IOC Report
zNWl7z1FbW.exe

loading gif

Files

File Path
Type
Category
Malicious
zNWl7z1FbW.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\zNWl7z1FbW.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\facebok.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\36db42ed563b740681ec3918ded7c343.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\facebok.exe.log
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\zNWl7z1FbW.exe
"C:\Users\user\Desktop\zNWl7z1FbW.exe"
malicious
C:\Users\user\AppData\Local\Temp\facebok.exe
"C:\Users\user\AppData\Local\Temp\facebok.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\facebok.exe" "facebok.exe" ENABLE
malicious
C:\Users\user\AppData\Local\Temp\facebok.exe
"C:\Users\user\AppData\Local\Temp\facebok.exe" ..
malicious
C:\Users\user\AppData\Local\Temp\facebok.exe
"C:\Users\user\AppData\Local\Temp\facebok.exe" ..
malicious
C:\Users\user\AppData\Local\Temp\facebok.exe
"C:\Users\user\AppData\Local\Temp\facebok.exe" ..
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
seznam.hopto.org
34.145.18.233
malicious

IPs

IP
Domain
Country
Malicious
34.145.18.233
seznam.hopto.org
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
36db42ed563b740681ec3918ded7c343
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
36db42ed563b740681ec3918ded7c343
HKEY_CURRENT_USER\SOFTWARE\36db42ed563b740681ec3918ded7c343
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
2AF1000
trusted library allocation
page read and write
malicious
30F1000
trusted library allocation
page read and write
malicious
2711000
trusted library allocation
page read and write
malicious
376C000
trusted library allocation
page read and write
5B34000
heap
page read and write
2807000
trusted library allocation
page read and write
2AA0000
trusted library allocation
page read and write
27F0000
trusted library allocation
page read and write
BA0000
heap
page read and write
BDC000
heap
page read and write
28F8000
trusted library allocation
page read and write
2D37000
trusted library allocation
page read and write
C4B000
heap
page read and write
145D000
trusted library allocation
page execute and read and write
16CE000
stack
page read and write
282C000
trusted library allocation
page read and write
948D000
stack
page read and write
980000
heap
page read and write
7D6E000
stack
page read and write
149B000
trusted library allocation
page execute and read and write
2D0A000
trusted library allocation
page read and write
EC3000
heap
page read and write
557B000
trusted library allocation
page read and write
C1D000
heap
page read and write
B9D000
trusted library allocation
page execute and read and write
2494000
trusted library allocation
page read and write
5B40000
heap
page read and write
9F0000
heap
page read and write
5AC6000
heap
page read and write
2D15000
trusted library allocation
page read and write
BDA000
heap
page read and write
5B62000
heap
page read and write
51DF000
stack
page read and write
6429000
heap
page read and write
53DF000
stack
page read and write
1210000
trusted library allocation
page execute and read and write
2C9D000
trusted library allocation
page read and write
27C2000
trusted library allocation
page read and write
DF8000
heap
page read and write
2B20000
trusted library allocation
page read and write
40F9000
trusted library allocation
page read and write
4D20000
trusted library allocation
page execute and read and write
BC8000
heap
page read and write
2D75000
trusted library allocation
page read and write
7620000
heap
page read and write
4D18000
trusted library allocation
page read and write
C7C000
heap
page read and write
3795000
trusted library allocation
page read and write
71B9000
stack
page read and write
2D0E000
trusted library allocation
page read and write
5300000
heap
page read and write
D50000
heap
page read and write
1030000
trusted library allocation
page read and write
73D16000
unkown
page readonly
8970000
trusted library allocation
page execute and read and write
BDB000
heap
page read and write
C4B000
heap
page read and write
52A3000
heap
page read and write
7EAE000
stack
page read and write
5A57000
heap
page read and write
C4B000
heap
page read and write
C3D000
heap
page read and write
719E000
stack
page read and write
7140000
heap
page read and write
C52000
heap
page read and write
5915000
heap
page read and write
5FAC000
heap
page read and write
24F0000
trusted library allocation
page execute and read and write
724B000
stack
page read and write
1750000
trusted library allocation
page read and write
2CCE000
trusted library allocation
page read and write
7FEC000
stack
page read and write
B91000
heap
page read and write
C6D000
heap
page read and write
5FE6000
heap
page read and write
7647000
trusted library allocation
page read and write
5C20000
heap
page read and write
C0F000
heap
page read and write
7750000
heap
page read and write
C2C000
heap
page read and write
4C6E000
trusted library allocation
page read and write
54C0000
heap
page read and write
BE0000
heap
page read and write
4BB6000
trusted library allocation
page read and write
6EDF000
stack
page read and write
1440000
trusted library allocation
page read and write
BD0000
heap
page read and write
5B38000
heap
page read and write
6520000
heap
page read and write
5B8D000
heap
page read and write
5010000
trusted library allocation
page execute and read and write
280F000
trusted library allocation
page read and write
BA0000
heap
page read and write
2829000
trusted library allocation
page read and write
C4B000
heap
page read and write
BED000
heap
page read and write
2D4C000
trusted library allocation
page read and write
2CD5000
trusted library allocation
page read and write
6569000
heap
page read and write
762E000
stack
page read and write
2CC8000
trusted library allocation
page read and write
C32000
heap
page read and write
1116000
heap
page read and write
2813000
trusted library allocation
page read and write
C4B000
heap
page read and write
895000
heap
page read and write
A6E000
stack
page read and write
5EC1000
heap
page read and write
7740000
trusted library allocation
page execute and read and write
4F70000
heap
page execute and read and write
C78000
heap
page read and write
4D93000
heap
page read and write
CBE000
stack
page read and write
650D000
heap
page read and write
BD0000
heap
page read and write
BE0000
heap
page read and write
72A0000
trusted library allocation
page read and write
C24000
heap
page read and write
59F9000
heap
page read and write
1849000
heap
page read and write
83E000
stack
page read and write
BC8000
heap
page read and write
6F90000
trusted library allocation
page read and write
812B000
stack
page read and write
5850000
trusted library section
page readonly
5596000
trusted library allocation
page read and write
BC8000
heap
page read and write
3848000
trusted library allocation
page read and write
C0D000
heap
page read and write
2D1D000
trusted library allocation
page read and write
283A000
trusted library allocation
page read and write
5F10000
heap
page read and write
2500000
heap
page execute and read and write
4F90000
trusted library allocation
page read and write
5EF3000
heap
page read and write
2CCA000
trusted library allocation
page read and write
7370000
trusted library allocation
page execute and read and write
C76000
heap
page read and write
2AAB000
trusted library allocation
page read and write
C23000
heap
page read and write
4F5D000
trusted library allocation
page read and write
775C000
heap
page read and write
3D2E000
trusted library allocation
page read and write
2D3C000
trusted library allocation
page read and write
7BDE000
stack
page read and write
4F45000
trusted library allocation
page read and write
278D000
trusted library allocation
page read and write
2AF0000
trusted library allocation
page read and write
8C3E000
stack
page read and write
2D4A000
trusted library allocation
page read and write
5F19000
heap
page read and write
C26000
heap
page read and write
281D000
trusted library allocation
page read and write
3B4C000
trusted library allocation
page read and write
282E000
trusted library allocation
page read and write
A98000
heap
page read and write
4FB0000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
7F0000
heap
page read and write
BCE000
heap
page read and write
85B0000
heap
page execute and read and write
C1A000
heap
page read and write
7C1E000
stack
page read and write
59E7000
heap
page read and write
5491000
heap
page read and write
F20000
trusted library allocation
page read and write
4BBD000
trusted library allocation
page read and write
FCE000
stack
page read and write
C39000
heap
page read and write
27EA000
trusted library allocation
page read and write
64C4000
heap
page read and write
1453000
trusted library allocation
page execute and read and write
C80000
heap
page read and write
C2D000
heap
page read and write
5B5F000
heap
page read and write
A20000
heap
page read and write
73D1D000
unkown
page read and write
C1F000
heap
page read and write
F46000
trusted library allocation
page execute and read and write
2C99000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
C2C000
heap
page read and write
C47000
heap
page read and write
C15000
heap
page read and write
2600000
heap
page read and write
CE9000
heap
page read and write
3719000
trusted library allocation
page read and write
4D00000
heap
page read and write
643F000
heap
page read and write
2ABE000
trusted library allocation
page read and write
5E3D000
heap
page read and write
381E000
trusted library allocation
page read and write
4BE6000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
2AEE000
stack
page read and write
840000
heap
page read and write
C2B000
heap
page read and write
4BF0000
trusted library allocation
page read and write
A2C000
heap
page read and write
2856000
trusted library allocation
page read and write
4C00000
trusted library allocation
page read and write
51E0000
heap
page read and write
2819000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
72D0000
trusted library allocation
page execute and read and write
50E0000
heap
page read and write
C13000
heap
page read and write
595D000
stack
page read and write
59E0000
heap
page read and write
27F8000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page execute and read and write
C2B000
heap
page read and write
B93000
trusted library allocation
page read and write
4C71000
trusted library allocation
page read and write
2730000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
5657000
heap
page read and write
5B00000
trusted library section
page read and write
F7B000
trusted library allocation
page execute and read and write
CEC000
heap
page read and write
F43000
trusted library allocation
page execute and read and write
C2C000
heap
page read and write
27B8000
trusted library allocation
page read and write
1450000
trusted library allocation
page read and write
122C000
heap
page read and write
5C8E000
stack
page read and write
5495000
heap
page read and write
5320000
heap
page read and write
4D70000
trusted library allocation
page read and write
72B7000
trusted library allocation
page read and write
2885000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
FA0000
heap
page read and write
C25000
heap
page read and write
280D000
trusted library allocation
page read and write
2817000
trusted library allocation
page read and write
1730000
heap
page read and write
27F6000
trusted library allocation
page read and write
AC7000
heap
page read and write
7747000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
27E4000
trusted library allocation
page read and write
8F6000
stack
page read and write
170E000
stack
page read and write
5210000
trusted library allocation
page execute and read and write
2744000
trusted library allocation
page read and write
64F6000
heap
page read and write
5170000
trusted library allocation
page read and write
BCA000
heap
page read and write
5320000
trusted library allocation
page read and write
24CB000
trusted library allocation
page execute and read and write
29D4000
trusted library allocation
page read and write
27CD000
trusted library allocation
page read and write
A8D000
trusted library allocation
page execute and read and write
F6A000
trusted library allocation
page execute and read and write
184C000
heap
page read and write
C08000
heap
page read and write
141E000
stack
page read and write
6CA0000
heap
page read and write
C27000
heap
page read and write
C17000
heap
page read and write
5900000
heap
page read and write
7792000
heap
page read and write
569B000
stack
page read and write
7E6E000
stack
page read and write
1490000
trusted library allocation
page read and write
4F80000
trusted library allocation
page read and write
1830000
trusted library allocation
page read and write
3B22000
trusted library allocation
page read and write
1700000
trusted library allocation
page execute and read and write
548C000
heap
page read and write
5489000
heap
page read and write
2D35000
trusted library allocation
page read and write
BC8000
heap
page read and write
3BC8000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
BD0000
heap
page read and write
9D6000
stack
page read and write
C24000
heap
page read and write
2D0C000
trusted library allocation
page read and write
B90000
trusted library allocation
page read and write
1740000
trusted library allocation
page read and write
24C2000
trusted library allocation
page read and write
890000
heap
page read and write
C6F000
heap
page read and write
2CC6000
trusted library allocation
page read and write
73D1F000
unkown
page readonly
2746000
trusted library allocation
page read and write
2865000
trusted library allocation
page read and write
5400000
heap
page read and write
1820000
trusted library allocation
page read and write
7753000
heap
page read and write
F23000
trusted library allocation
page execute and read and write
D83000
heap
page read and write
54B0000
trusted library allocation
page read and write
6CB0000
heap
page read and write
5327000
heap
page read and write
F52000
trusted library allocation
page read and write
474B000
stack
page read and write
5B49000
heap
page read and write
B30000
heap
page read and write
F72000
trusted library allocation
page read and write
4F3B000
trusted library allocation
page read and write
146D000
trusted library allocation
page execute and read and write
3779000
trusted library allocation
page read and write
1502000
heap
page read and write
71AE000
stack
page read and write
4BC2000
trusted library allocation
page read and write
C0E000
heap
page read and write
AFB000
stack
page read and write
5EC5000
heap
page read and write
2875000
trusted library allocation
page read and write
5BE4000
heap
page read and write
283C000
trusted library allocation
page read and write
BCA000
heap
page read and write
5ADD000
heap
page read and write
1170000
heap
page read and write
DF0000
heap
page read and write
24B6000
trusted library allocation
page execute and read and write
F4A000
trusted library allocation
page execute and read and write
702E000
stack
page read and write
5220000
heap
page execute and read and write
7EF70000
trusted library allocation
page execute and read and write
5610000
trusted library allocation
page execute and read and write
A83000
trusted library allocation
page execute and read and write
2CCC000
trusted library allocation
page read and write
C39000
heap
page read and write
870000
heap
page read and write
7630000
trusted library allocation
page read and write
5441000
heap
page read and write
283E000
trusted library allocation
page read and write
5310000
trusted library section
page readonly
27FC000
trusted library allocation
page read and write
59F0000
heap
page read and write
6442000
heap
page read and write
2CDF000
trusted library allocation
page read and write
1010000
heap
page read and write
7758000
heap
page read and write
1129000
stack
page read and write
C1D000
heap
page read and write
1038000
stack
page read and write
5430000
heap
page read and write
F66000
trusted library allocation
page execute and read and write
4BB1000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
73EE000
stack
page read and write
7A9E000
stack
page read and write
659A000
heap
page read and write
5A12000
heap
page read and write
148A000
trusted library allocation
page execute and read and write
C6D000
heap
page read and write
C40000
heap
page read and write
C2B000
heap
page read and write
7730000
trusted library allocation
page read and write
14E0000
heap
page read and write
C08000
heap
page read and write
F3D000
trusted library allocation
page execute and read and write
2D12000
trusted library allocation
page read and write
24A3000
trusted library allocation
page read and write
2D46000
trusted library allocation
page read and write
37CC000
trusted library allocation
page read and write
12D5000
heap
page read and write
E8E000
unkown
page read and write
5953000
heap
page read and write
5BDC000
heap
page read and write
50E3000
heap
page read and write
4BE0000
trusted library allocation
page read and write
728E000
stack
page read and write
F4D000
trusted library allocation
page execute and read and write
27CB000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
C34000
heap
page read and write
1730000
heap
page execute and read and write
30EF000
stack
page read and write
5110000
trusted library allocation
page read and write
55E0000
heap
page read and write
2A80000
trusted library allocation
page read and write
1788000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
1710000
trusted library allocation
page read and write
14CE000
heap
page read and write
C39000
heap
page read and write
516E000
stack
page read and write
C42000
unkown
page readonly
6417000
heap
page read and write
2D2F000
trusted library allocation
page read and write
4F00000
heap
page execute and read and write
7F1F0000
trusted library allocation
page execute and read and write
E40000
heap
page read and write
56F0000
trusted library allocation
page read and write
2B60000
heap
page read and write
6F2E000
stack
page read and write
27BE000
trusted library allocation
page read and write
2A90000
heap
page execute and read and write
3CDC000
trusted library allocation
page read and write
688000
stack
page read and write
7D2E000
stack
page read and write
5480000
heap
page read and write
8680000
trusted library allocation
page execute and read and write
C6C000
heap
page read and write
24E0000
trusted library allocation
page read and write
4D60000
heap
page read and write
7FAF000
stack
page read and write
95A0000
heap
page read and write
653C000
heap
page read and write
ECE000
stack
page read and write
5483000
heap
page read and write
717C000
stack
page read and write
BE5000
heap
page read and write
5570000
trusted library allocation
page read and write
BD1000
heap
page read and write
6EE0000
trusted library allocation
page read and write
27F4000
trusted library allocation
page read and write
1040000
heap
page read and write
5AFE000
stack
page read and write
37A2000
trusted library allocation
page read and write
C11000
heap
page read and write
C33000
heap
page read and write
7660000
trusted library allocation
page execute and read and write
2AD2000
trusted library allocation
page read and write
2D19000
trusted library allocation
page read and write
27EC000
trusted library allocation
page read and write
5943000
heap
page read and write
C39000
heap
page read and write
6524000
heap
page read and write
2D29000
trusted library allocation
page read and write
155C000
heap
page read and write
52F0000
trusted library allocation
page read and write
50D0000
trusted library allocation
page execute and read and write
2D66000
trusted library allocation
page read and write
F2D000
trusted library allocation
page execute and read and write
27E8000
trusted library allocation
page read and write
2B10000
trusted library allocation
page read and write
5710000
trusted library allocation
page execute and read and write
5410000
trusted library section
page readonly
AB9000
heap
page read and write
5440000
heap
page read and write
F70000
trusted library allocation
page read and write
9AC000
heap
page read and write
DD5000
heap
page read and write
C21000
heap
page read and write
27D1000
trusted library allocation
page read and write
14F5000
heap
page read and write
5FB4000
heap
page read and write
BB8000
heap
page read and write
5C2D000
heap
page read and write
8650000
heap
page execute and read and write
4BE4000
trusted library allocation
page read and write
1480000
trusted library allocation
page read and write
2809000
trusted library allocation
page read and write
2D48000
trusted library allocation
page read and write
11CE000
stack
page read and write
5EB9000
heap
page read and write
529E000
stack
page read and write
4DCE000
stack
page read and write
6010000
trusted library allocation
page read and write
2ACD000
trusted library allocation
page read and write
5497000
heap
page read and write
6420000
heap
page read and write
5F32000
heap
page read and write
2D04000
trusted library allocation
page read and write
2D52000
trusted library allocation
page read and write
3742000
trusted library allocation
page read and write
C1D000
heap
page read and write
CE0000
heap
page read and write
37F5000
trusted library allocation
page read and write
BCA000
heap
page read and write
BD4000
heap
page read and write
55DF000
stack
page read and write
5C40000
trusted library allocation
page read and write
2D3E000
trusted library allocation
page read and write
2CD9000
trusted library allocation
page read and write
C3F000
heap
page read and write
BD1000
heap
page read and write
4C90000
trusted library allocation
page execute and read and write
C33000
heap
page read and write
85E0000
trusted library allocation
page execute and read and write
24AD000
trusted library allocation
page execute and read and write
7FD40000
trusted library allocation
page execute and read and write
2C9B000
trusted library allocation
page read and write
27DB000
trusted library allocation
page read and write
1000000
heap
page execute and read and write
4C88000
trusted library allocation
page read and write
F30000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
C24000
heap
page read and write
7F990000
trusted library allocation
page execute and read and write
2D1F000
trusted library allocation
page read and write
6EE2000
trusted library allocation
page read and write
C2A000
heap
page read and write
86EE000
stack
page read and write
1755000
trusted library allocation
page read and write
5E0000
heap
page read and write
D48000
heap
page read and write
4D90000
heap
page read and write
2B70000
heap
page read and write
C33000
heap
page read and write
2D39000
trusted library allocation
page read and write
590E000
stack
page read and write
37BE000
trusted library allocation
page read and write
BBB000
trusted library allocation
page execute and read and write
9C5000
heap
page read and write
74EE000
stack
page read and write
DF0000
heap
page read and write
BED000
heap
page read and write
2558000
trusted library allocation
page read and write
A80000
trusted library allocation
page read and write
528000
stack
page read and write
7030000
heap
page read and write
73D00000
unkown
page readonly
2782000
trusted library allocation
page read and write
C18000
heap
page read and write
6487000
heap
page read and write
A90000
heap
page read and write
2CF8000
trusted library allocation
page read and write
B90000
heap
page read and write
4C76000
trusted library allocation
page read and write
1110000
heap
page read and write
C27000
heap
page read and write
37E8000
trusted library allocation
page read and write
C0E000
heap
page read and write
2A70000
trusted library allocation
page read and write
29CC000
stack
page read and write
4C05000
trusted library allocation
page read and write
4F51000
trusted library allocation
page read and write
C36000
heap
page read and write
5130000
trusted library allocation
page execute and read and write
F40000
trusted library allocation
page read and write
278B000
trusted library allocation
page read and write
2750000
trusted library allocation
page read and write
5A3B000
stack
page read and write
BCA000
heap
page read and write
7120000
heap
page read and write
27BC000
trusted library allocation
page read and write
2D08000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
B8B000
heap
page read and write
4B90000
trusted library allocation
page read and write
2740000
trusted library allocation
page read and write
A84000
trusted library allocation
page read and write
C4B000
heap
page read and write
160E000
stack
page read and write
5FFD000
heap
page read and write
2493000
trusted library allocation
page execute and read and write
2C47000
trusted library allocation
page read and write
3B9E000
trusted library allocation
page read and write
5482000
heap
page read and write
8D9000
stack
page read and write
2490000
trusted library allocation
page read and write
2CD2000
trusted library allocation
page read and write
2D02000
trusted library allocation
page read and write
C4B000
heap
page read and write
2D85000
trusted library allocation
page read and write
24A0000
trusted library allocation
page read and write
C1F000
heap
page read and write
77F0000
trusted library allocation
page execute and read and write
270F000
stack
page read and write
F33000
trusted library allocation
page read and write
3D05000
trusted library allocation
page read and write
5B79000
heap
page read and write
58C0000
heap
page execute and read and write
59C0000
trusted library section
page readonly
5D50000
heap
page read and write
4BEE000
stack
page read and write
5B30000
heap
page read and write
BDB000
heap
page read and write
1500000
heap
page read and write
C30000
trusted library allocation
page execute and read and write
530E000
stack
page read and write
94A0000
heap
page read and write
13DE000
stack
page read and write
1760000
trusted library allocation
page read and write
2789000
trusted library allocation
page read and write
1229000
heap
page read and write
BA0000
trusted library allocation
page read and write
7357000
trusted library allocation
page read and write
548F000
heap
page read and write
1470000
heap
page read and write
4BAE000
trusted library allocation
page read and write
C49000
heap
page read and write
4C7D000
trusted library allocation
page read and write
988000
heap
page read and write
24B0000
trusted library allocation
page read and write
BBE000
stack
page read and write
F40000
trusted library allocation
page read and write
118E000
stack
page read and write
2838000
trusted library allocation
page read and write
5B20000
heap
page read and write
5000000
trusted library allocation
page read and write
54D0000
heap
page read and write
2D9B000
trusted library allocation
page read and write
5720000
heap
page read and write
2CE5000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
C0E000
heap
page read and write
5A8C000
heap
page read and write
29E0000
heap
page read and write
594D000
heap
page read and write
7242000
trusted library allocation
page read and write
C2C000
heap
page read and write
C36000
heap
page read and write
77A7000
heap
page read and write
5960000
trusted library allocation
page read and write
C40000
heap
page read and write
9D0000
heap
page read and write
27EE000
trusted library allocation
page read and write
5DE000
stack
page read and write
4F70000
trusted library allocation
page read and write
3771000
trusted library allocation
page read and write
2D4E000
trusted library allocation
page read and write
5C1B000
stack
page read and write
5495000
heap
page read and write
BB5000
heap
page read and write
D20000
heap
page read and write
CB5000
heap
page read and write
590000
heap
page read and write
72B0000
trusted library allocation
page read and write
281F000
trusted library allocation
page read and write
2C81000
trusted library allocation
page read and write
4C70000
heap
page read and write
C2C000
heap
page read and write
AC4000
heap
page read and write
2A86000
trusted library allocation
page read and write
5A94000
heap
page read and write
B80000
heap
page read and write
1454000
trusted library allocation
page read and write
5CC0000
trusted library section
page readonly
16FE000
stack
page read and write
5D4E000
stack
page read and write
7C20000
trusted library allocation
page read and write
B37000
stack
page read and write
BDB000
heap
page read and write
5497000
heap
page read and write
D40000
heap
page read and write
638E000
stack
page read and write
C33000
heap
page read and write
27D5000
trusted library allocation
page read and write
64BC000
heap
page read and write
27B4000
trusted library allocation
page read and write
73D1D000
unkown
page read and write
ACE000
heap
page read and write
1497000
trusted library allocation
page execute and read and write
2AC1000
trusted library allocation
page read and write
656F000
heap
page read and write
2800000
trusted library allocation
page read and write
2832000
trusted library allocation
page read and write
6F8E000
stack
page read and write
5496000
heap
page read and write
CB0000
heap
page read and write
4F30000
trusted library allocation
page read and write
27E6000
trusted library allocation
page read and write
7F480000
trusted library allocation
page execute and read and write
C12000
heap
page read and write
BEF000
heap
page read and write
FEE000
stack
page read and write
4F50000
trusted library allocation
page execute and read and write
BD4000
heap
page read and write
65A2000
heap
page read and write
D4E000
stack
page read and write
F53000
trusted library allocation
page read and write
484C000
stack
page read and write
2D95000
trusted library allocation
page read and write
3C81000
trusted library allocation
page read and write
C13000
heap
page read and write
EF0000
heap
page read and write
27DF000
trusted library allocation
page read and write
2D06000
trusted library allocation
page read and write
E50000
heap
page read and write
709F000
stack
page read and write
C7E000
heap
page read and write
25F0000
trusted library allocation
page read and write
4C82000
trusted library allocation
page read and write
7350000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page read and write
1492000
trusted library allocation
page read and write
5591000
trusted library allocation
page read and write
490C000
stack
page read and write
2CD7000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
14B0000
trusted library allocation
page read and write
C19000
heap
page read and write
FF0000
trusted library allocation
page execute and read and write
5847000
heap
page read and write
2D44000
trusted library allocation
page read and write
3711000
trusted library allocation
page read and write
5B61000
heap
page read and write
C40000
unkown
page readonly
C1D000
heap
page read and write
2D27000
trusted library allocation
page read and write
C1F000
heap
page read and write
2CE1000
trusted library allocation
page read and write
CC0000
heap
page read and write
1720000
trusted library allocation
page read and write
27FE000
trusted library allocation
page read and write
571E000
stack
page read and write
BD4000
heap
page read and write
12B0000
heap
page read and write
4C80000
trusted library allocation
page read and write
C1B000
heap
page read and write
F80000
heap
page read and write
7860000
trusted library allocation
page execute and read and write
BD8000
heap
page read and write
2D25000
trusted library allocation
page read and write
AF4000
stack
page read and write
A70000
trusted library allocation
page read and write
27D9000
trusted library allocation
page read and write
77C0000
heap
page execute and read and write
C2C000
heap
page read and write
9E5000
heap
page read and write
4F62000
trusted library allocation
page read and write
C0F000
heap
page read and write
C30000
heap
page read and write
BB2000
trusted library allocation
page read and write
A29000
heap
page read and write
585C000
stack
page read and write
104C000
heap
page read and write
1500000
heap
page read and write
2805000
trusted library allocation
page read and write
280B000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
2C7F000
stack
page read and write
25EE000
stack
page read and write
BA0000
heap
page read and write
4CA0000
trusted library allocation
page read and write
7260000
trusted library allocation
page execute and read and write
5600000
trusted library allocation
page read and write
E23000
heap
page read and write
B7E000
stack
page read and write
2821000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
129E000
stack
page read and write
C90000
heap
page read and write
6DDE000
stack
page read and write
2CF6000
trusted library allocation
page read and write
5A0F000
heap
page read and write
1047000
heap
page read and write
4B9B000
trusted library allocation
page read and write
BCB000
heap
page read and write
4C30000
trusted library allocation
page read and write
14C0000
heap
page read and write
C1F000
heap
page read and write
BA6000
trusted library allocation
page execute and read and write
5481000
heap
page read and write
BED000
heap
page read and write
27C5000
trusted library allocation
page read and write
558E000
trusted library allocation
page read and write
5487000
heap
page read and write
254E000
stack
page read and write
4F4E000
trusted library allocation
page read and write
1090000
heap
page read and write
510E000
stack
page read and write
7230000
heap
page execute and read and write
7240000
trusted library allocation
page read and write
73D1D000
unkown
page read and write
26EF000
stack
page read and write
4F40000
trusted library allocation
page read and write
B94000
heap
page read and write
4D10000
trusted library allocation
page read and write
2842000
trusted library allocation
page read and write
9C7000
heap
page read and write
F60000
trusted library allocation
page read and write
5CD0000
heap
page read and write
73D01000
unkown
page execute read
2D31000
trusted library allocation
page read and write
7923000
trusted library allocation
page read and write
C08000
heap
page read and write
3CB2000
trusted library allocation
page read and write
D3E000
unkown
page readonly
1220000
heap
page read and write
2D2D000
trusted library allocation
page read and write
3214000
trusted library allocation
page read and write
5330000
heap
page read and write
1486000
trusted library allocation
page execute and read and write
561E000
stack
page read and write
C30000
heap
page read and write
4D70000
trusted library allocation
page read and write
27C0000
trusted library allocation
page read and write
12D0000
heap
page read and write
5180000
heap
page read and write
591D000
heap
page read and write
2CED000
trusted library allocation
page read and write
72AE000
stack
page read and write
C7E000
heap
page read and write
F5B000
trusted library allocation
page execute and read and write
AFE000
stack
page read and write
E26000
heap
page read and write
BD5000
heap
page read and write
4C5B000
trusted library allocation
page read and write
2AF5000
trusted library allocation
page read and write
3D58000
trusted library allocation
page read and write
3C89000
trusted library allocation
page read and write
C2A000
heap
page read and write
5487000
heap
page read and write
4D7C000
stack
page read and write
2825000
trusted library allocation
page read and write
C24000
heap
page read and write
7727000
trusted library allocation
page read and write
C20000
heap
page read and write
520E000
stack
page read and write
C1D000
heap
page read and write
1460000
trusted library allocation
page read and write
6410000
heap
page read and write
73D1D000
unkown
page read and write
8940000
heap
page execute and read and write
1572000
heap
page read and write
2830000
trusted library allocation
page read and write
553F000
stack
page read and write
F57000
trusted library allocation
page execute and read and write
4FF0000
heap
page read and write
C10000
heap
page read and write
288B000
trusted library allocation
page read and write
5723000
heap
page read and write
C76000
heap
page read and write
27FA000
trusted library allocation
page read and write
9AA000
heap
page read and write
2827000
trusted library allocation
page read and write
BB7000
trusted library allocation
page execute and read and write
249D000
trusted library allocation
page execute and read and write
D9E000
stack
page read and write
2836000
trusted library allocation
page read and write
40F1000
trusted library allocation
page read and write
799E000
stack
page read and write
BED000
heap
page read and write
2760000
heap
page execute and read and write
27D3000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
2823000
trusted library allocation
page read and write
BD3000
heap
page read and write
7ADE000
stack
page read and write
6562000
heap
page read and write
51F0000
trusted library allocation
page read and write
281B000
trusted library allocation
page read and write
F24000
trusted library allocation
page read and write
5F47000
heap
page read and write
656B000
heap
page read and write
59D0000
heap
page read and write
F62000
trusted library allocation
page read and write
1463000
trusted library allocation
page read and write
120C000
stack
page read and write
C2E000
stack
page read and write
1770000
heap
page read and write
C1D000
heap
page read and write
9BA000
heap
page read and write
4C95000
trusted library allocation
page read and write
1840000
heap
page read and write
5CCE000
stack
page read and write
522C000
stack
page read and write
2771000
trusted library allocation
page read and write
3811000
trusted library allocation
page read and write
27C9000
trusted library allocation
page read and write
EDB000
heap
page read and write
D4E000
heap
page read and write
95DE000
heap
page read and write
4DD0000
heap
page read and write
55F0000
heap
page read and write
5489000
heap
page read and write
27BA000
trusted library allocation
page read and write
738E000
stack
page read and write
7130000
trusted library allocation
page read and write
272C000
stack
page read and write
2CE3000
trusted library allocation
page read and write
2D40000
trusted library allocation
page read and write
C20000
heap
page read and write
C4B000
heap
page read and write
4C90000
trusted library allocation
page read and write
9E0000
heap
page read and write
5B3E000
stack
page read and write
108E000
stack
page read and write
D55000
heap
page read and write
BAA000
trusted library allocation
page execute and read and write
27F2000
trusted library allocation
page read and write
16BE000
stack
page read and write
7620000
trusted library allocation
page read and write
BC9000
heap
page read and write
73D1D000
unkown
page read and write
2CFE000
trusted library allocation
page read and write
80EC000
stack
page read and write
970000
trusted library allocation
page read and write
7CB000
stack
page read and write
4BD0000
heap
page read and write
7760000
heap
page read and write
BCB000
heap
page read and write
5497000
heap
page read and write
3AF1000
trusted library allocation
page read and write
B7D000
unkown
page read and write
4BD3000
heap
page read and write
2AE0000
trusted library allocation
page read and write
720C000
stack
page read and write
2C92000
trusted library allocation
page read and write
5EBC000
heap
page read and write
2815000
trusted library allocation
page read and write
6D60000
heap
page read and write
2D2B000
trusted library allocation
page read and write
716E000
stack
page read and write
2834000
trusted library allocation
page read and write
A38000
stack
page read and write
4C50000
trusted library allocation
page read and write
24BA000
trusted library allocation
page execute and read and write
2CDD000
trusted library allocation
page read and write
F44000
trusted library allocation
page read and write
2AC6000
trusted library allocation
page read and write
4C10000
trusted library allocation
page read and write
5F0E000
stack
page read and write
C6C000
heap
page read and write
6E8E000
stack
page read and write
3B75000
trusted library allocation
page read and write
DDE000
stack
page read and write
C39000
heap
page read and write
787000
stack
page read and write
2CFC000
trusted library allocation
page read and write
5420000
heap
page read and write
2D17000
trusted library allocation
page read and write
766E000
stack
page read and write
5BD8000
heap
page read and write
52A0000
heap
page read and write
2D1B000
trusted library allocation
page read and write
C28000
heap
page read and write
7796000
heap
page read and write
5F77000
heap
page read and write
1250000
heap
page read and write
559D000
trusted library allocation
page read and write
4C20000
trusted library allocation
page read and write
C30000
heap
page read and write
27B6000
trusted library allocation
page read and write
27DD000
trusted library allocation
page read and write
2802000
trusted library allocation
page read and write
5F2F000
heap
page read and write
2B00000
trusted library allocation
page read and write
6D50000
heap
page read and write
5EB0000
heap
page read and write
5150000
heap
page execute and read and write
B80000
heap
page read and write
D30000
trusted library allocation
page read and write
8A30000
trusted library allocation
page execute and read and write
C21000
heap
page read and write
4F85000
trusted library allocation
page read and write
5C16000
heap
page read and write
C6F000
heap
page read and write
6F92000
trusted library allocation
page read and write
C15000
heap
page read and write
C0E000
heap
page read and write
5B8A000
heap
page read and write
7920000
trusted library allocation
page read and write
583B000
stack
page read and write
C26000
heap
page read and write
27C7000
trusted library allocation
page read and write
2CE7000
trusted library allocation
page read and write
512B000
stack
page read and write
2CE9000
trusted library allocation
page read and write
2CDB000
trusted library allocation
page read and write
5840000
heap
page read and write
2CFA000
trusted library allocation
page read and write
2CEB000
trusted library allocation
page read and write
9B5000
heap
page read and write
110E000
stack
page read and write
4F57000
trusted library allocation
page read and write
752E000
stack
page read and write
7130000
heap
page read and write
B56000
heap
page read and write
706E000
stack
page read and write
5650000
heap
page read and write
DC2000
heap
page read and write
73AE000
stack
page read and write
F77000
trusted library allocation
page execute and read and write
AEE000
stack
page read and write
F5D000
trusted library allocation
page execute and read and write
2D33000
trusted library allocation
page read and write
5008000
trusted library allocation
page read and write
BDB000
heap
page read and write
BD6000
heap
page read and write
24C7000
trusted library allocation
page execute and read and write
95E1000
heap
page read and write
50C8000
trusted library allocation
page read and write
27D7000
trusted library allocation
page read and write
2D42000
trusted library allocation
page read and write
2A84000
trusted library allocation
page read and write
2CEF000
trusted library allocation
page read and write
BDA000
heap
page read and write
27CF000
trusted library allocation
page read and write
E19000
heap
page read and write
There are 971 hidden memdumps, click here to show them.