IOC Report
eFatura_HSY2024000004086_Ekleri.exe

loading gif

Files

File Path
Type
Category
Malicious
eFatura_HSY2024000004086_Ekleri.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\directory\temp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\temp.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\aut91A7.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut91F6.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut96D7.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut9801.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autCCAC.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autCD3A.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\fricandeaux
data
dropped
C:\Users\user\AppData\Local\Temp\nonsubmerged
ASCII text, with very long lines (28674), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\eFatura_HSY2024000004086_Ekleri.exe
"C:\Users\user\Desktop\eFatura_HSY2024000004086_Ekleri.exe"
malicious
C:\Users\user\AppData\Local\directory\temp.exe
"C:\Users\user\Desktop\eFatura_HSY2024000004086_Ekleri.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\eFatura_HSY2024000004086_Ekleri.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\temp.vbs"
malicious
C:\Users\user\AppData\Local\directory\temp.exe
"C:\Users\user\AppData\Local\directory\temp.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\temp.exe"
malicious

URLs

Name
IP
Malicious
http://zqamcx.com
unknown
malicious
https://account.dyn.com/
unknown
http://r11.o.lencr.org0#
unknown
http://r11.i.lencr.org/0#
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://www.microsoft.co
unknown

Domains

Name
IP
Malicious
zqamcx.com
78.110.166.82
malicious
18.31.95.13.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
78.110.166.82
zqamcx.com
United Kingdom
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5A20000
trusted library section
page read and write
malicious
350F000
trusted library allocation
page read and write
malicious
3539000
trusted library allocation
page read and write
malicious
44C1000
trusted library allocation
page read and write
malicious
2CBF000
trusted library allocation
page read and write
malicious
2FCF000
heap
page read and write
malicious
2CE9000
trusted library allocation
page read and write
malicious
5940000
trusted library section
page read and write
malicious
34C1000
trusted library allocation
page read and write
malicious
2CA8000
trusted library allocation
page read and write
malicious
5F80000
trusted library allocation
page read and write
10D0000
direct allocation
page execute and read and write
2F7E000
stack
page read and write
5E3E000
stack
page read and write
3B33000
direct allocation
page read and write
FD4000
heap
page read and write
E15000
heap
page read and write
BD0000
heap
page read and write
2E7E000
stack
page read and write
BCE000
stack
page read and write
30B0000
heap
page read and write
1804000
heap
page read and write
1425000
heap
page read and write
59E6000
trusted library allocation
page read and write
2E0D000
trusted library allocation
page read and write
1804000
heap
page read and write
59FE000
trusted library allocation
page read and write
404E000
direct allocation
page read and write
2F80000
heap
page read and write
5190000
trusted library allocation
page read and write
14E5000
heap
page read and write
1425000
heap
page read and write
1811000
heap
page read and write
330E2FE000
stack
page read and write
527A000
trusted library allocation
page read and write
14C2000
heap
page read and write
3BB0000
direct allocation
page read and write
6FFE000
stack
page read and write
18DF000
stack
page read and write
1441000
heap
page read and write
30F2000
trusted library allocation
page read and write
658D000
stack
page read and write
3F5E000
direct allocation
page read and write
593E000
stack
page read and write
6A50000
trusted library allocation
page execute and read and write
49C000
unkown
page readonly
2DEF000
trusted library allocation
page read and write
288B000
trusted library allocation
page execute and read and write
507000
unkown
page readonly
1113000
heap
page read and write
E6F000
stack
page read and write
17DC000
heap
page read and write
51B0000
trusted library allocation
page read and write
507000
unkown
page readonly
5D14000
heap
page read and write
4C2000
unkown
page readonly
1605000
heap
page read and write
49C000
unkown
page readonly
1140000
heap
page read and write
5D00000
heap
page read and write
30F0000
trusted library allocation
page read and write
1E4C3467000
heap
page read and write
140B000
heap
page read and write
1E4C3410000
heap
page read and write
63D0000
heap
page read and write
400000
unkown
page readonly
1E4C36B0000
heap
page read and write
717E000
stack
page read and write
71B0000
trusted library allocation
page read and write
3D4E000
direct allocation
page read and write
1459000
heap
page read and write
E10000
heap
page read and write
3FDD000
direct allocation
page read and write
583E000
stack
page read and write
404E000
direct allocation
page read and write
1114000
heap
page read and write
3E33000
direct allocation
page read and write
3517000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
11CE000
stack
page read and write
1802000
heap
page read and write
B8A000
stack
page read and write
1459000
heap
page read and write
3CC5000
trusted library allocation
page read and write
1829000
heap
page read and write
3A10000
direct allocation
page read and write
4D0000
unkown
page write copy
3EB0000
direct allocation
page read and write
18C4000
heap
page read and write
2880000
trusted library allocation
page read and write
1815000
heap
page read and write
663F000
stack
page read and write
3CFE000
direct allocation
page read and write
69E0000
trusted library allocation
page execute and read and write
3B33000
direct allocation
page read and write
39C0000
direct allocation
page read and write
53B0000
trusted library allocation
page execute and read and write
1360000
heap
page read and write
2C6E000
stack
page read and write
B19000
stack
page read and write
1450000
trusted library section
page read and write
6D3E000
stack
page read and write
330ECFF000
stack
page read and write
59E0000
trusted library allocation
page read and write
703F000
stack
page read and write
1540000
heap
page read and write
4D4000
unkown
page readonly
4D4000
unkown
page readonly
59D0000
heap
page execute and read and write
401000
unkown
page execute read
3659000
trusted library allocation
page read and write
707E000
stack
page read and write
FFE000
stack
page read and write
2B6E000
stack
page read and write
2830000
trusted library allocation
page read and write
5BDC000
stack
page read and write
17F5000
heap
page read and write
3D10000
direct allocation
page read and write
1802000
heap
page read and write
1828000
heap
page read and write
12F8000
stack
page read and write
32A0000
trusted library allocation
page read and write
1424000
heap
page read and write
1010000
unkown
page write copy
5D42000
heap
page read and write
7190000
trusted library allocation
page execute and read and write
49C000
unkown
page readonly
684E000
stack
page read and write
69F7000
trusted library allocation
page read and write
35E6000
trusted library allocation
page read and write
2D24000
trusted library allocation
page read and write
14E5000
heap
page read and write
FC9000
stack
page read and write
2D36000
trusted library allocation
page read and write
68CE000
stack
page read and write
18C5000
heap
page read and write
3D4E000
direct allocation
page read and write
3647000
trusted library allocation
page read and write
3D10000
direct allocation
page read and write
1159000
heap
page read and write
17F8000
heap
page read and write
1828000
heap
page read and write
FDC000
unkown
page readonly
330EAFE000
stack
page read and write
F78000
heap
page read and write
330E5FE000
stack
page read and write
2D3A000
trusted library allocation
page read and write
5DC9000
heap
page read and write
1459000
heap
page read and write
E5F000
stack
page read and write
3526000
trusted library allocation
page read and write
F70000
heap
page read and write
3D10000
direct allocation
page read and write
520E000
stack
page read and write
1444000
heap
page read and write
2D49000
trusted library allocation
page read and write
159E000
stack
page read and write
6A40000
trusted library allocation
page read and write
1002000
unkown
page readonly
E3F000
stack
page read and write
3CD9000
direct allocation
page read and write
526E000
trusted library allocation
page read and write
1425000
heap
page read and write
28E0000
heap
page execute and read and write
1828000
heap
page read and write
2D2E000
trusted library allocation
page read and write
18C5000
heap
page read and write
3FDD000
direct allocation
page read and write
148F000
stack
page read and write
71C0000
trusted library allocation
page read and write
3190000
heap
page execute and read and write
2843000
trusted library allocation
page execute and read and write
1143000
heap
page read and write
11F4000
heap
page read and write
17F5000
heap
page read and write
10E0000
heap
page read and write
400000
system
page execute and read and write
3130000
trusted library allocation
page read and write
3CFE000
direct allocation
page read and write
38DF000
stack
page read and write
2D82000
trusted library allocation
page read and write
1700000
direct allocation
page read and write
1FAE000
stack
page read and write
1131000
heap
page read and write
3E33000
direct allocation
page read and write
CF8000
stack
page read and write
17F6000
heap
page read and write
F1E000
stack
page read and write
2853000
trusted library allocation
page read and write
329E000
stack
page read and write
3117000
trusted library allocation
page execute and read and write
59EE000
trusted library allocation
page read and write
6A10000
trusted library allocation
page execute and read and write
51A4000
trusted library allocation
page read and write
147B000
stack
page read and write
52B0000
heap
page execute and read and write
115A000
heap
page read and write
3A10000
direct allocation
page read and write
23AE000
stack
page read and write
2DAE000
trusted library allocation
page read and write
354A000
trusted library allocation
page read and write
1133000
heap
page read and write
2A20000
heap
page read and write
140F000
heap
page read and write
1814000
heap
page read and write
2E19000
trusted library allocation
page read and write
18C4000
heap
page read and write
1159000
heap
page read and write
1047000
unkown
page readonly
6A00000
trusted library allocation
page read and write
1459000
heap
page read and write
3534000
heap
page read and write
11FF000
stack
page read and write
F40000
unkown
page readonly
456F000
trusted library allocation
page read and write
2E09000
trusted library allocation
page read and write
3C8D000
direct allocation
page read and write
18C4000
heap
page read and write
3FD9000
direct allocation
page read and write
3FD9000
direct allocation
page read and write
3107000
heap
page read and write
71F0000
heap
page read and write
1124000
heap
page read and write
5A01000
trusted library allocation
page read and write
2FA0000
heap
page read and write
1403000
heap
page read and write
17F6000
heap
page read and write
145F000
stack
page read and write
1428000
heap
page read and write
3E33000
direct allocation
page read and write
2885000
trusted library allocation
page execute and read and write
638E000
stack
page read and write
53A8000
trusted library allocation
page read and write
1027000
heap
page read and write
6A08000
trusted library allocation
page read and write
1123000
heap
page read and write
3D4E000
direct allocation
page read and write
1828000
heap
page read and write
FAA000
heap
page read and write
71A0000
trusted library allocation
page read and write
6A40000
heap
page read and write
17D3000
heap
page read and write
4CC000
unkown
page read and write
404E000
direct allocation
page read and write
E2F000
stack
page read and write
350D000
trusted library allocation
page read and write
3FDD000
direct allocation
page read and write
1520000
heap
page read and write
3FD9000
direct allocation
page read and write
FB0000
heap
page read and write
5958000
heap
page read and write
1828000
heap
page read and write
7F750000
trusted library allocation
page execute and read and write
4587000
trusted library allocation
page read and write
1828000
heap
page read and write
1413000
heap
page read and write
11F4000
heap
page read and write
2D92000
trusted library allocation
page read and write
62A0000
trusted library allocation
page execute and read and write
2A4F000
heap
page read and write
63CE000
stack
page read and write
3100000
heap
page read and write
5DD8000
heap
page read and write
6AAD000
stack
page read and write
1159000
heap
page read and write
1432000
heap
page read and write
2CFD000
trusted library allocation
page read and write
F40000
unkown
page readonly
59FA000
trusted library allocation
page read and write
5982000
heap
page read and write
3FDD000
direct allocation
page read and write
2CBD000
trusted library allocation
page read and write
FDC000
unkown
page readonly
363F000
trusted library allocation
page read and write
1159000
heap
page read and write
1159000
heap
page read and write
1159000
heap
page read and write
1428000
heap
page read and write
1370000
heap
page read and write
17E3000
heap
page read and write
4C2000
unkown
page readonly
2CE1000
trusted library allocation
page read and write
4D4000
unkown
page readonly
BF0000
heap
page read and write
422000
system
page execute and read and write
4CC000
unkown
page write copy
401000
unkown
page execute read
10E8000
heap
page read and write
284D000
trusted library allocation
page execute and read and write
3FD9000
direct allocation
page read and write
14DE000
stack
page read and write
2887000
trusted library allocation
page execute and read and write
51A6000
trusted library allocation
page read and write
2DEB000
trusted library allocation
page read and write
2C7E000
trusted library allocation
page read and write
1426000
heap
page read and write
2FA3000
heap
page read and write
39C0000
direct allocation
page read and write
F0E000
stack
page read and write
11F4000
heap
page read and write
17F4000
heap
page read and write
1330000
heap
page read and write
7210000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
145A000
heap
page read and write
3FDD000
direct allocation
page read and write
3AE3000
direct allocation
page read and write
330E8FD000
stack
page read and write
3AE3000
direct allocation
page read and write
2A1F000
stack
page read and write
149F000
stack
page read and write
1340000
heap
page read and write
3E33000
direct allocation
page read and write
2DFC000
trusted library allocation
page read and write
3EB0000
direct allocation
page read and write
1459000
heap
page read and write
17DC000
heap
page read and write
3EB0000
direct allocation
page read and write
3D10000
direct allocation
page read and write
1415000
heap
page read and write
5272000
trusted library allocation
page read and write
18B5000
heap
page read and write
3F51000
direct allocation
page read and write
1432000
heap
page read and write
1002000
unkown
page readonly
1425000
heap
page read and write
3EB0000
direct allocation
page read and write
1020000
heap
page read and write
3E33000
direct allocation
page read and write
32B0000
heap
page read and write
400000
unkown
page readonly
349D000
stack
page read and write
140E000
heap
page read and write
2840000
trusted library allocation
page read and write
1159000
heap
page read and write
1CDF000
stack
page read and write
445000
system
page execute and read and write
7200000
heap
page read and write
11F5000
heap
page read and write
677F000
stack
page read and write
1375000
heap
page read and write
2A23000
heap
page read and write
54BE000
stack
page read and write
317E000
stack
page read and write
35E2000
trusted library allocation
page read and write
3EB0000
direct allocation
page read and write
5998000
heap
page read and write
5A60000
trusted library allocation
page read and write
3C89000
direct allocation
page read and write
536C000
stack
page read and write
1434000
heap
page read and write
71A7000
trusted library allocation
page read and write
1828000
heap
page read and write
6A17000
trusted library allocation
page read and write
3A10000
direct allocation
page read and write
1828000
heap
page read and write
5281000
trusted library allocation
page read and write
2D7D000
trusted library allocation
page read and write
1E80000
heap
page read and write
1E4C3620000
heap
page read and write
2D41000
trusted library allocation
page read and write
69FD000
stack
page read and write
140E000
heap
page read and write
1E4C3496000
heap
page read and write
959000
stack
page read and write
5F7E000
stack
page read and write
35FE000
trusted library allocation
page read and write
1014000
unkown
page readonly
2D20000
trusted library allocation
page read and write
6FBE000
stack
page read and write
1444000
heap
page read and write
62FD000
stack
page read and write
1415000
heap
page read and write
28A0000
trusted library allocation
page read and write
1499000
heap
page read and write
18C5000
heap
page read and write
100C000
unkown
page read and write
3AE3000
direct allocation
page read and write
3C95000
trusted library allocation
page read and write
132E000
stack
page read and write
F5E000
stack
page read and write
1459000
heap
page read and write
149E000
heap
page read and write
3FD9000
direct allocation
page read and write
1360000
trusted library section
page read and write
11DB000
stack
page read and write
3D37000
trusted library allocation
page read and write
119E000
heap
page read and write
1802000
heap
page read and write
186E000
heap
page read and write
7180000
trusted library allocation
page execute and read and write
3531000
trusted library allocation
page read and write
2D3E000
trusted library allocation
page read and write
1828000
heap
page read and write
3535000
trusted library allocation
page read and write
2C9D000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
186E000
heap
page read and write
34B0000
heap
page read and write
2CD6000
trusted library allocation
page read and write
400000
unkown
page readonly
5D4C000
heap
page read and write
4D0000
unkown
page write copy
4D4000
unkown
page readonly
3599000
trusted library allocation
page read and write
F41000
unkown
page execute read
5260000
trusted library allocation
page read and write
1441000
heap
page read and write
4E4E000
stack
page read and write
1E4C3745000
heap
page read and write
49C000
unkown
page readonly
1460000
heap
page read and write
1124000
heap
page read and write
404E000
direct allocation
page read and write
59D2000
heap
page read and write
13E8000
heap
page read and write
B80000
heap
page read and write
2860000
heap
page read and write
1123000
heap
page read and write
2876000
trusted library allocation
page execute and read and write
140B000
heap
page read and write
5CDC000
stack
page read and write
30D3000
trusted library allocation
page execute and read and write
68FE000
stack
page read and write
528D000
trusted library allocation
page read and write
110A000
heap
page read and write
1828000
heap
page read and write
1425000
heap
page read and write
6A10000
trusted library allocation
page read and write
3FD9000
direct allocation
page read and write
14F4000
heap
page read and write
330EBFB000
stack
page read and write
1131000
heap
page read and write
5266000
trusted library allocation
page read and write
169F000
stack
page read and write
2CC7000
trusted library allocation
page read and write
1432000
heap
page read and write
3115000
trusted library allocation
page execute and read and write
6A70000
trusted library allocation
page read and write
150F000
heap
page read and write
401000
unkown
page execute read
6A00000
trusted library allocation
page read and write
6A50000
trusted library allocation
page execute and read and write
56BC000
stack
page read and write
2870000
trusted library allocation
page read and write
5A06000
trusted library allocation
page read and write
285D000
trusted library allocation
page execute and read and write
14BF000
heap
page read and write
507000
unkown
page readonly
F60000
trusted library section
page read and write
18C4000
heap
page read and write
670E000
stack
page read and write
E0E000
stack
page read and write
2850000
trusted library allocation
page read and write
401000
unkown
page execute read
30E0000
trusted library allocation
page read and write
1600000
heap
page read and write
3EB0000
direct allocation
page read and write
1E4C3740000
heap
page read and write
32C8000
trusted library allocation
page read and write
3C89000
direct allocation
page read and write
1159000
heap
page read and write
3D10000
direct allocation
page read and write
14F4000
heap
page read and write
3CD9000
direct allocation
page read and write
5A64000
trusted library allocation
page read and write
507000
unkown
page readonly
30E3000
trusted library allocation
page read and write
1159000
heap
page read and write
FA0000
heap
page read and write
17F5000
heap
page read and write
A6A000
stack
page read and write
3D10000
direct allocation
page read and write
2872000
trusted library allocation
page read and write
330E9FE000
stack
page read and write
5D4E000
heap
page read and write
3BB0000
direct allocation
page read and write
119E000
heap
page read and write
2D79000
trusted library allocation
page read and write
1828000
heap
page read and write
53AC000
trusted library allocation
page read and write
3C71000
trusted library allocation
page read and write
1390000
direct allocation
page execute and read and write
17F8000
heap
page read and write
6EBE000
stack
page read and write
2DF7000
trusted library allocation
page read and write
71C7000
trusted library allocation
page read and write
3D13000
trusted library allocation
page read and write
53A2000
trusted library allocation
page read and write
104E000
stack
page read and write
51BF000
trusted library allocation
page read and write
3C89000
direct allocation
page read and write
30D0000
trusted library allocation
page read and write
18C4000
heap
page read and write
1BDE000
stack
page read and write
59F2000
trusted library allocation
page read and write
5F3E000
stack
page read and write
1047000
unkown
page readonly
3541000
trusted library allocation
page read and write
68BC000
stack
page read and write
18C4000
heap
page read and write
5292000
trusted library allocation
page read and write
51A0000
trusted library allocation
page read and write
4C2000
unkown
page readonly
140F000
heap
page read and write
3C8D000
direct allocation
page read and write
404E000
direct allocation
page read and write
1459000
heap
page read and write
11F4000
heap
page read and write
69CD000
stack
page read and write
1C60000
direct allocation
page read and write
3B33000
direct allocation
page read and write
2844000
trusted library allocation
page read and write
4C78000
trusted library allocation
page read and write
3D77000
trusted library allocation
page read and write
5940000
heap
page read and write
11F4000
heap
page read and write
17E5000
heap
page read and write
6A44000
trusted library allocation
page read and write
10B0000
heap
page read and write
330E3FE000
stack
page read and write
6BD0000
heap
page read and write
6B80000
heap
page read and write
13E0000
heap
page read and write
2810000
heap
page read and write
1E70000
direct allocation
page read and write
5990000
trusted library allocation
page read and write
2882000
trusted library allocation
page read and write
364C000
trusted library allocation
page read and write
5AA0000
heap
page read and write
3B60000
direct allocation
page read and write
11F5000
heap
page read and write
101D000
heap
page read and write
363B000
trusted library allocation
page read and write
BE0000
heap
page read and write
1E4C3600000
heap
page read and write
11E5000
heap
page read and write
7230000
trusted library allocation
page execute and read and write
1425000
heap
page read and write
28C0000
trusted library allocation
page execute and read and write
1133000
heap
page read and write
F10000
heap
page read and write
18B5000
heap
page read and write
67BE000
stack
page read and write
17F4000
heap
page read and write
1444000
heap
page read and write
30D4000
trusted library allocation
page read and write
5286000
trusted library allocation
page read and write
3180000
trusted library allocation
page execute and read and write
11BE000
stack
page read and write
FAE000
heap
page read and write
17F5000
heap
page read and write
339C000
stack
page read and write
1459000
heap
page read and write
2910000
heap
page read and write
1125000
heap
page read and write
3CDD000
direct allocation
page read and write
1144000
heap
page read and write
1814000
heap
page read and write
1114000
heap
page read and write
4CC000
unkown
page read and write
59A0000
trusted library allocation
page read and write
11EF000
stack
page read and write
149C000
heap
page read and write
330E7F7000
stack
page read and write
400000
unkown
page readonly
54C0000
heap
page read and write
28B0000
heap
page read and write
39C0000
direct allocation
page read and write
62B0000
trusted library allocation
page read and write
2D96000
trusted library allocation
page read and write
3C8D000
direct allocation
page read and write
5D64000
heap
page read and write
1459000
heap
page read and write
17B8000
heap
page read and write
17E5000
heap
page read and write
1140000
heap
page read and write
1E4C374E000
heap
page read and write
4D4C000
stack
page read and write
E4B000
stack
page read and write
3CDD000
direct allocation
page read and write
1E4C3437000
heap
page read and write
2CE5000
trusted library allocation
page read and write
3B60000
direct allocation
page read and write
1000000
heap
page read and write
404E000
direct allocation
page read and write
30DD000
trusted library allocation
page execute and read and write
1370000
heap
page read and write
15D0000
direct allocation
page execute and read and write
1014000
unkown
page readonly
3BB0000
direct allocation
page read and write
1159000
heap
page read and write
5A80000
trusted library allocation
page read and write
15E0000
heap
page read and write
4C2000
unkown
page readonly
6B3F000
stack
page read and write
2D32000
trusted library allocation
page read and write
426000
system
page execute and read and write
1814000
heap
page read and write
9D0000
heap
page read and write
667E000
stack
page read and write
2C71000
trusted library allocation
page read and write
526B000
trusted library allocation
page read and write
11F4000
heap
page read and write
5310000
trusted library allocation
page read and write
30F6000
trusted library allocation
page execute and read and write
3E90000
direct allocation
page read and write
5390000
trusted library allocation
page read and write
146E000
stack
page read and write
3970000
direct allocation
page read and write
5A0D000
trusted library allocation
page read and write
3CDD000
direct allocation
page read and write
45C7000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
1459000
heap
page read and write
2ADF000
heap
page read and write
3E33000
direct allocation
page read and write
1424000
heap
page read and write
287A000
trusted library allocation
page execute and read and write
5A12000
trusted library allocation
page read and write
2D45000
trusted library allocation
page read and write
3B60000
direct allocation
page read and write
311B000
trusted library allocation
page execute and read and write
5A03000
heap
page read and write
1459000
heap
page read and write
330DF5A000
stack
page read and write
527E000
trusted library allocation
page read and write
1143000
heap
page read and write
4CC000
unkown
page write copy
2D2A000
trusted library allocation
page read and write
149E000
heap
page read and write
148F000
heap
page read and write
11E5000
heap
page read and write
1468000
heap
page read and write
1828000
heap
page read and write
6B7E000
stack
page read and write
1159000
heap
page read and write
2F90000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
1444000
heap
page read and write
1434000
heap
page read and write
3CFE000
direct allocation
page read and write
3FDD000
direct allocation
page read and write
1828000
heap
page read and write
9F0000
trusted library section
page read and write
1544000
heap
page read and write
9C0000
heap
page read and write
30ED000
trusted library allocation
page execute and read and write
3F93000
direct allocation
page read and write
2900000
heap
page read and write
1780000
heap
page read and write
7F970000
trusted library allocation
page execute and read and write
3CD9000
direct allocation
page read and write
680E000
stack
page read and write
3112000
trusted library allocation
page read and write
1103000
heap
page read and write
2A8F000
heap
page read and write
1E4C3430000
heap
page read and write
3530000
heap
page read and write
30FA000
trusted library allocation
page execute and read and write
1364000
heap
page read and write
330E6FF000
stack
page read and write
365D000
trusted library allocation
page read and write
1D30000
heap
page read and write
2907000
heap
page read and write
ED0000
heap
page read and write
17B0000
heap
page read and write
110A000
heap
page read and write
688F000
stack
page read and write
1811000
heap
page read and write
59EB000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
100C000
unkown
page write copy
69D0000
trusted library allocation
page execute and read and write
F41000
unkown
page execute read
1127000
heap
page read and write
2CF1000
trusted library allocation
page read and write
1143000
heap
page read and write
There are 669 hidden memdumps, click here to show them.