IOC Report
z51NEWPO.exe

loading gif

Files

File Path
Type
Category
Malicious
z51NEWPO.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\directory\name.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\cunili
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\z51NEWPO.exe
"C:\Users\user\Desktop\z51NEWPO.exe"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\Desktop\z51NEWPO.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\z51NEWPO.exe"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious

URLs

Name
IP
Malicious
https://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org/xml/8.46.123.33l
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.org/
158.101.44.242
http://checkip.dyndns.com
unknown
http://crl.micro
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://api.telegram.org/bot-/sendDocument?chat_id=
unknown
http://checkip.dyndns.org/q
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
158.101.44.242

IPs

IP
Domain
Country
Malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
158.101.44.242
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5860000
trusted library section
page read and write
malicious
41E1000
trusted library allocation
page read and write
malicious
2E80000
heap
page read and write
malicious
3160000
trusted library section
page read and write
malicious
3E89000
heap
page read and write
3FE2000
heap
page read and write
31FE000
trusted library allocation
page read and write
3E35000
heap
page read and write
46FD000
direct allocation
page read and write
3FE2000
heap
page read and write
1342000
heap
page read and write
A3E000
stack
page read and write
3E35000
heap
page read and write
6950000
trusted library allocation
page read and write
693E000
stack
page read and write
2C9D000
trusted library allocation
page execute and read and write
5A65000
heap
page read and write
3EE9000
heap
page read and write
3234000
trusted library allocation
page read and write
3EB0000
heap
page read and write
2FF0000
heap
page read and write
400000
unkown
page readonly
65BE000
stack
page read and write
3D40000
heap
page read and write
4AB000
unkown
page readonly
2CAD000
trusted library allocation
page execute and read and write
1264000
heap
page read and write
188AD890000
heap
page read and write
3225000
trusted library allocation
page read and write
9F0000
heap
page read and write
31E7000
trusted library allocation
page read and write
3E91000
heap
page read and write
490000
unkown
page read and write
3EE9000
heap
page read and write
8FE000
stack
page read and write
3F01000
heap
page read and write
3E35000
heap
page read and write
6E90000
heap
page read and write
8AF000
stack
page read and write
3024000
heap
page read and write
3DAB000
heap
page read and write
3EA8000
heap
page read and write
12A0000
trusted library allocation
page read and write
3F12000
heap
page read and write
6950000
trusted library allocation
page read and write
2FAE000
stack
page read and write
32CD000
trusted library allocation
page read and write
3DAB000
heap
page read and write
300D000
stack
page read and write
3FE2000
heap
page read and write
592D000
stack
page read and write
3EE9000
heap
page read and write
3F69000
heap
page read and write
2DE0000
trusted library allocation
page read and write
2DFD000
trusted library allocation
page execute and read and write
AEC000
heap
page read and write
323B000
trusted library allocation
page read and write
5D0D000
stack
page read and write
335E000
trusted library allocation
page read and write
3301000
trusted library allocation
page read and write
3D99000
heap
page read and write
3D9B000
heap
page read and write
45B0000
direct allocation
page read and write
3B90000
heap
page read and write
3203000
trusted library allocation
page read and write
3F32000
heap
page read and write
3FA2000
heap
page read and write
1260000
heap
page read and write
3AF0000
heap
page read and write
3F32000
heap
page read and write
11C1000
heap
page read and write
3F32000
heap
page read and write
2DF0000
trusted library allocation
page read and write
3E71000
heap
page read and write
4AB000
unkown
page readonly
3F11000
heap
page read and write
378E000
stack
page read and write
3F32000
heap
page read and write
339B000
trusted library allocation
page read and write
3F79000
heap
page read and write
4325000
heap
page read and write
3D9B000
heap
page read and write
45D0000
direct allocation
page read and write
3D9B000
heap
page read and write
970000
heap
page read and write
3EA8000
heap
page read and write
2E30000
heap
page read and write
320E000
trusted library allocation
page read and write
32AF000
trusted library allocation
page read and write
321B000
trusted library allocation
page read and write
476E000
direct allocation
page read and write
4490000
direct allocation
page read and write
3E70000
heap
page read and write
31C6000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
3D9B000
heap
page read and write
41F1000
trusted library allocation
page read and write
3332000
trusted library allocation
page read and write
666F000
stack
page read and write
990000
heap
page read and write
45B3000
direct allocation
page read and write
89F000
stack
page read and write
4307000
heap
page read and write
A40000
heap
page read and write
4630000
direct allocation
page read and write
135F000
stack
page read and write
1E0000
heap
page read and write
37AA000
heap
page read and write
5D6D000
stack
page read and write
3C90000
heap
page read and write
3EA8000
heap
page read and write
39AF000
stack
page read and write
3D78000
heap
page read and write
31AE000
stack
page read and write
3B6F000
heap
page read and write
89F000
stack
page read and write
2FC0000
heap
page read and write
3319000
trusted library allocation
page read and write
3F32000
heap
page read and write
3257000
trusted library allocation
page read and write
A7A000
heap
page read and write
6980000
trusted library allocation
page execute and read and write
425D000
trusted library allocation
page read and write
66FE000
stack
page read and write
3053000
heap
page read and write
3FE2000
heap
page read and write
58B0000
trusted library allocation
page execute and read and write
2E2B000
trusted library allocation
page execute and read and write
3395000
trusted library allocation
page read and write
3F12000
heap
page read and write
3D62000
heap
page read and write
5DC5000
trusted library allocation
page read and write
3EE9000
heap
page read and write
A00000
heap
page read and write
3F40000
heap
page read and write
3070000
direct allocation
page read and write
3150000
heap
page execute and read and write
3EE9000
heap
page read and write
69F0000
heap
page read and write
1130000
heap
page read and write
900000
heap
page read and write
2B00000
heap
page read and write
3215000
trusted library allocation
page read and write
188ADAA0000
heap
page read and write
3F12000
heap
page read and write
3DAB000
heap
page read and write
3FA2000
heap
page read and write
3FA2000
heap
page read and write
421E000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page read and write
537D000
stack
page read and write
5D60000
trusted library allocation
page read and write
3EA8000
heap
page read and write
67E0000
trusted library allocation
page execute and read and write
12755FD000
stack
page read and write
647E000
stack
page read and write
3C0F000
heap
page read and write
490000
unkown
page write copy
AA0000
heap
page read and write
42DC000
trusted library allocation
page read and write
3F01000
heap
page read and write
475D000
direct allocation
page read and write
3BEA000
heap
page read and write
3E35000
heap
page read and write
ABE000
heap
page read and write
3247000
trusted library allocation
page read and write
1274FFE000
stack
page read and write
3345000
trusted library allocation
page read and write
2C54000
heap
page read and write
940000
heap
page read and write
584D000
trusted library allocation
page read and write
5D52000
trusted library allocation
page read and write
3F32000
heap
page read and write
482000
unkown
page readonly
39B1000
heap
page read and write
4759000
direct allocation
page read and write
3213000
trusted library allocation
page read and write
323E000
trusted library allocation
page read and write
3DAB000
heap
page read and write
490000
unkown
page write copy
46D9000
direct allocation
page read and write
402000
system
page execute and read and write
3F79000
heap
page read and write
6B00000
trusted library allocation
page execute and read and write
AAA000
heap
page read and write
AEB000
heap
page read and write
476E000
direct allocation
page read and write
3217000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
188AD906000
heap
page read and write
3030000
direct allocation
page read and write
3EE9000
heap
page read and write
4533000
direct allocation
page read and write
1D0000
heap
page read and write
3E35000
heap
page read and write
130000
heap
page read and write
3FE2000
heap
page read and write
476E000
direct allocation
page read and write
3E35000
heap
page read and write
401000
unkown
page execute read
3F59000
heap
page read and write
3DAB000
heap
page read and write
3D9B000
heap
page read and write
474E000
direct allocation
page read and write
3EA0000
heap
page read and write
3EB6000
heap
page read and write
3EE9000
heap
page read and write
11A5000
heap
page read and write
3E81000
heap
page read and write
3F79000
heap
page read and write
400000
system
page execute and read and write
3EF7000
heap
page read and write
3EA8000
heap
page read and write
4AB000
unkown
page readonly
3DAB000
heap
page read and write
3D5C000
heap
page read and write
3DEA000
heap
page read and write
960000
heap
page read and write
3F32000
heap
page read and write
3F32000
heap
page read and write
401000
unkown
page execute read
3F22000
heap
page read and write
475D000
direct allocation
page read and write
46F9000
direct allocation
page read and write
3EA8000
heap
page read and write
57EE000
trusted library allocation
page read and write
3DAB000
heap
page read and write
4400000
direct allocation
page read and write
46FD000
direct allocation
page read and write
3FE2000
heap
page read and write
3DAB000
heap
page read and write
4A7000
unkown
page read and write
3F12000
heap
page read and write
32BC000
trusted library allocation
page read and write
3E79000
heap
page read and write
3E35000
heap
page read and write
3236000
trusted library allocation
page read and write
1E0000
heap
page read and write
474E000
direct allocation
page read and write
67FF000
stack
page read and write
45D0000
direct allocation
page read and write
2CC2000
trusted library allocation
page read and write
46F9000
direct allocation
page read and write
6850000
heap
page read and write
4AB000
unkown
page readonly
379E000
stack
page read and write
9A000
stack
page read and write
656E000
stack
page read and write
3224000
trusted library allocation
page read and write
1314000
heap
page read and write
137E000
heap
page read and write
2C50000
heap
page read and write
3EA8000
heap
page read and write
3EE9000
heap
page read and write
3309000
trusted library allocation
page read and write
3FE2000
heap
page read and write
2E25000
trusted library allocation
page execute and read and write
400000
unkown
page readonly
12756FE000
stack
page read and write
3DAB000
heap
page read and write
3F12000
heap
page read and write
3F41000
heap
page read and write
3FA2000
heap
page read and write
3327000
trusted library allocation
page read and write
583A000
trusted library allocation
page read and write
3E90000
heap
page read and write
ABA000
heap
page read and write
400000
unkown
page readonly
1C0000
heap
page read and write
31D0000
heap
page read and write
11B0000
heap
page read and write
3EC0000
heap
page read and write
401000
unkown
page execute read
3D9B000
heap
page read and write
3D27000
heap
page read and write
4AB000
unkown
page readonly
AE1000
heap
page read and write
188AD91D000
heap
page read and write
5DC0000
trusted library allocation
page read and write
4496000
direct allocation
page read and write
12AE000
stack
page read and write
3F40000
heap
page read and write
3DAB000
heap
page read and write
3E35000
heap
page read and write
B68000
heap
page read and write
31FC000
trusted library allocation
page read and write
1190000
heap
page read and write
3D9B000
heap
page read and write
5998000
heap
page read and write
476E000
direct allocation
page read and write
2E1A000
trusted library allocation
page execute and read and write
2EAE000
heap
page read and write
3230000
trusted library allocation
page read and write
4553000
direct allocation
page read and write
3DAB000
heap
page read and write
3D9B000
heap
page read and write
434F000
heap
page read and write
3F12000
heap
page read and write
311E000
stack
page read and write
3E1A000
heap
page read and write
3E35000
heap
page read and write
3EA8000
heap
page read and write
4490000
direct allocation
page read and write
188AD934000
heap
page read and write
A04000
heap
page read and write
3EA8000
heap
page read and write
32F8000
trusted library allocation
page read and write
3249000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
3FE2000
heap
page read and write
5A50000
heap
page read and write
331C000
trusted library allocation
page read and write
46FD000
direct allocation
page read and write
42CA000
trusted library allocation
page read and write
57BE000
stack
page read and write
1290000
heap
page read and write
490000
unkown
page read and write
3FA2000
heap
page read and write
46FD000
direct allocation
page read and write
3D9E000
heap
page read and write
3F00000
heap
page read and write
3E71000
heap
page read and write
3994000
heap
page read and write
A70000
heap
page read and write
1180000
heap
page read and write
47CE000
direct allocation
page read and write
3B8E000
heap
page read and write
3D9B000
heap
page read and write
47CE000
direct allocation
page read and write
3E35000
heap
page read and write
3F2E000
heap
page read and write
6959000
trusted library allocation
page read and write
4430000
direct allocation
page read and write
3EE9000
heap
page read and write
31AE000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
3FA2000
heap
page read and write
3FA2000
heap
page read and write
3FE1000
heap
page read and write
4430000
direct allocation
page read and write
5D56000
trusted library allocation
page read and write
3EE9000
heap
page read and write
3D4E000
heap
page read and write
AEB000
heap
page read and write
3221000
trusted library allocation
page read and write
A10000
heap
page read and write
9E0000
heap
page read and write
3D9B000
heap
page read and write
3FE2000
heap
page read and write
188AD8A0000
heap
page read and write
3EE9000
heap
page read and write
32AC000
trusted library allocation
page read and write
3EB5000
heap
page read and write
3FE2000
heap
page read and write
44A5000
direct allocation
page read and write
185000
heap
page read and write
4AB000
unkown
page readonly
490000
unkown
page read and write
2FB0000
trusted library allocation
page execute and read and write
31F1000
trusted library allocation
page read and write
5841000
trusted library allocation
page read and write
126F000
stack
page read and write
401000
unkown
page execute read
3D9B000
heap
page read and write
2CA0000
trusted library allocation
page read and write
47CE000
direct allocation
page read and write
3FA2000
heap
page read and write
3094000
heap
page read and write
32BF000
trusted library allocation
page read and write
3F32000
heap
page read and write
3223000
trusted library allocation
page read and write
95E000
stack
page read and write
322B000
trusted library allocation
page read and write
3EA8000
heap
page read and write
67B0000
trusted library allocation
page read and write
3E0C000
heap
page read and write
3DAB000
heap
page read and write
3F12000
heap
page read and write
3F12000
heap
page read and write
188AD8D0000
heap
page read and write
538E000
stack
page read and write
2C93000
trusted library allocation
page execute and read and write
3DB9000
heap
page read and write
4279000
trusted library allocation
page read and write
5D6C000
trusted library allocation
page read and write
3234000
trusted library allocation
page read and write
3F31000
heap
page read and write
12753FE000
stack
page read and write
3EA8000
heap
page read and write
3D9B000
heap
page read and write
2FC0000
trusted library allocation
page read and write
3DAB000
heap
page read and write
1355000
heap
page read and write
3EA8000
heap
page read and write
3FA2000
heap
page read and write
1E0000
heap
page read and write
2CB0000
trusted library allocation
page read and write
400000
unkown
page readonly
3E79000
heap
page read and write
166E000
stack
page read and write
3ED2000
heap
page read and write
3EE9000
heap
page read and write
476E000
direct allocation
page read and write
3213000
trusted library allocation
page read and write
3F42000
heap
page read and write
434D000
heap
page read and write
89F000
stack
page read and write
3120000
trusted library allocation
page read and write
10F7000
stack
page read and write
188ADC75000
heap
page read and write
3D9B000
heap
page read and write
335E000
trusted library allocation
page read and write
3FA2000
heap
page read and write
17E000
stack
page read and write
3240000
trusted library allocation
page read and write
8AF000
stack
page read and write
429E000
heap
page read and write
657F000
stack
page read and write
401000
unkown
page execute read
3DAF000
heap
page read and write
3FE2000
heap
page read and write
3EE9000
heap
page read and write
3E81000
heap
page read and write
2CC5000
trusted library allocation
page execute and read and write
482000
unkown
page readonly
5D70000
trusted library allocation
page execute and read and write
1137000
stack
page read and write
3E35000
heap
page read and write
3EA8000
heap
page read and write
3204000
trusted library allocation
page read and write
476E000
direct allocation
page read and write
31BA000
trusted library allocation
page read and write
4410000
direct allocation
page read and write
6960000
trusted library allocation
page execute and read and write
3EE9000
heap
page read and write
59F0000
heap
page read and write
2EC0000
heap
page read and write
A20000
heap
page read and write
3C00000
heap
page read and write
2CD0000
heap
page read and write
358E000
stack
page read and write
67C0000
trusted library allocation
page execute and read and write
46F9000
direct allocation
page read and write
1180000
heap
page read and write
3EA8000
heap
page read and write
3E35000
heap
page read and write
4A7000
unkown
page read and write
3F32000
heap
page read and write
3EE9000
heap
page read and write
67BF000
trusted library allocation
page read and write
315E000
stack
page read and write
6990000
trusted library allocation
page read and write
3D9B000
heap
page read and write
3EA8000
heap
page read and write
3F12000
heap
page read and write
AA3000
heap
page read and write
5940000
trusted library allocation
page read and write
3D53000
heap
page read and write
4430000
direct allocation
page read and write
3D9B000
heap
page read and write
11EC000
heap
page read and write
57E0000
trusted library allocation
page read and write
2CB6000
trusted library allocation
page execute and read and write
4410000
direct allocation
page read and write
475D000
direct allocation
page read and write
401000
unkown
page execute read
3DAB000
heap
page read and write
31B0000
trusted library allocation
page read and write
3207000
trusted library allocation
page read and write
46FD000
direct allocation
page read and write
11E8000
heap
page read and write
304E000
stack
page read and write
3EA8000
heap
page read and write
3FA2000
heap
page read and write
9A000
stack
page read and write
3DAB000
heap
page read and write
3FE2000
heap
page read and write
3F22000
heap
page read and write
3E35000
heap
page read and write
31F7000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page read and write
2E22000
trusted library allocation
page read and write
3E2D000
heap
page read and write
12750FE000
stack
page read and write
35AE000
stack
page read and write
3E35000
heap
page read and write
436000
system
page execute and read and write
3F59000
heap
page read and write
3380000
trusted library allocation
page read and write
AB8000
heap
page read and write
4533000
direct allocation
page read and write
482000
unkown
page readonly
426000
system
page execute and read and write
3D9B000
heap
page read and write
3DAA000
heap
page execute and read and write
3D82000
heap
page read and write
46F9000
direct allocation
page read and write
A7E000
heap
page read and write
3EA8000
heap
page read and write
5A17000
heap
page read and write
339F000
trusted library allocation
page read and write
3F32000
heap
page read and write
9DE000
stack
page read and write
3E01000
heap
page read and write
4553000
direct allocation
page read and write
431F000
heap
page read and write
3F32000
heap
page read and write
3C69000
heap
page read and write
3249000
trusted library allocation
page read and write
3EA8000
heap
page read and write
3EA7000
heap
page execute and read and write
2CB2000
trusted library allocation
page read and write
3F22000
heap
page read and write
4553000
direct allocation
page read and write
120B000
heap
page read and write
67D0000
trusted library allocation
page read and write
31F8000
trusted library allocation
page read and write
135000
heap
page read and write
3229000
trusted library allocation
page read and write
3E35000
heap
page read and write
16AF000
stack
page read and write
100000
heap
page read and write
3E9B000
heap
page read and write
3F32000
heap
page read and write
3B01000
heap
page read and write
2D40000
heap
page read and write
401000
system
page execute and read and write
3D9B000
heap
page read and write
3F22000
heap
page read and write
5A00000
heap
page read and write
3045000
heap
page read and write
B60000
heap
page read and write
3EE9000
heap
page read and write
3365000
trusted library allocation
page read and write
3FA2000
heap
page read and write
45D0000
direct allocation
page read and write
3EE9000
heap
page read and write
3E35000
heap
page read and write
3050000
heap
page read and write
3D43000
heap
page read and write
45B3000
direct allocation
page read and write
642F000
stack
page read and write
322D000
trusted library allocation
page read and write
980000
heap
page read and write
3D02000
heap
page read and write
12E0000
heap
page read and write
47CE000
direct allocation
page read and write
3F22000
heap
page read and write
5CCE000
stack
page read and write
AD7000
heap
page read and write
1290000
heap
page read and write
9CE000
stack
page read and write
31E1000
trusted library allocation
page read and write
5DB6000
trusted library allocation
page read and write
3E35000
heap
page read and write
3DCD000
heap
page read and write
3D9B000
heap
page read and write
3E35000
heap
page read and write
3244000
trusted library allocation
page read and write
A70000
heap
page read and write
3F22000
heap
page read and write
3C2E000
heap
page read and write
3F21000
heap
page read and write
4AB000
unkown
page readonly
2DF3000
trusted library allocation
page execute and read and write
490000
unkown
page write copy
3F32000
heap
page read and write
188ADC7E000
heap
page read and write
4759000
direct allocation
page read and write
3FA2000
heap
page read and write
100000
heap
page read and write
3F32000
heap
page read and write
8FE000
stack
page read and write
45B0000
direct allocation
page read and write
67B4000
trusted library allocation
page read and write
32B4000
trusted library allocation
page read and write
9A000
stack
page read and write
3FA2000
heap
page read and write
3F22000
heap
page read and write
490000
unkown
page read and write
990000
heap
page read and write
3F22000
heap
page read and write
695F000
trusted library allocation
page read and write
3F22000
heap
page read and write
3FA1000
heap
page read and write
31E0000
heap
page read and write
3F12000
heap
page read and write
131F000
heap
page read and write
6990000
heap
page read and write
476E000
direct allocation
page read and write
5DAE000
stack
page read and write
15E000
stack
page read and write
31BE000
trusted library allocation
page read and write
7000000
heap
page read and write
2CC0000
trusted library allocation
page read and write
45D0000
direct allocation
page read and write
5D2F000
stack
page read and write
57D6000
trusted library allocation
page read and write
9A000
stack
page read and write
3EE9000
heap
page read and write
2C94000
trusted library allocation
page read and write
3D9B000
heap
page read and write
3E35000
heap
page read and write
1350000
heap
page read and write
4490000
direct allocation
page read and write
2CCB000
trusted library allocation
page execute and read and write
3DAB000
heap
page read and write
3239000
trusted library allocation
page read and write
2D60000
heap
page read and write
9A000
stack
page read and write
103A000
stack
page read and write
45B3000
direct allocation
page read and write
3F12000
heap
page read and write
398F000
stack
page read and write
2FE0000
heap
page execute and read and write
4253000
trusted library allocation
page read and write
3DAB000
heap
page read and write
3EE9000
heap
page read and write
46FD000
direct allocation
page read and write
46DD000
direct allocation
page read and write
12EC000
heap
page read and write
3EA8000
heap
page read and write
32F4000
trusted library allocation
page read and write
4759000
direct allocation
page read and write
4290000
direct allocation
page read and write
45D0000
direct allocation
page read and write
4260000
trusted library allocation
page read and write
401000
unkown
page execute read
3F32000
heap
page read and write
3DF8000
heap
page read and write
32C0000
trusted library allocation
page read and write
9B6000
heap
page read and write
37DE000
stack
page read and write
12DF000
heap
page read and write
3F32000
heap
page read and write
31EC000
trusted library allocation
page read and write
A8E000
stack
page read and write
31F4000
trusted library allocation
page read and write
2E16000
trusted library allocation
page execute and read and write
3349000
trusted library allocation
page read and write
3F31000
heap
page read and write
475D000
direct allocation
page read and write
A25000
heap
page read and write
31C1000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
3190000
trusted library allocation
page read and write
3208000
trusted library allocation
page read and write
3CFF000
stack
page read and write
4553000
direct allocation
page read and write
12757FE000
stack
page read and write
3F22000
heap
page read and write
322C000
trusted library allocation
page read and write
3F32000
heap
page read and write
8FE000
stack
page read and write
3F32000
heap
page read and write
3FE2000
heap
page read and write
67F0000
trusted library allocation
page read and write
3F22000
heap
page read and write
3CB5000
heap
page read and write
16AF000
stack
page read and write
3040000
heap
page read and write
3EA8000
heap
page read and write
45D0000
direct allocation
page read and write
2E8F000
heap
page read and write
3DAB000
heap
page read and write
3D32000
heap
page read and write
100000
heap
page read and write
3F22000
heap
page read and write
31FC000
trusted library allocation
page read and write
3FE2000
heap
page read and write
4490000
direct allocation
page read and write
3FA2000
heap
page read and write
A3E000
stack
page read and write
12C0000
heap
page read and write
3F32000
heap
page read and write
5A77000
heap
page read and write
6B30000
heap
page read and write
2F20000
heap
page read and write
400000
unkown
page readonly
3AF1000
heap
page read and write
3291000
trusted library allocation
page read and write
1383000
heap
page read and write
160000
heap
page read and write
31B2000
trusted library allocation
page read and write
2C90000
trusted library allocation
page read and write
3D9B000
heap
page read and write
59D2000
heap
page read and write
3EE9000
heap
page read and write
3EB0000
heap
page read and write
12B8000
heap
page read and write
2E50000
trusted library allocation
page read and write
2CBA000
trusted library allocation
page execute and read and write
2E10000
heap
page read and write
3259000
trusted library allocation
page read and write
4299000
trusted library allocation
page read and write
3FE2000
heap
page read and write
100000
heap
page read and write
2E6F000
stack
page read and write
67AE000
stack
page read and write
400000
unkown
page readonly
46DD000
direct allocation
page read and write
3D00000
heap
page read and write
32B7000
trusted library allocation
page read and write
4630000
direct allocation
page read and write
4630000
direct allocation
page read and write
93E000
stack
page read and write
A6E000
stack
page read and write
31A6000
trusted library allocation
page read and write
3E48000
heap
page read and write
4AB000
unkown
page readonly
3DAB000
heap
page read and write
3F32000
heap
page read and write
3311000
trusted library allocation
page read and write
475D000
direct allocation
page read and write
9BA000
heap
page read and write
3DAB000
heap
page read and write
110000
heap
page read and write
4245000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
3DAB000
heap
page read and write
3AA0000
direct allocation
page read and write
31CD000
trusted library allocation
page read and write
2E03000
trusted library allocation
page read and write
4630000
direct allocation
page read and write
583E000
trusted library allocation
page read and write
123E000
stack
page read and write
3F41000
heap
page execute and read and write
3D9B000
heap
page read and write
3DAB000
heap
page read and write
320C000
trusted library allocation
page read and write
3F12000
heap
page read and write
3F12000
heap
page read and write
12AE000
stack
page read and write
401000
unkown
page execute read
138C000
heap
page read and write
2DF4000
trusted library allocation
page read and write
3315000
trusted library allocation
page read and write
3020000
heap
page read and write
2EE9000
heap
page read and write
1AE000
stack
page read and write
3F11000
heap
page read and write
12758FB000
stack
page read and write
32E8000
trusted library allocation
page read and write
32CA000
trusted library allocation
page read and write
1870000
heap
page read and write
2D50000
trusted library allocation
page execute and read and write
3EE9000
heap
page read and write
324F000
trusted library allocation
page read and write
320A000
trusted library allocation
page read and write
93E000
stack
page read and write
5D65000
trusted library allocation
page read and write
3010000
heap
page read and write
3FE2000
heap
page read and write
12B0000
heap
page read and write
482000
unkown
page readonly
3EA8000
heap
page read and write
3F12000
heap
page read and write
3227000
trusted library allocation
page read and write
118F000
stack
page read and write
3B00000
heap
page read and write
3206000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
490000
unkown
page write copy
9EE000
stack
page read and write
400000
unkown
page readonly
3FE2000
heap
page read and write
3F41000
heap
page read and write
46FD000
direct allocation
page read and write
3FE2000
heap
page read and write
3B8F000
stack
page read and write
32D0000
trusted library allocation
page read and write
3E35000
heap
page read and write
4289000
trusted library allocation
page read and write
3D9B000
heap
page read and write
180000
heap
page read and write
3EA8000
heap
page read and write
3DAB000
heap
page read and write
3F12000
heap
page read and write
490000
unkown
page write copy
AD4000
heap
page read and write
3F22000
heap
page read and write
4759000
direct allocation
page read and write
3A80000
direct allocation
page read and write
3247000
trusted library allocation
page read and write
4553000
direct allocation
page read and write
401000
unkown
page execute read
2E12000
trusted library allocation
page read and write
652F000
stack
page read and write
3E35000
heap
page read and write
3B9E000
heap
page read and write
3FE2000
heap
page read and write
3EE9000
heap
page read and write
5DCC000
trusted library allocation
page read and write
3D9B000
heap
page read and write
2B9E000
heap
page read and write
3FA2000
heap
page read and write
3DAB000
heap
page read and write
3F22000
heap
page read and write
482000
unkown
page readonly
401000
unkown
page execute read
3E35000
heap
page read and write
4430000
direct allocation
page read and write
3BDF000
stack
page read and write
328F000
trusted library allocation
page read and write
3F22000
heap
page read and write
3F12000
heap
page read and write
3DF9000
heap
page read and write
4288000
heap
page read and write
58E0000
trusted library allocation
page read and write
32DA000
trusted library allocation
page read and write
2D3E000
stack
page read and write
47CE000
direct allocation
page read and write
333B000
trusted library allocation
page read and write
3EB0000
heap
page read and write
4630000
direct allocation
page read and write
3D9B000
heap
page read and write
3F22000
heap
page read and write
695C000
trusted library allocation
page read and write
3CE4000
heap
page read and write
2CC7000
trusted library allocation
page execute and read and write
3370000
trusted library allocation
page read and write
3F12000
heap
page read and write
3E35000
heap
page read and write
4553000
direct allocation
page read and write
3EA8000
heap
page read and write
3D9B000
heap
page read and write
12752FF000
stack
page read and write
2B01000
heap
page read and write
3F19000
heap
page read and write
58CD000
stack
page read and write
100000
heap
page read and write
2E80000
heap
page read and write
3E2F000
heap
page read and write
3FE2000
heap
page read and write
4029000
heap
page read and write
3130000
heap
page read and write
3F32000
heap
page read and write
4A7000
unkown
page read and write
3E35000
heap
page read and write
3F45000
heap
page read and write
46F9000
direct allocation
page read and write
47CE000
direct allocation
page read and write
3D3F000
heap
page read and write
3090000
heap
page read and write
2F30000
heap
page read and write
3EEC000
heap
page read and write
B8E000
heap
page read and write
3F22000
heap
page read and write
4430000
direct allocation
page read and write
32BD000
trusted library allocation
page read and write
2B7F000
heap
page read and write
3F12000
heap
page read and write
3F12000
heap
page read and write
46FD000
direct allocation
page read and write
4759000
direct allocation
page read and write
46F9000
direct allocation
page read and write
3DEE000
heap
page read and write
58A0000
trusted library allocation
page read and write
2E60000
heap
page read and write
3F22000
heap
page read and write
3F12000
heap
page read and write
32CC000
trusted library allocation
page read and write
3FA2000
heap
page read and write
46F9000
direct allocation
page read and write
3B91000
heap
page read and write
3FA2000
heap
page read and write
2CA3000
trusted library allocation
page read and write
400000
unkown
page readonly
31F6000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
188ADC70000
heap
page read and write
482000
unkown
page readonly
3EA8000
heap
page read and write
683E000
stack
page read and write
46F9000
direct allocation
page read and write
4494000
direct allocation
page read and write
3E99000
heap
page read and write
57D4000
trusted library allocation
page read and write
B10000
heap
page read and write
3E42000
heap
page read and write
3E95000
heap
page read and write
975000
heap
page read and write
3C4F000
heap
page read and write
3EAC000
heap
page read and write
3304000
trusted library allocation
page read and write
188AD96E000
heap
page read and write
5826000
trusted library allocation
page read and write
3E80000
heap
page read and write
400000
unkown
page readonly
2FAD000
stack
page read and write
3EA8000
heap
page read and write
332B000
trusted library allocation
page read and write
1E0000
heap
page read and write
43A4000
heap
page read and write
AB0000
heap
page read and write
3EE9000
heap
page read and write
4430000
direct allocation
page read and write
32C4000
trusted library allocation
page read and write
3F32000
heap
page read and write
475D000
direct allocation
page read and write
A45000
heap
page read and write
5846000
trusted library allocation
page read and write
5D4D000
stack
page read and write
5810000
heap
page execute and read and write
3242000
trusted library allocation
page read and write
32C7000
trusted library allocation
page read and write
2E0D000
trusted library allocation
page execute and read and write
31D3000
heap
page read and write
3DAB000
heap
page read and write
3BF0000
heap
page read and write
45D0000
direct allocation
page read and write
3DAB000
heap
page read and write
3305000
trusted library allocation
page read and write
45B3000
direct allocation
page read and write
46D9000
direct allocation
page read and write
66BE000
stack
page read and write
3E35000
heap
page read and write
4269000
trusted library allocation
page read and write
3F32000
heap
page read and write
322E000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
139B000
heap
page read and write
1318000
heap
page read and write
3FA2000
heap
page read and write
3EE9000
heap
page read and write
323F000
trusted library allocation
page read and write
DC9000
stack
page read and write
3F12000
heap
page read and write
3FE2000
heap
page read and write
45D0000
direct allocation
page read and write
5840000
trusted library allocation
page read and write
3FA2000
heap
page read and write
3FA2000
heap
page read and write
3EA8000
heap
page read and write
3D9B000
heap
page read and write
422000
system
page execute and read and write
AE1000
heap
page read and write
3F22000
heap
page read and write
476E000
direct allocation
page read and write
3D9B000
heap
page read and write
4A7000
unkown
page read and write
66AE000
stack
page read and write
3EA8000
heap
page read and write
1274EFA000
stack
page read and write
6940000
trusted library allocation
page execute and read and write
1340000
trusted library section
page read and write
3EE9000
heap
page read and write
32DC000
trusted library allocation
page read and write
1188000
heap
page read and write
2E9E000
heap
page read and write
3F22000
heap
page read and write
945000
heap
page read and write
2E11000
heap
page read and write
490000
unkown
page read and write
5A20000
heap
page read and write
4278000
heap
page read and write
334E000
trusted library allocation
page read and write
3F12000
heap
page read and write
3211000
trusted library allocation
page read and write
5990000
heap
page read and write
3F22000
heap
page read and write
110000
heap
page read and write
4A7000
unkown
page read and write
3FA2000
heap
page read and write
3F22000
heap
page read and write
89F000
stack
page read and write
324B000
trusted library allocation
page read and write
3E35000
heap
page read and write
3210000
trusted library allocation
page read and write
165000
heap
page read and write
3E35000
heap
page read and write
3D70000
heap
page read and write
3FE2000
heap
page read and write
437000
system
page execute and read and write
323C000
trusted library allocation
page read and write
3F22000
heap
page read and write
1338000
heap
page read and write
4759000
direct allocation
page read and write
3EE9000
heap
page read and write
3FA2000
heap
page read and write
3EE9000
heap
page read and write
B20000
direct allocation
page read and write
3D9A000
heap
page execute and read and write
9F5000
heap
page read and write
3F12000
heap
page read and write
3F80000
heap
page read and write
3F32000
heap
page read and write
1280000
trusted library section
page read and write
8AF000
stack
page read and write
3D12000
heap
page read and write
4553000
direct allocation
page read and write
3FA2000
heap
page read and write
3EE8000
heap
page execute and read and write
31FA000
trusted library allocation
page read and write
3200000
trusted library allocation
page read and write
3EE9000
heap
page read and write
6960000
trusted library allocation
page execute and read and write
3FE2000
heap
page read and write
2FB0000
heap
page execute and read and write
8AF000
stack
page read and write
3F22000
heap
page read and write
67BC000
trusted library allocation
page read and write
1386000
heap
page read and write
4490000
direct allocation
page read and write
3232000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
131C000
heap
page read and write
3F12000
heap
page read and write
31AB000
trusted library allocation
page read and write
338A000
trusted library allocation
page read and write
9DE000
stack
page read and write
3D6A000
heap
page read and write
3EC0000
heap
page read and write
970000
heap
page read and write
11EE000
stack
page read and write
582E000
trusted library allocation
page read and write
3D9B000
heap
page read and write
482000
unkown
page readonly
3219000
trusted library allocation
page read and write
3FA2000
heap
page read and write
89F000
stack
page read and write
3DAB000
heap
page read and write
3FE2000
heap
page read and write
482000
unkown
page readonly
4430000
direct allocation
page read and write
5850000
trusted library allocation
page execute and read and write
5A32000
heap
page read and write
12EE000
heap
page read and write
AE3000
heap
page read and write
3FE9000
heap
page read and write
67B9000
trusted library allocation
page read and write
4430000
direct allocation
page read and write
188AF3F0000
heap
page read and write
482000
unkown
page readonly
4630000
direct allocation
page read and write
4553000
direct allocation
page read and write
3E99000
heap
page read and write
3FE2000
heap
page read and write
4AB000
unkown
page readonly
582B000
trusted library allocation
page read and write
305F000
stack
page read and write
4490000
direct allocation
page read and write
45B3000
direct allocation
page read and write
3F22000
heap
page read and write
4AB000
unkown
page readonly
2E10000
trusted library allocation
page read and write
45B3000
direct allocation
page read and write
3298000
trusted library allocation
page read and write
940000
heap
page read and write
980000
heap
page read and write
482000
unkown
page readonly
400000
unkown
page readonly
3B7F000
heap
page read and write
AB0000
heap
page read and write
3CC0000
heap
page read and write
8AF000
stack
page read and write
3ED0000
heap
page read and write
3EA8000
heap
page read and write
57F0000
trusted library allocation
page read and write
11A0000
heap
page read and write
3D9B000
heap
page read and write
998000
heap
page read and write
2F35000
heap
page read and write
3DAB000
heap
page read and write
9BF000
heap
page read and write
57CE000
stack
page read and write
3F12000
heap
page read and write
1DE000
stack
page read and write
2E27000
trusted library allocation
page execute and read and write
There are 1060 hidden memdumps, click here to show them.