IOC Report
Hesap-hareketleriniz.exe

loading gif

Files

File Path
Type
Category
Malicious
Hesap-hareketleriniz.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\0539FkHL
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\conged
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Hesap-hareketleriniz.exe
"C:\Users\user\Desktop\Hesap-hareketleriniz.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\Hesap-hareketleriniz.exe"
malicious
C:\Program Files (x86)\hbyONiquBGwKBDPPkYemXqLKYbGOUeZaswnRlfOrzOHSXQvsSeaGRzsoguHYTnUXJIgA\OYBTYubjsES.exe
"C:\Program Files (x86)\hbyONiquBGwKBDPPkYemXqLKYbGOUeZaswnRlfOrzOHSXQvsSeaGRzsoguHYTnUXJIgA\OYBTYubjsES.exe"
malicious
C:\Windows\SysWOW64\typeperf.exe
"C:\Windows\SysWOW64\typeperf.exe"
malicious
C:\Program Files (x86)\hbyONiquBGwKBDPPkYemXqLKYbGOUeZaswnRlfOrzOHSXQvsSeaGRzsoguHYTnUXJIgA\OYBTYubjsES.exe
"C:\Program Files (x86)\hbyONiquBGwKBDPPkYemXqLKYbGOUeZaswnRlfOrzOHSXQvsSeaGRzsoguHYTnUXJIgA\OYBTYubjsES.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.bluegirls.blog/cejh/?r0q0V0s=JEhqRC9H/oCtqmFmLFEvMyHxjYz9gjflj1v/RjUTK81nyojcGcbzh/gnMjlQ/TtYb30tzg4VXVGFmuHyWqFCU8DLSFDqJdvcTqUgJJ7lxtgKJN7MA9q4FvY=&Xtst=zxmDoZKX
195.110.124.133
malicious
http://www.bluegirls.blog/cejh/
195.110.124.133
malicious
http://www.tukaari.shop/9po4/
3.33.130.190
https://duckduckgo.com/chrome_newtab
unknown
http://www.platinumkitchens.info/2z1j/
3.33.130.190
https://duckduckgo.com/ac/?q=
unknown
http://www.luismoreno.monster
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.rsa3vh.shop/sm94/
8.210.49.208
http://www.tkggtf.asia/r878/
8.212.4.104
http://www.cc101.pro/59fb/?r0q0V0s=geqFIw2r3d2lbD3HTrfe7sZdVfdMBmYscjvpL3Q/DoRzT/6g2SZEkIP8fGkaSLAfd4XCUsjMqxrkjnloZhwxf7PikZVsJwnJOLtlnNE7XAIorFqKZH+1kao=&Xtst=zxmDoZKX
188.114.96.3
http://www.x100.shop/lmyl/
13.248.252.114
http://www.asiapartnars.online/smjh/
3.33.130.190
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.heakin.top/6adu/?Xtst=zxmDoZKX&r0q0V0s=6ql1NzGFeUnwU4z4+TO6wZ+CH3FyB0rkZmcQ32cwqyEdLdZlUKdXvt+RofduRiveXzEFZPiFW1B19OJhbgCxUgEyrrrFsvp+k4Ac6m/7mW7f8LDBmvQ6k60=
162.213.249.216
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.deefbank.net/wr3x/?Xtst=zxmDoZKX&r0q0V0s=SOSv5/i8DjAhPbV5Mr3LTj6sfOQnQMQoBhce2
unknown
http://www.asiapartnars.online/smjh/?r0q0V0s=TlCSuO632SEamC1Y4ySb54lFOhdqHJkFOoOTry0DDeEF6vpKE9wnOXrqmb3LfIvjaIJFRam+jfB8fuvWpK6RSrikHpOcvDixGqOub6DzdGZOdyXHqfovVh8=&Xtst=zxmDoZKX
3.33.130.190
http://156.226.108.99:28888/
unknown
http://www.luismoreno.monster/4f9a/
192.241.156.136
https://www.ecosia.org/newtab/
unknown
http://www.x100.shop/lmyl/?r0q0V0s=oAe/2A1Qz0WT9nlMP6wGkOF8WvVu0n2W/vpAVyR+fceClAZ3ClqW9VOJbbzw8QOeoJb6+uYzl0sVu65ySlybh4sI0eIDhe9F1FFriwjFpqQPdAmd+hXR6t0=&Xtst=zxmDoZKX
13.248.252.114
http://www.tukaari.shop/9po4/?r0q0V0s=VXJO1aDoNHMFre+elTBS+3c5B1ZhZcCZNzr0gNDalQuKkJIiHi+pEnkeresb1ULfe8c0xiMDEFiXGyZZCurg57YI2CFx0Rh7Fbe5b4altup9vXzeN+3P15E=&Xtst=zxmDoZKX
3.33.130.190
http://tempatmudisini01.click/7aoe/?Xtst=zxmDoZKX&r0q0V0s=qCMwne9AoGHQOe/6ZXm6rTElfQdm0X1sFz0Iw3/5AS
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.tempatmudisini01.click/7aoe/?Xtst=zxmDoZKX&r0q0V0s=qCMwne9AoGHQOe/6ZXm6rTElfQdm0X1sFz0Iw3/5ASNgcQwbbU0riHtag7bsNyP0dNoqiZdx0iiaBr5TKWZXOVKDcb2kUcKEzIkorzq+a2uf/UtJG+6eEuU=
103.21.221.4
http://www.deefbank.net/wr3x/?Xtst=zxmDoZKX&r0q0V0s=SOSv5/i8DjAhPbV5Mr3LTj6sfOQnQMQoBhce2+gazCApitTFelQ56UxSaFe5W64iSz/dHaiv+5N9LMyidkLtEzAqvse7QIXaNlDA+B0l13KNZUBwXqcVE3c=
142.250.185.179
http://www.heakin.top/6adu/
162.213.249.216
http://www.x100.shop/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.wcq24.top/n6pg/
154.23.184.240
http://www.deefbank.net/wr3x/
142.250.185.179
http://www.cc101.pro/59fb/
188.114.96.3
http://www.rsa3vh.shop/sm94/?r0q0V0s=acnZuFX8uJHxd5/+EDAvMtqqtRwNNB5btkpLhDS+HKjqD1Jc2mYglfm34ajFAb6C0fmUADEivrG5raFy9YPBV3o0n3LukS7df4q4sMX4CyUPmuILuro62X8=&Xtst=zxmDoZKX
8.210.49.208
http://www.luismoreno.monster/4f9a/?r0q0V0s=Vs9eSGxrW6t+E+2C19bxy3tfXTiADAEdwad5zoWc+CweKaAmrhPkYef/7T23pcIPjbZNdf1QPFEn8Za61oEwenZh6dnnz6lLlbWtZCLNm0XK4QAHhh8C89A=&Xtst=zxmDoZKX
192.241.156.136
http://www.tkggtf.asia/r878/?r0q0V0s=Dmjr9Upxh6obESj3vraHgZGrZCuxWN3gDDmRXB/mvbC8zuDfG5MQejH8cTFsyemkaG+uVOSvR/uKMtW383Q2nbJ6JXKP/U8sage132CiJTcM19r8nBb70BM=&Xtst=zxmDoZKX
8.212.4.104
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.wcq24.top/n6pg/?r0q0V0s=/O2K073Yw7CUB/DzzR/q2boO8Ae8c5QWkvlMblhEMNPwYJOi86yAXwnqi42g3pbq6vnHzc+TLL++JhLob/399YG+So8LU7tw0C09JppVp557m1azCxNfOPw=&Xtst=zxmDoZKX
154.23.184.240
There are 28 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.tukaari.shop
unknown
malicious
www.asiapartnars.online
unknown
malicious
www.deefbank.net
unknown
malicious
www.kabaribukota.press
unknown
malicious
www.tkggtf.asia
unknown
malicious
www.wcq24.top
unknown
malicious
www.platinumkitchens.info
unknown
malicious
www.rsa3vh.shop
unknown
malicious
www.bluegirls.blog
unknown
malicious
www.tempatmudisini01.click
unknown
malicious
www.pussy.coupons
unknown
malicious
www.pethut.shop
unknown
malicious
bluegirls.blog
195.110.124.133
ff.mdd121.shop
8.210.49.208
www.luismoreno.monster
192.241.156.136
wcq24.top
154.23.184.240
www.x100.shop
13.248.252.114
www.heakin.top
162.213.249.216
tukaari.shop
3.33.130.190
tempatmudisini01.click
103.21.221.4
www.cc101.pro
188.114.96.3
xg5dbb04f8d5803b72fbddd6e87b63418a.dlszywz.com
8.212.4.104
platinumkitchens.info
3.33.130.190
asiapartnars.online
3.33.130.190
ghs.googlehosted.com
142.250.185.179
There are 15 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
103.21.221.4
tempatmudisini01.click
unknown
8.212.4.104
xg5dbb04f8d5803b72fbddd6e87b63418a.dlszywz.com
Singapore
195.110.124.133
bluegirls.blog
Italy
8.210.49.208
ff.mdd121.shop
Singapore
188.114.96.3
www.cc101.pro
European Union
142.250.185.179
ghs.googlehosted.com
United States
154.23.184.240
wcq24.top
United States
162.213.249.216
www.heakin.top
United States
3.33.130.190
tukaari.shop
United States
13.248.252.114
www.x100.shop
United States
192.241.156.136
www.luismoreno.monster
United States
There are 1 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
55B0000
system
page execute and read and write
malicious
3160000
unkown
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
5C0000
trusted library allocation
page read and write
malicious
3750000
unclassified section
page execute and read and write
malicious
610000
trusted library allocation
page read and write
malicious
3120000
unclassified section
page execute and read and write
malicious
110000
system
page execute and read and write
malicious
75B0000
heap
page read and write
3EA4000
heap
page read and write
4743000
direct allocation
page read and write
25E45263000
heap
page read and write
69B000
heap
page read and write
791000
heap
page read and write
3ED0000
unkown
page read and write
48ED000
direct allocation
page read and write
25E45030000
system
page execute and read and write
791000
heap
page read and write
791000
heap
page read and write
3E24000
heap
page read and write
3EA4000
heap
page read and write
12A0000
unkown
page read and write
791000
heap
page read and write
1370000
unkown
page readonly
791000
heap
page read and write
36F6000
unkown
page read and write
791000
heap
page read and write
30C2000
unclassified section
page read and write
25E4523F000
heap
page read and write
31DC000
unclassified section
page read and write
4CF2000
unkown
page read and write
727B000
heap
page read and write
495E000
direct allocation
page read and write
14C0000
unkown
page read and write
45ED000
unkown
page execute and read and write
14D0000
unkown
page readonly
791000
heap
page read and write
C17000
heap
page read and write
48ED000
direct allocation
page read and write
791000
heap
page read and write
1C0000
unkown
page readonly
791000
heap
page read and write
4743000
direct allocation
page read and write
3F91000
heap
page read and write
30B2000
direct allocation
page execute and read and write
791000
heap
page read and write
5A0000
trusted library allocation
page read and write
791000
heap
page read and write
D90000
heap
page read and write
791000
heap
page read and write
DE0000
unkown
page read and write
3ABD000
heap
page read and write
3070000
unkown
page readonly
900000
heap
page read and write
14CF000
stack
page read and write
14A0000
unkown
page read and write
401000
unkown
page execute read
303D000
direct allocation
page execute and read and write
8B0000
heap
page read and write
3B7B000
unkown
page execute and read and write
2E42000
heap
page read and write
791000
heap
page read and write
1CE000
unkown
page readonly
3200000
heap
page read and write
3B3E000
heap
page read and write
25E46D16000
trusted library allocation
page read and write
791000
heap
page read and write
A13000
heap
page read and write
133D000
stack
page read and write
791000
heap
page read and write
2D64000
heap
page read and write
9C0000
heap
page read and write
3F1F000
heap
page read and write
3F91000
heap
page read and write
DDE000
stack
page read and write
3F91000
heap
page read and write
726E000
heap
page read and write
1AE0000
unkown
page readonly
791000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
25E45239000
heap
page read and write
3F40000
heap
page read and write
1CE000
unkown
page readonly
529C000
system
page read and write
1C1000
unkown
page execute read
791000
heap
page read and write
482000
unkown
page readonly
25E4505E000
system
page execute and read and write
5800000
trusted library allocation
page read and write
332D000
heap
page read and write
1100000
unkown
page read and write
BC7000
heap
page read and write
C05000
heap
page read and write
791000
heap
page read and write
4FC2000
system
page read and write
4A7000
unkown
page read and write
3F91000
heap
page read and write
E7E000
stack
page read and write
3E16000
heap
page read and write
3EA4000
heap
page read and write
3041000
direct allocation
page execute and read and write
A13000
heap
page read and write
3529000
direct allocation
page execute and read and write
D60000
unkown
page readonly
4743000
direct allocation
page read and write
A13000
heap
page read and write
47C0000
direct allocation
page read and write
48E9000
direct allocation
page read and write
3F5E000
unclassified section
page read and write
4743000
direct allocation
page read and write
3E4B000
heap
page read and write
C24000
heap
page read and write
C62000
heap
page read and write
791000
heap
page read and write
3E92000
heap
page read and write
1C0000
unkown
page readonly
4620000
direct allocation
page read and write
1D5000
unkown
page read and write
791000
heap
page read and write
791000
heap
page read and write
25E46EBE000
trusted library allocation
page read and write
48ED000
direct allocation
page read and write
2D64000
heap
page read and write
791000
heap
page read and write
1380000
heap
page read and write
25E451E0000
heap
page read and write
3E18000
heap
page read and write
DF1000
unkown
page readonly
6A0000
heap
page read and write
25E4525C000
heap
page read and write
1860000
unkown
page readonly
791000
heap
page read and write
791000
heap
page read and write
1CE000
unkown
page readonly
851A3FD000
stack
page read and write
791000
heap
page read and write
3F0F000
heap
page read and write
C00000
heap
page read and write
791000
heap
page read and write
A13000
heap
page read and write
2C70000
unkown
page readonly
6A5000
heap
page read and write
752000
heap
page read and write
1148000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
1100000
unkown
page read and write
791000
heap
page read and write
3F91000
heap
page read and write
A13000
heap
page read and write
791000
heap
page read and write
46AA000
unkown
page read and write
3EA4000
heap
page read and write
791000
heap
page read and write
8E0000
trusted library allocation
page read and write
791000
heap
page read and write
791000
heap
page read and write
14B1000
unkown
page readonly
A13000
heap
page read and write
6A9000
heap
page read and write
3EA4000
heap
page read and write
582C000
unkown
page read and write
F80000
unkown
page readonly
D01000
heap
page read and write
4D80000
unclassified section
page read and write
791000
heap
page read and write
48CA000
unclassified section
page read and write
2D60000
heap
page read and write
3564000
unkown
page read and write
A13000
heap
page read and write
7271000
heap
page read and write
47C0000
direct allocation
page read and write
FA0000
unkown
page readonly
791000
heap
page read and write
2F60000
heap
page read and write
490000
unkown
page read and write
791000
heap
page read and write
3F91000
heap
page read and write
6AF000
heap
page read and write
ED0000
direct allocation
page read and write
10FC000
stack
page read and write
A9A000
heap
page read and write
3F0F000
heap
page read and write
791000
heap
page read and write
F90000
unkown
page readonly
791000
heap
page read and write
4620000
direct allocation
page read and write
791000
heap
page read and write
791000
heap
page read and write
3EA4000
heap
page read and write
9B000
stack
page read and write
3F91000
heap
page read and write
3EE9000
heap
page read and write
594000
heap
page read and write
740000
heap
page read and write
3E21000
heap
page read and write
1380000
heap
page read and write
791000
heap
page read and write
70E000
heap
page read and write
791000
heap
page read and write
434E000
heap
page read and write
777000
heap
page read and write
3F91000
heap
page read and write
1C1000
unkown
page execute read
1C1000
unkown
page execute read
3916000
unclassified section
page read and write
791000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
79DE000
stack
page read and write
1E0000
heap
page read and write
7241000
heap
page read and write
1558000
heap
page read and write
190000
heap
page read and write
14C0000
unkown
page read and write
717000
heap
page read and write
791000
heap
page read and write
25E46A10000
trusted library allocation
page read and write
3888000
unkown
page read and write
2F0E000
direct allocation
page execute and read and write
7228000
heap
page read and write
7267000
heap
page read and write
6A9000
heap
page read and write
791000
heap
page read and write
717000
heap
page read and write
25E450F0000
heap
page read and write
123A000
stack
page read and write
D2A000
stack
page read and write
CC0000
unkown
page readonly
E00000
direct allocation
page read and write
3EA4000
heap
page read and write
4FED000
unkown
page execute and read and write
ED0000
direct allocation
page read and write
2EA2000
unkown
page read and write
3EA8000
heap
page read and write
14A0000
unkown
page read and write
495E000
direct allocation
page read and write
25E45210000
heap
page read and write
791000
heap
page read and write
A70000
heap
page read and write
14CF000
stack
page read and write
CB0000
unkown
page readonly
73B000
heap
page read and write
8D0000
heap
page read and write
791000
heap
page read and write
495E000
direct allocation
page read and write
D90000
heap
page read and write
1520000
heap
page read and write
1750000
unkown
page readonly
6FD000
heap
page read and write
5FDD000
unclassified section
page execute and read and write
791000
heap
page read and write
3064000
heap
page read and write
48E9000
direct allocation
page read and write
791000
heap
page read and write
791000
heap
page read and write
69E000
heap
page read and write
7236000
heap
page read and write
791000
heap
page read and write
3F91000
heap
page read and write
1520000
heap
page read and write
490000
unkown
page write copy
F90000
unkown
page readonly
1370000
unkown
page readonly
791000
heap
page read and write
A0A000
heap
page read and write
1360000
unkown
page readonly
25E46D13000
trusted library allocation
page read and write
791000
heap
page read and write
791000
heap
page read and write
C12000
heap
page read and write
352D000
direct allocation
page execute and read and write
1280000
unkown
page read and write
7273000
heap
page read and write
3F41000
heap
page read and write
791000
heap
page read and write
5659000
system
page execute and read and write
400000
unkown
page readonly
5675000
system
page execute and read and write
791000
heap
page read and write
1360000
unkown
page readonly
2E9F000
stack
page read and write
791000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
851ABFE000
stack
page read and write
3D40000
heap
page read and write
3EA4000
heap
page read and write
791000
heap
page read and write
9A000
stack
page read and write
791000
heap
page read and write
3B30000
direct allocation
page read and write
791000
heap
page read and write
791000
heap
page read and write
1350000
unkown
page readonly
791000
heap
page read and write
25E46D21000
trusted library allocation
page read and write
4620000
direct allocation
page read and write
5082000
system
page read and write
7A1F000
stack
page read and write
1AE0000
unkown
page readonly
791000
heap
page read and write
4414000
unclassified section
page read and write
25E46A10000
trusted library allocation
page read and write
791000
heap
page read and write
727A000
heap
page read and write
2F64000
heap
page read and write
7320000
trusted library allocation
page read and write
3F91000
heap
page read and write
3329000
heap
page read and write
D2A000
stack
page read and write
3EA4000
heap
page read and write
A13000
heap
page read and write
791000
heap
page read and write
1550000
heap
page read and write
1C1000
unkown
page execute read
791000
heap
page read and write
791000
heap
page read and write
1140000
heap
page read and write
3F91000
heap
page read and write
2F62000
unkown
page read and write
791000
heap
page read and write
990000
trusted library allocation
page execute and read and write
301F000
stack
page read and write
4518000
unkown
page read and write
791000
heap
page read and write
8E7000
heap
page read and write
D8000
stack
page read and write
791000
heap
page read and write
791000
heap
page read and write
40F0000
unclassified section
page read and write
1D7000
unkown
page readonly
12F6000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
1120000
unkown
page readonly
724B000
heap
page read and write
25E46D0E000
trusted library allocation
page read and write
6A4000
heap
page read and write
3400000
direct allocation
page execute and read and write
985000
heap
page read and write
D80000
unkown
page readonly
1340000
heap
page read and write
1280000
unkown
page read and write
3EA4000
heap
page read and write
127E000
stack
page read and write
72A000
heap
page read and write
142E000
stack
page read and write
A60000
heap
page read and write
1558000
heap
page read and write
100000
heap
page read and write
3000000
heap
page read and write
2D60000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
3D3E000
unkown
page read and write
791000
heap
page read and write
6BF000
heap
page read and write
25E46D11000
trusted library allocation
page read and write
2C70000
unkown
page readonly
F80000
unkown
page readonly
791000
heap
page read and write
25E4524C000
heap
page read and write
791000
heap
page read and write
8AF000
stack
page read and write
76D000
heap
page read and write
791000
heap
page read and write
6AF000
heap
page read and write
48ED000
direct allocation
page read and write
3F91000
heap
page read and write
6A9000
heap
page read and write
401000
unkown
page execute read
3EA4000
heap
page read and write
791000
heap
page read and write
3F91000
heap
page read and write
311F000
stack
page read and write
791000
heap
page read and write
712000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
3EA4000
heap
page read and write
791000
heap
page read and write
182F000
stack
page read and write
791000
heap
page read and write
1D5000
unkown
page read and write
3EA3000
heap
page execute and read and write
A13000
heap
page read and write
791000
heap
page read and write
1CE000
unkown
page readonly
791000
heap
page read and write
791000
heap
page read and write
702000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
3EA4000
heap
page read and write
A13000
heap
page read and write
A13000
heap
page read and write
791000
heap
page read and write
C30000
heap
page read and write
495E000
direct allocation
page read and write
70E000
heap
page read and write
791000
heap
page read and write
3C40000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
DF1000
unkown
page readonly
C1A000
heap
page read and write
151E000
stack
page read and write
791000
heap
page read and write
772000
heap
page read and write
1148000
heap
page read and write
791000
heap
page read and write
1530000
unkown
page readonly
25E46A10000
trusted library allocation
page read and write
1C0000
unkown
page readonly
791000
heap
page read and write
59ED000
unkown
page execute and read and write
4F12000
unclassified section
page read and write
791000
heap
page read and write
A13000
heap
page read and write
174F000
stack
page read and write
791000
heap
page read and write
4620000
direct allocation
page read and write
5677000
system
page execute and read and write
41F4000
unkown
page read and write
3A1A000
unkown
page read and write
25E45260000
heap
page read and write
4B60000
unkown
page read and write
3EA4000
heap
page read and write
9E0000
heap
page read and write
10FC000
stack
page read and write
791000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
149E000
stack
page read and write
791000
heap
page read and write
724E000
heap
page read and write
791000
heap
page read and write
3201000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
14B1000
unkown
page readonly
1120000
unkown
page readonly
5684000
system
page read and write
3EA4000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
1D7000
unkown
page readonly
3F91000
heap
page read and write
3EA4000
heap
page read and write
25E45230000
heap
page read and write
725A000
heap
page read and write
702000
heap
page read and write
3B60000
unkown
page execute and read and write
3AA8000
unclassified section
page read and write
791000
heap
page read and write
48ED000
direct allocation
page read and write
791000
heap
page read and write
495E000
direct allocation
page read and write
791000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
1550000
heap
page read and write
45A6000
unclassified section
page read and write
75C000
heap
page read and write
3060000
heap
page read and write
2D90000
heap
page read and write
72F000
heap
page read and write
8D0000
heap
page read and write
3AAF000
stack
page read and write
2FF0000
unkown
page read and write
3F91000
heap
page read and write
791000
heap
page read and write
3F91000
heap
page read and write
48E9000
direct allocation
page read and write
BC3000
heap
page read and write
123A000
stack
page read and write
8B4000
stack
page read and write
594000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
36D1000
direct allocation
page execute and read and write
3742000
direct allocation
page execute and read and write
5669000
system
page execute and read and write
3F91000
heap
page read and write
3EA4000
heap
page read and write
47C0000
direct allocation
page read and write
12F0000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
1750000
unkown
page readonly
55DD000
unclassified section
page execute and read and write
767000
heap
page read and write
791000
heap
page read and write
4282000
unclassified section
page read and write
7273000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
3EA4000
heap
page read and write
25E46D00000
trusted library allocation
page read and write
940000
heap
page read and write
3F91000
heap
page read and write
1D5000
unkown
page read and write
2E99000
direct allocation
page execute and read and write
4AB000
unkown
page readonly
F94000
unkown
page read and write
3C3A000
unclassified section
page read and write
791000
heap
page read and write
416B000
unclassified section
page execute and read and write
D80000
unkown
page readonly
7276000
heap
page read and write
7248000
heap
page read and write
851B3FF000
stack
page read and write
791000
heap
page read and write
3EA4000
heap
page read and write
1340000
heap
page read and write
25E45263000
heap
page read and write
3123000
heap
page read and write
D60000
unkown
page readonly
791000
heap
page read and write
890000
trusted library allocation
page read and write
3F91000
heap
page read and write
25E46EAE000
trusted library allocation
page read and write
A13000
heap
page read and write
1350000
unkown
page readonly
DDE000
stack
page read and write
791000
heap
page read and write
ED0000
direct allocation
page read and write
339E000
heap
page read and write
2EA2000
unkown
page read and write
791000
heap
page read and write
791000
heap
page read and write
4386000
unkown
page read and write
DE0000
unkown
page read and write
25E46ECE000
trusted library allocation
page read and write
791000
heap
page read and write
7262000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
2E9D000
direct allocation
page execute and read and write
723B000
heap
page read and write
482000
unkown
page readonly
A13000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
3EA4000
heap
page read and write
1530000
unkown
page readonly
791000
heap
page read and write
3EA4000
heap
page read and write
A02000
heap
page read and write
4738000
unclassified section
page read and write
50F000
stack
page read and write
A13000
heap
page read and write
87B000
stack
page read and write
2D70000
direct allocation
page execute and read and write
3EA4000
heap
page read and write
791000
heap
page read and write
48E9000
direct allocation
page read and write
3F91000
heap
page read and write
791000
heap
page read and write
1240000
stack
page read and write
6C1000
heap
page read and write
83C000
stack
page read and write
C3A000
heap
page read and write
2FEF000
stack
page read and write
1160000
heap
page read and write
1C0000
unkown
page readonly
791000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
25E46BD0000
heap
page read and write
791000
heap
page read and write
5A0000
heap
page read and write
C3E000
heap
page read and write
572C000
unkown
page read and write
400000
unkown
page readonly
791000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
C2E000
heap
page read and write
A0E000
stack
page read and write
A13000
heap
page read and write
1860000
unkown
page readonly
7231000
heap
page read and write
3EA4000
heap
page read and write
791000
heap
page read and write
47C0000
direct allocation
page read and write
7330000
trusted library allocation
page read and write
3060000
heap
page read and write
7250000
heap
page read and write
4743000
direct allocation
page read and write
791000
heap
page read and write
3EA4000
heap
page read and write
E80000
direct allocation
page read and write
791000
heap
page read and write
1140000
heap
page read and write
791000
heap
page read and write
8FE000
stack
page read and write
791000
heap
page read and write
48E9000
direct allocation
page read and write
791000
heap
page read and write
25E46D03000
trusted library allocation
page read and write
727E000
heap
page read and write
6A9000
heap
page read and write
2D90000
heap
page read and write
2FBC000
unkown
page read and write
339C000
unclassified section
page read and write
791000
heap
page read and write
1D7000
unkown
page readonly
1D5000
unkown
page read and write
3EA4000
heap
page read and write
784000
heap
page read and write
25E46EC4000
trusted library allocation
page read and write
CB0000
unkown
page readonly
791000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
690000
heap
page read and write
E3E000
stack
page read and write
791000
heap
page read and write
6A9000
heap
page read and write
25E45062000
system
page execute and read and write
790000
heap
page read and write
791000
heap
page read and write
3F91000
heap
page read and write
D70000
unkown
page readonly
93E000
stack
page read and write
6A4000
heap
page read and write
594000
heap
page read and write
4062000
unkown
page read and write
4743000
direct allocation
page read and write
791000
heap
page read and write
1D7000
unkown
page readonly
C1B000
heap
page read and write
791000
heap
page read and write
4620000
direct allocation
page read and write
791000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
1DE000
stack
page read and write
791000
heap
page read and write
3EA4000
heap
page read and write
CA0000
unkown
page readonly
791000
heap
page read and write
590000
heap
page read and write
3F41000
heap
page read and write
724000
heap
page read and write
C38000
heap
page read and write
C2E000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
6FD000
heap
page read and write
791000
heap
page read and write
3F91000
heap
page read and write
FA0000
unkown
page readonly
712000
heap
page read and write
3182000
unclassified section
page read and write
48ED000
direct allocation
page read and write
791000
heap
page read and write
8519BFB000
stack
page read and write
A00000
heap
page read and write
4150000
unclassified section
page execute and read and write
3064000
heap
page read and write
133D000
stack
page read and write
3BED000
unkown
page execute and read and write
3EA4000
heap
page read and write
980000
heap
page read and write
791000
heap
page read and write
745000
heap
page read and write
791000
heap
page read and write
47C0000
direct allocation
page read and write
25E45060000
system
page execute and read and write
890000
trusted library allocation
page read and write
791000
heap
page read and write
4AB000
unkown
page readonly
4620000
direct allocation
page read and write
25E46D0A000
trusted library allocation
page read and write
791000
heap
page read and write
25E46E01000
trusted library allocation
page read and write
1290000
unkown
page read and write
4BDD000
unclassified section
page execute and read and write
56CC000
system
page execute and read and write
14D0000
unkown
page readonly
6AA000
heap
page read and write
359E000
direct allocation
page execute and read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3EA4000
heap
page read and write
791000
heap
page read and write
724000
heap
page read and write
C17000
heap
page read and write
791000
heap
page read and write
791000
heap
page read and write
D70000
unkown
page readonly
89F000
stack
page read and write
791000
heap
page read and write
791000
heap
page read and write
50DC000
system
page read and write
25E46C00000
trusted library allocation
page read and write
7246000
heap
page read and write
41DD000
unclassified section
page execute and read and write
7236000
heap
page read and write
317C000
unkown
page read and write
6F2000
heap
page read and write
6A0000
heap
page read and write
48E9000
direct allocation
page read and write
7236000
heap
page read and write
12F0000
heap
page read and write
317C000
unkown
page read and write
A4E000
stack
page read and write
447B000
heap
page read and write
564F000
system
page execute and read and write
3F91000
heap
page read and write
36CD000
direct allocation
page execute and read and write
2FF0000
unkown
page read and write
791000
heap
page read and write
C05000
heap
page read and write
CC0000
unkown
page readonly
CFE000
stack
page read and write
791000
heap
page read and write
36AE000
stack
page read and write
890000
trusted library allocation
page read and write
D3E000
stack
page read and write
69E000
heap
page read and write
3784000
unclassified section
page read and write
495E000
direct allocation
page read and write
791000
heap
page read and write
791000
heap
page read and write
1E0000
heap
page read and write
791000
heap
page read and write
47C0000
direct allocation
page read and write
3F1F000
heap
page read and write
791000
heap
page read and write
CA0000
unkown
page readonly
3070000
unkown
page readonly
There are 737 hidden memdumps, click here to show them.