IOC Report
ExAXLXWP9K.exe

loading gif

Files

File Path
Type
Category
Malicious
ExAXLXWP9K.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:56 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ExAXLXWP9K.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Tmp9FF3.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpA004.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ExAXLXWP9K.exe
"C:\Users\user\Desktop\ExAXLXWP9K.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://tempuri.org/Entity/Id15V
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://purl.oen
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
103.113.70.99
unknown
India
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
6B2000
unkown
page readonly
malicious
28DE000
trusted library allocation
page read and write
2B7C000
trusted library allocation
page read and write
689B000
trusted library allocation
page read and write
30A4000
trusted library allocation
page read and write
5B88000
heap
page read and write
3D9B000
trusted library allocation
page read and write
3BB0000
trusted library allocation
page read and write
3D61000
trusted library allocation
page read and write
79F0000
trusted library allocation
page execute and read and write
285C000
stack
page read and write
68C1000
trusted library allocation
page read and write
79AE000
stack
page read and write
755B000
heap
page read and write
3C30000
trusted library allocation
page read and write
2D72000
trusted library allocation
page read and write
116E000
heap
page read and write
3C83000
trusted library allocation
page read and write
3E87000
trusted library allocation
page read and write
4FF0000
heap
page read and write
6E60000
trusted library allocation
page execute and read and write
3D9D000
trusted library allocation
page read and write
3063000
trusted library allocation
page read and write
2B20000
trusted library allocation
page read and write
6769000
trusted library allocation
page read and write
29F1000
trusted library allocation
page read and write
2C11000
trusted library allocation
page read and write
2C88000
trusted library allocation
page read and write
50DE000
stack
page read and write
332D000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
7BD0000
heap
page read and write
39F1000
trusted library allocation
page read and write
3A2C000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
3BF7000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
7F700000
trusted library allocation
page execute and read and write
3D00000
trusted library allocation
page read and write
2C3A000
trusted library allocation
page read and write
75AA000
heap
page read and write
74FB000
heap
page read and write
30AE000
trusted library allocation
page read and write
3314000
trusted library allocation
page read and write
68BE000
trusted library allocation
page read and write
32A4000
trusted library allocation
page read and write
6758000
trusted library allocation
page read and write
6B60000
trusted library allocation
page execute and read and write
3D7B000
trusted library allocation
page read and write
1160000
heap
page read and write
5428000
trusted library allocation
page read and write
3C26000
trusted library allocation
page read and write
6960000
trusted library allocation
page read and write
5140000
heap
page read and write
5B83000
heap
page read and write
6E0C000
stack
page read and write
32E5000
trusted library allocation
page read and write
6D0E000
stack
page read and write
4F92000
trusted library allocation
page read and write
1166000
heap
page read and write
3C5A000
trusted library allocation
page read and write
2BE0000
trusted library allocation
page read and write
74D0000
heap
page read and write
2DF7000
trusted library allocation
page read and write
68A6000
trusted library allocation
page read and write
3255000
trusted library allocation
page read and write
74DF000
heap
page read and write
62D0000
heap
page read and write
54BD000
stack
page read and write
3E9A000
trusted library allocation
page read and write
3ED6000
trusted library allocation
page read and write
63DE000
stack
page read and write
68A1000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
674A000
heap
page read and write
39FF000
trusted library allocation
page read and write
2BAD000
trusted library allocation
page read and write
3C09000
trusted library allocation
page read and write
3183000
trusted library allocation
page read and write
2C0B000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
3CF8000
trusted library allocation
page read and write
7A40000
heap
page read and write
6910000
trusted library allocation
page read and write
3D5B000
trusted library allocation
page read and write
68B2000
trusted library allocation
page read and write
540E000
stack
page read and write
5590000
trusted library allocation
page read and write
D98000
heap
page read and write
C56000
heap
page read and write
3CF2000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
3E6D000
trusted library allocation
page read and write
3D05000
trusted library allocation
page read and write
281E000
stack
page read and write
2B18000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
3B8A000
trusted library allocation
page read and write
3333000
trusted library allocation
page read and write
341A000
trusted library allocation
page read and write
2EF1000
trusted library allocation
page read and write
2FDB000
trusted library allocation
page read and write
68F0000
trusted library allocation
page read and write
2784000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
3DA0000
trusted library allocation
page read and write
2BF5000
trusted library allocation
page read and write
6F6000
unkown
page readonly
4F10000
trusted library allocation
page read and write
3E25000
trusted library allocation
page read and write
3F01000
trusted library allocation
page read and write
6740000
heap
page read and write
3E04000
trusted library allocation
page read and write
661E000
stack
page read and write
CE2000
heap
page read and write
2C36000
trusted library allocation
page read and write
3E21000
trusted library allocation
page read and write
3403000
trusted library allocation
page read and write
3E57000
trusted library allocation
page read and write
CAE000
heap
page read and write
5210000
heap
page execute and read and write
2DE9000
trusted library allocation
page read and write
D3F000
heap
page read and write
4F4E000
trusted library allocation
page read and write
2C9A000
trusted library allocation
page read and write
32FA000
trusted library allocation
page read and write
6744000
heap
page read and write
671A000
heap
page read and write
78AB000
stack
page read and write
6B0000
unkown
page readonly
2F08000
trusted library allocation
page read and write
30B9000
trusted library allocation
page read and write
3243000
trusted library allocation
page read and write
2E11000
trusted library allocation
page read and write
68E5000
trusted library allocation
page read and write
4EEE000
trusted library allocation
page read and write
6900000
trusted library allocation
page read and write
28A0000
trusted library allocation
page read and write
64DE000
stack
page read and write
2D67000
trusted library allocation
page read and write
319E000
trusted library allocation
page read and write
331B000
trusted library allocation
page read and write
3CF5000
trusted library allocation
page read and write
3E27000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
3D8E000
trusted library allocation
page read and write
334E000
trusted library allocation
page read and write
66AA000
heap
page read and write
2BD6000
trusted library allocation
page read and write
320D000
trusted library allocation
page read and write
68EB000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
3C3D000
trusted library allocation
page read and write
325F000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
3DE2000
trusted library allocation
page read and write
6750000
trusted library allocation
page read and write
2C7D000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
3222000
trusted library allocation
page read and write
279D000
trusted library allocation
page execute and read and write
3CD5000
trusted library allocation
page read and write
2E04000
trusted library allocation
page read and write
3C55000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
3BC6000
trusted library allocation
page read and write
543F000
trusted library allocation
page read and write
66F2000
heap
page read and write
3E61000
trusted library allocation
page read and write
3C43000
trusted library allocation
page read and write
2FF1000
trusted library allocation
page read and write
3F11000
trusted library allocation
page read and write
7B8E000
stack
page read and write
2ED2000
trusted library allocation
page read and write
3E51000
trusted library allocation
page read and write
3CB6000
trusted library allocation
page read and write
3EAA000
trusted library allocation
page read and write
2F03000
trusted library allocation
page read and write
6E49000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
5114000
trusted library allocation
page read and write
3A12000
trusted library allocation
page read and write
2D57000
trusted library allocation
page read and write
2F24000
trusted library allocation
page read and write
3343000
trusted library allocation
page read and write
3BBA000
trusted library allocation
page read and write
3D81000
trusted library allocation
page read and write
542A000
trusted library allocation
page read and write
3F06000
trusted library allocation
page read and write
AF7000
stack
page read and write
2E18000
trusted library allocation
page read and write
6E7C000
trusted library allocation
page read and write
27AA000
trusted library allocation
page execute and read and write
324E000
trusted library allocation
page read and write
3D1C000
trusted library allocation
page read and write
4EF6000
trusted library allocation
page read and write
4B8B000
stack
page read and write
2C06000
trusted library allocation
page read and write
6B80000
trusted library allocation
page execute and read and write
27D0000
trusted library allocation
page read and write
30C5000
trusted library allocation
page read and write
29EF000
stack
page read and write
2CA4000
trusted library allocation
page read and write
27A0000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
C4E000
stack
page read and write
3E6A000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
5D5E000
stack
page read and write
5B71000
heap
page read and write
6717000
heap
page read and write
6BCC000
stack
page read and write
66F0000
heap
page read and write
6E40000
trusted library allocation
page read and write
3D97000
trusted library allocation
page read and write
32EC000
trusted library allocation
page read and write
3187000
trusted library allocation
page read and write
2783000
trusted library allocation
page execute and read and write
7EEE000
stack
page read and write
27BB000
trusted library allocation
page execute and read and write
2F89000
trusted library allocation
page read and write
74F7000
heap
page read and write
2DD8000
trusted library allocation
page read and write
27B2000
trusted library allocation
page read and write
3DFA000
trusted library allocation
page read and write
2F0D000
trusted library allocation
page read and write
7A3E000
stack
page read and write
7B4E000
stack
page read and write
3CA4000
trusted library allocation
page read and write
3326000
trusted library allocation
page read and write
3A6F000
trusted library allocation
page read and write
4EF1000
trusted library allocation
page read and write
756D000
heap
page read and write
CBF000
heap
page read and write
6920000
trusted library allocation
page read and write
3C5F000
trusted library allocation
page read and write
2E2A000
trusted library allocation
page read and write
3EC9000
trusted library allocation
page read and write
2BEC000
trusted library allocation
page read and write
2E7A000
trusted library allocation
page read and write
3DBA000
trusted library allocation
page read and write
3D28000
trusted library allocation
page read and write
2D2B000
trusted library allocation
page read and write
6E90000
trusted library allocation
page execute and read and write
3CC0000
trusted library allocation
page read and write
3E5E000
trusted library allocation
page read and write
32DB000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
308B000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
6990000
trusted library allocation
page execute and read and write
651E000
stack
page read and write
3EF5000
trusted library allocation
page read and write
2860000
heap
page execute and read and write
2E40000
trusted library allocation
page read and write
5128000
trusted library allocation
page read and write
3E2F000
trusted library allocation
page read and write
7FEE000
stack
page read and write
6760000
trusted library allocation
page read and write
3CBB000
trusted library allocation
page read and write
2F93000
trusted library allocation
page read and write
3CAF000
trusted library allocation
page read and write
3BFE000
trusted library allocation
page read and write
3CCB000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
2B78000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
3D54000
trusted library allocation
page read and write
3E2A000
trusted library allocation
page read and write
3C47000
trusted library allocation
page read and write
2E4B000
trusted library allocation
page read and write
7545000
heap
page read and write
6733000
heap
page read and write
6890000
trusted library allocation
page read and write
2EC2000
trusted library allocation
page read and write
28E0000
heap
page read and write
3D49000
trusted library allocation
page read and write
3337000
trusted library allocation
page read and write
3E11000
trusted library allocation
page read and write
6980000
trusted library allocation
page execute and read and write
3E9F000
trusted library allocation
page read and write
7523000
heap
page read and write
3C1A000
trusted library allocation
page read and write
3D92000
trusted library allocation
page read and write
6700000
heap
page read and write
3214000
trusted library allocation
page read and write
6767000
trusted library allocation
page read and write
2EDD000
trusted library allocation
page read and write
8000000
trusted library allocation
page read and write
CC8000
heap
page read and write
2C02000
trusted library allocation
page read and write
7BCE000
stack
page read and write
2CC9000
trusted library allocation
page read and write
33B7000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
3D14000
trusted library allocation
page read and write
2DE1000
trusted library allocation
page read and write
6E80000
trusted library allocation
page read and write
3B71000
trusted library allocation
page read and write
CA0000
heap
page read and write
3E18000
trusted library allocation
page read and write
2DEB000
trusted library allocation
page read and write
6755000
trusted library allocation
page read and write
2E34000
trusted library allocation
page read and write
6684000
heap
page read and write
2FD4000
trusted library allocation
page read and write
2C6C000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
2D51000
trusted library allocation
page read and write
3E6F000
trusted library allocation
page read and write
3176000
trusted library allocation
page read and write
3411000
trusted library allocation
page read and write
F9E000
stack
page read and write
601E000
stack
page read and write
307E000
trusted library allocation
page read and write
66FA000
heap
page read and write
2FC2000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
3E75000
trusted library allocation
page read and write
3BDD000
trusted library allocation
page read and write
302C000
trusted library allocation
page read and write
2E23000
trusted library allocation
page read and write
3CE2000
trusted library allocation
page read and write
3CE9000
trusted library allocation
page read and write
2FE6000
trusted library allocation
page read and write
27A2000
trusted library allocation
page read and write
3D71000
trusted library allocation
page read and write
313E000
trusted library allocation
page read and write
3394000
trusted library allocation
page read and write
3164000
trusted library allocation
page read and write
6703000
heap
page read and write
6CCC000
stack
page read and write
54FE000
stack
page read and write
2AEF000
trusted library allocation
page read and write
27A6000
trusted library allocation
page execute and read and write
625E000
stack
page read and write
2FE1000
trusted library allocation
page read and write
3418000
trusted library allocation
page read and write
3216000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
4F80000
heap
page read and write
2780000
trusted library allocation
page read and write
3A2A000
trusted library allocation
page read and write
3C15000
trusted library allocation
page read and write
665C000
heap
page read and write
3D66000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page execute and read and write
2D38000
trusted library allocation
page read and write
3D35000
trusted library allocation
page read and write
B00000
heap
page read and write
3BD1000
trusted library allocation
page read and write
27B0000
trusted library allocation
page read and write
C50000
heap
page read and write
670E000
heap
page read and write
6765000
trusted library allocation
page read and write
28B0000
trusted library allocation
page read and write
3C77000
trusted library allocation
page read and write
2F53000
trusted library allocation
page read and write
7516000
heap
page read and write
550B000
trusted library allocation
page read and write
3A33000
trusted library allocation
page read and write
3E67000
trusted library allocation
page read and write
6E79000
trusted library allocation
page read and write
D4B000
heap
page read and write
3193000
trusted library allocation
page read and write
3EE3000
trusted library allocation
page read and write
558E000
stack
page read and write
4ED0000
trusted library allocation
page read and write
2B6B000
trusted library allocation
page read and write
3406000
trusted library allocation
page read and write
5412000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
278D000
trusted library allocation
page execute and read and write
554E000
stack
page read and write
5100000
trusted library allocation
page read and write
325B000
trusted library allocation
page read and write
317D000
trusted library allocation
page read and write
6662000
heap
page read and write
3E81000
trusted library allocation
page read and write
3B9E000
trusted library allocation
page read and write
C05000
heap
page read and write
3EBD000
trusted library allocation
page read and write
28C0000
trusted library allocation
page read and write
2CFF000
trusted library allocation
page read and write
672A000
heap
page read and write
3E91000
trusted library allocation
page read and write
74EC000
heap
page read and write
3CFA000
trusted library allocation
page read and write
3C36000
trusted library allocation
page read and write
3E34000
trusted library allocation
page read and write
3C9D000
trusted library allocation
page read and write
6723000
heap
page read and write
3E9D000
trusted library allocation
page read and write
7585000
heap
page read and write
69F0000
trusted library allocation
page execute and read and write
30F4000
trusted library allocation
page read and write
2EEA000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
4F15000
trusted library allocation
page read and write
3E97000
trusted library allocation
page read and write
7508000
heap
page read and write
2FB5000
trusted library allocation
page read and write
4F02000
trusted library allocation
page read and write
D7D000
heap
page read and write
2A99000
trusted library allocation
page read and write
62E0000
trusted library allocation
page execute and read and write
2EB1000
trusted library allocation
page read and write
27B7000
trusted library allocation
page execute and read and write
3BB5000
trusted library allocation
page read and write
4EFD000
trusted library allocation
page read and write
2F9B000
trusted library allocation
page read and write
D74000
heap
page read and write
49F8000
trusted library allocation
page read and write
3D88000
trusted library allocation
page read and write
3BEA000
trusted library allocation
page read and write
2B56000
trusted library allocation
page read and write
D62000
heap
page read and write
2FA8000
trusted library allocation
page read and write
2EBA000
trusted library allocation
page read and write
3092000
trusted library allocation
page read and write
2D11000
trusted library allocation
page read and write
2870000
heap
page read and write
C00000
heap
page read and write
5138000
trusted library allocation
page read and write
2D5C000
trusted library allocation
page read and write
74D6000
heap
page read and write
611F000
stack
page read and write
51FE000
stack
page read and write
3C10000
trusted library allocation
page read and write
340F000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
6650000
heap
page read and write
32EE000
trusted library allocation
page read and write
30A9000
trusted library allocation
page read and write
314A000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
770E000
stack
page read and write
3E0B000
trusted library allocation
page read and write
3415000
trusted library allocation
page read and write
68EE000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
3307000
trusted library allocation
page read and write
2C76000
trusted library allocation
page read and write
4ED4000
trusted library allocation
page read and write
2C95000
trusted library allocation
page read and write
2FFC000
trusted library allocation
page read and write
4EDB000
trusted library allocation
page read and write
671C000
heap
page read and write
542F000
trusted library allocation
page read and write
3276000
trusted library allocation
page read and write
6E7000
unkown
page readonly
4F20000
trusted library allocation
page read and write
79EE000
stack
page read and write
543A000
trusted library allocation
page read and write
3DA6000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
5419000
trusted library allocation
page read and write
2C68000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
BE0000
heap
page read and write
3CEC000
trusted library allocation
page read and write
69E0000
trusted library allocation
page execute and read and write
309D000
trusted library allocation
page read and write
2D3F000
trusted library allocation
page read and write
62F0000
trusted library allocation
page execute and read and write
323C000
trusted library allocation
page read and write
786D000
stack
page read and write
615E000
stack
page read and write
2D4A000
trusted library allocation
page read and write
6790000
heap
page read and write
6E2000
unkown
page readonly
752F000
heap
page read and write
50F0000
trusted library allocation
page execute and read and write
79A000
stack
page read and write
3E7A000
trusted library allocation
page read and write
2B1A000
trusted library allocation
page read and write
3EFC000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
3E1C000
trusted library allocation
page read and write
3E8E000
trusted library allocation
page read and write
C9E000
stack
page read and write
2ED0000
trusted library allocation
page read and write
4FF3000
heap
page read and write
3B7D000
trusted library allocation
page read and write
3EA5000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
3203000
trusted library allocation
page read and write
3C50000
trusted library allocation
page read and write
3F1B000
trusted library allocation
page read and write
3B97000
trusted library allocation
page read and write
2F18000
trusted library allocation
page read and write
3D42000
trusted library allocation
page read and write
2FC9000
trusted library allocation
page read and write
306C000
trusted library allocation
page read and write
3C4C000
trusted library allocation
page read and write
6736000
heap
page read and write
313C000
trusted library allocation
page read and write
2E2F000
trusted library allocation
page read and write
322F000
trusted library allocation
page read and write
E9F000
stack
page read and write
3CDC000
trusted library allocation
page read and write
316B000
trusted library allocation
page read and write
7C1D000
stack
page read and write
2C9E000
trusted library allocation
page read and write
27B5000
trusted library allocation
page execute and read and write
2EFC000
trusted library allocation
page read and write
31CC000
trusted library allocation
page read and write
3135000
trusted library allocation
page read and write
2DA1000
trusted library allocation
page read and write
2AE7000
trusted library allocation
page read and write
67A0000
heap
page read and write
3EEA000
trusted library allocation
page read and write
3BA9000
trusted library allocation
page read and write
2D09000
trusted library allocation
page read and write
675A000
trusted library allocation
page read and write
2890000
trusted library allocation
page execute and read and write
There are 508 hidden memdumps, click here to show them.