IOC Report
F#U0130YAT TALEB#U0130.exe

loading gif

Files

File Path
Type
Category
Malicious
F#U0130YAT TALEB#U0130.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\F#U0130YAT TALEB#U0130.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ctsdvwT.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0pdqiljo.jof.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cfhsmutz.3ix.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qryc5d10.u3d.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wh33y5wd.ub1.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\F#U0130YAT TALEB#U0130.exe
"C:\Users\user\Desktop\F#U0130YAT TALEB#U0130.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\F#U0130YAT TALEB#U0130.exe"
malicious
C:\Users\user\Desktop\F#U0130YAT TALEB#U0130.exe
"C:\Users\user\Desktop\F#U0130YAT TALEB#U0130.exe"
malicious
C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
"C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe"
malicious
C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
"C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe"
malicious
C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
"C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe"
malicious
C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
"C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe"
malicious
C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
"C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://mail.nogamobilya.com
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://nogamobilya.com
unknown

Domains

Name
IP
Malicious
nogamobilya.com
185.85.236.83
malicious
mail.nogamobilya.com
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.85.236.83
nogamobilya.com
Turkey
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ctsdvwT

Memdumps

Base Address
Regiontype
Protect
Malicious
3F9E000
trusted library allocation
page read and write
malicious
48C2000
trusted library allocation
page read and write
malicious
3F51000
trusted library allocation
page read and write
malicious
5550000
trusted library section
page read and write
malicious
3A19000
trusted library allocation
page read and write
malicious
2C61000
trusted library allocation
page read and write
malicious
2C51000
trusted library allocation
page read and write
malicious
3FC9000
trusted library allocation
page read and write
malicious
50CE000
trusted library allocation
page read and write
2C72000
trusted library allocation
page read and write
2C9E000
trusted library allocation
page read and write
6DFF000
stack
page read and write
F26000
trusted library allocation
page read and write
2863000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
36A9000
trusted library allocation
page read and write
DC7000
heap
page read and write
C00000
heap
page read and write
7502000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
28AB000
trusted library allocation
page read and write
340C000
trusted library allocation
page read and write
51D3000
heap
page read and write
C08000
heap
page read and write
28F9000
trusted library allocation
page read and write
27D7000
trusted library allocation
page read and write
28FB000
trusted library allocation
page read and write
3D53000
trusted library allocation
page read and write
EB3000
trusted library allocation
page read and write
B02000
trusted library allocation
page read and write
7F4C0000
trusted library allocation
page execute and read and write
4C10000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
2859000
trusted library allocation
page read and write
286F000
trusted library allocation
page read and write
2941000
trusted library allocation
page read and write
E60000
heap
page read and write
5D00000
heap
page read and write
6995000
trusted library allocation
page read and write
2833000
trusted library allocation
page read and write
67D0000
heap
page read and write
5860000
trusted library allocation
page read and write
CF7000
stack
page read and write
EA4000
trusted library allocation
page read and write
28AF000
trusted library allocation
page read and write
27F7000
trusted library allocation
page read and write
50D1000
trusted library allocation
page read and write
2C1E000
stack
page read and write
1088000
heap
page read and write
158D000
trusted library allocation
page execute and read and write
AC3D000
stack
page read and write
4CAE000
stack
page read and write
621E000
stack
page read and write
2865000
trusted library allocation
page read and write
3C61000
trusted library allocation
page read and write
5877000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
4C92000
trusted library allocation
page read and write
A97E000
stack
page read and write
FBE000
stack
page read and write
9F7E000
stack
page read and write
544D000
stack
page read and write
28FD000
trusted library allocation
page read and write
4359000
trusted library allocation
page read and write
BB0000
trusted library allocation
page read and write
1157000
heap
page read and write
2D63000
trusted library allocation
page read and write
7EFF0000
trusted library allocation
page execute and read and write
E8E000
stack
page read and write
7247000
trusted library allocation
page read and write
80C6000
trusted library allocation
page read and write
27ED000
trusted library allocation
page read and write
27A5000
trusted library allocation
page read and write
D60000
heap
page read and write
2929000
trusted library allocation
page read and write
3BD9000
trusted library allocation
page read and write
2A45000
trusted library allocation
page read and write
39DC000
trusted library allocation
page read and write
F1B000
trusted library allocation
page execute and read and write
5B50000
trusted library allocation
page execute and read and write
2680000
trusted library allocation
page read and write
B17000
trusted library allocation
page execute and read and write
516D000
trusted library allocation
page read and write
67AF000
stack
page read and write
5134000
heap
page read and write
2853000
trusted library allocation
page read and write
BB0000
heap
page read and write
1103000
trusted library allocation
page read and write
28D5000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
4BF0000
trusted library allocation
page read and write
8E6E000
stack
page read and write
2BA0000
heap
page execute and read and write
1232000
trusted library allocation
page read and write
12F7000
heap
page read and write
2831000
trusted library allocation
page read and write
323E000
stack
page read and write
50E2000
trusted library allocation
page read and write
2B2C000
stack
page read and write
1590000
trusted library allocation
page read and write
129E000
stack
page read and write
27AF000
trusted library allocation
page read and write
ECA000
trusted library allocation
page execute and read and write
3A85000
trusted library allocation
page read and write
2BB9000
trusted library allocation
page read and write
69DE000
stack
page read and write
2855000
trusted library allocation
page read and write
61D0000
heap
page read and write
28EB000
trusted library allocation
page read and write
101D000
heap
page read and write
2887000
trusted library allocation
page read and write
61AB000
trusted library allocation
page read and write
E2A000
heap
page read and write
28FF000
trusted library allocation
page read and write
2B62000
trusted library allocation
page read and write
AE4000
trusted library allocation
page read and write
2901000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
293F000
trusted library allocation
page read and write
5B4D000
stack
page read and write
1560000
trusted library allocation
page read and write
5116000
trusted library allocation
page read and write
1510000
heap
page read and write
BF0000
trusted library allocation
page read and write
5190000
heap
page read and write
8C8000
heap
page read and write
5780000
trusted library allocation
page execute and read and write
1060000
heap
page read and write
10B7000
heap
page read and write
95D000
heap
page read and write
27E7000
trusted library allocation
page read and write
2BE2000
trusted library allocation
page read and write
2B3B000
trusted library allocation
page read and write
5172000
trusted library allocation
page read and write
4D5C000
stack
page read and write
1123000
heap
page read and write
187E000
unkown
page read and write
5F1E000
stack
page read and write
6980000
trusted library allocation
page read and write
EE3000
trusted library allocation
page execute and read and write
2845000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
2925000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
2D53000
trusted library allocation
page read and write
8A2000
unkown
page readonly
28CD000
trusted library allocation
page read and write
CB0000
heap
page read and write
D3E000
stack
page read and write
F0A000
trusted library allocation
page execute and read and write
573E000
stack
page read and write
2A58000
trusted library allocation
page read and write
95BE000
stack
page read and write
33D9000
trusted library allocation
page read and write
1226000
trusted library allocation
page execute and read and write
A87E000
stack
page read and write
42D000
remote allocation
page execute and read and write
2905000
trusted library allocation
page read and write
5570000
heap
page read and write
5EEB000
trusted library allocation
page read and write
289F000
trusted library allocation
page read and write
2C6C000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
F17000
trusted library allocation
page execute and read and write
2815000
trusted library allocation
page read and write
1237000
trusted library allocation
page execute and read and write
334E000
stack
page read and write
5480000
heap
page read and write
5120000
trusted library allocation
page read and write
2BF0000
trusted library allocation
page execute and read and write
2927000
trusted library allocation
page read and write
342A000
trusted library allocation
page read and write
312E000
trusted library allocation
page read and write
2903000
trusted library allocation
page read and write
2B56000
trusted library allocation
page read and write
416000
remote allocation
page execute and read and write
4E10000
heap
page read and write
6010000
trusted library allocation
page read and write
4EBD000
trusted library allocation
page read and write
2837000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
F60000
heap
page read and write
6CFE000
stack
page read and write
EFD000
trusted library allocation
page execute and read and write
AD60000
trusted library allocation
page execute and read and write
387E000
trusted library allocation
page read and write
D38000
heap
page read and write
16F8000
heap
page read and write
12A0000
heap
page execute and read and write
280D000
trusted library allocation
page read and write
50BE000
trusted library allocation
page read and write
50C0000
heap
page read and write
270D000
trusted library allocation
page read and write
3146000
trusted library allocation
page read and write
BBA000
trusted library allocation
page execute and read and write
85EE000
stack
page read and write
5EC0000
trusted library allocation
page read and write
A5FD000
stack
page read and write
3141000
trusted library allocation
page read and write
6E50000
heap
page read and write
27EB000
trusted library allocation
page read and write
27CF000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
313E000
trusted library allocation
page read and write
2869000
trusted library allocation
page read and write
1169000
heap
page read and write
BC5000
heap
page read and write
B00000
heap
page read and write
2809000
trusted library allocation
page read and write
5140000
heap
page read and write
292F000
trusted library allocation
page read and write
946000
unkown
page readonly
4E5E000
trusted library allocation
page read and write
27FB000
trusted library allocation
page read and write
28A5000
trusted library allocation
page read and write
42C000
remote allocation
page execute and read and write
2BDE000
stack
page read and write
418000
remote allocation
page execute and read and write
27A7000
trusted library allocation
page read and write
6FCA000
heap
page read and write
2933000
trusted library allocation
page read and write
33D4000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
12EB000
stack
page read and write
6190000
trusted library allocation
page execute and read and write
2909000
trusted library allocation
page read and write
79E0000
heap
page read and write
30BC000
stack
page read and write
286B000
trusted library allocation
page read and write
15A7000
trusted library allocation
page execute and read and write
1198000
stack
page read and write
E5E000
stack
page read and write
5166000
trusted library allocation
page read and write
296E000
stack
page read and write
4BED000
trusted library allocation
page read and write
26A1000
trusted library allocation
page read and write
42A000
remote allocation
page execute and read and write
176E000
heap
page read and write
282F000
trusted library allocation
page read and write
2A8E000
stack
page read and write
6F90000
trusted library allocation
page read and write
12F0000
heap
page read and write
3110000
trusted library allocation
page read and write
290D000
trusted library allocation
page read and write
5580000
heap
page read and write
4B9000
stack
page read and write
27C7000
trusted library allocation
page read and write
9AC0000
heap
page read and write
2B4E000
trusted library allocation
page read and write
6000000
heap
page read and write
5140000
trusted library allocation
page read and write
285B000
trusted library allocation
page read and write
2640000
heap
page read and write
4E62000
trusted library allocation
page read and write
28CF000
trusted library allocation
page read and write
540B000
stack
page read and write
4B0D000
stack
page read and write
4E71000
trusted library allocation
page read and write
A37E000
stack
page read and write
C9D000
heap
page read and write
8AED000
stack
page read and write
53BE000
stack
page read and write
4E7D000
trusted library allocation
page read and write
681F000
heap
page read and write
4035000
trusted library allocation
page read and write
2C89000
trusted library allocation
page read and write
9DA000
stack
page read and write
D39000
stack
page read and write
40B2000
trusted library allocation
page read and write
BB2000
trusted library allocation
page read and write
50A0000
heap
page read and write
4BE6000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
27CD000
trusted library allocation
page read and write
6560000
heap
page read and write
1100000
trusted library allocation
page read and write
54C0000
trusted library allocation
page execute and read and write
F5C000
stack
page read and write
A6FF000
stack
page read and write
6FC0000
heap
page read and write
E08000
heap
page read and write
3E3E000
trusted library allocation
page read and write
2805000
trusted library allocation
page read and write
2660000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
9FBE000
stack
page read and write
5884000
heap
page read and write
2BE0000
trusted library allocation
page read and write
3426000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
9DFE000
stack
page read and write
10F3000
trusted library allocation
page execute and read and write
161E000
stack
page read and write
5870000
trusted library allocation
page read and write
16C8000
heap
page read and write
110D000
trusted library allocation
page execute and read and write
B9D000
trusted library allocation
page execute and read and write
27EF000
trusted library allocation
page read and write
51A2000
trusted library allocation
page read and write
4C80000
heap
page read and write
8D2E000
stack
page read and write
99BE000
stack
page read and write
1260000
trusted library allocation
page read and write
27F5000
trusted library allocation
page read and write
2813000
trusted library allocation
page read and write
3979000
trusted library allocation
page read and write
6DFE000
stack
page read and write
557E000
heap
page read and write
D71000
heap
page read and write
27DB000
trusted library allocation
page read and write
2861000
trusted library allocation
page read and write
291F000
trusted library allocation
page read and write
695C000
stack
page read and write
D73000
heap
page read and write
51C0000
trusted library allocation
page execute and read and write
5670000
trusted library allocation
page execute and read and write
5EF0000
trusted library allocation
page read and write
26A9000
trusted library allocation
page read and write
28B3000
trusted library allocation
page read and write
2911000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
2690000
heap
page read and write
2811000
trusted library allocation
page read and write
3240000
heap
page read and write
6F85000
trusted library allocation
page read and write
3C69000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
2686000
trusted library allocation
page read and write
432000
remote allocation
page execute and read and write
2877000
trusted library allocation
page read and write
5193000
heap
page read and write
2821000
trusted library allocation
page read and write
2931000
trusted library allocation
page read and write
FD4000
heap
page read and write
F06000
trusted library allocation
page execute and read and write
1285000
trusted library allocation
page read and write
EC2000
trusted library allocation
page read and write
3C51000
trusted library allocation
page read and write
183E000
stack
page read and write
57CE000
stack
page read and write
28E5000
trusted library allocation
page read and write
CFE000
stack
page read and write
5470000
heap
page read and write
5465000
heap
page read and write
1573000
trusted library allocation
page execute and read and write
2875000
trusted library allocation
page read and write
27A3000
trusted library allocation
page read and write
27E3000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
5700000
trusted library allocation
page execute and read and write
8F9000
heap
page read and write
3F31000
trusted library allocation
page read and write
88EE000
stack
page read and write
56CE000
stack
page read and write
D55000
heap
page read and write
2B80000
trusted library allocation
page read and write
28A7000
trusted library allocation
page read and write
292D000
trusted library allocation
page read and write
3C16000
trusted library allocation
page read and write
5FFE000
stack
page read and write
53CD000
stack
page read and write
CE5000
heap
page read and write
2BD0000
heap
page read and write
EA3000
trusted library allocation
page execute and read and write
2D1B000
trusted library allocation
page read and write
28B1000
trusted library allocation
page read and write
1050000
trusted library allocation
page execute and read and write
DC4000
heap
page read and write
5140000
trusted library allocation
page read and write
2841000
trusted library allocation
page read and write
810000
heap
page read and write
28E9000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
50F0000
heap
page read and write
291D000
trusted library allocation
page read and write
286D000
trusted library allocation
page read and write
3BB1000
trusted library allocation
page read and write
6E00000
heap
page read and write
3174000
trusted library allocation
page read and write
F38000
heap
page read and write
1880000
trusted library allocation
page read and write
4C00000
trusted library allocation
page read and write
28F7000
trusted library allocation
page read and write
33C7000
trusted library allocation
page read and write
414000
remote allocation
page execute and read and write
179E000
heap
page read and write
2C50000
heap
page read and write
28E3000
trusted library allocation
page read and write
8A5000
heap
page read and write
5110000
trusted library allocation
page read and write
4D90000
trusted library section
page readonly
12A7000
heap
page read and write
28B9000
trusted library allocation
page read and write
275B000
trusted library allocation
page read and write
2825000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page execute and read and write
5130000
heap
page read and write
2857000
trusted library allocation
page read and write
10F4000
trusted library allocation
page read and write
4E70000
heap
page execute and read and write
8F7000
heap
page read and write
4BE1000
trusted library allocation
page read and write
5990000
heap
page read and write
C34000
heap
page read and write
5180000
heap
page read and write
283D000
trusted library allocation
page read and write
F71000
heap
page read and write
4F30000
heap
page read and write
433000
remote allocation
page execute and read and write
1574000
trusted library allocation
page read and write
27B3000
trusted library allocation
page read and write
666C000
stack
page read and write
2945000
trusted library allocation
page read and write
290F000
trusted library allocation
page read and write
7F8E0000
trusted library allocation
page execute and read and write
27B1000
trusted library allocation
page read and write
2670000
heap
page execute and read and write
3C59000
trusted library allocation
page read and write
284D000
trusted library allocation
page read and write
A73E000
stack
page read and write
AFD000
trusted library allocation
page execute and read and write
2915000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
4EA0000
heap
page execute and read and write
4BDE000
trusted library allocation
page read and write
A4D0000
heap
page read and write
862D000
stack
page read and write
3793000
trusted library allocation
page read and write
6FAE000
stack
page read and write
2BB1000
trusted library allocation
page read and write
28AD000
trusted library allocation
page read and write
2C85000
trusted library allocation
page read and write
6E40000
heap
page read and write
27B5000
trusted library allocation
page read and write
527B000
stack
page read and write
16C0000
heap
page read and write
54B0000
heap
page read and write
4C90000
trusted library allocation
page read and write
EAD000
trusted library allocation
page execute and read and write
6940000
trusted library allocation
page execute and read and write
8AF0000
heap
page read and write
28E7000
trusted library allocation
page read and write
B80000
trusted library allocation
page read and write
263E000
stack
page read and write
28BF000
trusted library allocation
page read and write
2829000
trusted library allocation
page read and write
F35000
heap
page read and write
2A2C000
trusted library allocation
page read and write
F02000
trusted library allocation
page read and write
2913000
trusted library allocation
page read and write
2849000
trusted library allocation
page read and write
5115000
trusted library allocation
page read and write
F20000
heap
page read and write
F30000
heap
page read and write
A27E000
stack
page read and write
71B0000
trusted library section
page read and write
27AB000
trusted library allocation
page read and write
2827000
trusted library allocation
page read and write
422000
remote allocation
page execute and read and write
F00000
trusted library allocation
page read and write
ED2000
trusted library allocation
page read and write
A4C0000
heap
page read and write
2889000
trusted library allocation
page read and write
2899000
trusted library allocation
page read and write
27C5000
trusted library allocation
page read and write
D50000
heap
page read and write
27FF000
trusted library allocation
page read and write
253E000
stack
page read and write
27E5000
trusted library allocation
page read and write
116E000
stack
page read and write
F12000
trusted library allocation
page read and write
543C000
stack
page read and write
4E00000
heap
page read and write
10B5000
heap
page read and write
F73000
heap
page read and write
2919000
trusted library allocation
page read and write
690E000
stack
page read and write
3D43000
trusted library allocation
page read and write
28B5000
trusted library allocation
page read and write
5410000
heap
page execute and read and write
28C9000
trusted library allocation
page read and write
2CCA000
trusted library allocation
page read and write
860000
heap
page read and write
FB0000
trusted library allocation
page read and write
AF9000
stack
page read and write
61E0000
trusted library allocation
page execute and read and write
A3BD000
stack
page read and write
510B000
stack
page read and write
4E5B000
trusted library allocation
page read and write
27F9000
trusted library allocation
page read and write
28C1000
trusted library allocation
page read and write
28D7000
trusted library allocation
page read and write
27C3000
trusted library allocation
page read and write
175B000
heap
page read and write
5D10000
heap
page read and write
2B51000
trusted library allocation
page read and write
4E40000
trusted library allocation
page execute and read and write
51B0000
trusted library allocation
page execute and read and write
4C40000
trusted library allocation
page read and write
16EC000
heap
page read and write
15AB000
trusted library allocation
page execute and read and write
4F0C000
stack
page read and write
56D0000
trusted library section
page read and write
89EE000
stack
page read and write
27BD000
trusted library allocation
page read and write
2839000
trusted library allocation
page read and write
A4BD000
stack
page read and write
5135000
heap
page read and write
3B02000
trusted library allocation
page read and write
64DF000
stack
page read and write
284F000
trusted library allocation
page read and write
4BF2000
trusted library allocation
page read and write
4379000
trusted library allocation
page read and write
27D5000
trusted library allocation
page read and write
2B9F000
stack
page read and write
61B0000
trusted library allocation
page read and write
404000
remote allocation
page execute and read and write
2895000
trusted library allocation
page read and write
B50000
heap
page read and write
2684000
trusted library allocation
page read and write
BB6000
trusted library allocation
page execute and read and write
50D6000
trusted library allocation
page read and write
2879000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
2C10000
trusted library allocation
page execute and read and write
6FB2000
heap
page read and write
28BB000
trusted library allocation
page read and write
3999000
trusted library allocation
page read and write
10E0000
trusted library allocation
page read and write
2BC0000
heap
page execute and read and write
ED7000
trusted library allocation
page execute and read and write
2843000
trusted library allocation
page read and write
27C9000
trusted library allocation
page read and write
28D9000
trusted library allocation
page read and write
2CAB000
trusted library allocation
page read and write
293B000
trusted library allocation
page read and write
48B2000
trusted library allocation
page read and write
50BB000
trusted library allocation
page read and write
BDB000
trusted library allocation
page execute and read and write
28D1000
trusted library allocation
page read and write
43C000
remote allocation
page execute and read and write
15A2000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
11F0000
heap
page read and write
2C98000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
289D000
trusted library allocation
page read and write
26DB000
trusted library allocation
page read and write
28D3000
trusted library allocation
page read and write
1580000
trusted library allocation
page read and write
5FAE000
stack
page read and write
5FBD000
stack
page read and write
2847000
trusted library allocation
page read and write
28A1000
trusted library allocation
page read and write
627D000
stack
page read and write
8335000
trusted library allocation
page read and write
26AB000
trusted library allocation
page read and write
F0E000
stack
page read and write
EC0000
trusted library allocation
page read and write
B4E000
stack
page read and write
5190000
heap
page read and write
EDB000
trusted library allocation
page execute and read and write
17FF000
stack
page read and write
43E000
remote allocation
page execute and read and write
50B4000
trusted library allocation
page read and write
27D1000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
B94000
trusted library allocation
page read and write
43B6000
trusted library allocation
page read and write
8C0000
heap
page read and write
283B000
trusted library allocation
page read and write
94C000
heap
page read and write
402000
remote allocation
page execute and read and write
27AD000
trusted library allocation
page read and write
41A000
remote allocation
page execute and read and write
26E0000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
BA0000
trusted library allocation
page read and write
27F3000
trusted library allocation
page read and write
3971000
trusted library allocation
page read and write
568E000
stack
page read and write
F90000
trusted library allocation
page execute and read and write
2881000
trusted library allocation
page read and write
15C0000
heap
page read and write
5114000
trusted library allocation
page read and write
28A3000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
6F9E000
stack
page read and write
2943000
trusted library allocation
page read and write
27B7000
trusted library allocation
page read and write
18C0000
trusted library allocation
page execute and read and write
63DE000
stack
page read and write
28CB000
trusted library allocation
page read and write
C73000
heap
page read and write
7A0000
heap
page read and write
F3E000
heap
page read and write
1596000
trusted library allocation
page execute and read and write
280F000
trusted library allocation
page read and write
2891000
trusted library allocation
page read and write
C2A000
heap
page read and write
ACE000
stack
page read and write
B1B000
trusted library allocation
page execute and read and write
3412000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
3351000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
F30000
heap
page read and write
15D0000
trusted library allocation
page read and write
281F000
trusted library allocation
page read and write
26EB000
trusted library allocation
page read and write
281D000
trusted library allocation
page read and write
5D31000
heap
page read and write
E90000
heap
page read and write
5100000
trusted library allocation
page read and write
1592000
trusted library allocation
page read and write
175E000
heap
page read and write
471E000
stack
page read and write
2817000
trusted library allocation
page read and write
631C000
stack
page read and write
5120000
trusted library allocation
page read and write
557E000
stack
page read and write
27BB000
trusted library allocation
page read and write
514B000
trusted library allocation
page read and write
6FEE000
stack
page read and write
27E1000
trusted library allocation
page read and write
1290000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
27BF000
trusted library allocation
page read and write
2971000
trusted library allocation
page read and write
5ED0000
trusted library allocation
page execute and read and write
287B000
trusted library allocation
page read and write
2C1B000
trusted library allocation
page read and write
2C00000
heap
page execute and read and write
C5E000
stack
page read and write
B57000
stack
page read and write
50DD000
trusted library allocation
page read and write
29DB000
trusted library allocation
page read and write
3905000
trusted library allocation
page read and write
27D3000
trusted library allocation
page read and write
EED000
trusted library allocation
page execute and read and write
6BFA000
stack
page read and write
6F50000
trusted library allocation
page execute and read and write
15A0000
trusted library allocation
page read and write
5161000
trusted library allocation
page read and write
27A9000
trusted library allocation
page read and write
288B000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
7EE000
stack
page read and write
5220000
heap
page read and write
428000
remote allocation
page execute and read and write
292B000
trusted library allocation
page read and write
157D000
trusted library allocation
page execute and read and write
567E000
stack
page read and write
F24000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
2885000
trusted library allocation
page read and write
423000
remote allocation
page execute and read and write
159A000
trusted library allocation
page execute and read and write
5110000
heap
page read and write
28BD000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
553C000
stack
page read and write
4E82000
trusted library allocation
page read and write
5460000
heap
page read and write
2B5D000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
E40000
heap
page read and write
52B0000
heap
page execute and read and write
C3A000
stack
page read and write
36A1000
trusted library allocation
page read and write
3BB9000
trusted library allocation
page read and write
4C20000
trusted library allocation
page read and write
283F000
trusted library allocation
page read and write
43A000
remote allocation
page execute and read and write
5DAC000
stack
page read and write
BAD000
trusted library allocation
page execute and read and write
7F0000
heap
page read and write
1884000
trusted library allocation
page read and write
4F34000
heap
page read and write
419000
remote allocation
page execute and read and write
2823000
trusted library allocation
page read and write
5AD0000
trusted library allocation
page execute and read and write
2867000
trusted library allocation
page read and write
2ACE000
stack
page read and write
E40000
heap
page read and write
3132000
trusted library allocation
page read and write
DE0000
heap
page read and write
28EF000
trusted library allocation
page read and write
2CBA000
trusted library allocation
page read and write
D50000
heap
page read and write
288F000
trusted library allocation
page read and write
5867000
trusted library allocation
page read and write
6E3E000
stack
page read and write
D5E000
stack
page read and write
28C7000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
4C15000
trusted library allocation
page read and write
74A000
stack
page read and write
2A5E000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
F65000
heap
page read and write
867000
heap
page read and write
514E000
trusted library allocation
page read and write
427000
remote allocation
page execute and read and write
2A49000
trusted library allocation
page read and write
512E000
stack
page read and write
5F20000
trusted library allocation
page execute and read and write
F7E000
stack
page read and write
8BDF000
stack
page read and write
3F61000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
4E94000
trusted library allocation
page read and write
3120000
trusted library allocation
page read and write
426000
remote allocation
page execute and read and write
6E3E000
stack
page read and write
3981000
trusted library allocation
page read and write
2835000
trusted library allocation
page read and write
3160000
heap
page execute and read and write
9B3000
heap
page read and write
C87000
heap
page read and write
2801000
trusted library allocation
page read and write
18D0000
heap
page read and write
10FD000
trusted library allocation
page execute and read and write
11BE000
stack
page read and write
39D5000
trusted library allocation
page read and write
2A32000
trusted library allocation
page read and write
2803000
trusted library allocation
page read and write
54B5000
heap
page read and write
515E000
trusted library allocation
page read and write
67E5000
heap
page read and write
2897000
trusted library allocation
page read and write
AED000
trusted library allocation
page execute and read and write
B93000
trusted library allocation
page execute and read and write
4E6E000
trusted library allocation
page read and write
EE4000
trusted library allocation
page read and write
5090000
trusted library section
page readonly
28C3000
trusted library allocation
page read and write
1890000
heap
page read and write
27CB000
trusted library allocation
page read and write
270A000
trusted library allocation
page read and write
51D0000
heap
page read and write
3170000
trusted library allocation
page read and write
5ACB000
trusted library allocation
page read and write
4DFB000
stack
page read and write
2AE0000
trusted library allocation
page execute and read and write
10AE000
stack
page read and write
D66000
heap
page read and write
2871000
trusted library allocation
page read and write
27DF000
trusted library allocation
page read and write
C37000
heap
page read and write
61A0000
trusted library allocation
page read and write
4F40000
heap
page read and write
F20000
trusted library allocation
page read and write
27F1000
trusted library allocation
page read and write
1520000
heap
page read and write
42B000
remote allocation
page execute and read and write
54E0000
trusted library allocation
page read and write
5130000
heap
page read and write
54E7000
trusted library allocation
page read and write
6FA5000
trusted library allocation
page read and write
66AE000
stack
page read and write
A5A000
stack
page read and write
5200000
heap
page read and write
97BE000
stack
page read and write
421000
remote allocation
page execute and read and write
434000
remote allocation
page execute and read and write
2921000
trusted library allocation
page read and write
51A0000
trusted library allocation
page read and write
1104000
heap
page read and write
52BE000
stack
page read and write
2939000
trusted library allocation
page read and write
293D000
trusted library allocation
page read and write
5B60000
heap
page execute and read and write
28C5000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
6E5E000
heap
page read and write
4351000
trusted library allocation
page read and write
F00000
trusted library allocation
page execute and read and write
2907000
trusted library allocation
page read and write
6990000
trusted library allocation
page read and write
4CD3000
heap
page read and write
2851000
trusted library allocation
page read and write
5152000
trusted library allocation
page read and write
2873000
trusted library allocation
page read and write
C90000
heap
page read and write
121E000
stack
page read and write
5EC7000
trusted library allocation
page read and write
9ABD000
stack
page read and write
287D000
trusted library allocation
page read and write
28B7000
trusted library allocation
page read and write
E46000
heap
page read and write
97B000
heap
page read and write
27D9000
trusted library allocation
page read and write
8C2E000
stack
page read and write
2B5C000
stack
page read and write
3439000
trusted library allocation
page read and write
126F000
stack
page read and write
56E0000
trusted library allocation
page execute and read and write
477B000
stack
page read and write
28DB000
trusted library allocation
page read and write
4730000
trusted library allocation
page execute and read and write
85AE000
stack
page read and write
123B000
trusted library allocation
page execute and read and write
95FD000
stack
page read and write
1270000
heap
page read and write
2807000
trusted library allocation
page read and write
5AB7000
trusted library allocation
page read and write
73E0000
heap
page read and write
5150000
heap
page read and write
62C0000
heap
page read and write
EBD000
trusted library allocation
page execute and read and write
2893000
trusted library allocation
page read and write
289B000
trusted library allocation
page read and write
46DE000
stack
page read and write
290B000
trusted library allocation
page read and write
4E96000
trusted library allocation
page read and write
3CB7000
trusted library allocation
page read and write
3D05000
trusted library allocation
page read and write
6840000
heap
page read and write
8D6E000
stack
page read and write
28F1000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
2917000
trusted library allocation
page read and write
4CD0000
heap
page read and write
4BCB000
trusted library allocation
page read and write
D30000
heap
page read and write
28ED000
trusted library allocation
page read and write
3EB5000
trusted library allocation
page read and write
98BF000
stack
page read and write
F58000
heap
page read and write
109A000
stack
page read and write
28F5000
trusted library allocation
page read and write
2C40000
heap
page read and write
EE0000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
57FE000
stack
page read and write
870000
heap
page read and write
50EF000
stack
page read and write
1250000
trusted library allocation
page read and write
11C8000
trusted library allocation
page read and write
2C40000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
AE3000
trusted library allocation
page execute and read and write
5EAE000
stack
page read and write
282D000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
79DE000
stack
page read and write
CB3000
heap
page read and write
27FD000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
EA0000
trusted library allocation
page read and write
4E76000
trusted library allocation
page read and write
C1F000
heap
page read and write
5280000
trusted library allocation
page read and write
6100000
heap
page read and write
F80000
heap
page read and write
2B1F000
stack
page read and write
BD7000
trusted library allocation
page execute and read and write
87EE000
stack
page read and write
4BC4000
trusted library allocation
page read and write
291B000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
506E000
stack
page read and write
BD2000
trusted library allocation
page read and write
ABFC000
stack
page read and write
FEC000
heap
page read and write
1222000
trusted library allocation
page read and write
6110000
trusted library allocation
page read and write
42E000
remote allocation
page execute and read and write
343F000
trusted library allocation
page read and write
A17F000
stack
page read and write
26F1000
trusted library allocation
page read and write
7A39000
heap
page read and write
A83E000
stack
page read and write
C97000
heap
page read and write
4978000
trusted library allocation
page read and write
FA0000
trusted library allocation
page read and write
598E000
stack
page read and write
2935000
trusted library allocation
page read and write
956000
heap
page read and write
D3E000
heap
page read and write
1570000
trusted library allocation
page read and write
F6E000
stack
page read and write
28F3000
trusted library allocation
page read and write
B06000
trusted library allocation
page execute and read and write
62BE000
stack
page read and write
4302000
trusted library allocation
page read and write
2923000
trusted library allocation
page read and write
285D000
trusted library allocation
page read and write
50F0000
trusted library allocation
page read and write
62D0000
trusted library allocation
page read and write
9CBE000
stack
page read and write
6187000
trusted library allocation
page read and write
16F6000
heap
page read and write
8E2000
heap
page read and write
122A000
trusted library allocation
page execute and read and write
C8F000
heap
page read and write
AAFC000
stack
page read and write
28A9000
trusted library allocation
page read and write
39A1000
trusted library allocation
page read and write
EC6000
trusted library allocation
page execute and read and write
2B30000
trusted library allocation
page read and write
10F0000
trusted library allocation
page read and write
6FB0000
heap
page read and write
B12000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
7A15000
heap
page read and write
487C000
stack
page read and write
281B000
trusted library allocation
page read and write
4DA0000
heap
page read and write
284B000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
85E000
stack
page read and write
438000
remote allocation
page execute and read and write
BC0000
heap
page read and write
AF0000
trusted library allocation
page read and write
B90000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
3E2E000
trusted library allocation
page read and write
1628000
trusted library allocation
page read and write
5B7000
stack
page read and write
106F000
stack
page read and write
5EE0000
trusted library allocation
page read and write
26F3000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page execute and read and write
8A0000
heap
page read and write
1220000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
2883000
trusted library allocation
page read and write
B0A000
trusted library allocation
page execute and read and write
314D000
trusted library allocation
page read and write
27B9000
trusted library allocation
page read and write
150E000
stack
page read and write
439000
remote allocation
page execute and read and write
282B000
trusted library allocation
page read and write
2819000
trusted library allocation
page read and write
4D4C000
stack
page read and write
1080000
heap
page read and write
12A0000
heap
page read and write
415000
remote allocation
page execute and read and write
403000
remote allocation
page execute and read and write
10FB000
heap
page read and write
10AB000
heap
page read and write
5880000
heap
page read and write
280B000
trusted library allocation
page read and write
FC0000
heap
page read and write
285F000
trusted library allocation
page read and write
28DF000
trusted library allocation
page read and write
51F0000
trusted library section
page readonly
6C30000
heap
page read and write
174B000
heap
page read and write
E90000
trusted library allocation
page read and write
8A0000
unkown
page readonly
E30000
heap
page read and write
5850000
trusted library allocation
page read and write
9CFE000
stack
page read and write
DAC000
heap
page read and write
287F000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
27DD000
trusted library allocation
page read and write
112E000
stack
page read and write
B40000
trusted library allocation
page execute and read and write
2BBB000
trusted library allocation
page read and write
2937000
trusted library allocation
page read and write
15C5000
heap
page read and write
64BE000
stack
page read and write
AF3000
trusted library allocation
page read and write
AD3E000
stack
page read and write
28DD000
trusted library allocation
page read and write
288D000
trusted library allocation
page read and write
5270000
trusted library allocation
page execute and read and write
1110000
heap
page read and write
F10000
heap
page execute and read and write
5450000
trusted library allocation
page read and write
31DC000
stack
page read and write
110E000
heap
page read and write
3100000
trusted library allocation
page read and write
27C1000
trusted library allocation
page read and write
There are 971 hidden memdumps, click here to show them.