IOC Report
PO-1BdyzarvrjUANe0.exe

loading gif

Files

File Path
Type
Category
Malicious
PO-1BdyzarvrjUANe0.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO-1BdyzarvrjUANe0.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO-1BdyzarvrjUANe0.exe
"C:\Users\user\Desktop\PO-1BdyzarvrjUANe0.exe"
malicious
C:\Users\user\Desktop\PO-1BdyzarvrjUANe0.exe
"C:\Users\user\Desktop\PO-1BdyzarvrjUANe0.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://www.fontbureau.com/designers
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://www.carterandcone.coml
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://tempuri.org/D
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://www.typography.netD
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://tempuri.org/Entity/Id13Response
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
unknown
http://tempuri.org/Entity/Id7ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Entity/Id4ResponseD
unknown
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
unknown
http://schemas.xmlsoap.org/ws/2002/12/policy
unknown
http://tempuri.org/Entity/Id22Response
unknown
http://tempuri.org/Entity/Id22ResponseD
unknown
http://tempuri.org/Entity/Id16ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
unknown
http://www.founder.com.cn/cn
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc
unknown
http://tempuri.org/Entity/Id18Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
unknown
http://tempuri.org/Entity/Id3Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id9
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id5
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
188.190.10.19
unknown
Ukraine
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
40C9000
trusted library allocation
page read and write
malicious
2EC6000
trusted library allocation
page read and write
malicious
41E6000
trusted library allocation
page read and write
malicious
419B000
trusted library allocation
page read and write
malicious
3F16000
trusted library allocation
page read and write
3314000
trusted library allocation
page read and write
624F000
heap
page read and write
1340000
trusted library allocation
page read and write
CB0000
unkown
page readonly
8E00000
heap
page read and write
335A000
trusted library allocation
page read and write
11AE000
stack
page read and write
6CBA000
trusted library allocation
page read and write
332A000
trusted library allocation
page read and write
10F7000
stack
page read and write
32DA000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
33E1000
trusted library allocation
page read and write
4210000
trusted library allocation
page read and write
7048000
trusted library allocation
page read and write
4349000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
13EB000
trusted library allocation
page execute and read and write
1300000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
3245000
trusted library allocation
page read and write
7630000
trusted library allocation
page execute and read and write
5A10000
heap
page read and write
3017000
trusted library allocation
page read and write
5733000
heap
page read and write
3126000
trusted library allocation
page read and write
430C000
trusted library allocation
page read and write
432000
remote allocation
page execute and read and write
3254000
trusted library allocation
page read and write
3FE9000
trusted library allocation
page read and write
5370000
heap
page read and write
5F80000
trusted library allocation
page execute and read and write
7920000
trusted library allocation
page execute and read and write
56FE000
stack
page read and write
1320000
trusted library allocation
page read and write
4073000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
14AB000
stack
page read and write
5A60000
heap
page read and write
3FE4000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
1500000
heap
page read and write
62FF000
heap
page read and write
405B000
trusted library allocation
page read and write
7050000
trusted library allocation
page read and write
2F81000
trusted library allocation
page read and write
3E78000
trusted library allocation
page read and write
3E3F000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
EF7000
stack
page read and write
30BE000
stack
page read and write
1395000
heap
page read and write
42EB000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
13DA000
trusted library allocation
page execute and read and write
321B000
trusted library allocation
page read and write
117F000
stack
page read and write
41EC000
trusted library allocation
page read and write
127A000
heap
page read and write
586E000
trusted library allocation
page read and write
3EC8000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
4011000
trusted library allocation
page read and write
40AD000
trusted library allocation
page read and write
3FCB000
trusted library allocation
page read and write
2FB9000
trusted library allocation
page read and write
3027000
trusted library allocation
page read and write
52DE000
trusted library allocation
page read and write
6283000
heap
page read and write
528B000
trusted library allocation
page read and write
52E5000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
6580000
trusted library allocation
page read and write
57FE000
stack
page read and write
1586000
heap
page read and write
1160000
heap
page read and write
62B6000
heap
page read and write
3EEB000
trusted library allocation
page read and write
4068000
trusted library allocation
page read and write
7A2E000
stack
page read and write
3EF6000
trusted library allocation
page read and write
3E54000
trusted library allocation
page read and write
3275000
trusted library allocation
page read and write
6E3D000
heap
page read and write
752E000
stack
page read and write
4294000
trusted library allocation
page read and write
589B000
trusted library allocation
page read and write
52A6000
trusted library allocation
page read and write
42A1000
trusted library allocation
page read and write
718E000
stack
page read and write
13B0000
trusted library allocation
page read and write
6285000
heap
page read and write
5862000
trusted library allocation
page read and write
13D6000
trusted library allocation
page execute and read and write
304C000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
5851000
trusted library allocation
page read and write
13BD000
trusted library allocation
page execute and read and write
52D0000
trusted library allocation
page read and write
3F5C000
trusted library allocation
page read and write
131D000
trusted library allocation
page execute and read and write
6070000
trusted library allocation
page execute and read and write
4320000
trusted library allocation
page read and write
5A29000
heap
page read and write
42E5000
trusted library allocation
page read and write
40C9000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
3338000
trusted library allocation
page read and write
7210000
trusted library allocation
page execute and read and write
2F20000
trusted library allocation
page read and write
62FD000
heap
page read and write
7830000
heap
page read and write
14FB000
stack
page read and write
7055000
trusted library allocation
page read and write
1277000
heap
page read and write
6278000
heap
page read and write
720F000
stack
page read and write
7AF0000
trusted library section
page read and write
41E9000
trusted library allocation
page read and write
428F000
trusted library allocation
page read and write
7052000
trusted library allocation
page read and write
62DB000
heap
page read and write
1400000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
5610000
heap
page read and write
5FB0000
trusted library allocation
page read and write
3FC0000
trusted library allocation
page read and write
2F7A000
trusted library allocation
page read and write
303E000
trusted library allocation
page read and write
3FD6000
trusted library allocation
page read and write
762E000
stack
page read and write
30A3000
trusted library allocation
page read and write
7FDD0000
trusted library allocation
page execute and read and write
4269000
trusted library allocation
page read and write
2F53000
trusted library allocation
page read and write
140E000
heap
page read and write
13D0000
trusted library allocation
page read and write
CB2000
unkown
page readonly
4065000
trusted library allocation
page read and write
5871000
trusted library allocation
page read and write
13A6000
heap
page read and write
3F20000
trusted library allocation
page read and write
1198000
heap
page read and write
647E000
stack
page read and write
61B0000
trusted library allocation
page execute and read and write
5284000
trusted library allocation
page read and write
2EFD000
trusted library allocation
page read and write
3FEF000
trusted library allocation
page read and write
42B7000
trusted library allocation
page read and write
4017000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
3249000
trusted library allocation
page read and write
4216000
trusted library allocation
page read and write
7850000
trusted library section
page read and write
13C0000
trusted library allocation
page read and write
5F6E000
stack
page read and write
3231000
trusted library allocation
page read and write
33B2000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
79C0000
trusted library allocation
page read and write
8E64000
heap
page read and write
409E000
trusted library allocation
page read and write
F7E000
stack
page read and write
2F60000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
1580000
heap
page read and write
7D45000
heap
page read and write
6CA0000
trusted library allocation
page read and write
70CD000
stack
page read and write
5A4E000
heap
page read and write
406B000
trusted library allocation
page read and write
3227000
trusted library allocation
page read and write
170E000
stack
page read and write
53AA000
trusted library allocation
page read and write
6C40000
trusted library allocation
page execute and read and write
74EE000
stack
page read and write
5830000
heap
page execute and read and write
55B2000
trusted library allocation
page read and write
1460000
heap
page read and write
431D000
trusted library allocation
page read and write
2FC7000
trusted library allocation
page read and write
3F0C000
trusted library allocation
page read and write
4043000
trusted library allocation
page read and write
5B1E000
heap
page read and write
6E50000
heap
page read and write
421B000
trusted library allocation
page read and write
5600000
heap
page read and write
FA0000
heap
page read and write
1314000
trusted library allocation
page read and write
3FF6000
trusted library allocation
page read and write
5A64000
heap
page read and write
40AA000
trusted library allocation
page read and write
767E000
stack
page read and write
3E51000
trusted library allocation
page read and write
1323000
trusted library allocation
page read and write
5881000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
3F12000
trusted library allocation
page read and write
1346000
trusted library allocation
page execute and read and write
32AE000
trusted library allocation
page read and write
72C2000
trusted library allocation
page read and write
713D000
trusted library allocation
page read and write
135B000
trusted library allocation
page execute and read and write
11E0000
heap
page read and write
62D1000
heap
page read and write
11AE000
heap
page read and write
6230000
heap
page read and write
2FBC000
trusted library allocation
page read and write
42B1000
trusted library allocation
page read and write
14BE000
stack
page read and write
11A4000
heap
page read and write
5890000
trusted library allocation
page read and write
6315000
heap
page read and write
40C1000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
7D41000
heap
page read and write
913E000
stack
page read and write
7D49000
heap
page read and write
1450000
heap
page read and write
13EC000
heap
page read and write
4F2B000
stack
page read and write
5390000
trusted library allocation
page execute and read and write
3317000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
1313000
trusted library allocation
page execute and read and write
5300000
heap
page read and write
796E000
stack
page read and write
525C000
stack
page read and write
13E5000
trusted library allocation
page execute and read and write
422F000
trusted library allocation
page read and write
4002000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
BB7E000
stack
page read and write
1420000
heap
page read and write
B97E000
stack
page read and write
3E5F000
trusted library allocation
page read and write
55C0000
trusted library allocation
page execute and read and write
3307000
trusted library allocation
page read and write
132D000
trusted library allocation
page execute and read and write
55F0000
trusted library section
page readonly
4241000
trusted library allocation
page read and write
4222000
trusted library allocation
page read and write
5856000
trusted library allocation
page read and write
5F70000
trusted library allocation
page read and write
3E83000
trusted library allocation
page read and write
6EFB000
heap
page read and write
7860000
trusted library allocation
page execute and read and write
B7BE000
stack
page read and write
593D000
stack
page read and write
6E30000
heap
page read and write
3FBD000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
3F3B000
trusted library allocation
page read and write
4323000
trusted library allocation
page read and write
408C000
trusted library allocation
page read and write
1360000
heap
page read and write
4336000
trusted library allocation
page read and write
321D000
trusted library allocation
page read and write
4203000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
6308000
heap
page read and write
40A4000
trusted library allocation
page read and write
6265000
heap
page read and write
2EDB000
trusted library allocation
page read and write
1352000
trusted library allocation
page read and write
632E000
heap
page read and write
50C8000
trusted library allocation
page read and write
404A000
trusted library allocation
page read and write
13A0000
heap
page read and write
F80000
heap
page read and write
6050000
trusted library allocation
page read and write
40B3000
trusted library allocation
page read and write
DFA000
stack
page read and write
41DF000
trusted library allocation
page read and write
337B000
trusted library allocation
page read and write
58A0000
trusted library allocation
page read and write
3305000
trusted library allocation
page read and write
32C4000
trusted library allocation
page read and write
2F40000
heap
page execute and read and write
4097000
trusted library allocation
page read and write
4228000
trusted library allocation
page read and write
4014000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
4362000
trusted library allocation
page read and write
9030000
trusted library allocation
page execute and read and write
5382000
trusted library allocation
page read and write
6C70000
heap
page read and write
3F2E000
trusted library allocation
page read and write
32A1000
trusted library allocation
page read and write
2F50000
trusted library allocation
page read and write
7034000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
5630000
trusted library allocation
page execute and read and write
5350000
heap
page read and write
432B000
trusted library allocation
page read and write
6EF6000
heap
page read and write
62B2000
heap
page read and write
2F58000
trusted library allocation
page read and write
42E8000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
6CBF000
trusted library allocation
page read and write
12FE000
stack
page read and write
62E3000
heap
page read and write
6220000
trusted library allocation
page execute and read and write
6326000
heap
page read and write
3117000
trusted library allocation
page read and write
13E2000
trusted library allocation
page read and write
2F44000
trusted library allocation
page read and write
6CB8000
trusted library allocation
page read and write
6C60000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
3221000
trusted library allocation
page read and write
5570000
heap
page execute and read and write
13E7000
trusted library allocation
page execute and read and write
41F7000
trusted library allocation
page read and write
4038000
trusted library allocation
page read and write
41EF000
trusted library allocation
page read and write
331F000
trusted library allocation
page read and write
3223000
trusted library allocation
page read and write
52C4000
trusted library allocation
page read and write
529E000
trusted library allocation
page read and write
3FB3000
trusted library allocation
page read and write
2FE8000
trusted library allocation
page read and write
13A2000
heap
page read and write
2F5D000
trusted library allocation
page read and write
6CCF000
trusted library allocation
page read and write
1337000
heap
page read and write
3F46000
trusted library allocation
page read and write
5303000
heap
page read and write
2EEE000
trusted library allocation
page read and write
42F3000
trusted library allocation
page read and write
6EA8000
heap
page read and write
620C000
stack
page read and write
3371000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
4231000
trusted library allocation
page read and write
7060000
trusted library allocation
page read and write
13D2000
trusted library allocation
page read and write
6C50000
trusted library allocation
page read and write
572B000
stack
page read and write
62EF000
heap
page read and write
125D000
heap
page read and write
32D2000
trusted library allocation
page read and write
2F6C000
trusted library allocation
page read and write
3E31000
trusted library allocation
page read and write
6CCA000
trusted library allocation
page read and write
79BE000
stack
page read and write
6040000
trusted library allocation
page execute and read and write
5B10000
heap
page read and write
3EDD000
trusted library allocation
page read and write
7D30000
heap
page read and write
144D000
heap
page read and write
6C3C000
stack
page read and write
6291000
heap
page read and write
3F53000
trusted library allocation
page read and write
7120000
trusted library allocation
page read and write
326D000
trusted library allocation
page read and write
6E2D000
stack
page read and write
7F010000
trusted library allocation
page execute and read and write
BF0000
heap
page read and write
6CA9000
trusted library allocation
page read and write
32B1000
trusted library allocation
page read and write
6030000
trusted library allocation
page execute and read and write
52AD000
trusted library allocation
page read and write
4279000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
42FE000
trusted library allocation
page read and write
2FBF000
trusted library allocation
page read and write
BCBE000
stack
page read and write
2E2E000
stack
page read and write
5895000
trusted library allocation
page read and write
55A0000
heap
page read and write
5FE0000
trusted library allocation
page read and write
3384000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
2FB0000
heap
page read and write
583E000
stack
page read and write
6CA2000
trusted library allocation
page read and write
434F000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
710F000
stack
page read and write
3E6A000
trusted library allocation
page read and write
8E3D000
heap
page read and write
14D0000
heap
page execute and read and write
3F73000
trusted library allocation
page read and write
5FC0000
trusted library allocation
page read and write
52B2000
trusted library allocation
page read and write
4344000
trusted library allocation
page read and write
141B000
heap
page read and write
3FFB000
trusted library allocation
page read and write
587A000
trusted library allocation
page read and write
158E000
heap
page read and write
4050000
trusted library allocation
page read and write
407E000
trusted library allocation
page read and write
42AA000
trusted library allocation
page read and write
138E000
stack
page read and write
11BA000
heap
page read and write
3311000
trusted library allocation
page read and write
1357000
trusted library allocation
page execute and read and write
2ED0000
trusted library allocation
page read and write
56BE000
stack
page read and write
3FC3000
trusted library allocation
page read and write
774E000
stack
page read and write
7130000
trusted library allocation
page read and write
13CD000
trusted library allocation
page execute and read and write
6CC5000
trusted library allocation
page read and write
7110000
trusted library allocation
page execute and read and write
40BA000
trusted library allocation
page read and write
134A000
trusted library allocation
page execute and read and write
58B0000
trusted library allocation
page read and write
3402000
trusted library allocation
page read and write
402A000
trusted library allocation
page read and write
160E000
stack
page read and write
777F000
stack
page read and write
784E000
stack
page read and write
5620000
heap
page read and write
32AB000
trusted library allocation
page read and write
5A00000
heap
page read and write
BA7E000
stack
page read and write
3ED2000
trusted library allocation
page read and write
429B000
trusted library allocation
page read and write
62A1000
heap
page read and write
136A000
heap
page read and write
5A20000
heap
page read and write
401F000
trusted library allocation
page read and write
4313000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
2F35000
trusted library allocation
page read and write
30C1000
trusted library allocation
page read and write
61C0000
trusted library allocation
page execute and read and write
62CD000
heap
page read and write
5A05000
heap
page read and write
3F23000
trusted library allocation
page read and write
6D20000
heap
page read and write
3F50000
trusted library allocation
page read and write
13B3000
trusted library allocation
page execute and read and write
1330000
heap
page read and write
2FD3000
trusted library allocation
page read and write
3E85000
trusted library allocation
page read and write
32B9000
trusted library allocation
page read and write
5270000
trusted library allocation
page read and write
584B000
trusted library allocation
page read and write
324C000
trusted library allocation
page read and write
4091000
trusted library allocation
page read and write
3F00000
trusted library allocation
page read and write
1470000
trusted library allocation
page read and write
3212000
trusted library allocation
page read and write
4007000
trusted library allocation
page read and write
14E8000
trusted library allocation
page read and write
4056000
trusted library allocation
page read and write
2EF1000
trusted library allocation
page read and write
628C000
heap
page read and write
40C6000
trusted library allocation
page read and write
3219000
trusted library allocation
page read and write
4356000
trusted library allocation
page read and write
403D000
trusted library allocation
page read and write
6CA5000
trusted library allocation
page read and write
13B4000
trusted library allocation
page read and write
6BC9000
trusted library allocation
page read and write
11C7000
heap
page read and write
13E0000
trusted library allocation
page read and write
6241000
heap
page read and write
33EB000
trusted library allocation
page read and write
1427000
heap
page read and write
77BE000
stack
page read and write
1342000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page execute and read and write
446000
remote allocation
page execute and read and write
71CE000
stack
page read and write
7030000
trusted library allocation
page read and write
1150000
heap
page read and write
62A4000
heap
page read and write
2EF6000
trusted library allocation
page read and write
40C0000
trusted library allocation
page read and write
62C6000
heap
page read and write
42DB000
trusted library allocation
page read and write
3F38000
trusted library allocation
page read and write
1190000
heap
page read and write
13D5000
heap
page read and write
14B0000
trusted library allocation
page execute and read and write
2FAE000
trusted library allocation
page read and write
55BE000
stack
page read and write
55B0000
trusted library allocation
page read and write
2E31000
trusted library allocation
page read and write
7970000
trusted library allocation
page read and write
6253000
heap
page read and write
7045000
trusted library allocation
page read and write
329F000
trusted library allocation
page read and write
5730000
heap
page read and write
642C000
stack
page read and write
325F000
trusted library allocation
page read and write
144E000
stack
page read and write
B77E000
stack
page read and write
3368000
trusted library allocation
page read and write
589E000
trusted library allocation
page read and write
2F50000
trusted library allocation
page read and write
435C000
trusted library allocation
page read and write
7040000
trusted library allocation
page read and write
3F05000
trusted library allocation
page read and write
BBBE000
stack
page read and write
337F000
trusted library allocation
page read and write
B99000
stack
page read and write
53A0000
trusted library allocation
page read and write
136E000
heap
page read and write
59D0000
trusted library allocation
page read and write
33F9000
trusted library allocation
page read and write
F3E000
stack
page read and write
657C000
stack
page read and write
There are 508 hidden memdumps, click here to show them.