IOC Report
FaZM14kDMN.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FaZM14kDMN.exe
"C:\Users\user\Desktop\FaZM14kDMN.exe"
malicious

URLs

Name
IP
Malicious
4.251.123.83:6677
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
https://discord.com/api/v9/users/
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/example/Field1Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://www.w3.oh
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://tempuri.org/example/Field1
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://tempuri.org/example/Field2
unknown
http://tempuri.org/example/Field3
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
unknown
http://www.w3.o
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
http://tempuri.org/example/Field3Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
unknown
http://schemas.xmlsoap.org/ws/2002/12/policy
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
4.251.123.83
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
462000
unkown
page readonly
malicious
2934000
trusted library allocation
page read and write
malicious
7FFB117F0000
trusted library allocation
page read and write
12D18000
trusted library allocation
page read and write
12CEC000
trusted library allocation
page read and write
7FFB11630000
trusted library allocation
page read and write
1C142000
heap
page read and write
2C98000
trusted library allocation
page read and write
12A6A000
trusted library allocation
page read and write
3135000
trusted library allocation
page read and write
1C5D6000
heap
page read and write
1C050000
heap
page read and write
12938000
trusted library allocation
page read and write
12AB1000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
1C723000
heap
page read and write
1B4E0000
heap
page read and write
1C6C5000
heap
page read and write
7FFB117FF000
trusted library allocation
page read and write
92B000
heap
page read and write
2E77000
trusted library allocation
page read and write
2F37000
trusted library allocation
page read and write
7FFB1146D000
trusted library allocation
page read and write
1AC25000
heap
page read and write
12941000
trusted library allocation
page read and write
1C651000
heap
page read and write
2EB2000
trusted library allocation
page read and write
2D1D000
trusted library allocation
page read and write
8F1000
stack
page read and write
7FFB11469000
trusted library allocation
page read and write
129B6000
trusted library allocation
page read and write
7FFB11490000
trusted library allocation
page read and write
7FFB11264000
trusted library allocation
page read and write
7FFB11550000
trusted library allocation
page read and write
129CD000
trusted library allocation
page read and write
7FFB11890000
trusted library allocation
page read and write
2CA8000
trusted library allocation
page read and write
7FFB117D7000
trusted library allocation
page read and write
1C0B1000
heap
page read and write
2F8C000
trusted library allocation
page read and write
2E43000
trusted library allocation
page read and write
2F0D000
trusted library allocation
page read and write
1C62D000
heap
page read and write
2C4B000
trusted library allocation
page read and write
7FFB11720000
trusted library allocation
page read and write
1CDB8000
heap
page read and write
129C2000
trusted library allocation
page read and write
1CD70000
heap
page read and write
129E9000
trusted library allocation
page read and write
7FFB11600000
trusted library allocation
page read and write
9E8000
heap
page read and write
7FFB11560000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
1C720000
heap
page read and write
7FFB11650000
trusted library allocation
page read and write
129FA000
trusted library allocation
page read and write
2E85000
trusted library allocation
page read and write
1C58B000
heap
page read and write
2C7A000
trusted library allocation
page read and write
1B250000
heap
page read and write
7FFB114F5000
trusted library allocation
page read and write
7FFB1144F000
trusted library allocation
page read and write
12CCA000
trusted library allocation
page read and write
7FFB117B0000
trusted library allocation
page read and write
2E3D000
trusted library allocation
page read and write
590000
heap
page read and write
2F22000
trusted library allocation
page read and write
1B253000
heap
page read and write
7FFB11428000
trusted library allocation
page read and write
12A37000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
2DB2000
trusted library allocation
page read and write
12CF5000
trusted library allocation
page read and write
12A2A000
trusted library allocation
page read and write
12CC4000
trusted library allocation
page read and write
D1C000
heap
page read and write
1C0BE000
heap
page read and write
7FFB1143F000
trusted library allocation
page read and write
2D52000
trusted library allocation
page read and write
1C588000
heap
page read and write
460000
unkown
page readonly
2B9D000
trusted library allocation
page read and write
7FFB11449000
trusted library allocation
page read and write
2E98000
trusted library allocation
page read and write
7FFB114B0000
trusted library allocation
page read and write
7FFB11680000
trusted library allocation
page read and write
12A40000
trusted library allocation
page read and write
2FA3000
trusted library allocation
page read and write
7FFB1142B000
trusted library allocation
page read and write
7FFB11960000
trusted library allocation
page read and write
12A30000
trusted library allocation
page read and write
12935000
trusted library allocation
page read and write
7FFB117E4000
trusted library allocation
page read and write
7FFB11453000
trusted library allocation
page read and write
2D96000
trusted library allocation
page read and write
7FFB11750000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
2FC1000
trusted library allocation
page read and write
2F33000
trusted library allocation
page read and write
12947000
trusted library allocation
page read and write
2D44000
trusted library allocation
page read and write
7FFB117A0000
trusted library allocation
page read and write
7FFB115F0000
trusted library allocation
page read and write
128DF000
trusted library allocation
page read and write
2F13000
trusted library allocation
page read and write
7FFB11770000
trusted library allocation
page read and write
12CF0000
trusted library allocation
page read and write
2E2C000
trusted library allocation
page read and write
7FFB11858000
trusted library allocation
page read and write
1C6BB000
heap
page read and write
1C0B7000
heap
page read and write
7FFB1145C000
trusted library allocation
page read and write
2F48000
trusted library allocation
page read and write
7FFB11790000
trusted library allocation
page read and write
2D90000
trusted library allocation
page read and write
1CD8C000
heap
page read and write
2DC7000
trusted library allocation
page read and write
2F51000
trusted library allocation
page read and write
7FFB11436000
trusted library allocation
page read and write
12CE6000
trusted library allocation
page read and write
2F02000
trusted library allocation
page read and write
7FFB1183A000
trusted library allocation
page read and write
2DD8000
trusted library allocation
page read and write
2D2C000
trusted library allocation
page read and write
7FFB11260000
trusted library allocation
page read and write
2EDE000
trusted library allocation
page read and write
2F88000
trusted library allocation
page read and write
2CB5000
trusted library allocation
page read and write
7FFB11273000
trusted library allocation
page read and write
2D08000
trusted library allocation
page read and write
2CBD000
trusted library allocation
page read and write
2E94000
trusted library allocation
page read and write
2C5C000
trusted library allocation
page read and write
1C719000
heap
page read and write
2E41000
trusted library allocation
page read and write
7FFB115D5000
trusted library allocation
page read and write
7FFB114FC000
trusted library allocation
page read and write
12CD1000
trusted library allocation
page read and write
7FFB11868000
trusted library allocation
page read and write
12D0B000
trusted library allocation
page read and write
2C7C000
trusted library allocation
page read and write
7FFB1131C000
trusted library allocation
page execute and read and write
2EA1000
trusted library allocation
page read and write
1C24E000
stack
page read and write
7FFB118A0000
trusted library allocation
page read and write
1C6FC000
heap
page read and write
7FFB11310000
trusted library allocation
page read and write
2CDF000
trusted library allocation
page read and write
2E61000
trusted library allocation
page read and write
2B94000
trusted library allocation
page read and write
7FFB114A0000
trusted library allocation
page read and write
2E74000
trusted library allocation
page read and write
7FFB11485000
trusted library allocation
page read and write
2EA3000
trusted library allocation
page read and write
2E2E000
trusted library allocation
page read and write
90C000
heap
page read and write
7FFB1151C000
trusted library allocation
page read and write
1C649000
heap
page read and write
7FFB11831000
trusted library allocation
page read and write
1CDB2000
heap
page read and write
129AF000
trusted library allocation
page read and write
BCE000
stack
page read and write
2C8D000
trusted library allocation
page read and write
2ECB000
trusted library allocation
page read and write
2CDD000
trusted library allocation
page read and write
2F15000
trusted library allocation
page read and write
2C2D000
trusted library allocation
page read and write
7FFB1143C000
trusted library allocation
page read and write
1C099000
heap
page read and write
2C05000
trusted library allocation
page read and write
2DB4000
trusted library allocation
page read and write
1A8D0000
trusted library allocation
page read and write
2EB6000
trusted library allocation
page read and write
7FFB11263000
trusted library allocation
page execute and read and write
1292E000
trusted library allocation
page read and write
7FFB1174A000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
7FFB11860000
trusted library allocation
page read and write
12928000
trusted library allocation
page read and write
12CAE000
trusted library allocation
page read and write
2D2E000
trusted library allocation
page read and write
1B5EE000
stack
page read and write
2CBB000
trusted library allocation
page read and write
2EE2000
trusted library allocation
page read and write
2F20000
trusted library allocation
page read and write
2FCE000
trusted library allocation
page read and write
2B7A000
trusted library allocation
page read and write
2CB7000
trusted library allocation
page read and write
12ABE000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
1DB9B000
heap
page read and write
2C78000
trusted library allocation
page read and write
7FFB11530000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
7FFB11660000
trusted library allocation
page read and write
1DB80000
heap
page read and write
2E6E000
trusted library allocation
page read and write
2C67000
trusted library allocation
page read and write
2FE4000
trusted library allocation
page read and write
2FEE000
trusted library allocation
page read and write
7FFB117FD000
trusted library allocation
page read and write
7FFB11826000
trusted library allocation
page read and write
D10000
heap
page read and write
12A3A000
trusted library allocation
page read and write
2CCE000
trusted library allocation
page read and write
2FBB000
trusted library allocation
page read and write
2F55000
trusted library allocation
page read and write
7FFB11850000
trusted library allocation
page read and write
7FFB11520000
trusted library allocation
page read and write
129F0000
trusted library allocation
page read and write
12A03000
trusted library allocation
page read and write
2CD9000
trusted library allocation
page read and write
2F35000
trusted library allocation
page read and write
1B470000
heap
page execute and read and write
7FFB1126D000
trusted library allocation
page execute and read and write
1C700000
heap
page read and write
25F0000
trusted library allocation
page read and write
7FFB11821000
trusted library allocation
page read and write
7FFB11940000
trusted library allocation
page read and write
1C626000
heap
page read and write
2F11000
trusted library allocation
page read and write
7FFB117DD000
trusted library allocation
page read and write
2EC2000
trusted library allocation
page read and write
2B98000
trusted library allocation
page read and write
CEE000
stack
page read and write
2C7E000
trusted library allocation
page read and write
7FFB11730000
trusted library allocation
page read and write
1296F000
trusted library allocation
page read and write
1C66F000
heap
page read and write
12A43000
trusted library allocation
page read and write
1B24F000
stack
page read and write
7FFB11517000
trusted library allocation
page read and write
9E3000
heap
page read and write
2F8E000
trusted library allocation
page read and write
1293E000
trusted library allocation
page read and write
2DB6000
trusted library allocation
page read and write
2DC3000
trusted library allocation
page read and write
3137000
trusted library allocation
page read and write
BE0000
heap
page read and write
12CFE000
trusted library allocation
page read and write
2C5E000
trusted library allocation
page read and write
2C3E000
trusted library allocation
page read and write
2F9F000
trusted library allocation
page read and write
2F53000
trusted library allocation
page read and write
7FFB115C2000
trusted library allocation
page read and write
2FAE000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
7FFB117E0000
trusted library allocation
page read and write
2C3C000
trusted library allocation
page read and write
7FFB11847000
trusted library allocation
page read and write
2CED000
trusted library allocation
page read and write
7FFB1150D000
trusted library allocation
page read and write
2D06000
trusted library allocation
page read and write
1D660000
heap
page read and write
460000
unkown
page readonly
2F79000
trusted library allocation
page read and write
7FFB114F2000
trusted library allocation
page read and write
2C14000
trusted library allocation
page read and write
2C03000
trusted library allocation
page read and write
1B4CF000
stack
page read and write
2E30000
trusted library allocation
page read and write
2D83000
trusted library allocation
page read and write
7FFB11320000
trusted library allocation
page execute and read and write
2D50000
trusted library allocation
page read and write
1C760000
heap
page read and write
2B90000
trusted library allocation
page read and write
7FFB11880000
trusted library allocation
page read and write
7FF4D7120000
trusted library allocation
page execute and read and write
7FFB11620000
trusted library allocation
page read and write
2EAB000
trusted library allocation
page read and write
1B360000
heap
page execute and read and write
2E45000
trusted library allocation
page read and write
2F2F000
trusted library allocation
page read and write
4EE000
unkown
page readonly
7FFB117FA000
trusted library allocation
page read and write
2F17000
trusted library allocation
page read and write
7FFB11824000
trusted library allocation
page read and write
1C6AD000
heap
page read and write
2FA1000
trusted library allocation
page read and write
2E32000
trusted library allocation
page read and write
7FFB11870000
trusted library allocation
page read and write
2E65000
trusted library allocation
page read and write
1CDB0000
heap
page read and write
1C065000
heap
page read and write
2C6B000
trusted library allocation
page read and write
1C071000
heap
page read and write
12CDF000
trusted library allocation
page read and write
12975000
trusted library allocation
page read and write
1B46E000
stack
page read and write
5D0000
heap
page read and write
2ED3000
trusted library allocation
page read and write
7FFB11467000
trusted library allocation
page read and write
2F9D000
trusted library allocation
page read and write
2DD6000
trusted library allocation
page read and write
1CDB4000
heap
page read and write
1C56C000
stack
page read and write
2FBF000
trusted library allocation
page read and write
520000
heap
page read and write
7FFB11803000
trusted library allocation
page read and write
2C8B000
trusted library allocation
page read and write
2B7C000
trusted library allocation
page read and write
1C73D000
heap
page read and write
2CAB000
trusted library allocation
page read and write
2B8B000
trusted library allocation
page read and write
7FFB11346000
trusted library allocation
page execute and read and write
2F68000
trusted library allocation
page read and write
2C16000
trusted library allocation
page read and write
1C638000
heap
page read and write
12A4E000
trusted library allocation
page read and write
D15000
heap
page read and write
CF0000
heap
page read and write
2F7B000
trusted library allocation
page read and write
2F77000
trusted library allocation
page read and write
2CE8000
trusted library allocation
page read and write
1CA6E000
stack
page read and write
7FFB11760000
trusted library allocation
page read and write
2D17000
trusted library allocation
page read and write
7FFB11523000
trusted library allocation
page read and write
2EF7000
trusted library allocation
page read and write
7FFB115DB000
trusted library allocation
page read and write
2F6A000
trusted library allocation
page read and write
2FDD000
trusted library allocation
page read and write
2C69000
trusted library allocation
page read and write
7FFB11462000
trusted library allocation
page read and write
2E35000
trusted library allocation
page read and write
2CA6000
trusted library allocation
page read and write
7FFB11280000
trusted library allocation
page read and write
2EE4000
trusted library allocation
page read and write
2DD4000
trusted library allocation
page read and write
2FFB000
trusted library allocation
page read and write
12CF9000
trusted library allocation
page read and write
2F46000
trusted library allocation
page read and write
2CCA000
trusted library allocation
page read and write
2B8D000
trusted library allocation
page read and write
2EB8000
trusted library allocation
page read and write
12A0D000
trusted library allocation
page read and write
1298D000
trusted library allocation
page read and write
7FFB11284000
trusted library allocation
page read and write
7FFB11930000
trusted library allocation
page read and write
7FFB117F5000
trusted library allocation
page read and write
128C7000
trusted library allocation
page read and write
2B76000
trusted library allocation
page read and write
1C08F000
heap
page read and write
7FFB114F8000
trusted library allocation
page read and write
2C07000
trusted library allocation
page read and write
27CE000
stack
page read and write
25D0000
trusted library allocation
page read and write
1D56D000
stack
page read and write
7FFB1127D000
trusted library allocation
page execute and read and write
2680000
trusted library allocation
page read and write
2D63000
trusted library allocation
page read and write
2D65000
trusted library allocation
page read and write
2CF7000
trusted library allocation
page read and write
12987000
trusted library allocation
page read and write
1C34A000
stack
page read and write
7FFB114C0000
trusted library allocation
page read and write
1C748000
heap
page read and write
1C738000
heap
page read and write
2650000
heap
page read and write
2DA1000
trusted library allocation
page read and write
7FFB11540000
trusted library allocation
page read and write
1C695000
heap
page read and write
1C6B3000
heap
page read and write
12982000
trusted library allocation
page read and write
2EB4000
trusted library allocation
page read and write
7FFB112BC000
trusted library allocation
page execute and read and write
7FFB11740000
trusted library allocation
page read and write
2CB3000
trusted library allocation
page read and write
942000
heap
page read and write
12AC3000
trusted library allocation
page read and write
12921000
trusted library allocation
page read and write
7FFB11640000
trusted library allocation
page execute and read and write
1DB91000
heap
page read and write
12A08000
trusted library allocation
page read and write
2FB9000
trusted library allocation
page read and write
1C6EA000
heap
page read and write
2F31000
trusted library allocation
page read and write
7FFB1128B000
trusted library allocation
page execute and read and write
2F0F000
trusted library allocation
page read and write
2D92000
trusted library allocation
page read and write
7FFB11410000
trusted library allocation
page read and write
7FFB115C9000
trusted library allocation
page read and write
2EA7000
trusted library allocation
page read and write
2F9B000
trusted library allocation
page read and write
12D2F000
trusted library allocation
page read and write
2F4A000
trusted library allocation
page read and write
2D99000
trusted library allocation
page read and write
294D000
trusted library allocation
page read and write
7FFB114D1000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
7FFB11570000
trusted library allocation
page execute and read and write
2C0B000
trusted library allocation
page read and write
7FFB11967000
trusted library allocation
page read and write
1AE27000
stack
page read and write
2D78000
trusted library allocation
page read and write
2C58000
trusted library allocation
page read and write
7FFB115E0000
trusted library allocation
page read and write
E1E000
stack
page read and write
12D24000
trusted library allocation
page read and write
2B78000
trusted library allocation
page read and write
1C96C000
stack
page read and write
2D4E000
trusted library allocation
page read and write
2F44000
trusted library allocation
page read and write
129FF000
trusted library allocation
page read and write
7FFB11856000
trusted library allocation
page read and write
2F8A000
trusted library allocation
page read and write
2ECD000
trusted library allocation
page read and write
7FFB11580000
trusted library allocation
page read and write
2E58000
trusted library allocation
page read and write
12B01000
trusted library allocation
page read and write
12CD6000
trusted library allocation
page read and write
1B6EF000
stack
page read and write
2FCC000
trusted library allocation
page read and write
7FFB11470000
trusted library allocation
page read and write
2D19000
trusted library allocation
page read and write
12D21000
trusted library allocation
page read and write
28A1000
trusted library allocation
page read and write
2B89000
trusted library allocation
page read and write
1C570000
heap
page read and write
2CDB000
trusted library allocation
page read and write
7FFB11950000
trusted library allocation
page read and write
2D5F000
trusted library allocation
page read and write
2E63000
trusted library allocation
page read and write
2C09000
trusted library allocation
page read and write
12D29000
trusted library allocation
page read and write
1C06C000
heap
page read and write
128C2000
trusted library allocation
page read and write
12968000
trusted library allocation
page read and write
2E92000
trusted library allocation
page read and write
129C7000
trusted library allocation
page read and write
2D54000
trusted library allocation
page read and write
12A48000
trusted library allocation
page read and write
4B1000
unkown
page readonly
2F6C000
trusted library allocation
page read and write
1C05B000
heap
page read and write
2B96000
trusted library allocation
page read and write
2F7D000
trusted library allocation
page read and write
2C3A000
trusted library allocation
page read and write
7FFB11710000
trusted library allocation
page read and write
1C6E3000
heap
page read and write
2DBA000
trusted library allocation
page read and write
1C6A0000
heap
page read and write
2C38000
trusted library allocation
page read and write
2DB8000
trusted library allocation
page read and write
7FFB1184F000
trusted library allocation
page read and write
1C617000
heap
page read and write
7FFB1147E000
trusted library allocation
page read and write
2DC9000
trusted library allocation
page read and write
7FFB11780000
trusted library allocation
page read and write
2CA4000
trusted library allocation
page read and write
7FFB1147A000
trusted library allocation
page read and write
2C1A000
trusted library allocation
page read and write
1297E000
trusted library allocation
page read and write
2BF9000
trusted library allocation
page read and write
7FFB11443000
trusted library allocation
page read and write
BE5000
heap
page read and write
2FB0000
trusted library allocation
page read and write
129F6000
trusted library allocation
page read and write
7FFB1150A000
trusted library allocation
page read and write
2CD7000
trusted library allocation
page read and write
2E72000
trusted library allocation
page read and write
1C76D000
heap
page read and write
2E47000
trusted library allocation
page read and write
2F66000
trusted library allocation
page read and write
7FFB11670000
trusted library allocation
page read and write
2FDB000
trusted library allocation
page read and write
2C2B000
trusted library allocation
page read and write
2D1B000
trusted library allocation
page read and write
1C6F6000
heap
page read and write
2FDF000
trusted library allocation
page read and write
2890000
heap
page execute and read and write
7FFB11420000
trusted library allocation
page read and write
2B9A000
trusted library allocation
page read and write
2EA9000
trusted library allocation
page read and write
7FFB115B1000
trusted library allocation
page read and write
1CD7B000
heap
page read and write
2D0C000
trusted library allocation
page read and write
2ED1000
trusted library allocation
page read and write
2ECF000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
12D03000
trusted library allocation
page read and write
2CFB000
trusted library allocation
page read and write
2F6E000
trusted library allocation
page read and write
7FFB115A0000
trusted library allocation
page execute and read and write
2D74000
trusted library allocation
page read and write
2CA2000
trusted library allocation
page read and write
2E81000
trusted library allocation
page read and write
2C27000
trusted library allocation
page read and write
2C81000
trusted library allocation
page read and write
2C29000
trusted library allocation
page read and write
900000
heap
page read and write
129BF000
trusted library allocation
page read and write
2C18000
trusted library allocation
page read and write
7FFB118B0000
trusted library allocation
page execute and read and write
2D2A000
trusted library allocation
page read and write
26C0000
heap
page read and write
2FE1000
trusted library allocation
page read and write
7FFB11480000
trusted library allocation
page read and write
12979000
trusted library allocation
page read and write
7FFB11610000
trusted library allocation
page read and write
2FAA000
trusted library allocation
page read and write
7FFB114E0000
trusted library allocation
page read and write
96A000
heap
page read and write
2DC5000
trusted library allocation
page read and write
2CC6000
trusted library allocation
page read and write
7FFB11668000
trusted library allocation
page read and write
1DB82000
heap
page read and write
1B364000
heap
page execute and read and write
2CC8000
trusted library allocation
page read and write
2EE0000
trusted library allocation
page read and write
7FFB117C0000
trusted library allocation
page read and write
2C4D000
trusted library allocation
page read and write
1C72B000
heap
page read and write
2F91000
trusted library allocation
page read and write
1D66C000
heap
page read and write
12D1B000
trusted library allocation
page read and write
129A9000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
12A56000
trusted library allocation
page read and write
2C5A000
trusted library allocation
page read and write
2E56000
trusted library allocation
page read and write
7FFB117D0000
trusted library allocation
page read and write
7FFB11617000
trusted library allocation
page read and write
2BF0000
trusted library allocation
page read and write
2C6F000
trusted library allocation
page read and write
7FFB11499000
trusted library allocation
page read and write
12D11000
trusted library allocation
page read and write
7FFB11316000
trusted library allocation
page read and write
2D56000
trusted library allocation
page read and write
2E96000
trusted library allocation
page read and write
129B9000
trusted library allocation
page read and write
2D67000
trusted library allocation
page read and write
1B7EA000
stack
page read and write
2FBD000
trusted library allocation
page read and write
1294C000
trusted library allocation
page read and write
2D94000
trusted library allocation
page read and write
7FFB11380000
trusted library allocation
page execute and read and write
3133000
trusted library allocation
page read and write
1C5E5000
heap
page read and write
128A1000
trusted library allocation
page read and write
2D61000
trusted library allocation
page read and write
93F000
heap
page read and write
2CF9000
trusted library allocation
page read and write
92E000
heap
page read and write
2DCB000
trusted library allocation
page read and write
2F58000
trusted library allocation
page read and write
2EF3000
trusted library allocation
page read and write
12AB7000
trusted library allocation
page read and write
7FFB114F0000
trusted library allocation
page read and write
2F7F000
trusted library allocation
page read and write
2DD2000
trusted library allocation
page read and write
7FFB11690000
trusted library allocation
page execute and read and write
7FFB11400000
trusted library allocation
page read and write
There are 543 hidden memdumps, click here to show them.