IOC Report
pdhmXuEYmc.exe

loading gif

Files

File Path
Type
Category
Malicious
pdhmXuEYmc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:34 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\pdhmXuEYmc.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\TmpAA73.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpAA84.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\pdhmXuEYmc.exe
"C:\Users\user\Desktop\pdhmXuEYmc.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
91.92.241.122
unknown
Bulgaria
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
2D78000
trusted library allocation
page read and write
malicious
842000
unkown
page readonly
malicious
4004000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
3CD1000
trusted library allocation
page read and write
2DBA000
trusted library allocation
page read and write
5061000
trusted library allocation
page read and write
3D13000
trusted library allocation
page read and write
3EC2000
trusted library allocation
page read and write
7087000
trusted library allocation
page read and write
3F9A000
trusted library allocation
page read and write
50DE000
trusted library allocation
page read and write
4043000
trusted library allocation
page read and write
62CE000
stack
page read and write
F85000
trusted library allocation
page execute and read and write
11EA000
heap
page read and write
418B000
trusted library allocation
page read and write
89F0000
trusted library allocation
page read and write
531E000
stack
page read and write
3F39000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
3F9D000
trusted library allocation
page read and write
40D0000
trusted library allocation
page read and write
3F28000
trusted library allocation
page read and write
E65000
heap
page read and write
997E000
stack
page read and write
F76000
trusted library allocation
page execute and read and write
9574000
heap
page read and write
703B000
trusted library allocation
page read and write
877000
unkown
page readonly
63F8000
heap
page read and write
40E0000
trusted library allocation
page read and write
89E0000
trusted library allocation
page read and write
30FA000
trusted library allocation
page read and write
30D9000
trusted library allocation
page read and write
3E9E000
trusted library allocation
page read and write
7089000
trusted library allocation
page read and write
3F7C000
trusted library allocation
page read and write
2F37000
trusted library allocation
page read and write
64D2000
heap
page read and write
40B2000
trusted library allocation
page read and write
576E000
stack
page read and write
2F61000
trusted library allocation
page read and write
8C10000
trusted library allocation
page read and write
3FEB000
trusted library allocation
page read and write
3F81000
trusted library allocation
page read and write
2E06000
trusted library allocation
page read and write
E1D000
trusted library allocation
page execute and read and write
4086000
trusted library allocation
page read and write
E20000
heap
page read and write
3F1B000
trusted library allocation
page read and write
2FDB000
trusted library allocation
page read and write
9E1E000
stack
page read and write
40BA000
trusted library allocation
page read and write
662E000
stack
page read and write
F7A000
trusted library allocation
page execute and read and write
415A000
trusted library allocation
page read and write
9460000
heap
page read and write
2F20000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
3F75000
trusted library allocation
page read and write
2FCC000
trusted library allocation
page read and write
504B000
trusted library allocation
page read and write
702B000
stack
page read and write
5090000
trusted library allocation
page read and write
3EFD000
trusted library allocation
page read and write
705E000
trusted library allocation
page read and write
618E000
stack
page read and write
559C000
heap
page read and write
64BC000
heap
page read and write
94E0000
heap
page read and write
328D000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page execute and read and write
3E91000
trusted library allocation
page read and write
94B5000
heap
page read and write
6B90000
trusted library allocation
page execute and read and write
11E6000
heap
page read and write
99BE000
stack
page read and write
6BD0000
trusted library allocation
page read and write
94F0000
heap
page read and write
7140000
trusted library allocation
page read and write
E2E000
heap
page read and write
E00000
trusted library allocation
page read and write
A680000
heap
page read and write
98EE000
stack
page read and write
64A9000
heap
page read and write
8A00000
trusted library allocation
page read and write
410E000
trusted library allocation
page read and write
686A000
stack
page read and write
4120000
trusted library allocation
page read and write
3EB4000
trusted library allocation
page read and write
3F2D000
trusted library allocation
page read and write
608F000
stack
page read and write
2E1F000
trusted library allocation
page read and write
7041000
trusted library allocation
page read and write
988D000
trusted library allocation
page read and write
2F12000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
5044000
trusted library allocation
page read and write
840000
unkown
page readonly
556F000
stack
page read and write
CF7000
stack
page read and write
6FC0000
trusted library allocation
page execute and read and write
872000
unkown
page readonly
2E17000
trusted library allocation
page read and write
4030000
trusted library allocation
page read and write
69EC000
stack
page read and write
4089000
trusted library allocation
page read and write
30E5000
trusted library allocation
page read and write
3030000
trusted library allocation
page read and write
413C000
trusted library allocation
page read and write
2FBE000
trusted library allocation
page read and write
992E000
stack
page read and write
307F000
trusted library allocation
page read and write
2F34000
trusted library allocation
page read and write
9870000
heap
page read and write
E47000
heap
page read and write
5066000
trusted library allocation
page read and write
305A000
trusted library allocation
page read and write
3D00000
trusted library allocation
page read and write
10FE000
stack
page read and write
2FC9000
trusted library allocation
page read and write
8A78000
trusted library allocation
page read and write
3CF9000
trusted library allocation
page read and write
3E9B000
trusted library allocation
page read and write
308D000
trusted library allocation
page read and write
3CDF000
trusted library allocation
page read and write
64B6000
heap
page read and write
3F88000
trusted library allocation
page read and write
3E71000
trusted library allocation
page read and write
4012000
trusted library allocation
page read and write
3074000
trusted library allocation
page read and write
9512000
heap
page read and write
2FD6000
trusted library allocation
page read and write
2F7A000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
31C3000
trusted library allocation
page read and write
3095000
trusted library allocation
page read and write
6F8D000
stack
page read and write
2E7F000
trusted library allocation
page read and write
F5E000
stack
page read and write
6B30000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page execute and read and write
9481000
heap
page read and write
9A3D000
stack
page read and write
9525000
heap
page read and write
3F6A000
trusted library allocation
page read and write
3FBE000
trusted library allocation
page read and write
32C9000
trusted library allocation
page read and write
3F08000
trusted library allocation
page read and write
3CF2000
trusted library allocation
page read and write
9508000
heap
page read and write
2B8F000
stack
page read and write
696C000
stack
page read and write
8A8F000
trusted library allocation
page read and write
3EE0000
trusted library allocation
page read and write
3E69000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
9A0000
heap
page read and write
6B2E000
stack
page read and write
6BA0000
trusted library allocation
page execute and read and write
9880000
trusted library allocation
page read and write
50A5000
trusted library allocation
page read and write
61CE000
stack
page read and write
8A30000
trusted library allocation
page read and write
32D4000
trusted library allocation
page read and write
4167000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
4094000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
7030000
trusted library allocation
page read and write
40C5000
trusted library allocation
page read and write
F8B000
trusted library allocation
page execute and read and write
3FC9000
trusted library allocation
page read and write
4024000
trusted library allocation
page read and write
2CAC000
stack
page read and write
5110000
heap
page read and write
30F2000
trusted library allocation
page read and write
2F1A000
trusted library allocation
page read and write
2FFC000
trusted library allocation
page read and write
6B50000
trusted library allocation
page execute and read and write
6BF0000
trusted library allocation
page execute and read and write
3FE1000
trusted library allocation
page read and write
6320000
heap
page read and write
40CB000
trusted library allocation
page read and write
6D0C000
stack
page read and write
11DB000
stack
page read and write
2F2B000
trusted library allocation
page read and write
505E000
trusted library allocation
page read and write
2EA2000
trusted library allocation
page read and write
9490000
heap
page read and write
3069000
trusted library allocation
page read and write
94CC000
heap
page read and write
DE0000
heap
page read and write
52BE000
stack
page read and write
30CE000
trusted library allocation
page read and write
3248000
trusted library allocation
page read and write
F13000
heap
page read and write
40BF000
trusted library allocation
page read and write
4147000
trusted library allocation
page read and write
64ED000
heap
page read and write
3E66000
trusted library allocation
page read and write
3EEF000
trusted library allocation
page read and write
3F21000
trusted library allocation
page read and write
3EF2000
trusted library allocation
page read and write
3EA9000
trusted library allocation
page read and write
4106000
trusted library allocation
page read and write
6410000
heap
page read and write
2FE6000
trusted library allocation
page read and write
40DD000
trusted library allocation
page read and write
3253000
trusted library allocation
page read and write
2E2B000
trusted library allocation
page read and write
E3F000
heap
page read and write
94D7000
heap
page read and write
94C2000
heap
page read and write
9473000
heap
page read and write
6A2E000
stack
page read and write
92A000
stack
page read and write
2E11000
trusted library allocation
page read and write
947D000
heap
page read and write
32E2000
trusted library allocation
page read and write
7085000
trusted library allocation
page read and write
3D05000
trusted library allocation
page read and write
89EE000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
3F34000
trusted library allocation
page read and write
679E000
stack
page read and write
985E000
stack
page read and write
401D000
trusted library allocation
page read and write
3D0F000
trusted library allocation
page read and write
9538000
heap
page read and write
2EFC000
trusted library allocation
page read and write
4017000
trusted library allocation
page read and write
950C000
heap
page read and write
32F3000
trusted library allocation
page read and write
3EA1000
trusted library allocation
page read and write
6E4C000
stack
page read and write
4174000
trusted library allocation
page read and write
9A40000
trusted library allocation
page read and write
7120000
trusted library allocation
page read and write
F87000
trusted library allocation
page execute and read and write
315F000
trusted library allocation
page read and write
4113000
trusted library allocation
page read and write
7075000
trusted library allocation
page read and write
410C000
trusted library allocation
page read and write
5593000
heap
page read and write
2F10000
trusted library allocation
page read and write
509E000
trusted library allocation
page read and write
7F720000
trusted library allocation
page execute and read and write
94BE000
heap
page read and write
4131000
trusted library allocation
page read and write
11E0000
heap
page read and write
31B1000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
6340000
trusted library allocation
page execute and read and write
3F51000
trusted library allocation
page read and write
9554000
heap
page read and write
5581000
heap
page read and write
FA0000
trusted library allocation
page read and write
6330000
trusted library allocation
page execute and read and write
3FC3000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
7080000
trusted library allocation
page read and write
407C000
trusted library allocation
page read and write
3FDC000
trusted library allocation
page read and write
8A85000
trusted library allocation
page read and write
F82000
trusted library allocation
page read and write
31A3000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
3F16000
trusted library allocation
page read and write
7046000
trusted library allocation
page read and write
6F96000
trusted library allocation
page read and write
3FEE000
trusted library allocation
page read and write
946A000
heap
page read and write
51E3000
heap
page read and write
3198000
trusted library allocation
page read and write
305C000
trusted library allocation
page read and write
5010000
heap
page read and write
3FF1000
trusted library allocation
page read and write
306C000
trusted library allocation
page read and write
3FD0000
trusted library allocation
page read and write
2B90000
trusted library allocation
page execute and read and write
2CD1000
trusted library allocation
page read and write
3F6F000
trusted library allocation
page read and write
9EE000
stack
page read and write
301A000
trusted library allocation
page read and write
652D000
stack
page read and write
3F46000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
6990000
trusted library allocation
page execute and read and write
E14000
trusted library allocation
page read and write
F0D000
heap
page read and write
8A04000
trusted library allocation
page read and write
2BA0000
heap
page read and write
40F3000
trusted library allocation
page read and write
3EC7000
trusted library allocation
page read and write
951F000
heap
page read and write
3066000
trusted library allocation
page read and write
3FF9000
trusted library allocation
page read and write
712A000
trusted library allocation
page read and write
FEE000
stack
page read and write
8A8A000
trusted library allocation
page read and write
2A8E000
stack
page read and write
6E8E000
stack
page read and write
312D000
trusted library allocation
page read and write
8A7A000
trusted library allocation
page read and write
8A69000
trusted library allocation
page read and write
5072000
trusted library allocation
page read and write
323A000
trusted library allocation
page read and write
2EF8000
trusted library allocation
page read and write
89E5000
trusted library allocation
page read and write
949E000
heap
page read and write
3E8A000
trusted library allocation
page read and write
3EE5000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
886000
unkown
page readonly
3ECD000
trusted library allocation
page read and write
7127000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
3FA5000
trusted library allocation
page read and write
4119000
trusted library allocation
page read and write
EF8000
heap
page read and write
50D0000
trusted library allocation
page read and write
5122000
trusted library allocation
page read and write
7070000
trusted library allocation
page read and write
51E0000
heap
page read and write
3F43000
trusted library allocation
page read and write
64D9000
heap
page read and write
506D000
trusted library allocation
page read and write
3ED4000
trusted library allocation
page read and write
F6D000
trusted library allocation
page execute and read and write
9860000
heap
page read and write
990000
heap
page read and write
3F49000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
2E6F000
trusted library allocation
page read and write
2F3A000
trusted library allocation
page read and write
31BD000
trusted library allocation
page read and write
9564000
heap
page read and write
2FF4000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
6418000
heap
page read and write
2F64000
trusted library allocation
page read and write
3FD5000
trusted library allocation
page read and write
4162000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
3E63000
trusted library allocation
page read and write
8A60000
trusted library allocation
page read and write
31F5000
trusted library allocation
page read and write
4177000
trusted library allocation
page read and write
EEC000
heap
page read and write
2F3E000
trusted library allocation
page read and write
3F5C000
trusted library allocation
page read and write
322F000
trusted library allocation
page read and write
643D000
heap
page read and write
9D1E000
stack
page read and write
2F94000
trusted library allocation
page read and write
4160000
trusted library allocation
page read and write
3ED9000
trusted library allocation
page read and write
40E8000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
3259000
trusted library allocation
page read and write
FF0000
heap
page read and write
3F8D000
trusted library allocation
page read and write
E28000
heap
page read and write
7052000
trusted library allocation
page read and write
11EE000
heap
page read and write
63F0000
heap
page read and write
6D4E000
stack
page read and write
6414000
heap
page read and write
40DA000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
2F57000
trusted library allocation
page read and write
2F55000
trusted library allocation
page read and write
2F28000
trusted library allocation
page read and write
89D0000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page read and write
3E7C000
trusted library allocation
page read and write
32ED000
trusted library allocation
page read and write
669E000
stack
page read and write
2F2E000
trusted library allocation
page read and write
52D0000
heap
page read and write
8A65000
trusted library allocation
page read and write
3EF5000
trusted library allocation
page read and write
98A0000
trusted library allocation
page execute and read and write
3D0C000
trusted library allocation
page read and write
30D1000
trusted library allocation
page read and write
F80000
trusted library allocation
page read and write
8A62000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page read and write
3127000
trusted library allocation
page read and write
5DCE000
stack
page read and write
94A6000
heap
page read and write
94AF000
heap
page read and write
3028000
trusted library allocation
page read and write
40AD000
trusted library allocation
page read and write
409F000
trusted library allocation
page read and write
E13000
trusted library allocation
page execute and read and write
30CB000
trusted library allocation
page read and write
F72000
trusted library allocation
page read and write
8A28000
trusted library allocation
page read and write
5130000
trusted library allocation
page execute and read and write
4155000
trusted library allocation
page read and write
2EF4000
trusted library allocation
page read and write
F70000
trusted library allocation
page read and write
3E59000
trusted library allocation
page read and write
2E14000
trusted library allocation
page read and write
5348000
trusted library allocation
page read and write
1108000
trusted library allocation
page read and write
408C000
trusted library allocation
page read and write
707A000
trusted library allocation
page read and write
4134000
trusted library allocation
page read and write
3D57000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
640C000
heap
page read and write
3F97000
trusted library allocation
page read and write
9660000
heap
page read and write
69A0000
trusted library allocation
page read and write
2F16000
trusted library allocation
page read and write
2F67000
trusted library allocation
page read and write
7078000
trusted library allocation
page read and write
5D8E000
stack
page read and write
412E000
trusted library allocation
page read and write
E61000
heap
page read and write
50A0000
trusted library allocation
page read and write
406B000
trusted library allocation
page read and write
3FB0000
trusted library allocation
page read and write
4029000
trusted library allocation
page read and write
5370000
heap
page execute and read and write
64DD000
heap
page read and write
2F1C000
trusted library allocation
page read and write
40B8000
trusted library allocation
page read and write
2CC0000
heap
page execute and read and write
9465000
heap
page read and write
4124000
trusted library allocation
page read and write
99FE000
stack
page read and write
2E38000
trusted library allocation
page read and write
416D000
trusted library allocation
page read and write
8A7F000
trusted library allocation
page read and write
2F88000
trusted library allocation
page read and write
9517000
heap
page read and write
8A10000
trusted library allocation
page read and write
DE5000
heap
page read and write
4180000
trusted library allocation
page read and write
2F6F000
trusted library allocation
page read and write
89EB000
trusted library allocation
page read and write
FF7000
heap
page read and write
9552000
heap
page read and write
4101000
trusted library allocation
page read and write
9930000
trusted library allocation
page execute and read and write
2FCF000
trusted library allocation
page read and write
There are 444 hidden memdumps, click here to show them.