IOC Report
hesaphareketi-01.exe

loading gif

Files

File Path
Type
Category
Malicious
hesaphareketi-01.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\directory\svchost.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.vbs
data
modified
malicious
C:\Users\user\AppData\Local\Temp\aut4B09.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut4B67.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut50F4.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut5143.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut5634.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut5683.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut82B3.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut82F2.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut886F.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut89E7.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nonsubmerged
ASCII text, with very long lines (28674), with no line terminators
modified
C:\Users\user\AppData\Local\Temp\ophiolatrous
data
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\hesaphareketi-01.exe
"C:\Users\user\Desktop\hesaphareketi-01.exe"
malicious
C:\Users\user\AppData\Local\directory\svchost.exe
"C:\Users\user\Desktop\hesaphareketi-01.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\hesaphareketi-01.exe"
malicious
C:\Users\user\AppData\Local\directory\svchost.exe
"C:\Users\user\AppData\Local\directory\svchost.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\svchost.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.vbs"
malicious
C:\Users\user\AppData\Local\directory\svchost.exe
"C:\Users\user\AppData\Local\directory\svchost.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\svchost.exe"
malicious
C:\Users\user\AppData\Local\directory\svchost.exe
"C:\Users\user\AppData\Local\directory\svchost.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\svchost.exe"
malicious

URLs

Name
IP
Malicious
http://zqamcx.com
unknown
malicious
https://account.dyn.com/
unknown
http://r11.o.lencr.org0#
unknown
http://r11.i.lencr.org/0#
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
zqamcx.com
78.110.166.82
malicious

IPs

IP
Domain
Country
Malicious
78.110.166.82
zqamcx.com
United Kingdom
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2FA1000
trusted library allocation
page read and write
malicious
2E20000
trusted library section
page read and write
malicious
2B2F000
heap
page read and write
malicious
55C0000
trusted library section
page read and write
malicious
3FDE000
trusted library allocation
page read and write
malicious
3019000
trusted library allocation
page read and write
malicious
3188000
trusted library allocation
page read and write
malicious
2FEF000
trusted library allocation
page read and write
malicious
319F000
trusted library allocation
page read and write
malicious
31C9000
trusted library allocation
page read and write
malicious
10C2000
trusted library allocation
page read and write
16C2000
heap
page read and write
F0000
unkown
page write copy
10C3000
heap
page read and write
1642000
heap
page read and write
14C3000
heap
page read and write
1600000
heap
page read and write
16C3000
heap
page read and write
10C0000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
18B7000
heap
page read and write
310B000
trusted library allocation
page read and write
1067000
heap
page read and write
6D80000
heap
page read and write
16C3000
heap
page read and write
23E37050000
heap
page read and write
12AF000
heap
page read and write
6D37000
trusted library allocation
page read and write
10C3000
heap
page read and write
5E0000
heap
page read and write
E7A000
stack
page read and write
E0C000
heap
page read and write
56AA000
heap
page read and write
16C3000
heap
page read and write
14C3000
heap
page read and write
2D90000
trusted library allocation
page read and write
1650000
heap
page read and write
10C3000
heap
page read and write
16C3000
heap
page read and write
56E3000
heap
page read and write
21000
unkown
page execute read
18AD000
heap
page read and write
58AC000
stack
page read and write
127000
unkown
page readonly
13FF000
stack
page read and write
1090000
trusted library allocation
page read and write
5678000
heap
page read and write
4253000
direct allocation
page read and write
64DC000
stack
page read and write
3006000
trusted library allocation
page read and write
16C3000
heap
page read and write
7030000
heap
page read and write
2C40000
trusted library allocation
page read and write
16C3000
heap
page read and write
2CC7000
heap
page read and write
16C3000
heap
page read and write
F4000
unkown
page readonly
E2000
unkown
page readonly
14C3000
heap
page read and write
10C3000
heap
page read and write
6CCE000
stack
page read and write
16C3000
heap
page read and write
1072000
heap
page read and write
4180000
direct allocation
page read and write
4320000
direct allocation
page read and write
F42000
heap
page read and write
B5A000
stack
page read and write
F4000
unkown
page readonly
11AF000
heap
page read and write
D70000
heap
page read and write
10C3000
heap
page read and write
18B5000
heap
page read and write
2C52000
trusted library allocation
page read and write
14C3000
heap
page read and write
16C3000
heap
page read and write
5C4E000
stack
page read and write
14C3000
heap
page read and write
1672000
heap
page read and write
14C3000
heap
page read and write
5558000
trusted library allocation
page read and write
4320000
direct allocation
page read and write
59CE000
stack
page read and write
EC000
unkown
page write copy
14C3000
heap
page read and write
729000
stack
page read and write
2CA0000
trusted library allocation
page execute and read and write
421E000
direct allocation
page read and write
6ED0000
heap
page read and write
1451000
heap
page read and write
16C3000
heap
page read and write
41AD000
direct allocation
page read and write
14C3000
heap
page read and write
6D0F000
stack
page read and write
40A9000
trusted library allocation
page read and write
3C73000
direct allocation
page read and write
1032000
heap
page read and write
EC000
unkown
page write copy
70420000
unkown
page readonly
14C3000
heap
page read and write
10C3000
heap
page read and write
10C3000
heap
page read and write
10C3000
heap
page read and write
650000
unkown
page readonly
14C3000
heap
page read and write
16C3000
heap
page read and write
1412000
heap
page read and write
315E000
trusted library allocation
page read and write
18F6000
heap
page read and write
10C3000
heap
page read and write
757000
unkown
page readonly
41AD000
direct allocation
page read and write
14C3000
heap
page read and write
6D10000
trusted library allocation
page execute and read and write
14C3000
heap
page read and write
3009000
trusted library allocation
page read and write
2301000
heap
page read and write
7140000
heap
page read and write
14C3000
heap
page read and write
117E000
heap
page read and write
16A4000
heap
page read and write
1148000
heap
page read and write
100A000
heap
page read and write
20000
unkown
page readonly
1672000
heap
page read and write
308D000
trusted library allocation
page read and write
14C3000
heap
page read and write
14C3000
heap
page read and write
1642000
heap
page read and write
420D000
trusted library allocation
page read and write
10C3000
heap
page read and write
2FF7000
trusted library allocation
page read and write
2D50000
heap
page read and write
5670000
heap
page read and write
165D000
heap
page read and write
1181000
heap
page read and write
14C3000
heap
page read and write
10C3000
heap
page read and write
670E000
stack
page read and write
400000
system
page execute and read and write
41AD000
direct allocation
page read and write
C6A000
stack
page read and write
E2000
unkown
page readonly
6BA74FE000
stack
page read and write
2E01000
trusted library allocation
page read and write
16C3000
heap
page read and write
103E000
stack
page read and write
6720000
trusted library allocation
page execute and read and write
2001000
heap
page read and write
31C5000
trusted library allocation
page read and write
4369000
direct allocation
page read and write
BC0000
heap
page read and write
10CB000
trusted library allocation
page execute and read and write
6850000
heap
page read and write
16C3000
heap
page read and write
B7E000
stack
page read and write
5780000
heap
page read and write
2AF0000
trusted library section
page read and write
6BA79FF000
stack
page read and write
41A9000
direct allocation
page read and write
E2000
unkown
page readonly
1030000
heap
page read and write
14C3000
heap
page read and write
680E000
stack
page read and write
16C3000
heap
page read and write
6F00000
trusted library allocation
page read and write
20000
unkown
page readonly
317D000
trusted library allocation
page read and write
6D57000
trusted library allocation
page read and write
12A4000
heap
page read and write
4180000
direct allocation
page read and write
6E60000
trusted library allocation
page execute and read and write
4080000
direct allocation
page read and write
16D5000
heap
page read and write
2D1C000
stack
page read and write
23E37070000
heap
page read and write
14C3000
heap
page read and write
14C3000
heap
page read and write
3E1D000
direct allocation
page read and write
2C80000
trusted library allocation
page read and write
10C3000
heap
page read and write
23E372AE000
heap
page read and write
F4000
unkown
page readonly
12B6000
heap
page read and write
BC000
unkown
page readonly
4040000
direct allocation
page execute and read and write
14C3000
heap
page read and write
EC000
unkown
page write copy
2F3F000
trusted library allocation
page read and write
1072000
heap
page read and write
21000
unkown
page execute read
446E000
direct allocation
page read and write
10C3000
heap
page read and write
20000
unkown
page readonly
16C3000
heap
page read and write
10C3000
heap
page read and write
10C3000
heap
page read and write
16C3000
heap
page read and write
418E000
trusted library allocation
page read and write
3CCE000
stack
page read and write
14C3000
heap
page read and write
30B8000
trusted library allocation
page read and write
2401000
heap
page read and write
18B5000
heap
page read and write
2D40000
heap
page read and write
4130000
direct allocation
page read and write
14C3000
heap
page read and write
10C3000
heap
page read and write
196F000
stack
page read and write
2C4D000
trusted library allocation
page execute and read and write
16C3000
heap
page read and write
10C3000
heap
page read and write
600000
direct allocation
page execute and read and write
436D000
direct allocation
page read and write
1672000
heap
page read and write
2C56000
trusted library allocation
page execute and read and write
124F000
stack
page read and write
1650000
heap
page read and write
14C3000
heap
page read and write
41A9000
direct allocation
page read and write
41A9000
direct allocation
page read and write
4080000
direct allocation
page read and write
16C3000
heap
page read and write
18A4000
heap
page read and write
568C000
heap
page read and write
127F000
stack
page read and write
16C3000
heap
page read and write
16C3000
heap
page read and write
5688000
heap
page read and write
6E87000
trusted library allocation
page read and write
16C3000
heap
page read and write
100E000
heap
page read and write
10C3000
heap
page read and write
31D1000
trusted library allocation
page read and write
4003000
direct allocation
page read and write
1425000
heap
page read and write
1472000
heap
page read and write
5CE6000
trusted library allocation
page read and write
55A1000
trusted library allocation
page read and write
14C3000
heap
page read and write
3110000
trusted library allocation
page read and write
F50000
trusted library section
page read and write
F63000
heap
page read and write
6BA78FF000
stack
page read and write
3E8E000
direct allocation
page read and write
4240000
direct allocation
page read and write
1D10000
heap
page read and write
E1C000
heap
page read and write
10C3000
heap
page read and write
566E000
stack
page read and write
7043F000
unkown
page readonly
EC000
unkown
page read and write
421E000
direct allocation
page read and write
29EE000
stack
page read and write
422000
system
page execute and read and write
43F9000
direct allocation
page read and write
6EA7000
trusted library allocation
page read and write
14C3000
heap
page read and write
100E000
heap
page read and write
3266000
trusted library allocation
page read and write
6710000
heap
page read and write
12D0000
heap
page read and write
16C3000
heap
page read and write
10C3000
heap
page read and write
2501000
heap
page read and write
4449000
direct allocation
page read and write
23E370D4000
heap
page read and write
6D90000
trusted library allocation
page read and write
14C3000
heap
page read and write
10C2000
heap
page read and write
684E000
stack
page read and write
2DEE000
stack
page read and write
1400000
heap
page read and write
F0000
unkown
page write copy
10C3000
heap
page read and write
2D4C000
stack
page read and write
31B9000
trusted library allocation
page read and write
BE0000
heap
page read and write
16C3000
heap
page read and write
16C3000
heap
page read and write
20000
unkown
page readonly
18B2000
heap
page read and write
16C3000
heap
page read and write
5D24000
trusted library allocation
page read and write
42D0000
direct allocation
page read and write
2C34000
trusted library allocation
page read and write
6C8F000
stack
page read and write
145D000
heap
page read and write
14C3000
heap
page read and write
16C3000
heap
page read and write
31DA000
trusted library allocation
page read and write
6BA75FF000
stack
page read and write
3E19000
direct allocation
page read and write
16C3000
heap
page read and write
309C000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
6BA72FE000
stack
page read and write
16C3000
heap
page read and write
16C3000
heap
page read and write
16C3000
heap
page read and write
10C3000
heap
page read and write
557E000
stack
page read and write
10C3000
heap
page read and write
41AD000
direct allocation
page read and write
DAC000
heap
page read and write
2C3D000
trusted library allocation
page execute and read and write
651000
unkown
page execute read
14C3000
heap
page read and write
13BF000
stack
page read and write
597C000
stack
page read and write
16C3000
heap
page read and write
436D000
direct allocation
page read and write
2D86000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
309A000
trusted library allocation
page read and write
41F3000
trusted library allocation
page read and write
1C3F000
stack
page read and write
5592000
trusted library allocation
page read and write
10E0000
trusted library allocation
page read and write
10C3000
heap
page read and write
2DFA000
trusted library allocation
page read and write
2DDE000
stack
page read and write
2F9E000
stack
page read and write
565C000
stack
page read and write
6714000
trusted library allocation
page read and write
18AD000
heap
page read and write
F4000
unkown
page readonly
DF0000
heap
page read and write
14C3000
heap
page read and write
760000
heap
page read and write
7FFB1E866000
unkown
page readonly
F4000
unkown
page readonly
10C3000
heap
page read and write
16C3000
heap
page read and write
102E000
stack
page read and write
18A4000
heap
page read and write
2C5A000
trusted library allocation
page execute and read and write
E0B000
heap
page read and write
DA4000
heap
page read and write
6BA77FE000
stack
page read and write
2C33000
trusted library allocation
page execute and read and write
E0D000
heap
page read and write
14C3000
heap
page read and write
10C3000
heap
page read and write
4320000
direct allocation
page read and write
3FA1000
trusted library allocation
page read and write
10C3000
heap
page read and write
DA9000
heap
page read and write
105F000
stack
page read and write
16C3000
heap
page read and write
14C3000
heap
page read and write
120E000
stack
page read and write
16C3000
heap
page read and write
1450000
heap
page read and write
14C3000
heap
page read and write
20000
unkown
page readonly
102C000
heap
page read and write
23E38C30000
heap
page read and write
56A0000
heap
page read and write
4067000
trusted library allocation
page read and write
110D000
stack
page read and write
1651000
heap
page read and write
16C3000
heap
page read and write
1140000
heap
page read and write
16B6000
heap
page read and write
3100000
heap
page read and write
720000
unkown
page write copy
311A000
trusted library allocation
page read and write
EF8000
stack
page read and write
F0000
unkown
page write copy
10C3000
heap
page read and write
14C3000
heap
page read and write
10F0000
heap
page read and write
16C3000
heap
page read and write
65DD000
stack
page read and write
1600000
heap
page read and write
71C000
unkown
page write copy
43FD000
direct allocation
page read and write
20000
unkown
page readonly
165D000
heap
page read and write
14C3000
heap
page read and write
65E0000
trusted library allocation
page execute and read and write
6E70000
trusted library allocation
page execute and read and write
12AD000
heap
page read and write
6A0E000
stack
page read and write
4257000
trusted library allocation
page read and write
10C3000
heap
page read and write
14C3000
heap
page read and write
11ED000
heap
page read and write
4175000
trusted library allocation
page read and write
1200000
heap
page read and write
BD5000
heap
page read and write
16C3000
heap
page read and write
10C3000
heap
page read and write
42A3000
direct allocation
page read and write
2150000
direct allocation
page execute and read and write
2E80000
trusted library allocation
page read and write
5CCE000
stack
page read and write
10C3000
heap
page read and write
1031000
heap
page read and write
1631000
heap
page read and write
14C3000
heap
page read and write
2E20000
heap
page execute and read and write
41A9000
direct allocation
page read and write
30F8000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
1202000
heap
page read and write
D60000
heap
page read and write
12B2000
heap
page read and write
5770000
heap
page read and write
44BE000
direct allocation
page read and write
4080000
direct allocation
page read and write
41A5000
trusted library allocation
page read and write
3EE0000
direct allocation
page read and write
4449000
direct allocation
page read and write
109000
stack
page read and write
16C3000
heap
page read and write
445000
system
page execute and read and write
14C3000
heap
page read and write
42A3000
direct allocation
page read and write
2D80000
trusted library allocation
page read and write
10C3000
heap
page read and write
6EA0000
trusted library allocation
page read and write
10F4000
heap
page read and write
558E000
trusted library allocation
page read and write
14C3000
heap
page read and write
6BA7AFB000
stack
page read and write
4050000
direct allocation
page read and write
E0B000
heap
page read and write
16C3000
heap
page read and write
127000
unkown
page readonly
EE1000
heap
page read and write
14C3000
heap
page read and write
55A6000
trusted library allocation
page read and write
2C10000
trusted library section
page read and write
1402000
heap
page read and write
3B50000
direct allocation
page read and write
14C3000
heap
page read and write
16C3000
heap
page read and write
DA5000
heap
page read and write
10C3000
heap
page read and write
6D20000
trusted library allocation
page execute and read and write
5540000
trusted library allocation
page read and write
125B000
stack
page read and write
780000
heap
page read and write
10C3000
heap
page read and write
10C3000
heap
page read and write
F60000
trusted library allocation
page read and write
16C3000
heap
page read and write
BC000
unkown
page readonly
2B00000
heap
page read and write
16F4000
heap
page read and write
2C50000
trusted library allocation
page read and write
41C3000
direct allocation
page read and write
14C3000
heap
page read and write
EFF000
heap
page read and write
10AD000
trusted library allocation
page execute and read and write
30FE000
stack
page read and write
10C3000
heap
page read and write
16C3000
heap
page read and write
16C3000
heap
page read and write
712000
unkown
page readonly
DF5000
heap
page read and write
2BFF000
heap
page read and write
14C3000
heap
page read and write
11A9000
heap
page read and write
10C3000
heap
page read and write
10C3000
heap
page read and write
16C3000
heap
page read and write
16C3000
heap
page read and write
1630000
heap
page read and write
1FD0000
heap
page read and write
10C3000
heap
page read and write
1042000
heap
page read and write
23E372A0000
heap
page read and write
14C3000
heap
page read and write
1E3F000
stack
page read and write
16D5000
heap
page read and write
5A0000
heap
page read and write
1ECE000
stack
page read and write
127000
unkown
page readonly
10C3000
heap
page read and write
BC000
unkown
page readonly
4217000
trusted library allocation
page read and write
421E000
direct allocation
page read and write
13EF000
stack
page read and write
14C3000
heap
page read and write
323D000
trusted library allocation
page read and write
DFF000
stack
page read and write
5CF0000
trusted library allocation
page execute and read and write
757000
unkown
page readonly
14C3000
heap
page read and write
1CE000
stack
page read and write
1672000
heap
page read and write
16C3000
heap
page read and write
21000
unkown
page execute read
2DA0000
heap
page execute and read and write
3070000
direct allocation
page read and write
14C3000
heap
page read and write
1631000
heap
page read and write
10C3000
heap
page read and write
160E000
heap
page read and write
2C90000
heap
page read and write
16AF000
heap
page read and write
21000
unkown
page execute read
EC000
unkown
page read and write
14C3000
heap
page read and write
13CF000
stack
page read and write
16C3000
heap
page read and write
5713000
heap
page read and write
18D5000
heap
page read and write
10C3000
heap
page read and write
FD0000
heap
page read and write
10C0000
heap
page read and write
14C3000
heap
page read and write
1642000
heap
page read and write
1632000
heap
page read and write
16C3000
heap
page read and write
5553000
trusted library allocation
page read and write
3EE0000
direct allocation
page read and write
10C3000
heap
page read and write
55AD000
trusted library allocation
page read and write
14C3000
heap
page read and write
16C3000
heap
page read and write
14C3000
heap
page read and write
E2000
unkown
page readonly
10C3000
heap
page read and write
14C3000
heap
page read and write
12B0000
heap
page read and write
16C3000
heap
page read and write
2C60000
trusted library allocation
page read and write
16C3000
heap
page read and write
70436000
unkown
page readonly
1672000
heap
page read and write
3EE0000
direct allocation
page read and write
3E19000
direct allocation
page read and write
E26000
heap
page read and write
4003000
direct allocation
page read and write
3C73000
direct allocation
page read and write
18B6000
heap
page read and write
14C3000
heap
page read and write
16C3000
heap
page read and write
106F000
stack
page read and write
55B2000
trusted library allocation
page read and write
1672000
heap
page read and write
21000
unkown
page execute read
16C2000
heap
page read and write
3104000
heap
page read and write
10C3000
heap
page read and write
13E0000
heap
page read and write
2DF0000
trusted library allocation
page read and write
1051000
heap
page read and write
513E000
stack
page read and write
567C000
heap
page read and write
207F000
stack
page read and write
10C3000
heap
page read and write
EC000
unkown
page read and write
2101000
heap
page read and write
43F9000
direct allocation
page read and write
5708000
heap
page read and write
16AD000
heap
page read and write
14C3000
heap
page read and write
2D43000
heap
page read and write
14C3000
heap
page read and write
E2000
unkown
page readonly
14C3000
heap
page read and write
16C2000
heap
page read and write
5B0E000
stack
page read and write
BC000
unkown
page readonly
18AF000
heap
page read and write
2CC0000
heap
page read and write
127000
unkown
page readonly
18D6000
heap
page read and write
10C3000
heap
page read and write
12D5000
heap
page read and write
EF8000
stack
page read and write
41AD000
direct allocation
page read and write
16C3000
heap
page read and write
14C3000
heap
page read and write
10C3000
heap
page read and write
7B0000
heap
page read and write
DBF000
stack
page read and write
10C3000
heap
page read and write
16C3000
heap
page read and write
4449000
direct allocation
page read and write
444D000
direct allocation
page read and write
1170000
heap
page read and write
10A0000
heap
page read and write
21000
unkown
page execute read
10C3000
heap
page read and write
14C3000
heap
page read and write
1300000
heap
page read and write
2E10000
heap
page read and write
59AC000
stack
page read and write
105E000
heap
page read and write
32B0000
trusted library allocation
page read and write
6A4E000
stack
page read and write
10C2000
heap
page read and write
F0000
unkown
page write copy
2C8F000
heap
page read and write
559E000
trusted library allocation
page read and write
1630000
heap
page read and write
32CE000
trusted library allocation
page read and write
11B8000
heap
page read and write
14C3000
heap
page read and write
123F000
stack
page read and write
2C20000
trusted library allocation
page read and write
16C3000
heap
page read and write
5C0E000
stack
page read and write
16C3000
heap
page read and write
BD0000
heap
page read and write
BC000
unkown
page readonly
14C3000
heap
page read and write
12D5000
heap
page read and write
6E80000
trusted library allocation
page read and write
4003000
direct allocation
page read and write
10C3000
heap
page read and write
10C3000
heap
page read and write
2F68000
trusted library allocation
page read and write
22E0000
heap
page read and write
13DB000
stack
page read and write
162C000
heap
page read and write
DAE000
stack
page read and write
10A0000
trusted library allocation
page read and write
E27000
heap
page read and write
FD8000
heap
page read and write
10C3000
heap
page read and write
10C3000
heap
page read and write
21000
unkown
page execute read
1442000
heap
page read and write
16C3000
heap
page read and write
2F30000
trusted library allocation
page read and write
14C3000
heap
page read and write
14C3000
heap
page read and write
16C3000
heap
page read and write
7043D000
unkown
page read and write
18D6000
heap
page read and write
16C3000
heap
page read and write
6D50000
trusted library allocation
page read and write
14C3000
heap
page read and write
1430000
heap
page read and write
558B000
trusted library allocation
page read and write
1094000
trusted library allocation
page read and write
651000
unkown
page execute read
2201000
heap
page read and write
1D0000
heap
page read and write
16C3000
heap
page read and write
724000
unkown
page readonly
2DE0000
trusted library allocation
page read and write
1050000
heap
page read and write
16C3000
heap
page read and write
2F57000
heap
page read and write
14C3000
heap
page read and write
BC000
unkown
page readonly
41C3000
direct allocation
page read and write
3CF0000
direct allocation
page read and write
32A4000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
1000000
heap
page read and write
5ACF000
stack
page read and write
16C3000
heap
page read and write
2D90000
heap
page read and write
F4000
unkown
page readonly
3140000
heap
page read and write
2C3F000
heap
page read and write
16C3000
heap
page read and write
16B5000
heap
page read and write
10C3000
heap
page read and write
BC0000
heap
page read and write
E2000
unkown
page readonly
30F4000
trusted library allocation
page read and write
1025000
heap
page read and write
EEB000
heap
page read and write
2C93000
heap
page read and write
43DE000
direct allocation
page read and write
1612000
heap
page read and write
14C3000
heap
page read and write
16C3000
heap
page read and write
1000000
heap
page read and write
F40000
trusted library section
page read and write
14C3000
heap
page read and write
16F4000
heap
page read and write
1672000
heap
page read and write
16C3000
heap
page read and write
32B5000
trusted library allocation
page read and write
BBF000
stack
page read and write
2AEF000
stack
page read and write
16C3000
heap
page read and write
5CF0000
trusted library allocation
page execute and read and write
10C3000
heap
page read and write
14C3000
heap
page read and write
183D000
stack
page read and write
10C3000
heap
page read and write
16C3000
heap
page read and write
32A8000
trusted library allocation
page read and write
1C7E000
stack
page read and write
42A3000
direct allocation
page read and write
6E4D000
stack
page read and write
1012000
heap
page read and write
14C3000
heap
page read and write
31A7000
trusted library allocation
page read and write
16C3000
heap
page read and write
10C3000
heap
page read and write
42D0000
direct allocation
page read and write
BF0000
heap
page read and write
16C3000
heap
page read and write
18D5000
heap
page read and write
14C3000
heap
page read and write
1472000
heap
page read and write
DCF000
stack
page read and write
319D000
trusted library allocation
page read and write
DBB000
heap
page read and write
10C3000
heap
page read and write
5586000
trusted library allocation
page read and write
23E37040000
heap
page read and write
305F000
trusted library allocation
page read and write
16C3000
heap
page read and write
16C3000
heap
page read and write
1130000
trusted library allocation
page execute and read and write
14C3000
heap
page read and write
56D3000
heap
page read and write
10C3000
heap
page read and write
14C3000
heap
page read and write
14C3000
heap
page read and write
16C3000
heap
page read and write
E2000
unkown
page readonly
14C3000
heap
page read and write
16C3000
heap
page read and write
10C3000
heap
page read and write
41A9000
direct allocation
page read and write
4130000
direct allocation
page read and write
10A3000
trusted library allocation
page read and write
6C0E000
stack
page read and write
6D30000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
16C3000
heap
page read and write
BC000
unkown
page readonly
14C3000
heap
page read and write
3151000
trusted library allocation
page read and write
EC000
unkown
page write copy
446E000
direct allocation
page read and write
6EE0000
trusted library allocation
page execute and read and write
677D000
stack
page read and write
133F000
stack
page read and write
16C3000
heap
page read and write
11F0000
heap
page read and write
F4000
unkown
page readonly
2E06000
trusted library allocation
page read and write
4130000
direct allocation
page read and write
E0C000
heap
page read and write
109D000
trusted library allocation
page execute and read and write
16C3000
heap
page read and write
2DEE000
trusted library allocation
page read and write
10C3000
heap
page read and write
3268000
trusted library allocation
page read and write
DEE000
stack
page read and write
16C3000
heap
page read and write
40A0000
direct allocation
page read and write
18B7000
heap
page read and write
14C3000
heap
page read and write
2E0D000
trusted library allocation
page read and write
1651000
heap
page read and write
38CE000
stack
page read and write
43FD000
direct allocation
page read and write
444D000
direct allocation
page read and write
2C43000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
14C3000
heap
page read and write
16C2000
heap
page read and write
10C3000
heap
page read and write
20000
unkown
page readonly
16C3000
heap
page read and write
42D0000
direct allocation
page read and write
10C3000
heap
page read and write
71C000
unkown
page read and write
10C3000
heap
page read and write
50E000
stack
page read and write
10B6000
trusted library allocation
page execute and read and write
16C3000
heap
page read and write
10C3000
heap
page read and write
10C3000
heap
page read and write
3450000
direct allocation
page read and write
3511000
direct allocation
page read and write
14C2000
heap
page read and write
16C3000
heap
page read and write
16C3000
heap
page read and write
14C3000
heap
page read and write
3AF0000
direct allocation
page execute and read and write
F43000
heap
page read and write
E26000
heap
page read and write
14C3000
heap
page read and write
3CF0000
direct allocation
page read and write
10C3000
heap
page read and write
18B6000
heap
page read and write
10C3000
heap
page read and write
10C3000
heap
page read and write
1432000
heap
page read and write
31C1000
trusted library allocation
page read and write
10C7000
trusted library allocation
page execute and read and write
6E90000
trusted library allocation
page read and write
421E000
direct allocation
page read and write
446E000
direct allocation
page read and write
14C2000
heap
page read and write
4253000
direct allocation
page read and write
10C3000
heap
page read and write
31B6000
trusted library allocation
page read and write
1642000
heap
page read and write
43DE000
direct allocation
page read and write
16C3000
heap
page read and write
14C3000
heap
page read and write
2CB0000
trusted library allocation
page read and write
2D0E000
stack
page read and write
6EC000
unkown
page readonly
3EE0000
direct allocation
page read and write
F43000
heap
page read and write
104B000
stack
page read and write
43FD000
direct allocation
page read and write
4FA8000
trusted library allocation
page read and write
16C3000
heap
page read and write
10C3000
heap
page read and write
127000
unkown
page readonly
21000
unkown
page execute read
32C0000
trusted library allocation
page read and write
3021000
trusted library allocation
page read and write
102E000
heap
page read and write
16B2000
heap
page read and write
44BE000
direct allocation
page read and write
16C3000
heap
page read and write
11F9000
heap
page read and write
7FFB1E872000
unkown
page readonly
1472000
heap
page read and write
1F01000
heap
page read and write
10C3000
heap
page read and write
32BB000
trusted library allocation
page read and write
16C3000
heap
page read and write
11BB000
heap
page read and write
11D0000
heap
page read and write
3EE0000
direct allocation
page read and write
3EE0000
direct allocation
page read and write
1D0E000
stack
page read and write
16C3000
heap
page read and write
21000
unkown
page execute read
2DEB000
trusted library allocation
page read and write
18B2000
heap
page read and write
1442000
heap
page read and write
180000
heap
page read and write
10BA000
trusted library allocation
page execute and read and write
4003000
direct allocation
page read and write
14C3000
heap
page read and write
14C3000
heap
page read and write
4003000
direct allocation
page read and write
F4000
unkown
page readonly
107E000
heap
page read and write
16C3000
heap
page read and write
5780000
heap
page read and write
2C65000
trusted library allocation
page execute and read and write
5560000
heap
page execute and read and write
2D70000
trusted library allocation
page read and write
2FED000
trusted library allocation
page read and write
16C3000
heap
page read and write
1072000
heap
page read and write
18AF000
heap
page read and write
3B50000
direct allocation
page read and write
2F2E000
stack
page read and write
3105000
trusted library allocation
page read and write
10C3000
heap
page read and write
6A0D000
stack
page read and write
1612000
heap
page read and write
3B00000
direct allocation
page read and write
1E01000
heap
page read and write
40A0000
direct allocation
page read and write
14C3000
heap
page read and write
16C3000
heap
page read and write
559A000
trusted library allocation
page read and write
65F0000
trusted library allocation
page read and write
6D4E000
stack
page read and write
1632000
heap
page read and write
CDA000
stack
page read and write
14C3000
heap
page read and write
23E37240000
heap
page read and write
10C3000
heap
page read and write
7FFB1E850000
unkown
page readonly
EC000
unkown
page read and write
F63000
heap
page read and write
D78000
heap
page read and write
16C3000
heap
page read and write
10C3000
heap
page read and write
14C3000
heap
page read and write
14C3000
heap
page read and write
10C3000
heap
page read and write
14C3000
heap
page read and write
3110000
trusted library allocation
page read and write
3FCD000
trusted library allocation
page read and write
10C3000
heap
page read and write
23E372AC000
heap
page read and write
10C3000
heap
page read and write
140E000
heap
page read and write
16C3000
heap
page read and write
663E000
stack
page read and write
650000
unkown
page readonly
14C3000
heap
page read and write
BC000
unkown
page readonly
1431000
heap
page read and write
1600000
heap
page read and write
5D20000
trusted library allocation
page read and write
14C3000
heap
page read and write
3E8E000
direct allocation
page read and write
E1C000
heap
page read and write
E46000
heap
page read and write
12F6000
heap
page read and write
1672000
heap
page read and write
41AD000
direct allocation
page read and write
E0D000
heap
page read and write
5CE8000
trusted library allocation
page read and write
4080000
direct allocation
page read and write
10C3000
heap
page read and write
112E000
stack
page read and write
10C3000
heap
page read and write
56A6000
heap
page read and write
14C3000
heap
page read and write
126F000
stack
page read and write
2C62000
trusted library allocation
page read and write
1A3E000
stack
page read and write
B9B000
stack
page read and write
20000
unkown
page readonly
1800000
heap
page read and write
1093000
trusted library allocation
page execute and read and write
23E37081000
heap
page read and write
6EC000
unkown
page readonly
12B6000
heap
page read and write
16F6000
heap
page read and write
18B6000
heap
page read and write
D30000
heap
page read and write
14C3000
heap
page read and write
426000
system
page execute and read and write
21000
unkown
page execute read
43F9000
direct allocation
page read and write
2D50000
heap
page read and write
5C8D000
stack
page read and write
10C3000
heap
page read and write
21000
unkown
page execute read
3E1D000
direct allocation
page read and write
DAC000
heap
page read and write
1D30000
heap
page read and write
14C3000
heap
page read and write
23C0000
direct allocation
page execute and read and write
3015000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
105C000
heap
page read and write
E02000
heap
page read and write
127000
unkown
page readonly
14C3000
heap
page read and write
4151000
trusted library allocation
page read and write
10C3000
heap
page read and write
10C3000
heap
page read and write
4003000
direct allocation
page read and write
BF7000
heap
page read and write
421E000
direct allocation
page read and write
555C000
trusted library allocation
page read and write
10C3000
heap
page read and write
10C3000
heap
page read and write
66CE000
stack
page read and write
2F50000
heap
page read and write
4080000
direct allocation
page read and write
14C3000
heap
page read and write
6BA71FE000
stack
page read and write
DDB000
stack
page read and write
1402000
heap
page read and write
7F3D0000
trusted library allocation
page execute and read and write
2DF2000
trusted library allocation
page read and write
4253000
direct allocation
page read and write
10C3000
heap
page read and write
14C3000
heap
page read and write
170000
heap
page read and write
324A000
trusted library allocation
page read and write
10C3000
heap
page read and write
127000
unkown
page readonly
16C3000
heap
page read and write
16C3000
heap
page read and write
E2000
unkown
page readonly
BAF000
stack
page read and write
444D000
direct allocation
page read and write
41A9000
direct allocation
page read and write
16C3000
heap
page read and write
10C3000
heap
page read and write
14C3000
heap
page read and write
1029000
heap
page read and write
127000
unkown
page readonly
6D40000
trusted library allocation
page read and write
6860000
heap
page read and write
10C3000
heap
page read and write
2C67000
trusted library allocation
page execute and read and write
1472000
heap
page read and write
10C3000
heap
page read and write
142C000
heap
page read and write
6BA70FA000
stack
page read and write
B59000
stack
page read and write
724000
unkown
page readonly
421E000
direct allocation
page read and write
16C3000
heap
page read and write
7FE000
stack
page read and write
F75000
heap
page read and write
7FFB1E870000
unkown
page read and write
712000
unkown
page readonly
70421000
unkown
page execute read
2C30000
trusted library allocation
page read and write
40A0000
direct allocation
page read and write
12B5000
heap
page read and write
10C3000
heap
page read and write
F70000
heap
page read and write
16C3000
heap
page read and write
105D000
heap
page read and write
10C3000
heap
page read and write
10C3000
heap
page read and write
2E90000
heap
page read and write
18F7000
heap
page read and write
F3E000
stack
page read and write
16B6000
heap
page read and write
320F000
trusted library allocation
page read and write
21000
unkown
page execute read
156E000
stack
page read and write
2160000
direct allocation
page read and write
14C3000
heap
page read and write
10C3000
heap
page read and write
14C3000
heap
page read and write
10C3000
heap
page read and write
16C3000
heap
page read and write
306B000
trusted library allocation
page read and write
4369000
direct allocation
page read and write
14C3000
heap
page read and write
14C3000
heap
page read and write
7043D000
unkown
page read and write
10C3000
heap
page read and write
351E000
direct allocation
page read and write
40E0000
direct allocation
page read and write
10B2000
trusted library allocation
page read and write
7FFB1E875000
unkown
page readonly
3553000
direct allocation
page read and write
6730000
trusted library allocation
page read and write
4240000
direct allocation
page read and write
4180000
direct allocation
page read and write
6D0F000
stack
page read and write
3011000
trusted library allocation
page read and write
2DFE000
trusted library allocation
page read and write
7FFB1E851000
unkown
page execute read
302A000
trusted library allocation
page read and write
D10000
heap
page read and write
6A8E000
stack
page read and write
10C3000
heap
page read and write
16C3000
heap
page read and write
F62000
heap
page read and write
44BE000
direct allocation
page read and write
1625000
heap
page read and write
68CE000
stack
page read and write
6DB0000
trusted library allocation
page execute and read and write
5690000
heap
page read and write
2D84000
trusted library allocation
page read and write
10C5000
trusted library allocation
page execute and read and write
14F4000
heap
page read and write
18CE000
stack
page read and write
324C000
trusted library allocation
page read and write
BD0000
heap
page read and write
2C6B000
trusted library allocation
page execute and read and write
22CE000
stack
page read and write
1800000
heap
page read and write
190E000
stack
page read and write
1042000
heap
page read and write
63DF000
stack
page read and write
DEF000
stack
page read and write
1072000
heap
page read and write
23E372A5000
heap
page read and write
14C3000
heap
page read and write
5670000
heap
page execute and read and write
6B8E000
stack
page read and write
690E000
stack
page read and write
10C3000
heap
page read and write
B8E000
stack
page read and write
4080000
direct allocation
page read and write
10C3000
heap
page read and write
7F610000
trusted library allocation
page execute and read and write
16C3000
heap
page read and write
6710000
trusted library allocation
page read and write
16C3000
heap
page read and write
14C3000
heap
page read and write
321B000
trusted library allocation
page read and write
30B6000
trusted library allocation
page read and write
5680000
heap
page read and write
There are 1076 hidden memdumps, click here to show them.