3B0000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
81B000
heap
page read and write
1BB74000
heap
page read and write
284B000
trusted library allocation
page read and write
2BCA000
trusted library allocation
page read and write
2CF5000
trusted library allocation
page read and write
1CE61000
heap
page read and write
1BB9C000
heap
page read and write
2B2B000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page read and write
2D96000
trusted library allocation
page read and write
1259B000
trusted library allocation
page read and write
2D04000
trusted library allocation
page read and write
2B6F000
trusted library allocation
page read and write
2D0F000
trusted library allocation
page read and write
2BF1000
trusted library allocation
page read and write
2D3B000
trusted library allocation
page read and write
2DE5000
trusted library allocation
page read and write
1BA2E000
heap
page read and write
127AC000
trusted library allocation
page read and write
29B4000
trusted library allocation
page read and write
7FFD9B786000
trusted library allocation
page read and write
2C8F000
trusted library allocation
page read and write
2A05000
trusted library allocation
page read and write
12792000
trusted library allocation
page read and write
12921000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B6D3000
trusted library allocation
page execute and read and write
1BB30000
heap
page read and write
12935000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
127A4000
trusted library allocation
page read and write
126EC000
trusted library allocation
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
1BABF000
heap
page read and write
2BE8000
trusted library allocation
page read and write
2BD3000
trusted library allocation
page read and write
1B683000
heap
page read and write
2B4B000
trusted library allocation
page read and write
7FFD9BB1D000
trusted library allocation
page read and write
2C7C000
trusted library allocation
page read and write
2B4D000
trusted library allocation
page read and write
29E7000
trusted library allocation
page read and write
128A8000
trusted library allocation
page read and write
1BA7A000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
129B1000
trusted library allocation
page read and write
2A7F000
trusted library allocation
page read and write
2A16000
trusted library allocation
page read and write
125BF000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
7FFD9BB44000
trusted library allocation
page read and write
2CB1000
trusted library allocation
page read and write
2DAE000
trusted library allocation
page read and write
2DD8000
trusted library allocation
page read and write
B9E000
stack
page read and write
126E0000
trusted library allocation
page read and write
7FFD9BB51000
trusted library allocation
page read and write
2A7D000
trusted library allocation
page read and write
2B2D000
trusted library allocation
page read and write
128DA000
trusted library allocation
page read and write
2D33000
trusted library allocation
page read and write
24EE000
stack
page read and write
29B2000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
1B5EA000
heap
page read and write
29B0000
trusted library allocation
page read and write
2A68000
trusted library allocation
page read and write
2A18000
trusted library allocation
page read and write
2D19000
trusted library allocation
page read and write
1B25E000
stack
page read and write
7FFD9BAED000
trusted library allocation
page read and write
2ABF000
trusted library allocation
page read and write
7FFD9B6F4000
trusted library allocation
page read and write
1AB0C000
stack
page read and write
9EE000
stack
page read and write
7FFD9B870000
trusted library allocation
page read and write
1B609000
heap
page read and write
2E27000
trusted library allocation
page read and write
1273E000
trusted library allocation
page read and write
1B9AB000
stack
page read and write
6F4000
stack
page read and write
2D92000
trusted library allocation
page read and write
7FFD9BB15000
trusted library allocation
page read and write
1295B000
trusted library allocation
page read and write
2DC3000
trusted library allocation
page read and write
A40000
heap
page read and write
125B9000
trusted library allocation
page read and write
2C15000
trusted library allocation
page read and write
1BB58000
heap
page read and write
2B29000
trusted library allocation
page read and write
1A5B0000
trusted library allocation
page read and write
2ABD000
trusted library allocation
page read and write
2A8E000
trusted library allocation
page read and write
1294A000
trusted library allocation
page read and write
390000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
129AA000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
2C04000
trusted library allocation
page read and write
275E000
trusted library allocation
page read and write
29E9000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
2D2E000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
1279F000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page execute and read and write
A90000
heap
page read and write
2BF5000
trusted library allocation
page read and write
2D21000
trusted library allocation
page read and write
2BB7000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
2CA2000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
1B9B2000
heap
page read and write
284D000
trusted library allocation
page read and write
2A70000
trusted library allocation
page read and write
12919000
trusted library allocation
page read and write
29A1000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
29C3000
trusted library allocation
page read and write
2C19000
trusted library allocation
page read and write
7FFD9BB5A000
trusted library allocation
page read and write
2E2D000
trusted library allocation
page read and write
7FFD9BB23000
trusted library allocation
page read and write
2ADF000
trusted library allocation
page read and write
2E18000
trusted library allocation
page read and write
2CB5000
trusted library allocation
page read and write
12912000
trusted library allocation
page read and write
7FFD9BB6F000
trusted library allocation
page read and write
2AAE000
trusted library allocation
page read and write
1BA95000
heap
page read and write
1274B000
trusted library allocation
page read and write
2E1E000
trusted library allocation
page read and write
12602000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
2D7F000
trusted library allocation
page read and write
7FFD9B8E5000
trusted library allocation
page read and write
2A79000
trusted library allocation
page read and write
1B590000
heap
page read and write
1C92D000
stack
page read and write
2C02000
trusted library allocation
page read and write
2B89000
trusted library allocation
page read and write
2BD7000
trusted library allocation
page read and write
7FFD9B8EB000
trusted library allocation
page read and write
1B5B5000
heap
page read and write
1292E000
trusted library allocation
page read and write
1BB15000
heap
page read and write
3D0000
heap
page read and write
128CD000
trusted library allocation
page read and write
12951000
trusted library allocation
page read and write
1BB40000
heap
page read and write
29F6000
trusted library allocation
page read and write
1BB5C000
heap
page read and write
2CD1000
trusted library allocation
page read and write
127B9000
trusted library allocation
page read and write
2BA4000
trusted library allocation
page read and write
12745000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
127C2000
trusted library allocation
page read and write
1BAC3000
heap
page read and write
2BA7000
trusted library allocation
page read and write
2B07000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
127D5000
trusted library allocation
page read and write
2B5E000
trusted library allocation
page read and write
29E1000
trusted library allocation
page read and write
2ACA000
trusted library allocation
page read and write
1B5E0000
heap
page read and write
1BF30000
heap
page read and write
2E3A000
trusted library allocation
page read and write
129B7000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
2AEC000
trusted library allocation
page read and write
12944000
trusted library allocation
page read and write
1B270000
heap
page read and write
2A92000
trusted library allocation
page read and write
1BD6C000
stack
page read and write
127B3000
trusted library allocation
page read and write
7FF4CB6D0000
trusted library allocation
page execute and read and write
1BA2A000
heap
page read and write
127CA000
trusted library allocation
page read and write
2AA8000
trusted library allocation
page read and write
2D6E000
trusted library allocation
page read and write
127CF000
trusted library allocation
page read and write
78B000
heap
page read and write
2BF9000
trusted library allocation
page read and write
2D54000
trusted library allocation
page read and write
128F6000
trusted library allocation
page read and write
There are 492 hidden memdumps, click here to show them.