IOC Report
03.07.2024-sipari#U015f UG01072410 - Onka ve Tic a.s .exe

loading gif

Files

File Path
Type
Category
Malicious
03.07.2024-sipari#U015f UG01072410 - Onka ve Tic a.s .exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\03.07.2024-sipari#U015f UG01072410 - Onka ve Tic a.s .exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\410-3696
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_csme5hsf.fwq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gu3ek3pu.vgc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qakqe5ur.vo2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ts0toslt.13i.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\03.07.2024-sipari#U015f UG01072410 - Onka ve Tic a.s .exe
"C:\Users\user\Desktop\03.07.2024-sipari#U015f UG01072410 - Onka ve Tic a.s .exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\03.07.2024-sipari#U015f UG01072410 - Onka ve Tic a.s .exe"
malicious
C:\Users\user\Desktop\03.07.2024-sipari#U015f UG01072410 - Onka ve Tic a.s .exe
"C:\Users\user\Desktop\03.07.2024-sipari#U015f UG01072410 - Onka ve Tic a.s .exe"
malicious
C:\Program Files (x86)\dBFhdyqBsdNrnrJAfNLOKXKaQnhKQJBcldNsIfNpUQtMCDpaQGBzTrWGWqXfCiiJiSX\akwoJPEqdiyPQmCnaGzo.exe
"C:\Program Files (x86)\dBFhdyqBsdNrnrJAfNLOKXKaQnhKQJBcldNsIfNpUQtMCDpaQGBzTrWGWqXfCiiJiSX\akwoJPEqdiyPQmCnaGzo.exe"
malicious
C:\Windows\SysWOW64\fc.exe
"C:\Windows\SysWOW64\fc.exe"
malicious
C:\Program Files (x86)\dBFhdyqBsdNrnrJAfNLOKXKaQnhKQJBcldNsIfNpUQtMCDpaQGBzTrWGWqXfCiiJiSX\akwoJPEqdiyPQmCnaGzo.exe
"C:\Program Files (x86)\dBFhdyqBsdNrnrJAfNLOKXKaQnhKQJBcldNsIfNpUQtMCDpaQGBzTrWGWqXfCiiJiSX\akwoJPEqdiyPQmCnaGzo.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.fontbureau.com/designersG
unknown
http://www.hissmjkl.com/m0xz/?lxRlvTSh=mXjiODcdBBXx02CT+mommPNahBZnOONdEz0dJALDPbptcbrNH3E9vFlm0oQl87Jfr/zi8sA6LXl9HQJlpR4v66WH/OKR7mDYMhPXwYhk+M55Q9NgI1iegHg=&kh=9PxLvhoHS4
172.67.137.15
https://duckduckgo.com/ac/?q=
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.1.3/css/bootstrap.min.css
unknown
http://www.saalameh.com/hfb9/?lxRlvTSh=fwSRWDIDlEtpZKpO15TnR7rdvvbvUQOUwoPVjl38Pi8M+UCq29ZeNKRmFQz0yoK86tSBJtX0+7UQykNFUthSdrPfT9CD49CruGe2y7ZC/ovpvsGUE+526xA=&kh=9PxLvhoHS4
84.32.84.32
http://www.qdfake525pm.xyz/a24j/?lxRlvTSh=RsceReT900EWT/dwsr4j9O4BlXzkLceVZQ7aWeUSP6prvEVffZLEO15AIWxlHKHabVj2I55FGLI5L0C49uGheAnDVqmJ9AiU0eI6N3YkeR21zvyMSZqsHmQ=&kh=9PxLvhoHS4
38.150.29.6
http://www.monchosoft.com/735n/?lxRlvTSh=KJAlFkGNwGXoK9jXB03h4jJMHTy8Y0+g9t3JgJmyeOCBT/uylrmuLZmon7piRwxkAvV6Iq7XsIFI/+KtRdw7O50MagBKJtHJjM3XcudO1Duzw6d1NcP9VI8=&kh=9PxLvhoHS4
46.30.211.38
http://www.tiro.com
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://goge8opp.com:301
unknown
http://www.goodfont.co.kr
unknown
http://www.66hc7.com/ooz9/?lxRlvTSh=MlFGyqpiH0BFSJI/fef/dCG888BGWBIcHVtVHklmmXS6c3kDIZAL8aaEfl7Aaohh3sZenWVq3ThPiwkLLGk004Us/fWH1X98Emf9JC/rX1g9bPHIk5sfq80=&kh=9PxLvhoHS4
162.209.189.212
http://www.valerieomage.com/k2gj/
23.227.38.74
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.saalameh.com/hfb9/
84.32.84.32
http://www.devele.top/nm4d/
162.0.213.72
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.66hc7.com/ooz9/
162.209.189.212
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
https://cdnjs.cloudflare.com/ajax/libs/normalize/5.0.0/normalize.min.css
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
http://www.kaps4kancer.org/tqvk/
74.208.236.247
http://www.kaps4kancer.org/tqvk/?lxRlvTSh=sqV4H0HgKEmT+MSVPZvHtNNOCugFouPGcNtakGXEq4+Q8zlVn8x6bNcZA2Wcm7hNKJFeivErhIl2wMRsNIGAokWHBtGrsDvz+bZZo+cuUvU/JTN/Qn5+SZw=&kh=9PxLvhoHS4
74.208.236.247
http://www.theweekendcreator.com/4h78/
217.160.0.87
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.theweekendcreator.com/4h78/?lxRlvTSh=bXG7bLU8VpdhFuw8OEWepvz+lmtIgfU4QefCRLOwt0xUHukcXkmHP9rgqbjL97YnLUFJGTOXt4l1DZESwR3Y2jPuWZfGScD+gHNftK8/3r/KPWW9Eddz3K4=&kh=9PxLvhoHS4
217.160.0.87
https://www.ecosia.org/newtab/
unknown
http://www.ybw73.top/0ag0/?lxRlvTSh=ijsxwTuQWQMrQrpunY58zmHtK7oEhmVQOqZdZNdH7TeXDSEes5ptIscTzSElyzixUNFuHL69iVpfwUSC4AMHMDnys0WZTFD5qHcVGhhYgxj+QsPKbvjZ0mA=&kh=9PxLvhoHS4
38.47.232.233
http://www.carterandcone.coml
unknown
http://www.ybw73.top/0ag0/
38.47.232.233
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.hissmjkl.com/m0xz/
172.67.137.15
https://cdnjs.cloudflare.com/ajax/libs/gsap/3.1.1/gsap.min.js
unknown
https://valerieomage.com/k2gj?lxRlvTSh=ymeZBmicwKRkvYz1pzK8dvNYDsR2PzT6E62YqhKlQApFxMMJHFlv70ADTYJNZ
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.saalameh.com
unknown
http://www.fontbureau.com/designers8
unknown
http://www.valerieomage.com/k2gj/?lxRlvTSh=ymeZBmicwKRkvYz1pzK8dvNYDsR2PzT6E62YqhKlQApFxMMJHFlv70ADTYJNZSHN5jgdkAWV5BpKxies/HoRpeaidodvJqxOnF4QVVaL9HaFaof4/PPNLQo=&kh=9PxLvhoHS4
23.227.38.74
http://www.katgstamps.com/el0d/
3.33.130.190
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.monchosoft.com/735n/
46.30.211.38
http://www.katgstamps.com/el0d/?lxRlvTSh=+Q7ZzK8QtvU36dLJnzucjS+TJ0IzvZmyWs7tRfA/z2Vlh6102r3Lp6tJH45cMzuZYwqpgOtAlm44C9LsA0ZyYXRYfzgEIkIQAxK9duS/lWCJ3udFt4tR1RA=&kh=9PxLvhoHS4
3.33.130.190
There are 51 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
qdfake525pm.xyz
38.150.29.6
malicious
www.miningarea.fun
unknown
malicious
www.katgstamps.com
unknown
malicious
www.qdfake525pm.xyz
unknown
malicious
www.saalameh.com
unknown
malicious
www.ddi828media.com
unknown
malicious
www.com-kh.com
unknown
malicious
www.vivemasvivebien.com
unknown
malicious
www.ybw73.top
unknown
malicious
www.66hc7.com
unknown
malicious
www.valerieomage.com
unknown
malicious
ybw73.top
38.47.232.233
www.hissmjkl.com
172.67.137.15
www.theweekendcreator.com
217.160.0.87
saalameh.com
84.32.84.32
www.kaps4kancer.org
74.208.236.247
katgstamps.com
3.33.130.190
kloeti.pc205kopl.com
162.209.189.212
www.monchosoft.com
46.30.211.38
www.devele.top
162.0.213.72
shops.myshopify.com
23.227.38.74
There are 11 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
38.150.29.6
qdfake525pm.xyz
United States
malicious
162.0.213.72
www.devele.top
Canada
162.209.189.212
kloeti.pc205kopl.com
United States
172.67.137.15
www.hissmjkl.com
United States
23.227.38.74
shops.myshopify.com
Canada
84.32.84.32
saalameh.com
Lithuania
217.160.0.87
www.theweekendcreator.com
Germany
38.47.232.233
ybw73.top
United States
46.30.211.38
www.monchosoft.com
Denmark
74.208.236.247
www.kaps4kancer.org
United States
3.33.130.190
katgstamps.com
United States
There are 1 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4530000
unkown
page execute and read and write
malicious
3A50000
unclassified section
page execute and read and write
malicious
390000
system
page execute and read and write
malicious
B90000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
1C10000
unclassified section
page execute and read and write
malicious
50C0000
system
page execute and read and write
malicious
B50000
trusted library allocation
page read and write
malicious
1D97D200000
trusted library allocation
page read and write
931000
heap
page read and write
931000
heap
page read and write
7B1E000
stack
page read and write
5EAE000
stack
page read and write
31DC000
unclassified section
page read and write
790000
heap
page read and write
CF0000
heap
page read and write
698000
heap
page read and write
D0F000
heap
page read and write
FCD000
trusted library allocation
page execute and read and write
1D97B8A0000
heap
page read and write
CE0000
unkown
page readonly
931000
heap
page read and write
931000
heap
page read and write
29B2000
unkown
page read and write
10EE000
stack
page read and write
1300000
heap
page read and write
C1B000
heap
page read and write
931000
heap
page read and write
126E000
stack
page read and write
931000
heap
page read and write
75B5000
heap
page read and write
F3E000
stack
page read and write
6E0000
heap
page read and write
2450000
unkown
page read and write
930000
heap
page read and write
64B000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
590000
unkown
page readonly
19E9000
direct allocation
page execute and read and write
1C50000
unclassified section
page execute and read and write
830000
unkown
page readonly
3B72000
unkown
page read and write
83E000
unkown
page readonly
845000
unkown
page read and write
931000
heap
page read and write
FD3000
trusted library allocation
page read and write
931000
heap
page read and write
931000
heap
page read and write
521D000
trusted library allocation
page read and write
931000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
5F0000
unkown
page read and write
C70000
trusted library allocation
page read and write
3020000
trusted library allocation
page execute and read and write
75A1000
heap
page read and write
931000
heap
page read and write
831000
unkown
page execute read
75D1000
heap
page read and write
931000
heap
page read and write
45A6000
unclassified section
page read and write
1460000
heap
page read and write
931000
heap
page read and write
C60000
heap
page read and write
75E4000
heap
page read and write
931000
heap
page read and write
75BA000
heap
page read and write
71B2000
trusted library allocation
page read and write
931000
heap
page read and write
75A1000
heap
page read and write
931000
heap
page read and write
1D97B72A000
system
page execute and read and write
931000
heap
page read and write
57F0000
trusted library allocation
page read and write
D9A000
heap
page read and write
9F0000
heap
page read and write
7F0000
unkown
page readonly
931000
heap
page read and write
800000
unkown
page readonly
3B742000
system
page read and write
845000
unkown
page read and write
999000
stack
page read and write
FFE000
stack
page read and write
75A1000
heap
page read and write
7190000
trusted library allocation
page read and write
5FF7000
heap
page read and write
FC0000
unkown
page readonly
931000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
4555000
trusted library allocation
page read and write
759E000
heap
page read and write
C00000
heap
page read and write
931000
heap
page read and write
8D6E000
stack
page read and write
931000
heap
page read and write
11FA000
trusted library allocation
page execute and read and write
C80000
unkown
page read and write
18C0000
direct allocation
page execute and read and write
931000
heap
page read and write
CE0000
unkown
page readonly
3FFC000
unclassified section
page execute and read and write
6F6000
heap
page read and write
931000
heap
page read and write
64A000
heap
page read and write
3012000
direct allocation
page execute and read and write
1D97D4CE000
trusted library allocation
page read and write
931000
heap
page read and write
51F4000
trusted library allocation
page read and write
5280000
heap
page read and write
931000
heap
page read and write
785A000
heap
page read and write
D21000
heap
page read and write
931000
heap
page read and write
1325000
trusted library allocation
page read and write
931000
heap
page read and write
931000
heap
page read and write
11EE000
stack
page read and write
931000
heap
page read and write
75D8000
heap
page read and write
7E0000
unkown
page readonly
3CB1000
trusted library allocation
page read and write
FC3000
trusted library allocation
page execute and read and write
54DC000
unkown
page execute and read and write
12AC000
stack
page read and write
6E2000
heap
page read and write
931000
heap
page read and write
75AB000
heap
page read and write
931000
heap
page read and write
6A4000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
A34000
heap
page read and write
931000
heap
page read and write
DF6000
heap
page read and write
54A000
stack
page read and write
783F000
stack
page read and write
2C19000
trusted library allocation
page read and write
6B6000
heap
page read and write
5C0000
unkown
page read and write
931000
heap
page read and write
5B0000
heap
page read and write
57E0000
trusted library allocation
page read and write
5240000
heap
page read and write
75B2000
heap
page read and write
75C4000
heap
page read and write
1000000
unkown
page readonly
2CF6000
trusted library allocation
page read and write
C71000
unkown
page readonly
6BC000
heap
page read and write
2880000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
2880000
heap
page read and write
2C00000
trusted library allocation
page read and write
931000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
7F3D0000
trusted library allocation
page execute and read and write
54C0000
heap
page execute and read and write
845000
unkown
page read and write
A6E000
stack
page read and write
931000
heap
page read and write
54BB000
stack
page read and write
71D000
heap
page read and write
A30000
trusted library allocation
page read and write
931000
heap
page read and write
931000
heap
page read and write
9F6000
heap
page read and write
610000
heap
page read and write
812000
unkown
page readonly
1A5E000
direct allocation
page execute and read and write
5630000
heap
page read and write
3E96000
unkown
page read and write
C8C000
heap
page read and write
C80000
unkown
page read and write
7160000
trusted library section
page read and write
1B8D000
direct allocation
page execute and read and write
931000
heap
page read and write
931000
heap
page read and write
3B30000
unkown
page execute and read and write
FC0000
unkown
page readonly
75A1000
heap
page read and write
931000
heap
page read and write
75A6000
heap
page read and write
3DCC000
unclassified section
page read and write
847000
unkown
page readonly
D27E000
stack
page read and write
931000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
1D97B93C000
heap
page read and write
931000
heap
page read and write
7E0000
unkown
page readonly
4D0000
unkown
page readonly
773E000
stack
page read and write
5E1000
unkown
page readonly
9D0000
unkown
page readonly
D570000
trusted library section
page read and write
810000
unkown
page readonly
931000
heap
page read and write
931000
heap
page read and write
11F6000
trusted library allocation
page execute and read and write
630000
heap
page read and write
600000
heap
page read and write
7850000
heap
page read and write
516F000
system
page execute and read and write
C50000
unkown
page read and write
517F000
system
page execute and read and write
931000
heap
page read and write
7A7E000
stack
page read and write
931000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
579E000
stack
page read and write
931000
heap
page read and write
CF8000
heap
page read and write
931000
heap
page read and write
C70000
unkown
page readonly
931000
heap
page read and write
5DBE000
stack
page read and write
4282000
unclassified section
page read and write
931000
heap
page read and write
19ED000
direct allocation
page execute and read and write
1D97D4C4000
trusted library allocation
page read and write
931000
heap
page read and write
1467000
heap
page read and write
2730000
unkown
page execute and read and write
D46000
heap
page read and write
2FBA000
trusted library allocation
page read and write
5296000
trusted library allocation
page read and write
931000
heap
page read and write
1D97D400000
trusted library allocation
page read and write
794000
heap
page read and write
75A1000
heap
page read and write
647000
heap
page read and write
1351000
unkown
page readonly
931000
heap
page read and write
931000
heap
page read and write
1D97D401000
trusted library allocation
page read and write
13459FE000
stack
page read and write
520E000
trusted library allocation
page read and write
384E000
unkown
page read and write
6D4000
heap
page read and write
E10000
heap
page read and write
6B3000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
2CD0000
direct allocation
page execute and read and write
2CA0000
heap
page execute and read and write
931000
heap
page read and write
30C2000
unclassified section
page read and write
931000
heap
page read and write
931000
heap
page read and write
6E4000
heap
page read and write
99C000
stack
page read and write
1000000
unkown
page readonly
730000
heap
page read and write
A78000
heap
page read and write
2C8C000
unkown
page read and write
1D97B952000
heap
page read and write
45A3000
trusted library allocation
page read and write
831000
unkown
page execute read
7A80000
trusted library section
page read and write
931000
heap
page read and write
1220000
trusted library allocation
page read and write
2640000
unkown
page readonly
931000
heap
page read and write
147C000
heap
page read and write
FC4000
trusted library allocation
page read and write
3B682000
system
page read and write
D00000
heap
page read and write
10FEC000
stack
page read and write
5292000
trusted library allocation
page read and write
931000
heap
page read and write
657000
heap
page read and write
FB0000
trusted library allocation
page read and write
931000
heap
page read and write
65C000
heap
page read and write
794000
heap
page read and write
F7E000
stack
page read and write
75A1000
heap
page read and write
75A1000
heap
page read and write
931000
heap
page read and write
2CB1000
trusted library allocation
page read and write
931000
heap
page read and write
931000
heap
page read and write
468E000
trusted library allocation
page read and write
5100000
heap
page read and write
75A1000
heap
page read and write
4028000
unkown
page read and write
931000
heap
page read and write
75A1000
heap
page read and write
661000
heap
page read and write
931000
heap
page read and write
29B2000
unkown
page read and write
931000
heap
page read and write
831000
unkown
page execute read
650000
heap
page read and write
5F0000
unkown
page read and write
6B6000
heap
page read and write
2530000
heap
page read and write
931000
heap
page read and write
3182000
unclassified section
page read and write
28C0000
unkown
page readonly
75B0000
heap
page read and write
656000
heap
page read and write
2640000
unkown
page readonly
931000
heap
page read and write
75A1000
heap
page read and write
1D97D4BE000
trusted library allocation
page read and write
57DE000
stack
page read and write
2884000
heap
page read and write
931000
heap
page read and write
9F0000
unkown
page readonly
2524000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
580000
unkown
page readonly
931000
heap
page read and write
EF0000
heap
page read and write
931000
heap
page read and write
5D0000
heap
page read and write
590000
unkown
page readonly
44DE000
unkown
page read and write
931000
heap
page read and write
51E1000
system
page execute and read and write
75A1000
heap
page read and write
28C0000
unkown
page readonly
A54000
heap
page read and write
75A1000
heap
page read and write
75A1000
heap
page read and write
9D0000
unkown
page readonly
4414000
unclassified section
page read and write
4ADC000
unkown
page execute and read and write
652000
heap
page read and write
9E0000
unkown
page readonly
5FC0000
heap
page read and write
931000
heap
page read and write
2524000
heap
page read and write
54A000
stack
page read and write
F69F000
trusted library allocation
page read and write
4C0000
unkown
page readonly
6A9000
heap
page read and write
2E95000
trusted library allocation
page read and write
931000
heap
page read and write
2450000
unkown
page read and write
5640000
heap
page read and write
75A1000
heap
page read and write
931000
heap
page read and write
2A72000
unkown
page read and write
931000
heap
page read and write
10EEC000
stack
page read and write
560E000
stack
page read and write
1860000
direct allocation
page read and write
A70000
heap
page read and write
C71000
unkown
page readonly
931000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
64B000
heap
page read and write
6C9000
heap
page read and write
931000
heap
page read and write
FE0000
heap
page read and write
2530000
heap
page read and write
64D000
heap
page read and write
931000
heap
page read and write
50F0000
heap
page read and write
931000
heap
page read and write
4E0000
unkown
page readonly
830000
unkown
page readonly
931000
heap
page read and write
13E0000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
31B000
stack
page read and write
830000
unkown
page readonly
75A1000
heap
page read and write
830000
unkown
page readonly
83E000
unkown
page readonly
A96000
heap
page read and write
518B000
system
page execute and read and write
52FC000
stack
page read and write
931000
heap
page read and write
1348000
heap
page read and write
76A0000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
3B95C000
system
page read and write
2FA1000
direct allocation
page execute and read and write
99C000
stack
page read and write
931000
heap
page read and write
AEE000
heap
page read and write
931000
heap
page read and write
5D0000
heap
page read and write
7590000
trusted library allocation
page read and write
931000
heap
page read and write
89A000
stack
page read and write
4D0000
unkown
page readonly
7D9F000
stack
page read and write
931000
heap
page read and write
931000
heap
page read and write
52B0000
trusted library allocation
page read and write
4C0000
unkown
page readonly
931000
heap
page read and write
75A1000
heap
page read and write
1320000
trusted library allocation
page read and write
931000
heap
page read and write
12E0000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
794000
heap
page read and write
931000
heap
page read and write
2F9D000
direct allocation
page execute and read and write
D44000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
6CF000
heap
page read and write
7180000
trusted library allocation
page execute and read and write
931000
heap
page read and write
1D97B952000
heap
page read and write
5164000
system
page execute and read and write
D3A000
heap
page read and write
1560000
heap
page read and write
1D97B8E0000
heap
page read and write
1D97B6F0000
system
page execute and read and write
339C000
unclassified section
page read and write
1D97B7C0000
heap
page read and write
1350000
unkown
page readonly
28B0000
heap
page read and write
A70000
heap
page read and write
5A0000
unkown
page readonly
75A1000
heap
page read and write
931000
heap
page read and write
1D97D300000
trusted library allocation
page read and write
931000
heap
page read and write
7F0000
unkown
page readonly
1B71000
direct allocation
page execute and read and write
FDD000
trusted library allocation
page execute and read and write
931000
heap
page read and write
D0E000
heap
page read and write
75A1000
heap
page read and write
7840000
heap
page read and write
931000
heap
page read and write
FD0000
trusted library allocation
page read and write
13F0000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
575E000
stack
page read and write
40F0000
unclassified section
page read and write
2870000
unkown
page read and write
434C000
unkown
page read and write
FC0000
trusted library allocation
page read and write
75A1000
heap
page read and write
2C6E000
stack
page read and write
1330000
trusted library allocation
page read and write
65C000
heap
page read and write
75EF000
heap
page read and write
931000
heap
page read and write
120B000
trusted library allocation
page execute and read and write
6E9000
heap
page read and write
263F000
stack
page read and write
2870000
unkown
page read and write
931000
heap
page read and write
5D7E000
stack
page read and write
3F5E000
unclassified section
page read and write
6B3000
heap
page read and write
C00000
heap
page read and write
1D97B920000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
656000
heap
page read and write
FB0000
heap
page read and write
1D97B927000
heap
page read and write
DA3000
heap
page read and write
1200000
trusted library allocation
page read and write
931000
heap
page read and write
3074000
unkown
page read and write
847000
unkown
page readonly
3BD44000
system
page read and write
95C000
stack
page read and write
931000
heap
page read and write
7AA0000
trusted library allocation
page read and write
75DB000
heap
page read and write
CF8000
heap
page read and write
931000
heap
page read and write
4507000
trusted library allocation
page read and write
931000
heap
page read and write
1310000
trusted library allocation
page read and write
1207000
trusted library allocation
page execute and read and write
797E000
stack
page read and write
5650000
heap
page read and write
931000
heap
page read and write
2ACC000
unkown
page read and write
931000
heap
page read and write
931000
heap
page read and write
9E0000
unkown
page readonly
931000
heap
page read and write
4738000
unclassified section
page read and write
931000
heap
page read and write
4BEE000
unclassified section
page read and write
931000
heap
page read and write
931000
heap
page read and write
13449FD000
stack
page read and write
931000
heap
page read and write
75A1000
heap
page read and write
75A0000
heap
page read and write
CF0000
heap
page read and write
70D000
heap
page read and write
5211000
trusted library allocation
page read and write
48CA000
unclassified section
page read and write
931000
heap
page read and write
75B8000
heap
page read and write
931000
heap
page read and write
3050000
unclassified section
page execute and read and write
C70000
unkown
page readonly
931000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
49FC000
unclassified section
page execute and read and write
51F0000
trusted library allocation
page read and write
28B0000
heap
page read and write
89A000
stack
page read and write
931000
heap
page read and write
1202000
trusted library allocation
page read and write
931000
heap
page read and write
185F000
stack
page read and write
931000
heap
page read and write
DBA000
heap
page read and write
358000
stack
page read and write
2BFE000
trusted library allocation
page read and write
75A1000
heap
page read and write
41BA000
unkown
page read and write
5FB0000
heap
page read and write
95C000
stack
page read and write
1D97D4AB000
trusted library allocation
page read and write
5610000
heap
page read and write
800000
unkown
page readonly
55CD000
stack
page read and write
2DFD000
direct allocation
page execute and read and write
931000
heap
page read and write
6BC000
heap
page read and write
D46F000
stack
page read and write
12FA000
stack
page read and write
1B86000
direct allocation
page execute and read and write
2BF0000
trusted library allocation
page read and write
1D97D303000
trusted library allocation
page read and write
1D97D321000
trusted library allocation
page read and write
2C8C000
unkown
page read and write
C4E000
stack
page read and write
12F0000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
D36000
heap
page read and write
C17000
heap
page read and write
931000
heap
page read and write
1D97B94F000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
12D0000
trusted library allocation
page execute and read and write
931000
heap
page read and write
931000
heap
page read and write
C70000
trusted library allocation
page read and write
13D0000
heap
page read and write
580000
unkown
page readonly
C50000
unkown
page read and write
931000
heap
page read and write
CF7000
stack
page read and write
931000
heap
page read and write
1D97D1C0000
heap
page read and write
C6F000
stack
page read and write
931000
heap
page read and write
931000
heap
page read and write
9F0000
unkown
page readonly
931000
heap
page read and write
2884000
heap
page read and write
931000
heap
page read and write
810000
unkown
page readonly
279C000
stack
page read and write
2C20000
trusted library allocation
page execute and read and write
5FAE000
stack
page read and write
931000
heap
page read and write
931000
heap
page read and write
2520000
heap
page read and write
1340000
heap
page read and write
5620000
trusted library section
page readonly
11F2000
trusted library allocation
page read and write
931000
heap
page read and write
78D0000
heap
page read and write
7D5E000
stack
page read and write
845000
unkown
page read and write
931000
heap
page read and write
CA0000
unkown
page read and write
7590000
heap
page read and write
5615000
heap
page read and write
5216000
trusted library allocation
page read and write
931000
heap
page read and write
640000
heap
page read and write
3130000
unkown
page execute and read and write
713000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
847000
unkown
page readonly
4E0000
unkown
page readonly
1D97D1D0000
trusted library allocation
page read and write
2BEE000
stack
page read and write
1C08000
direct allocation
page execute and read and write
FBF000
stack
page read and write
1D97B72C000
system
page execute and read and write
5A0000
unkown
page readonly
52A0000
trusted library allocation
page execute and read and write
931000
heap
page read and write
931000
heap
page read and write
7598000
heap
page read and write
52E0000
trusted library allocation
page execute and read and write
39E0000
unkown
page read and write
36BC000
unkown
page read and write
13451FE000
stack
page read and write
13441FB000
stack
page read and write
175F000
stack
page read and write
931000
heap
page read and write
F4C000
stack
page read and write
83E000
unkown
page readonly
C70000
trusted library allocation
page read and write
75A1000
heap
page read and write
1D97D316000
trusted library allocation
page read and write
1D97D310000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
657000
heap
page read and write
C60000
heap
page read and write
3CB9000
trusted library allocation
page read and write
1D97D30E000
trusted library allocation
page read and write
5C0000
unkown
page read and write
656000
heap
page read and write
1D97B92F000
heap
page read and write
2E8D000
trusted library allocation
page read and write
931000
heap
page read and write
931000
heap
page read and write
698000
heap
page read and write
3784000
unclassified section
page read and write
2C10000
trusted library allocation
page read and write
2650000
unclassified section
page execute and read and write
4DAC000
stack
page read and write
931000
heap
page read and write
75A1000
heap
page read and write
B30000
heap
page read and write
718000
heap
page read and write
847000
unkown
page readonly
931000
heap
page read and write
5B0000
heap
page read and write
D08000
heap
page read and write
810000
unkown
page readonly
5E1000
unkown
page readonly
931000
heap
page read and write
83E000
unkown
page readonly
931000
heap
page read and write
75A1000
heap
page read and write
931000
heap
page read and write
1D97D1D0000
trusted library allocation
page read and write
A78000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
12B0000
heap
page read and write
1D97B728000
system
page execute and read and write
931000
heap
page read and write
2DF9000
direct allocation
page execute and read and write
6C9000
heap
page read and write
931000
heap
page read and write
831000
unkown
page execute read
143E000
stack
page read and write
244E000
stack
page read and write
931000
heap
page read and write
7A90000
trusted library section
page read and write
75A1000
heap
page read and write
931000
heap
page read and write
931000
heap
page read and write
2520000
heap
page read and write
3D04000
unkown
page read and write
931000
heap
page read and write
2E6E000
direct allocation
page execute and read and write
1D97B94B000
heap
page read and write
5243000
heap
page read and write
D36E000
stack
page read and write
931000
heap
page read and write
4A5C000
unclassified section
page read and write
931000
heap
page read and write
75E0000
heap
page read and write
There are 682 hidden memdumps, click here to show them.