IOC Report
03.07.2024-sipari#U015f UG01072410 -onka ve Tic a.s.exe

loading gif

Files

File Path
Type
Category
Malicious
03.07.2024-sipari#U015f UG01072410 -onka ve Tic a.s.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\03.07.2024-sipari#U015f UG01072410 -onka ve Tic a.s.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\3y36225
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dnyr5qzu.vgw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ifwwgjla.qvu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_plapwhs1.hgt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wjd2pqcm.m1p.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\03.07.2024-sipari#U015f UG01072410 -onka ve Tic a.s.exe
"C:\Users\user\Desktop\03.07.2024-sipari#U015f UG01072410 -onka ve Tic a.s.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\03.07.2024-sipari#U015f UG01072410 -onka ve Tic a.s.exe"
malicious
C:\Users\user\Desktop\03.07.2024-sipari#U015f UG01072410 -onka ve Tic a.s.exe
"C:\Users\user\Desktop\03.07.2024-sipari#U015f UG01072410 -onka ve Tic a.s.exe"
malicious
C:\Program Files (x86)\fCItteFJYCpGRjbbipFVZXppqDEMltRMTRZhTmAkhCdoSZgFZhPaeeYRYCCJYhiNGjPK\zkhJmzWnNnFLoIoaAsyqpwQZ.exe
"C:\Program Files (x86)\fCItteFJYCpGRjbbipFVZXppqDEMltRMTRZhTmAkhCdoSZgFZhPaeeYRYCCJYhiNGjPK\zkhJmzWnNnFLoIoaAsyqpwQZ.exe"
malicious
C:\Windows\SysWOW64\shutdown.exe
"C:\Windows\SysWOW64\shutdown.exe"
malicious
C:\Program Files (x86)\fCItteFJYCpGRjbbipFVZXppqDEMltRMTRZhTmAkhCdoSZgFZhPaeeYRYCCJYhiNGjPK\zkhJmzWnNnFLoIoaAsyqpwQZ.exe
"C:\Program Files (x86)\fCItteFJYCpGRjbbipFVZXppqDEMltRMTRZhTmAkhCdoSZgFZhPaeeYRYCCJYhiNGjPK\zkhJmzWnNnFLoIoaAsyqpwQZ.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.fungusbus.com/ucdm/?j2=EKdombQUikql/e8x5w/b0WRCZZ7GjewvGt5yqJ62oMuwgaHfKWbffkwAJSwjzlHKlyNbdgTciiNebF1Tnxx1ssE7dAszzRsyY0LYOFUjrmAhIYA2gw==&NbL=5XSdkb2PqtnPh8PP
91.195.240.19
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
parkingpage.namecheap.com
91.195.240.19
malicious
www.fungusbus.com
unknown
malicious
www.deviexp.com
unknown
malicious
www.betful.site
unknown
malicious

IPs

IP
Domain
Country
Malicious
91.195.240.19
parkingpage.namecheap.com
Germany
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1AF0000
unclassified section
page execute and read and write
malicious
3700000
trusted library allocation
page read and write
malicious
3230000
system
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
FA0000
system
page execute and read and write
malicious
2F70000
unkown
page execute and read and write
malicious
1250000
unclassified section
page execute and read and write
malicious
36C0000
trusted library allocation
page read and write
malicious
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
8240000
trusted library allocation
page read and write
D45E000
stack
page read and write
D31E000
stack
page read and write
35C1000
heap
page read and write
B80000
unkown
page readonly
1027000
trusted library allocation
page execute and read and write
8300000
heap
page read and write
7314000
heap
page read and write
243E7A00000
trusted library allocation
page read and write
52BC000
stack
page read and write
3400000
heap
page read and write
29B0000
heap
page read and write
35C1000
heap
page read and write
3740000
trusted library allocation
page read and write
34A0000
heap
page read and write
1210000
direct allocation
page read and write
8318000
heap
page read and write
E60000
unkown
page readonly
35C1000
heap
page read and write
344B000
heap
page read and write
CB4000
heap
page read and write
E91000
unkown
page readonly
35C1000
heap
page read and write
56DD000
stack
page read and write
34EE000
heap
page read and write
35C1000
heap
page read and write
349D000
heap
page read and write
51F6000
trusted library allocation
page read and write
B70000
unkown
page readonly
2FF8000
stack
page read and write
E30000
heap
page read and write
DDE000
stack
page read and write
346E000
heap
page read and write
35C1000
heap
page read and write
2CB0000
trusted library allocation
page read and write
1431000
unkown
page readonly
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
51FD000
trusted library allocation
page read and write
3411000
heap
page read and write
2D7B000
stack
page read and write
12C0000
heap
page execute and read and write
EB7000
unkown
page readonly
3416000
heap
page read and write
76A0000
trusted library section
page read and write
32C4000
heap
page read and write
1000000
trusted library allocation
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
E91000
unkown
page readonly
51D4000
trusted library allocation
page read and write
1022000
trusted library allocation
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
B90000
heap
page read and write
3740000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
4E8C000
stack
page read and write
35C1000
heap
page read and write
18E1000
unkown
page readonly
B90000
heap
page read and write
2E80000
unkown
page readonly
340B000
heap
page read and write
2E80000
unkown
page readonly
35C1000
heap
page read and write
35C1000
heap
page read and write
FC0000
heap
page read and write
773D000
stack
page read and write
35C1000
heap
page read and write
168F000
stack
page read and write
EC0000
heap
page read and write
243E5ECA000
heap
page read and write
36ED000
heap
page read and write
35C1000
heap
page read and write
EB5000
unkown
page read and write
7160000
heap
page read and write
B3C000
stack
page read and write
895F000
stack
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
5FE0000
heap
page read and write
35C1000
heap
page read and write
DA0000
unkown
page readonly
35C1000
heap
page read and write
45E7000
trusted library allocation
page read and write
2D40000
heap
page read and write
3A69000
direct allocation
page execute and read and write
FCC000
stack
page read and write
FD0000
unkown
page read and write
35C1000
heap
page read and write
5370000
heap
page read and write
35C1000
heap
page read and write
12E0000
trusted library allocation
page read and write
2D70000
heap
page read and write
35C1000
heap
page read and write
C60000
heap
page read and write
E70000
heap
page read and write
837D000
heap
page read and write
129E000
stack
page read and write
51EE000
trusted library allocation
page read and write
35C1000
heap
page read and write
EBE000
stack
page read and write
4635000
trusted library allocation
page read and write
58E0000
heap
page read and write
35C1000
heap
page read and write
3473000
heap
page read and write
3485000
heap
page read and write
2DD6000
trusted library allocation
page read and write
35C1000
heap
page read and write
8385000
heap
page read and write
35C1000
heap
page read and write
340D000
heap
page read and write
3478000
heap
page read and write
34C9000
heap
page read and write
32C0000
heap
page read and write
8259000
heap
page read and write
35C1000
heap
page read and write
100E000
system
page execute and read and write
837C000
heap
page read and write
1012000
trusted library allocation
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
855F000
stack
page read and write
35C1000
heap
page read and write
7C0000
unkown
page readonly
36C0000
trusted library allocation
page read and write
243E7790000
trusted library allocation
page read and write
8315000
heap
page read and write
243E7AA5000
trusted library allocation
page read and write
1060000
heap
page read and write
8301000
heap
page read and write
EB7000
unkown
page readonly
35C1000
heap
page read and write
54F0000
trusted library allocation
page execute and read and write
52B0000
trusted library allocation
page read and write
84DD000
stack
page read and write
1003000
trusted library allocation
page read and write
FF3000
trusted library allocation
page execute and read and write
C60000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
293E000
unkown
page read and write
831A000
heap
page read and write
54EB000
stack
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
6A5E000
stack
page read and write
5270000
heap
page execute and read and write
859E000
stack
page read and write
10F1000
heap
page read and write
12D0000
trusted library allocation
page read and write
82F0000
trusted library allocation
page read and write
557E000
stack
page read and write
29C0000
unkown
page readonly
5220000
trusted library allocation
page read and write
35C1000
heap
page read and write
3D32000
unclassified section
page read and write
35C1000
heap
page read and write
3794000
heap
page read and write
FC8000
heap
page read and write
8349000
heap
page read and write
8310000
heap
page read and write
FF0000
unkown
page readonly
2CA0000
trusted library allocation
page read and write
1087000
heap
page read and write
2CD0000
trusted library allocation
page execute and read and write
CFC000
stack
page read and write
10FA000
stack
page read and write
5470000
trusted library allocation
page read and write
E7E000
stack
page read and write
2CAE000
trusted library allocation
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
8385000
heap
page read and write
C30000
unkown
page read and write
32B0000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
55D0000
heap
page read and write
35C1000
heap
page read and write
2FBB000
stack
page read and write
35C1000
heap
page read and write
3460000
heap
page read and write
1450000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
85D0000
heap
page read and write
35C1000
heap
page read and write
348A000
heap
page read and write
E80000
unkown
page read and write
EA1000
unkown
page execute read
35C1000
heap
page read and write
BB7000
stack
page read and write
3464000
heap
page read and write
35C1000
heap
page read and write
10A1000
heap
page read and write
3C0D000
direct allocation
page execute and read and write
1068000
heap
page read and write
CB0000
heap
page read and write
158F000
stack
page read and write
345F000
heap
page read and write
34D4000
heap
page read and write
A3A000
stack
page read and write
57DF000
stack
page read and write
852000
unkown
page read and write
3416000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
7540000
trusted library section
page read and write
8306000
heap
page read and write
EB5000
unkown
page read and write
35C1000
heap
page read and write
8380000
heap
page read and write
D80000
unkown
page readonly
35C1000
heap
page read and write
E50000
unkown
page readonly
35C1000
heap
page read and write
3780000
heap
page read and write
E0A000
stack
page read and write
D530000
trusted library section
page read and write
3411000
heap
page read and write
EAE000
unkown
page readonly
D4DC000
stack
page read and write
35C1000
heap
page read and write
D4F000
heap
page read and write
930000
unkown
page readonly
FE4000
system
page execute and read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
52A0000
heap
page read and write
10F5000
heap
page read and write
12AC000
heap
page read and write
E40000
unkown
page readonly
B60000
unkown
page readonly
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
D90000
unkown
page readonly
243E7790000
trusted library allocation
page read and write
35C1000
heap
page read and write
849C000
stack
page read and write
58F0000
heap
page read and write
CB0000
heap
page read and write
E0A000
stack
page read and write
243E5ECF000
heap
page read and write
243E7ABE000
trusted library allocation
page read and write
EA1000
unkown
page execute read
2D80000
heap
page read and write
8367000
heap
page read and write
D1C000
stack
page read and write
35C1000
heap
page read and write
EAE000
unkown
page readonly
3407000
heap
page read and write
836D000
heap
page read and write
35C1000
heap
page read and write
32C4000
heap
page read and write
1390000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
19C6000
direct allocation
page execute and read and write
3471000
heap
page read and write
35C1000
heap
page read and write
DA0000
unkown
page readonly
10A0000
unkown
page readonly
E80000
unkown
page read and write
12A6000
heap
page read and write
838B000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
3890000
trusted library allocation
page read and write
38C0000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
8377000
heap
page read and write
51F1000
trusted library allocation
page read and write
3797000
heap
page read and write
34DA000
heap
page read and write
CB4000
heap
page read and write
3416000
heap
page read and write
35BE000
stack
page read and write
35C1000
heap
page read and write
348F000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
1298000
heap
page read and write
B3C000
stack
page read and write
3416000
heap
page read and write
35C1000
heap
page read and write
EAE000
unkown
page readonly
851E000
stack
page read and write
C00000
unkown
page read and write
35C1000
heap
page read and write
1476000
heap
page read and write
1A48000
direct allocation
page execute and read and write
35C1000
heap
page read and write
B70000
unkown
page readonly
35C1000
heap
page read and write
35C1000
heap
page read and write
7B0000
unkown
page readonly
35C1000
heap
page read and write
743E000
stack
page read and write
1020000
trusted library allocation
page read and write
12E0000
unkown
page read and write
5373000
heap
page read and write
2B72000
unkown
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
FD0000
unkown
page read and write
76C0000
trusted library allocation
page read and write
2D91000
trusted library allocation
page read and write
EB7000
unkown
page readonly
1AE0000
heap
page read and write
EB5000
unkown
page read and write
1550000
unkown
page readonly
35C1000
heap
page read and write
ABA000
stack
page read and write
345F000
heap
page read and write
35C1000
heap
page read and write
BE0000
unkown
page read and write
35C1000
heap
page read and write
2C9E000
stack
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
353F000
stack
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
55BE000
stack
page read and write
55D5000
heap
page read and write
341C000
heap
page read and write
35C1000
heap
page read and write
2AB2000
unkown
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
D80000
unkown
page readonly
101A000
trusted library allocation
page execute and read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
1431000
unkown
page readonly
A3A000
stack
page read and write
EA0000
unkown
page readonly
E20000
heap
page read and write
35C1000
heap
page read and write
51D0000
trusted library allocation
page read and write
12E0000
unkown
page read and write
EB7000
unkown
page readonly
FF4000
trusted library allocation
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
5480000
heap
page read and write
35C1000
heap
page read and write
346E000
heap
page read and write
FF0000
unkown
page readonly
100B000
system
page execute and read and write
2D44000
heap
page read and write
400C000
unclassified section
page read and write
3ADE000
direct allocation
page execute and read and write
10FEF000
stack
page read and write
35C1000
heap
page read and write
8D3E000
stack
page read and write
2D1D000
stack
page read and write
35C1000
heap
page read and write
5910000
trusted library allocation
page read and write
C90000
unkown
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
7A0000
unkown
page readonly
189E000
direct allocation
page execute and read and write
341E000
heap
page read and write
BF1000
unkown
page readonly
35C1000
heap
page read and write
3A6D000
direct allocation
page execute and read and write
899E000
stack
page read and write
35C1000
heap
page read and write
1016000
trusted library allocation
page execute and read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
72F0000
trusted library allocation
page execute and read and write
34B3000
heap
page read and write
8251000
heap
page read and write
833F000
heap
page read and write
35C1000
heap
page read and write
5FF0000
heap
page read and write
35C1000
heap
page read and write
1050000
trusted library allocation
page execute and read and write
5230000
trusted library allocation
page read and write
8377000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
52B6000
trusted library allocation
page read and write
2D44000
heap
page read and write
35C1000
heap
page read and write
1829000
direct allocation
page execute and read and write
12F0000
heap
page read and write
357E000
stack
page read and write
C90000
unkown
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
2D8C000
unkown
page read and write
35C1000
heap
page read and write
106E000
heap
page read and write
76B0000
trusted library section
page read and write
6014000
heap
page read and write
5900000
trusted library allocation
page read and write
3D99000
trusted library allocation
page read and write
102B000
trusted library allocation
page execute and read and write
1010000
trusted library allocation
page read and write
EA0000
unkown
page readonly
3416000
heap
page read and write
35C1000
heap
page read and write
5202000
trusted library allocation
page read and write
35C1000
heap
page read and write
100D000
trusted library allocation
page execute and read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
1040000
trusted library allocation
page read and write
89DF000
stack
page read and write
29B0000
heap
page read and write
35C1000
heap
page read and write
1700000
direct allocation
page execute and read and write
DE0000
heap
page read and write
6A1E000
stack
page read and write
35C1000
heap
page read and write
7C0000
unkown
page readonly
D50000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
C00000
unkown
page read and write
1458000
heap
page read and write
35C1000
heap
page read and write
1290000
heap
page read and write
EA0000
unkown
page readonly
35C1000
heap
page read and write
4718000
unclassified section
page read and write
7A0000
unkown
page readonly
759E000
stack
page read and write
35C1000
heap
page read and write
7300000
heap
page read and write
35C1000
heap
page read and write
D30000
heap
page read and write
EB5000
unkown
page read and write
8343000
heap
page read and write
5360000
trusted library allocation
page execute and read and write
8339000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
769E000
stack
page read and write
932000
unkown
page readonly
55C0000
trusted library section
page readonly
18E1000
unkown
page readonly
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
C66000
heap
page read and write
33E0000
heap
page read and write
3473000
heap
page read and write
7EF50000
trusted library allocation
page execute and read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
B80000
unkown
page readonly
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
1550000
unkown
page readonly
D90000
heap
page read and write
2D40000
heap
page read and write
32C4000
heap
page read and write
3DF2000
unclassified section
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
EA1000
unkown
page execute read
52B2000
trusted library allocation
page read and write
35CA000
heap
page read and write
BDE000
unkown
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
830B000
heap
page read and write
10E2000
heap
page read and write
3940000
direct allocation
page execute and read and write
2CC0000
trusted library allocation
page read and write
35C1000
heap
page read and write
824A000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
125E000
stack
page read and write
2F50000
trusted library allocation
page read and write
2AB2000
unkown
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
5250000
trusted library allocation
page read and write
C70000
unkown
page readonly
35C1000
heap
page read and write
3471000
heap
page read and write
35C1000
heap
page read and write
FE0000
trusted library allocation
page read and write
3C90000
trusted library allocation
page execute and read and write
120E000
stack
page read and write
3495000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
243E7AC4000
trusted library allocation
page read and write
FCC000
stack
page read and write
7862000
trusted library allocation
page read and write
3C82000
direct allocation
page execute and read and write
35C1000
heap
page read and write
19B1000
direct allocation
page execute and read and write
309A000
trusted library allocation
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
2D70000
heap
page read and write
8374000
heap
page read and write
3C11000
direct allocation
page execute and read and write
EC5000
heap
page read and write
35C1000
heap
page read and write
D30000
heap
page read and write
322D000
unkown
page execute and read and write
EA0000
unkown
page readonly
12F0000
heap
page read and write
753E000
stack
page read and write
8361000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
C70000
unkown
page readonly
8383000
heap
page read and write
553E000
stack
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
32A0000
heap
page read and write
182D000
direct allocation
page execute and read and write
12F0000
heap
page read and write
35C1000
heap
page read and write
110EC000
stack
page read and write
35C1000
heap
page read and write
3D91000
trusted library allocation
page read and write
35C1000
heap
page read and write
EAE000
unkown
page readonly
35C1000
heap
page read and write
35C1000
heap
page read and write
D38000
heap
page read and write
F65E000
trusted library allocation
page read and write
13FF000
stack
page read and write
3485000
heap
page read and write
35C1000
heap
page read and write
5210000
trusted library allocation
page read and write
C20000
unkown
page read and write
D38000
heap
page read and write
35C1000
heap
page read and write
E60000
unkown
page readonly
35C1000
heap
page read and write
29C0000
unkown
page readonly
35C1000
heap
page read and write
35C1000
heap
page read and write
3935000
heap
page read and write
2D8C000
unkown
page read and write
35C1000
heap
page read and write
8312000
heap
page read and write
D90000
unkown
page readonly
2CC9000
trusted library allocation
page read and write
34A6000
heap
page read and write
1DAD000
unclassified section
page execute and read and write
35C1000
heap
page read and write
4683000
trusted library allocation
page read and write
E40000
unkown
page readonly
35C1000
heap
page read and write
35C1000
heap
page read and write
19CD000
direct allocation
page execute and read and write
FFD000
trusted library allocation
page execute and read and write
8324000
heap
page read and write
BF1000
unkown
page readonly
476E000
trusted library allocation
page read and write
E50000
unkown
page readonly
35C1000
heap
page read and write
340B000
heap
page read and write
EA1000
unkown
page execute read
38C4000
heap
page read and write
35C1000
heap
page read and write
109F000
heap
page read and write
3740000
trusted library allocation
page read and write
B60000
unkown
page readonly
3478000
heap
page read and write
58DE000
stack
page read and write
34D0000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
E70000
heap
page read and write
35C1000
heap
page read and write
33DE000
stack
page read and write
10A0000
unkown
page readonly
1458000
heap
page read and write
1062000
system
page execute and read and write
7B0000
unkown
page readonly
243E5ED2000
heap
page read and write
5FDE000
stack
page read and write
341C000
heap
page read and write
8372000
heap
page read and write
35C1000
heap
page read and write
35C1000
heap
page read and write
35C0000
heap
page read and write
5225000
trusted library allocation
page read and write
35C1000
heap
page read and write
3498000
unkown
page read and write
35C1000
heap
page read and write
835D000
heap
page read and write
BE0000
unkown
page read and write
12A0000
heap
page read and write
1450000
heap
page read and write
There are 625 hidden memdumps, click here to show them.