Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Hesaphareketi-01.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\vaccinators
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Hesaphareketi-01.exe
|
"C:\Users\user\Desktop\Hesaphareketi-01.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\Hesaphareketi-01.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://aborters.duckdns.org:8081
|
unknown
|
||
http://anotherarmy.dns.army:8081
|
unknown
|
||
https://www.office.com/
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:813435%0D%0ADate%20and%20Time:%2003/10/2024%20/%2015:06:33%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20813435%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:813435%0D%0ADate%20a
|
unknown
|
||
http://lifechangerscare.com
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://www.office.com/lBlq
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.97.3
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=
|
unknown
|
||
https://chrome.google.com/webstore?hl=en
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://varders.kozow.com:8081
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://checkip.dyndns.org/
|
132.226.247.73
|
||
http://51.38.247.67:8081/_send_.php?L
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33$
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
http://ftp.lifechangerscare.com
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://chrome.google.com/webstore?hl=enlBlq
|
unknown
|
||
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 22 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
lifechangerscare.com
|
216.252.233.118
|
||
reallyfreegeoip.org
|
188.114.97.3
|
||
api.telegram.org
|
149.154.167.220
|
||
ftp.lifechangerscare.com
|
unknown
|
||
checkip.dyndns.org
|
unknown
|
||
checkip.dyndns.com
|
132.226.247.73
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
188.114.97.3
|
reallyfreegeoip.org
|
European Union
|
||
216.252.233.118
|
lifechangerscare.com
|
Switzerland
|
||
132.226.247.73
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
A80000
|
direct allocation
|
page read and write
|
||
2AE1000
|
trusted library allocation
|
page read and write
|
||
2CD2000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
3AF4000
|
trusted library allocation
|
page read and write
|
||
E95000
|
trusted library allocation
|
page execute and read and write
|
||
400C000
|
heap
|
page read and write
|
||
487E000
|
direct allocation
|
page read and write
|
||
C35000
|
heap
|
page read and write
|
||
E64000
|
trusted library allocation
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
107E000
|
trusted library allocation
|
page read and write
|
||
3D6B000
|
trusted library allocation
|
page read and write
|
||
2E86000
|
trusted library allocation
|
page read and write
|
||
6550000
|
trusted library allocation
|
page read and write
|
||
4809000
|
direct allocation
|
page read and write
|
||
3E6A000
|
trusted library allocation
|
page read and write
|
||
109D000
|
trusted library allocation
|
page read and write
|
||
2E78000
|
trusted library allocation
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
3F76000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
B2E000
|
heap
|
page read and write
|
||
3CC1000
|
trusted library allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
2D55000
|
trusted library allocation
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
3FC5000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
2B94000
|
trusted library allocation
|
page read and write
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
6A30000
|
heap
|
page read and write
|
||
2BA0000
|
trusted library allocation
|
page read and write
|
||
480D000
|
direct allocation
|
page read and write
|
||
3D98000
|
trusted library allocation
|
page read and write
|
||
3B4C000
|
trusted library allocation
|
page read and write
|
||
3C06000
|
trusted library allocation
|
page read and write
|
||
2D98000
|
trusted library allocation
|
page read and write
|
||
9C4000
|
heap
|
page read and write
|
||
63C0000
|
trusted library allocation
|
page execute and read and write
|
||
B3B000
|
heap
|
page read and write
|
||
EB0000
|
trusted library allocation
|
page read and write
|
||
3B9F000
|
stack
|
page read and write
|
||
4809000
|
direct allocation
|
page read and write
|
||
2D71000
|
trusted library allocation
|
page read and write
|
||
446000
|
system
|
page execute and read and write
|
||
2BEA000
|
trusted library allocation
|
page read and write
|
||
3F49000
|
heap
|
page read and write
|
||
2C67000
|
trusted library allocation
|
page read and write
|
||
3CAE000
|
trusted library allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
6490000
|
trusted library allocation
|
page read and write
|
||
B46000
|
heap
|
page read and write
|
||
2D68000
|
trusted library allocation
|
page read and write
|
||
2C6B000
|
trusted library allocation
|
page read and write
|
||
4663000
|
direct allocation
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
2B80000
|
trusted library allocation
|
page read and write
|
||
BFC000
|
heap
|
page read and write
|
||
480D000
|
direct allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
2B8C000
|
trusted library allocation
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
B18000
|
heap
|
page read and write
|
||
2B84000
|
trusted library allocation
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
2E7D000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
6400000
|
trusted library allocation
|
page execute and read and write
|
||
487E000
|
direct allocation
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
2E53000
|
trusted library allocation
|
page read and write
|
||
487E000
|
direct allocation
|
page read and write
|
||
106C000
|
stack
|
page read and write
|
||
61EE000
|
stack
|
page read and write
|
||
442A000
|
heap
|
page read and write
|
||
2A50000
|
heap
|
page execute and read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
3E21000
|
heap
|
page read and write
|
||
63D0000
|
trusted library allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
2C63000
|
trusted library allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
3D3F000
|
trusted library allocation
|
page read and write
|
||
2CA7000
|
trusted library allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
3050000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
3AE1000
|
trusted library allocation
|
page read and write
|
||
10A2000
|
trusted library allocation
|
page read and write
|
||
3DF4000
|
trusted library allocation
|
page read and write
|
||
2C76000
|
trusted library allocation
|
page read and write
|
||
5FD1000
|
heap
|
page read and write
|
||
3DE7000
|
trusted library allocation
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
3DEE000
|
trusted library allocation
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
3F50000
|
heap
|
page read and write
|
||
5043000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
538E000
|
stack
|
page read and write
|
||
6430000
|
trusted library allocation
|
page execute and read and write
|
||
400C000
|
heap
|
page read and write
|
||
480D000
|
direct allocation
|
page read and write
|
||
55F4000
|
trusted library allocation
|
page read and write
|
||
379E000
|
stack
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
2CE2000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3DE1000
|
trusted library allocation
|
page read and write
|
||
3BB2000
|
trusted library allocation
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page execute and read and write
|
||
3B09000
|
trusted library allocation
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
2B48000
|
trusted library allocation
|
page read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
2DF1000
|
trusted library allocation
|
page read and write
|
||
64A7000
|
trusted library allocation
|
page read and write
|
||
6510000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
487E000
|
direct allocation
|
page read and write
|
||
3F49000
|
heap
|
page read and write
|
||
4809000
|
direct allocation
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
2E7B000
|
trusted library allocation
|
page read and write
|
||
5F30000
|
heap
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
AF7000
|
stack
|
page read and write
|
||
3C3C000
|
trusted library allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
2B53000
|
trusted library allocation
|
page read and write
|
||
63AE000
|
stack
|
page read and write
|
||
2B9C000
|
trusted library allocation
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
ADE000
|
heap
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
2B5B000
|
trusted library allocation
|
page read and write
|
||
1076000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
E60000
|
trusted library allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
3B9C000
|
trusted library allocation
|
page read and write
|
||
3FC5000
|
heap
|
page read and write
|
||
2B32000
|
trusted library allocation
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
E9B000
|
trusted library allocation
|
page execute and read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
487E000
|
direct allocation
|
page read and write
|
||
6420000
|
trusted library allocation
|
page execute and read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
2D9E000
|
trusted library allocation
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
4052000
|
heap
|
page read and write
|
||
64C0000
|
trusted library allocation
|
page execute and read and write
|
||
400C000
|
heap
|
page read and write
|
||
2DEE000
|
trusted library allocation
|
page read and write
|
||
E7D000
|
trusted library allocation
|
page execute and read and write
|
||
3CEF000
|
trusted library allocation
|
page read and write
|
||
4663000
|
direct allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
3DA3000
|
trusted library allocation
|
page read and write
|
||
5FB9000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
2E73000
|
trusted library allocation
|
page read and write
|
||
E82000
|
trusted library allocation
|
page read and write
|
||
3D9A000
|
trusted library allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
9BE000
|
stack
|
page read and write
|
||
3E0D000
|
trusted library allocation
|
page read and write
|
||
2D4A000
|
trusted library allocation
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
2E26000
|
trusted library allocation
|
page read and write
|
||
3F05000
|
heap
|
page read and write
|
||
3F75000
|
heap
|
page read and write
|
||
2DD5000
|
trusted library allocation
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
2978000
|
trusted library allocation
|
page read and write
|
||
2CF8000
|
trusted library allocation
|
page read and write
|
||
2B57000
|
trusted library allocation
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
ADA000
|
heap
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
4809000
|
direct allocation
|
page read and write
|
||
6540000
|
trusted library allocation
|
page execute and read and write
|
||
3C50000
|
heap
|
page read and write
|
||
63F0000
|
trusted library allocation
|
page read and write
|
||
3D50000
|
heap
|
page read and write
|
||
5DEE000
|
stack
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
3E8A000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
2A30000
|
trusted library allocation
|
page read and write
|
||
4663000
|
direct allocation
|
page read and write
|
||
3D8F000
|
trusted library allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
3B01000
|
trusted library allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
2E82000
|
trusted library allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
60EE000
|
stack
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
64D6000
|
trusted library allocation
|
page read and write
|
||
4809000
|
direct allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
435A000
|
heap
|
page read and write
|
||
3F76000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
2DE2000
|
trusted library allocation
|
page read and write
|
||
E6D000
|
trusted library allocation
|
page execute and read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
3C26000
|
trusted library allocation
|
page read and write
|
||
B07000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
2C9A000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
3EDB000
|
heap
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
3BDA000
|
trusted library allocation
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
2C71000
|
trusted library allocation
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
6520000
|
trusted library allocation
|
page read and write
|
||
4BDE000
|
stack
|
page read and write
|
||
3DDC000
|
trusted library allocation
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
3F2A000
|
heap
|
page read and write
|
||
3E32000
|
heap
|
page read and write
|
||
2D5F000
|
trusted library allocation
|
page read and write
|
||
3F48000
|
heap
|
page execute and read and write
|
||
482000
|
unkown
|
page readonly
|
||
2C98000
|
trusted library allocation
|
page read and write
|
||
3E35000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
3E80000
|
trusted library allocation
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
5E2E000
|
stack
|
page read and write
|
||
3DF7000
|
trusted library allocation
|
page read and write
|
||
1070000
|
trusted library allocation
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
2C9C000
|
trusted library allocation
|
page read and write
|
||
BBE000
|
heap
|
page read and write
|
||
2DEB000
|
trusted library allocation
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
3E92000
|
trusted library allocation
|
page read and write
|
||
5F92000
|
heap
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page execute and read and write
|
||
2EA9000
|
trusted library allocation
|
page read and write
|
||
3D94000
|
trusted library allocation
|
page read and write
|
||
2DA4000
|
trusted library allocation
|
page read and write
|
||
B0D000
|
heap
|
page read and write
|
||
2E7B000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
3C99000
|
trusted library allocation
|
page read and write
|
||
3BAE000
|
heap
|
page read and write
|
||
5F9B000
|
heap
|
page read and write
|
||
606D000
|
stack
|
page read and write
|
||
480D000
|
direct allocation
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5CEE000
|
stack
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
3CEB000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
B03000
|
heap
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
622E000
|
stack
|
page read and write
|
||
E97000
|
trusted library allocation
|
page execute and read and write
|
||
6502000
|
trusted library allocation
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
3D8B000
|
trusted library allocation
|
page read and write
|
||
108E000
|
trusted library allocation
|
page read and write
|
||
71A000
|
stack
|
page read and write
|
||
2B90000
|
trusted library allocation
|
page read and write
|
||
E4E000
|
stack
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
3F4E000
|
heap
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
400C000
|
heap
|
page read and write
|
||
480D000
|
direct allocation
|
page read and write
|
||
2AD0000
|
heap
|
page execute and read and write
|
||
2CA2000
|
trusted library allocation
|
page read and write
|
||
2D92000
|
trusted library allocation
|
page read and write
|
||
3AEF000
|
trusted library allocation
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
2D4F000
|
trusted library allocation
|
page read and write
|
||
1096000
|
trusted library allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
3EEA000
|
heap
|
page read and write
|
||
4809000
|
direct allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
62AE000
|
stack
|
page read and write
|
||
2B88000
|
trusted library allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
E92000
|
trusted library allocation
|
page read and write
|
||
6539000
|
trusted library allocation
|
page read and write
|
||
2BC7000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
E86000
|
trusted library allocation
|
page execute and read and write
|
||
63BD000
|
trusted library allocation
|
page read and write
|
||
626E000
|
stack
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
1091000
|
trusted library allocation
|
page read and write
|
||
63B0000
|
trusted library allocation
|
page read and write
|
||
5F8D000
|
heap
|
page read and write
|
||
2B3E000
|
trusted library allocation
|
page read and write
|
||
5F2F000
|
stack
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
16CF000
|
stack
|
page read and write
|
||
4663000
|
direct allocation
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
3BC9000
|
trusted library allocation
|
page read and write
|
||
2B4A000
|
trusted library allocation
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
3FC6000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3E66000
|
heap
|
page read and write
|
||
2C69000
|
trusted library allocation
|
page read and write
|
||
60AE000
|
stack
|
page read and write
|
||
55F6000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
6505000
|
trusted library allocation
|
page read and write
|
||
B48000
|
heap
|
page read and write
|
||
E63000
|
trusted library allocation
|
page execute and read and write
|
||
3055000
|
heap
|
page read and write
|
||
3EBD000
|
trusted library allocation
|
page read and write
|
||
102E000
|
stack
|
page read and write
|
||
487E000
|
direct allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
3D0B000
|
trusted library allocation
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
3E59000
|
heap
|
page read and write
|
||
6530000
|
trusted library allocation
|
page read and write
|
||
3D9D000
|
trusted library allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
3D20000
|
trusted library allocation
|
page read and write
|
||
6500000
|
trusted library allocation
|
page read and write
|
||
3AFB000
|
trusted library allocation
|
page read and write
|
||
64B4000
|
trusted library allocation
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
2D6D000
|
trusted library allocation
|
page read and write
|
||
4663000
|
direct allocation
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
2B98000
|
trusted library allocation
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
3FC6000
|
heap
|
page read and write
|
||
2C94000
|
trusted library allocation
|
page read and write
|
||
55E0000
|
trusted library allocation
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
480D000
|
direct allocation
|
page read and write
|
||
108A000
|
trusted library allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
4663000
|
direct allocation
|
page read and write
|
||
3EC0000
|
trusted library allocation
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
3E30000
|
heap
|
page read and write
|
||
2D9A000
|
trusted library allocation
|
page read and write
|
||
6410000
|
trusted library allocation
|
page execute and read and write
|
||
E8A000
|
trusted library allocation
|
page execute and read and write
|
||
107B000
|
trusted library allocation
|
page read and write
|
||
400C000
|
heap
|
page read and write
|
||
55FA000
|
trusted library allocation
|
page read and write
|
There are 409 hidden memdumps, click here to show them.