IOC Report
Siparis. 000867000960 TAVSAN order_Optium A.s 03.07.2024.exe

loading gif

Files

File Path
Type
Category
Malicious
Siparis. 000867000960 TAVSAN order_Optium A.s 03.07.2024.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Siparis. 000867000960 TAVSAN order_Optium A.s 03.07.2024.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\7454168B
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jt4ezjzt.bti.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sixvkcea.rxc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vjlksn2r.tgk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wpimaqpi.vkv.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Siparis. 000867000960 TAVSAN order_Optium A.s 03.07.2024.exe
"C:\Users\user\Desktop\Siparis. 000867000960 TAVSAN order_Optium A.s 03.07.2024.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Siparis. 000867000960 TAVSAN order_Optium A.s 03.07.2024.exe"
malicious
C:\Users\user\Desktop\Siparis. 000867000960 TAVSAN order_Optium A.s 03.07.2024.exe
"C:\Users\user\Desktop\Siparis. 000867000960 TAVSAN order_Optium A.s 03.07.2024.exe"
malicious
C:\Program Files (x86)\ZbSDFslviKIFedZkSUgKtKQRuMdiZYRzTkQTcBwsci\UQgCFxrqyzfeJVhlwgINlmFOLs.exe
"C:\Program Files (x86)\ZbSDFslviKIFedZkSUgKtKQRuMdiZYRzTkQTcBwsci\UQgCFxrqyzfeJVhlwgINlmFOLs.exe"
malicious
C:\Windows\SysWOW64\unregmp2.exe
"C:\Windows\SysWOW64\unregmp2.exe"
malicious
C:\Program Files (x86)\ZbSDFslviKIFedZkSUgKtKQRuMdiZYRzTkQTcBwsci\UQgCFxrqyzfeJVhlwgINlmFOLs.exe
"C:\Program Files (x86)\ZbSDFslviKIFedZkSUgKtKQRuMdiZYRzTkQTcBwsci\UQgCFxrqyzfeJVhlwgINlmFOLs.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.evertudy.xyz/csr7/
203.161.49.220
malicious
http://www.qe1jqiste.sbs/2dv8/
47.239.13.172
malicious
http://www.fungusbus.com/dmjt/?iJiX_=phzqshWM8++lNTZcZDn6PlPBsxjNAhN5IKmoEk/tfOScWWQLgCWtTff73plV+RjstliAOCijSwUPjuCIutjnEtY8cBV1InP23K1rvoSk7X1+smLn8qttMRFZOf+8GJ/nwg==&eZ=3HYLM
91.195.240.19
malicious
http://www.ennerdaledevcons.co.uk/4ksh/?eZ=3HYLM&iJiX_=URmoC5X4e6K7wlVx2KbqE9eRaPOmGfPMOnoqB8M3F0zECWK+Sf67ndIbG8DedkN4mAzPYnwe388RaOdlDVpfZlnLf1iW05ccEvRvL6OrWq1JPJo5l6rk1ZbisRWcHyTHqg==
212.227.172.254
malicious
http://www.artemhypnotherapy.com/9285/
91.195.240.19
malicious
http://www.mocar.pro/prg5/?eZ=3HYLM&iJiX_=OUWlBSduFOmbWHHx1+vrCN7lKThtnpeA9WltEIwOsC9+Rnf1YsqGBMTu+SXEa1SqJjg2e+xS43eh4+WwnjHBew+mwyIGh8NWq3ehH5OgTP/98tgqTRgcUpqrv79RN6be7A==
109.95.158.122
malicious
http://www.dxgsf.shop/vfca/?iJiX_=PjuNaM4rErgNDqYdGwCHqm/mvS3xhxVRtMFmVQvGZApPshrl2us8sSNvZzeSfqXaMpgL6dVjOwb89B84ObwJyCFsntjSnqpwzP+jY6yNjY7ViduojwQX6Un4yLfzesgT7A==&eZ=3HYLM
103.197.25.241
malicious
http://www.stefanogaus.com/0rsk/
66.235.200.146
malicious
http://www.dxgsf.shop/vfca/
103.197.25.241
malicious
http://www.mocar.pro/prg5/
109.95.158.122
malicious
http://www.qe1jqiste.sbs/2dv8/?iJiX_=psGgeTZm92uMMjwvw3+ekktQKHQr8PtkyzA1wjnO7+NPXjQAxvdC6xrXVCGmGkxqQ5F0SN4BIMC+q/QNsQX29b0eHgxHefEnuc0ogV2nM4gi2K3554lDMjGRktsI1JKBOA==&eZ=3HYLM
47.239.13.172
malicious
http://www.thesprinklesontop.com/n12h/?eZ=3HYLM&iJiX_=RL7POCi4RQwOAHw5RpRi0oRkNrFJHCE4O3Q4e5XJ1RgvJteO2OLpaAwWvE/Xee8N43HhgIeZk31xLdwZ5MBNiQ0n2zDakMpJnzyHioqcCYotdW6+iH3FtmEZOQT5Ykxdbw==
208.91.197.27
malicious
http://www.highwavesmarine.com/vpfr/?eZ=3HYLM&iJiX_=YJOYlkuNdHbUbxIU0duDsGwGBWmXVvvP+a5ZIsJaJ66fRzvfH4BZf/UT7tP0StNW9dLVB8Be+XMnEr4f4IOQp0lsgtKVk15wNPoNEOoMMjyN3LU6dxhHI1FgmxIsamdstg==
23.111.180.146
malicious
http://www.ennerdaledevcons.co.uk/4ksh/
212.227.172.254
malicious
http://www.fungusbus.com/dmjt/
91.195.240.19
malicious
http://www.thesprinklesontop.com/n12h/
208.91.197.27
malicious
http://www.evertudy.xyz/csr7/?iJiX_=IuYwVr8nXepE7mYHSf+gGVghE+QsK0Y2QdUzXudSXEAptekBSDag4n7LIWAgnje27+AV9TSqmFigDMavfH+dBRmaO8GFftFICNQKrDMfpUc2J19e4FsCw3tJmkJ0eBlHLQ==&eZ=3HYLM
203.161.49.220
malicious
http://www.dennisrosenberg.studio/gvk0/
91.195.240.19
malicious
http://www.dennisrosenberg.studio/gvk0/?eZ=3HYLM&iJiX_=PBk/k+wnSgDApBLvvStJ1Qfqn2+N7jbU3UJKISJwHJXOTy3qrqzF3aeAlE7aotAu8uhq4eiBm9zMPuEZ1b+PYRv9+O/t9WvMGJPSRuXiPeF8kiiDoShqgPK5SBbSxKLjpw==
91.195.240.19
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://download.quark.cn/download/quarkpc?platform=android&ch=pcquark
unknown
https://g.alicdn.com/woodpeckerx/jssdk/plugins/performance.js
unknown
https://duckduckgo.com/ac/?q=
unknown
https://g.alicdn.com/woodpeckerx/jssdk/plugins/globalerror.js
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://www.namecheap.com/domains/registration/results/?domain=fungusbus.com
unknown
http://www.thesprinklesontop.com/sk-logabpstatus.php?a=a1hVY3BFSVExenNSTmVHYmpRNUdGNXVZNnlIbGdzZTQ2N
unknown
https://track.uc.cn/collect
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://mocar.pro/prg5/?eZ=3HYLM&iJiX_=OUWlBSduFOmbWHHx1
unknown
http://www.thesprinklesontop.com/px.js?ch=1
unknown
http://www.thesprinklesontop.com/px.js?ch=2
unknown
http://www.luo918.com/qmv1/?eZ=3HYLM&iJiX_=70iXdBj3vvgYA1qv9X+C2v5f15BZXYNXgOSbaBLZsvX+/zBEWaSfpSSmWx4BVFALB6Pvk4Cj2RW76gyU8dG7duzMF8qcwSy0or9MU4FAt6yJL5XTwcCyhmcdeorymiKmWQ==
35.227.248.111
https://www.ecosia.org/newtab/
unknown
https://www.ennerdaledevcons.co.uk/4ksh/?eZ=3HYLM&iJiX_=URmoC5X4e6K7wlVx2KbqE9eRaPOmGfPMOnoqB8M3F0zE
unknown
https://image.uc.cn/s/uae/g/3o/berg/static/archer_index.e96dc6dc6863835f4ad0.js
unknown
https://www.sedo.com/services/parking.php3
unknown
http://www.luo918.com/qmv1/
35.227.248.111
https://ac.ecosia.org/autocomplete?q=
unknown
https://hm.baidu.com/hm.js?
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.stefanogaus.com
unknown
https://img.sedoparking.com/templates/images/hero_nc.svg
unknown
https://g.alicdn.com/woodpeckerx/jssdk/wpkReporter.js
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://image.uc.cn/s/uae/g/3o/berg/static/index.c4bc5b38d870fecd8a1f.css
unknown
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mocar.pro
109.95.158.122
malicious
www.highwavesmarine.com
23.111.180.146
malicious
www.thesprinklesontop.com
208.91.197.27
malicious
parkingpage.namecheap.com
91.195.240.19
malicious
www.ennerdaledevcons.co.uk
212.227.172.254
malicious
dxgsf.shop
103.197.25.241
malicious
stefanogaus.com
66.235.200.146
malicious
xiaoyue.zhuangkou.com
47.239.13.172
malicious
www.evertudy.xyz
203.161.49.220
malicious
www.fungusbus.com
unknown
malicious
www.newzionocala.com
unknown
malicious
56.126.166.20.in-addr.arpa
unknown
malicious
www.dennisrosenberg.studio
unknown
malicious
www.shoplifestylebrand.com
unknown
malicious
www.qe1jqiste.sbs
unknown
malicious
www.mocar.pro
unknown
malicious
www.dxgsf.shop
unknown
malicious
www.neworldelectronic.com
unknown
malicious
www.stefanogaus.com
unknown
malicious
www.artemhypnotherapy.com
unknown
malicious
www.todosneaker.com
unknown
malicious
www.luo918.com
35.227.248.111
There are 12 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
66.235.200.146
stefanogaus.com
United States
malicious
23.111.180.146
www.highwavesmarine.com
United States
malicious
103.197.25.241
dxgsf.shop
Hong Kong
malicious
208.91.197.27
www.thesprinklesontop.com
Virgin Islands (BRITISH)
malicious
109.95.158.122
mocar.pro
Poland
malicious
203.161.49.220
www.evertudy.xyz
Malaysia
malicious
91.195.240.19
parkingpage.namecheap.com
Germany
malicious
47.239.13.172
xiaoyue.zhuangkou.com
United States
malicious
212.227.172.254
www.ennerdaledevcons.co.uk
Germany
malicious
35.227.248.111
www.luo918.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
1720000
unclassified section
page execute and read and write
malicious
5020000
system
page execute and read and write
malicious
2FD0000
unkown
page execute and read and write
malicious
410000
system
page execute and read and write
malicious
16E0000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
D70000
trusted library allocation
page read and write
malicious
D30000
trusted library allocation
page read and write
malicious
C11000
heap
page read and write
2CF0000
unkown
page readonly
4E0000
unkown
page readonly
11B7E000
stack
page read and write
8F7000
stack
page read and write
4E1000
unkown
page execute read
C11000
heap
page read and write
14BD000
direct allocation
page execute and read and write
C11000
heap
page read and write
C11000
heap
page read and write
8B2E000
stack
page read and write
2900000
heap
page read and write
D3A000
stack
page read and write
DE0000
unkown
page readonly
C11000
heap
page read and write
DF0000
unkown
page readonly
B67000
heap
page read and write
6ED000
heap
page read and write
4960000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
11F0000
unkown
page read and write
630000
heap
page read and write
19F4CFC4000
trusted library allocation
page read and write
F28000
heap
page read and write
6C40000
trusted library allocation
page read and write
4F5000
unkown
page read and write
4350000
heap
page read and write
6BE000
heap
page read and write
C11000
heap
page read and write
2FCF000
stack
page read and write
107A000
stack
page read and write
2730000
unkown
page readonly
E60000
trusted library allocation
page read and write
650000
heap
page read and write
11C7F000
stack
page read and write
4DD1000
trusted library allocation
page read and write
19F4B2BC000
heap
page read and write
A00000
heap
page read and write
4EE000
unkown
page readonly
4F00000
heap
page read and write
B4E000
heap
page read and write
820000
unkown
page readonly
59F0000
heap
page read and write
AF0000
trusted library allocation
page read and write
76E5000
heap
page read and write
764E000
heap
page read and write
19F4CFAC000
trusted library allocation
page read and write
C11000
heap
page read and write
75E4000
heap
page read and write
BE7000
heap
page read and write
EA77FC000
stack
page read and write
88A000
stack
page read and write
267F000
stack
page read and write
77A0000
heap
page read and write
E40000
heap
page read and write
706E000
stack
page read and write
B31C000
system
page read and write
4175000
trusted library allocation
page read and write
673000
heap
page read and write
4852000
unclassified section
page read and write
6C9D000
stack
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
98C000
stack
page read and write
1203C000
stack
page read and write
820000
unkown
page readonly
45D0000
unkown
page read and write
1201000
unkown
page readonly
66E000
heap
page read and write
B102000
system
page read and write
4DBB000
trusted library allocation
page read and write
C11000
heap
page read and write
11F3C000
stack
page read and write
2912000
unkown
page read and write
B4B000
heap
page read and write
7802000
heap
page read and write
C11000
heap
page read and write
555C000
unclassified section
page read and write
C11000
heap
page read and write
2912000
unkown
page read and write
C11000
heap
page read and write
A00000
heap
page read and write
C11000
heap
page read and write
673000
heap
page read and write
77B2000
heap
page read and write
509E000
system
page execute and read and write
5A00000
heap
page read and write
781D000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
4EA6000
trusted library allocation
page read and write
7800000
heap
page read and write
4EE0000
trusted library section
page readonly
4912000
unclassified section
page read and write
6510000
unclassified section
page read and write
6D4000
heap
page read and write
38AF000
unkown
page execute and read and write
C11000
heap
page read and write
9D0000
unkown
page readonly
11EFE000
stack
page read and write
4127000
trusted library allocation
page read and write
2DC0000
heap
page read and write
32F8000
unkown
page read and write
2720000
heap
page read and write
11D0000
unkown
page readonly
1350000
direct allocation
page read and write
ACE000
stack
page read and write
B20000
unkown
page read and write
C11000
heap
page read and write
D3F000
stack
page read and write
2EC4000
heap
page read and write
4DE2000
trusted library allocation
page read and write
B31000
unkown
page readonly
DDF000
stack
page read and write
C11000
heap
page read and write
B75000
heap
page read and write
77DB000
heap
page read and write
19F4B270000
heap
page read and write
7821000
heap
page read and write
C11000
heap
page read and write
BA0000
unkown
page readonly
5BA4000
unclassified section
page read and write
C11000
heap
page read and write
19F4CA90000
heap
page read and write
462D000
direct allocation
page execute and read and write
2BEC000
unkown
page read and write
3841000
unkown
page execute and read and write
1201000
unkown
page readonly
C11000
heap
page read and write
11B3E000
stack
page read and write
1000000
unkown
page readonly
11F0000
unkown
page read and write
494000
heap
page read and write
2DC0000
heap
page read and write
C11000
heap
page read and write
19F4B2CF000
heap
page read and write
C11000
heap
page read and write
6E0000
heap
page read and write
D80000
trusted library allocation
page execute and read and write
7826000
heap
page read and write
6C50000
trusted library allocation
page read and write
C11000
heap
page read and write
673000
heap
page read and write
C11000
heap
page read and write
4A6C000
stack
page read and write
4F10000
heap
page read and write
C11000
heap
page read and write
7675000
heap
page read and write
1310000
heap
page read and write
4E83000
heap
page read and write
11C0000
unkown
page readonly
B80000
heap
page read and write
C1A000
heap
page read and write
38D9000
trusted library allocation
page read and write
2FD4000
unkown
page read and write
4DF0000
trusted library allocation
page read and write
BC0000
unkown
page read and write
B02000
trusted library allocation
page read and write
66F000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
780E000
heap
page read and write
76FA000
heap
page read and write
A70000
trusted library allocation
page read and write
2D50000
unkown
page read and write
1010000
unkown
page readonly
19F4B0B0000
system
page execute and read and write
98C000
stack
page read and write
4500000
direct allocation
page execute and read and write
19F4CC10000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
4F14000
unclassified section
page read and write
11E0000
heap
page read and write
1318000
heap
page read and write
870000
heap
page read and write
C11000
heap
page read and write
5355000
heap
page read and write
5A21000
heap
page read and write
77B5000
heap
page read and write
4E70000
trusted library allocation
page execute and read and write
131F000
stack
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
28C0000
heap
page read and write
EDD000
stack
page read and write
C11000
heap
page read and write
2BD8000
trusted library allocation
page read and write
2CF0000
unkown
page readonly
C11000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
6E7E000
stack
page read and write
C11000
heap
page read and write
B82000
heap
page read and write
B40000
heap
page read and write
BF9000
heap
page read and write
C11000
heap
page read and write
810000
unkown
page readonly
C11000
heap
page read and write
6EBD000
stack
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
658000
heap
page read and write
1390000
direct allocation
page execute and read and write
77AD000
heap
page read and write
C0F000
heap
page read and write
C11000
heap
page read and write
F9E000
stack
page read and write
2EC0000
heap
page read and write
53E0000
trusted library allocation
page execute and read and write
679000
heap
page read and write
29B4000
trusted library allocation
page read and write
77B8000
heap
page read and write
C11000
heap
page read and write
5238000
unclassified section
page read and write
4F7000
unkown
page readonly
C11000
heap
page read and write
28D1000
trusted library allocation
page read and write
77E5000
heap
page read and write
C11000
heap
page read and write
5D0000
heap
page read and write
77BA000
heap
page read and write
C11000
heap
page read and write
47CD000
direct allocation
page execute and read and write
C11000
heap
page read and write
11DBE000
stack
page read and write
410000
unkown
page readonly
4F7000
unkown
page readonly
291C000
trusted library allocation
page read and write
C11000
heap
page read and write
77C4000
heap
page read and write
C11000
heap
page read and write
494000
heap
page read and write
4DD6000
trusted library allocation
page read and write
AF6000
trusted library allocation
page execute and read and write
C11000
heap
page read and write
11CBE000
stack
page read and write
2900000
heap
page read and write
C11000
heap
page read and write
B9E000
stack
page read and write
41C3000
trusted library allocation
page read and write
C11000
heap
page read and write
4E1000
unkown
page execute read
C11000
heap
page read and write
BE8000
heap
page read and write
4E0000
unkown
page readonly
7E3F000
stack
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
800000
unkown
page readonly
C11000
heap
page read and write
19B000
stack
page read and write
75D8000
heap
page read and write
7A0000
trusted library allocation
page read and write
B5F000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
165D000
direct allocation
page execute and read and write
496B000
trusted library allocation
page read and write
F99000
heap
page read and write
1550000
unkown
page readonly
7652000
heap
page read and write
5030000
trusted library allocation
page read and write
9F0000
heap
page read and write
4EE000
unkown
page readonly
C11000
heap
page read and write
C11000
heap
page read and write
4E1000
unkown
page execute read
F97000
heap
page read and write
C11000
heap
page read and write
5070000
heap
page execute and read and write
B40000
unkown
page read and write
1F91000
unclassified section
page execute and read and write
B40000
unkown
page read and write
5C0000
heap
page read and write
28A0000
trusted library allocation
page read and write
77EB000
heap
page read and write
679000
heap
page read and write
9C0000
unkown
page readonly
723000
heap
page read and write
5880000
unclassified section
page read and write
532E000
stack
page read and write
E9E000
stack
page read and write
53D0000
trusted library section
page read and write
BD0000
unkown
page read and write
4DB4000
trusted library allocation
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
800000
unkown
page readonly
C11000
heap
page read and write
4F7000
unkown
page readonly
2680000
unkown
page read and write
19F4CE15000
trusted library allocation
page read and write
673000
heap
page read and write
9E0000
unkown
page readonly
B30000
heap
page execute and read and write
C11000
heap
page read and write
4DB0000
trusted library allocation
page read and write
C11000
heap
page read and write
447D000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
1000000
unkown
page readonly
C11000
heap
page read and write
3F88000
unkown
page read and write
12F0000
unkown
page read and write
5430000
trusted library section
page read and write
48D0000
trusted library section
page read and write
C11000
heap
page read and write
6AF0000
heap
page read and write
443E000
stack
page read and write
7814000
heap
page read and write
C11000
heap
page read and write
1020000
heap
page read and write
C11000
heap
page read and write
7819000
heap
page read and write
29D2000
unkown
page read and write
BE0000
heap
page read and write
C11000
heap
page read and write
1390000
heap
page read and write
66A000
heap
page read and write
4EE000
unkown
page readonly
66A000
heap
page read and write
C11000
heap
page read and write
16D8000
direct allocation
page execute and read and write
4E0000
unkown
page readonly
6C7000
heap
page read and write
4EB0000
trusted library allocation
page execute and read and write
C11000
heap
page read and write
19F4CF01000
trusted library allocation
page read and write
117D000
stack
page read and write
781E000
heap
page read and write
480000
heap
page read and write
28B0000
trusted library allocation
page read and write
66E000
heap
page read and write
BE0000
heap
page read and write
154F000
stack
page read and write
76E0000
trusted library allocation
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
77AB000
heap
page read and write
7808000
heap
page read and write
9F0000
heap
page read and write
EA87FE000
stack
page read and write
77A6000
heap
page read and write
5D36000
unclassified section
page read and write
50F5000
system
page execute and read and write
3C64000
unkown
page read and write
C11000
heap
page read and write
762B000
heap
page read and write
1641000
direct allocation
page execute and read and write
BF7000
heap
page read and write
AE0000
trusted library allocation
page read and write
19F4CE00000
trusted library allocation
page read and write
C11000
heap
page read and write
4F5000
unkown
page read and write
1318000
heap
page read and write
C11000
heap
page read and write
1010000
unkown
page readonly
107A000
stack
page read and write
19F4CAB0000
trusted library allocation
page read and write
19F4CFCE000
trusted library allocation
page read and write
4E0000
unkown
page readonly
26DC000
unkown
page read and write
14B9000
direct allocation
page execute and read and write
19F4B0FB000
system
page execute and read and write
88A000
stack
page read and write
4EA0000
trusted library allocation
page read and write
71F000
heap
page read and write
5050000
trusted library allocation
page execute and read and write
810000
unkown
page readonly
AF2000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
411A000
unkown
page read and write
AD4000
trusted library allocation
page read and write
673000
heap
page read and write
E60000
trusted library allocation
page read and write
6E6000
heap
page read and write
DE0000
unkown
page readonly
1170000
unkown
page readonly
6B3000
heap
page read and write
1210000
heap
page read and write
412000
unkown
page readonly
11C0000
unkown
page readonly
C11000
heap
page read and write
490000
heap
page read and write
1310000
heap
page read and write
19F4CE21000
trusted library allocation
page read and write
C11000
heap
page read and write
18E1000
unkown
page readonly
5092000
system
page execute and read and write
2DD0000
unkown
page readonly
3DF6000
unkown
page read and write
19F4B2A0000
heap
page read and write
1340000
heap
page read and write
6DB000
heap
page read and write
C11000
heap
page read and write
4350000
trusted library allocation
page execute and read and write
18E0000
unkown
page readonly
11B0000
unkown
page readonly
B07000
trusted library allocation
page execute and read and write
496C000
unclassified section
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
7815000
heap
page read and write
5350000
heap
page read and write
4EE000
unkown
page readonly
C11000
heap
page read and write
C11000
heap
page read and write
4E1000
unkown
page execute read
111C2000
trusted library allocation
page read and write
1D8000
stack
page read and write
291E000
trusted library allocation
page read and write
6BE000
heap
page read and write
2D3E000
stack
page read and write
C11000
heap
page read and write
4F5000
unkown
page read and write
1171000
unkown
page readonly
569000
stack
page read and write
C11000
heap
page read and write
8A2F000
stack
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
47D1000
direct allocation
page execute and read and write
4DE0000
trusted library allocation
page read and write
4479000
heap
page read and write
117D000
stack
page read and write
542E000
stack
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
67B000
heap
page read and write
7F8D0000
trusted library allocation
page execute and read and write
B042000
system
page read and write
4B2C000
unclassified section
page read and write
11A3E000
stack
page read and write
283E000
stack
page read and write
D90000
heap
page read and write
500B000
stack
page read and write
4EC0000
trusted library allocation
page read and write
C11000
heap
page read and write
6C7000
heap
page read and write
C11000
heap
page read and write
6C1000
heap
page read and write
C1C000
heap
page read and write
19F4B190000
heap
page read and write
EA8FFE000
stack
page read and write
C11000
heap
page read and write
19F4CD00000
trusted library allocation
page read and write
144E000
stack
page read and write
E20000
heap
page read and write
79E0000
heap
page read and write
2730000
unkown
page readonly
77E1000
heap
page read and write
1550000
unkown
page readonly
699000
heap
page read and write
B31000
unkown
page readonly
4F5000
unkown
page read and write
B15C000
system
page read and write
C11000
heap
page read and write
2904000
heap
page read and write
469E000
direct allocation
page execute and read and write
44EE000
heap
page read and write
5F7000
heap
page read and write
BFF000
heap
page read and write
637E000
unclassified section
page read and write
C11000
heap
page read and write
75EC000
heap
page read and write
7A0000
heap
page read and write
7DFE000
stack
page read and write
77B0000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
BA0000
unkown
page readonly
673000
heap
page read and write
19F4B0F8000
system
page execute and read and write
C11000
heap
page read and write
9D0000
unkown
page readonly
5082000
system
page execute and read and write
2EC4000
heap
page read and write
29BD000
trusted library allocation
page read and write
C11000
heap
page read and write
4629000
direct allocation
page execute and read and write
4E60000
trusted library allocation
page read and write
AFA000
trusted library allocation
page execute and read and write
C11000
heap
page read and write
605A000
unclassified section
page read and write
73D000
heap
page read and write
C11000
heap
page read and write
19F4B2A7000
heap
page read and write
C11000
heap
page read and write
3940000
unkown
page read and write
28B5000
trusted library allocation
page read and write
5077000
system
page execute and read and write
4E80000
heap
page read and write
C11000
heap
page read and write
7819000
heap
page read and write
152E000
direct allocation
page execute and read and write
4DDD000
trusted library allocation
page read and write
11E0000
heap
page read and write
2890000
trusted library allocation
page read and write
6AE000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
38D1000
trusted library allocation
page read and write
ADD000
trusted library allocation
page execute and read and write
C11000
heap
page read and write
19F4B2D2000
heap
page read and write
6C1000
heap
page read and write
5F0000
heap
page read and write
C11000
heap
page read and write
9F6000
heap
page read and write
679000
heap
page read and write
42AE000
trusted library allocation
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
4F7000
unkown
page readonly
C11000
heap
page read and write
7821000
heap
page read and write
19F4CE03000
trusted library allocation
page read and write
2A2C000
unkown
page read and write
494000
heap
page read and write
B20000
unkown
page read and write
C11000
heap
page read and write
F20000
heap
page read and write
EA7FFD000
stack
page read and write
BF4000
heap
page read and write
B1E000
stack
page read and write
D90000
heap
page read and write
BC0000
unkown
page read and write
B0B000
trusted library allocation
page execute and read and write
AD3000
trusted library allocation
page execute and read and write
121F000
stack
page read and write
6F7000
heap
page read and write
7790000
trusted library allocation
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
2BEC000
unkown
page read and write
7816000
heap
page read and write
19F4CAB0000
trusted library allocation
page read and write
1FFF000
unclassified section
page execute and read and write
7612000
heap
page read and write
DF0000
unkown
page readonly
19F4B2CB000
heap
page read and write
4DCE000
trusted library allocation
page read and write
C10000
heap
page read and write
718000
heap
page read and write
D7E000
stack
page read and write
DDE000
stack
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
5EC8000
unclassified section
page read and write
C11000
heap
page read and write
6BF0000
trusted library allocation
page read and write
C11000
heap
page read and write
2880000
trusted library allocation
page read and write
6F2000
heap
page read and write
19F4CE0D000
trusted library allocation
page read and write
2D50000
unkown
page read and write
B20000
trusted library allocation
page read and write
19F4CFBE000
trusted library allocation
page read and write
C11000
heap
page read and write
729000
heap
page read and write
C11000
heap
page read and write
11DFE000
stack
page read and write
762E000
heap
page read and write
11D0000
unkown
page readonly
11B0000
unkown
page readonly
B704000
system
page read and write
AED000
trusted library allocation
page execute and read and write
71F2000
trusted library allocation
page read and write
782C000
heap
page read and write
C11000
heap
page read and write
1210000
heap
page read and write
9C0000
unkown
page readonly
E1E000
stack
page read and write
C11000
heap
page read and write
C3C000
stack
page read and write
12F0000
unkown
page read and write
C11000
heap
page read and write
361C000
unkown
page read and write
C11000
heap
page read and write
6D4000
heap
page read and write
77A1000
heap
page read and write
C11000
heap
page read and write
5330000
trusted library section
page read and write
7824000
heap
page read and write
443E000
unkown
page read and write
75D4000
heap
page read and write
D3D000
heap
page read and write
C11000
heap
page read and write
9E0000
unkown
page readonly
C11000
heap
page read and write
C11000
heap
page read and write
1656000
direct allocation
page execute and read and write
A4E000
stack
page read and write
C11000
heap
page read and write
4842000
direct allocation
page execute and read and write
D10000
heap
page read and write
7460000
trusted library allocation
page read and write
2DD0000
unkown
page readonly
526D000
stack
page read and write
19F4CAB0000
trusted library allocation
page read and write
C11000
heap
page read and write
7CD000
unkown
page read and write
668000
heap
page read and write
525C000
unkown
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
287C000
stack
page read and write
C11000
heap
page read and write
2EC0000
heap
page read and write
C11000
heap
page read and write
A80000
heap
page read and write
703000
heap
page read and write
4EF0000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
7827000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
668000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
BE8000
heap
page read and write
A0E000
stack
page read and write
5060000
trusted library allocation
page read and write
2720000
heap
page read and write
C11000
heap
page read and write
C11000
heap
page read and write
4E50000
heap
page read and write
19F4CE10000
trusted library allocation
page read and write
DB0000
trusted library allocation
page read and write
6C30000
trusted library allocation
page execute and read and write
E60000
trusted library allocation
page read and write
2904000
heap
page read and write
There are 651 hidden memdumps, click here to show them.