Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Halkbank_Ekstre_20241022_081224_563756.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Halkbank_Ekstre_20241022_081224_563756.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpD8B4.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\bAZAANr.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\bAZAANr.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\bAZAANr.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_142fxk0j.umy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4spchqge.hrw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_czultcis.eod.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gtciswzl.v5s.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h1ju5ih4.n5h.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i43rkmla.x5m.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ljruqizx.5re.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oilutxhm.dll.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpF6AC.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Halkbank_Ekstre_20241022_081224_563756.exe
|
"C:\Users\user\Desktop\Halkbank_Ekstre_20241022_081224_563756.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Halkbank_Ekstre_20241022_081224_563756.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\bAZAANr.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bAZAANr" /XML "C:\Users\user\AppData\Local\Temp\tmpD8B4.tmp"
|
||
C:\Users\user\Desktop\Halkbank_Ekstre_20241022_081224_563756.exe
|
"C:\Users\user\Desktop\Halkbank_Ekstre_20241022_081224_563756.exe"
|
||
C:\Users\user\AppData\Roaming\bAZAANr.exe
|
C:\Users\user\AppData\Roaming\bAZAANr.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bAZAANr" /XML "C:\Users\user\AppData\Local\Temp\tmpF6AC.tmp"
|
||
C:\Users\user\AppData\Roaming\bAZAANr.exe
|
"C:\Users\user\AppData\Roaming\bAZAANr.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://checkip.dyndns.org/
|
132.226.247.73
|
||
http://checkip.dyndns.comd
|
unknown
|
||
https://reallyfreegeoip.org/xml/173.254.250.71d
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
http://reallyfreegeoip.orgd
|
unknown
|
||
http://tempuri.org/DataSet1.xsd
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
http://checkip.dyndns.orgd
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
https://reallyfreegeoip.org/xml/173.254.250.71
|
188.114.96.3
|
||
https://reallyfreegeoip.org/xml/173.254.250.71l
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://checkip.dyndns.com
|
unknown
|
||
http://checkip.dyndns.org/d
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
|
unknown
|
||
https://api.telegram.org/bot-/sendDocument?chat_id=
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 8 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.96.3
|
||
checkip.dyndns.org
|
unknown
|
||
checkip.dyndns.com
|
132.226.247.73
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.96.3
|
reallyfreegeoip.org
|
European Union
|
||
132.226.247.73
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20241022_081224_563756_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20241022_081224_563756_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20241022_081224_563756_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20241022_081224_563756_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20241022_081224_563756_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20241022_081224_563756_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20241022_081224_563756_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20241022_081224_563756_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20241022_081224_563756_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20241022_081224_563756_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20241022_081224_563756_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20241022_081224_563756_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20241022_081224_563756_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20241022_081224_563756_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\bAZAANr_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\bAZAANr_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\bAZAANr_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\bAZAANr_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\bAZAANr_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\bAZAANr_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\bAZAANr_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\bAZAANr_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\bAZAANr_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\bAZAANr_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\bAZAANr_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\bAZAANr_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\bAZAANr_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\bAZAANr_RASMANCS
|
FileDirectory
|
There are 19 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
37B9000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
trusted library section
|
page read and write
|
||
2AD4000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
heap
|
page execute and read and write
|
||
B50E000
|
stack
|
page read and write
|
||
B8D000
|
trusted library allocation
|
page execute and read and write
|
||
4E81000
|
trusted library allocation
|
page read and write
|
||
3989000
|
trusted library allocation
|
page read and write
|
||
28F1000
|
trusted library allocation
|
page read and write
|
||
712E000
|
stack
|
page read and write
|
||
2BA8000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
FD7000
|
heap
|
page read and write
|
||
5FF9000
|
heap
|
page read and write
|
||
635E000
|
stack
|
page read and write
|
||
4F26000
|
trusted library allocation
|
page read and write
|
||
B92B000
|
stack
|
page read and write
|
||
5DE000
|
stack
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page execute and read and write
|
||
5A20000
|
heap
|
page read and write
|
||
E13000
|
trusted library allocation
|
page execute and read and write
|
||
C90000
|
heap
|
page read and write
|
||
51C0000
|
heap
|
page execute and read and write
|
||
6F9E000
|
stack
|
page read and write
|
||
4F60000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
2B81000
|
trusted library allocation
|
page read and write
|
||
5E9E000
|
stack
|
page read and write
|
||
BB2000
|
trusted library allocation
|
page read and write
|
||
76ED000
|
stack
|
page read and write
|
||
2981000
|
trusted library allocation
|
page read and write
|
||
10DE000
|
stack
|
page read and write
|
||
4F7C000
|
trusted library allocation
|
page read and write
|
||
39F1000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
trusted library allocation
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
6150000
|
trusted library allocation
|
page execute and read and write
|
||
B17E000
|
stack
|
page read and write
|
||
D6A000
|
trusted library allocation
|
page execute and read and write
|
||
6140000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
4C30000
|
trusted library allocation
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
4EA5000
|
trusted library allocation
|
page read and write
|
||
9D5000
|
heap
|
page read and write
|
||
5170000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
25F8000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
304E000
|
unkown
|
page read and write
|
||
6B12000
|
trusted library allocation
|
page read and write
|
||
5180000
|
trusted library allocation
|
page execute and read and write
|
||
D80000
|
heap
|
page read and write
|
||
EB0000
|
trusted library allocation
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
26D0000
|
trusted library allocation
|
page read and write
|
||
39BB000
|
trusted library allocation
|
page read and write
|
||
299E000
|
stack
|
page read and write
|
||
2710000
|
trusted library allocation
|
page read and write
|
||
6E1E000
|
stack
|
page read and write
|
||
7260000
|
trusted library allocation
|
page execute and read and write
|
||
26FB000
|
trusted library allocation
|
page execute and read and write
|
||
839000
|
stack
|
page read and write
|
||
963000
|
trusted library allocation
|
page execute and read and write
|
||
6250000
|
trusted library allocation
|
page read and write
|
||
3AEA000
|
trusted library allocation
|
page read and write
|
||
28DE000
|
trusted library allocation
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
39A5000
|
trusted library allocation
|
page read and write
|
||
4CB0000
|
trusted library allocation
|
page read and write
|
||
2BC5000
|
trusted library allocation
|
page read and write
|
||
488000
|
unkown
|
page readonly
|
||
5170000
|
heap
|
page read and write
|
||
2B3C000
|
trusted library allocation
|
page read and write
|
||
B27F000
|
stack
|
page read and write
|
||
63C5000
|
heap
|
page read and write
|
||
2BA4000
|
trusted library allocation
|
page read and write
|
||
2D5D000
|
stack
|
page read and write
|
||
2BFB000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page execute and read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
295B000
|
trusted library allocation
|
page read and write
|
||
2B86000
|
trusted library allocation
|
page read and write
|
||
5010000
|
trusted library allocation
|
page execute and read and write
|
||
2A7C000
|
trusted library allocation
|
page read and write
|
||
26A0000
|
heap
|
page read and write
|
||
BA2C000
|
stack
|
page read and write
|
||
6C20000
|
heap
|
page read and write
|
||
5280000
|
heap
|
page read and write
|
||
6910000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
2AA3000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
29E1000
|
trusted library allocation
|
page read and write
|
||
4EB3000
|
heap
|
page read and write
|
||
96D000
|
trusted library allocation
|
page execute and read and write
|
||
A20000
|
heap
|
page read and write
|
||
7670000
|
trusted library allocation
|
page execute and read and write
|
||
4E74000
|
trusted library allocation
|
page read and write
|
||
D43000
|
trusted library allocation
|
page execute and read and write
|
||
C80000
|
heap
|
page read and write
|
||
2690000
|
trusted library allocation
|
page read and write
|
||
631E000
|
stack
|
page read and write
|
||
3AC1000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
65DE000
|
stack
|
page read and write
|
||
4EB0000
|
heap
|
page read and write
|
||
6F50000
|
heap
|
page read and write
|
||
73EE000
|
stack
|
page read and write
|
||
4F2D000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
2A6E000
|
trusted library allocation
|
page read and write
|
||
2A97000
|
trusted library allocation
|
page read and write
|
||
8F7000
|
stack
|
page read and write
|
||
26EA000
|
trusted library allocation
|
page execute and read and write
|
||
29FC000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
trusted library section
|
page readonly
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
C86000
|
heap
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page read and write
|
||
D66000
|
trusted library allocation
|
page execute and read and write
|
||
B3E000
|
stack
|
page read and write
|
||
6F36000
|
heap
|
page read and write
|
||
613E000
|
stack
|
page read and write
|
||
E14000
|
trusted library allocation
|
page read and write
|
||
60B4000
|
trusted library allocation
|
page read and write
|
||
AD2000
|
heap
|
page read and write
|
||
B4AF000
|
stack
|
page read and write
|
||
4C3B000
|
trusted library allocation
|
page read and write
|
||
B4CC000
|
stack
|
page read and write
|
||
2BB8000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2A9D000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
691E000
|
heap
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
982000
|
trusted library allocation
|
page read and write
|
||
D4D000
|
trusted library allocation
|
page execute and read and write
|
||
51A000
|
stack
|
page read and write
|
||
4FA0000
|
heap
|
page execute and read and write
|
||
6177000
|
trusted library allocation
|
page read and write
|
||
6C8F000
|
heap
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
297E000
|
stack
|
page read and write
|
||
6CBC000
|
heap
|
page read and write
|
||
2B5F000
|
trusted library allocation
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
heap
|
page read and write
|
||
2B8C000
|
trusted library allocation
|
page read and write
|
||
27B1000
|
trusted library allocation
|
page read and write
|
||
4C90000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
heap
|
page read and write
|
||
79AE000
|
stack
|
page read and write
|
||
2A1B000
|
trusted library allocation
|
page read and write
|
||
AFE000
|
heap
|
page read and write
|
||
E5A000
|
heap
|
page read and write
|
||
D72000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
D7B000
|
trusted library allocation
|
page execute and read and write
|
||
25EE000
|
stack
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
29E9000
|
trusted library allocation
|
page read and write
|
||
4F0E000
|
trusted library allocation
|
page read and write
|
||
B7E000
|
unkown
|
page read and write
|
||
4F12000
|
trusted library allocation
|
page read and write
|
||
3A30000
|
trusted library allocation
|
page read and write
|
||
2981000
|
trusted library allocation
|
page read and write
|
||
2910000
|
trusted library allocation
|
page read and write
|
||
F97000
|
heap
|
page read and write
|
||
751E000
|
trusted library allocation
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
71DE000
|
stack
|
page read and write
|
||
2D5F000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
AF7000
|
stack
|
page read and write
|
||
29A0000
|
trusted library allocation
|
page read and write
|
||
BA6E000
|
stack
|
page read and write
|
||
4C51000
|
trusted library allocation
|
page read and write
|
||
970000
|
trusted library allocation
|
page read and write
|
||
29EC000
|
trusted library allocation
|
page read and write
|
||
6710000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
29FE000
|
trusted library allocation
|
page read and write
|
||
6CAD000
|
heap
|
page read and write
|
||
26DD000
|
trusted library allocation
|
page execute and read and write
|
||
4FC5000
|
heap
|
page read and write
|
||
275E000
|
stack
|
page read and write
|
||
B32000
|
heap
|
page read and write
|
||
4D22000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
A8D000
|
stack
|
page read and write
|
||
FB6000
|
trusted library allocation
|
page read and write
|
||
4E64000
|
trusted library allocation
|
page read and write
|
||
2AC1000
|
trusted library allocation
|
page read and write
|
||
B5AE000
|
stack
|
page read and write
|
||
98A000
|
trusted library allocation
|
page execute and read and write
|
||
3B31000
|
trusted library allocation
|
page read and write
|
||
B70000
|
trusted library allocation
|
page read and write
|
||
60E0000
|
trusted library allocation
|
page read and write
|
||
2902000
|
trusted library allocation
|
page read and write
|
||
2A59000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page execute and read and write
|
||
93E000
|
stack
|
page read and write
|
||
6C57000
|
heap
|
page read and write
|
||
AFB000
|
heap
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
26E0000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page execute and read and write
|
||
26F0000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
heap
|
page execute and read and write
|
||
317E000
|
unkown
|
page read and write
|
||
D75000
|
trusted library allocation
|
page execute and read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
BC2000
|
trusted library allocation
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
4F42000
|
trusted library allocation
|
page read and write
|
||
6F64000
|
heap
|
page read and write
|
||
A49000
|
heap
|
page read and write
|
||
4C4E000
|
trusted library allocation
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
ACA000
|
stack
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
2A34000
|
trusted library allocation
|
page read and write
|
||
4BBE000
|
stack
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
28F6000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
trusted library allocation
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
60D0000
|
trusted library allocation
|
page execute and read and write
|
||
2950000
|
trusted library allocation
|
page read and write
|
||
5FA0000
|
heap
|
page read and write
|
||
2890000
|
trusted library allocation
|
page execute and read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
3AF9000
|
trusted library allocation
|
page read and write
|
||
6F8C000
|
heap
|
page read and write
|
||
3F0000
|
unkown
|
page readonly
|
||
CC5000
|
heap
|
page read and write
|
||
6CC3000
|
heap
|
page read and write
|
||
28D6000
|
trusted library allocation
|
page read and write
|
||
D5D000
|
trusted library allocation
|
page execute and read and write
|
||
39BC000
|
trusted library allocation
|
page read and write
|
||
5023000
|
heap
|
page read and write
|
||
3B43000
|
trusted library allocation
|
page read and write
|
||
66E0000
|
trusted library allocation
|
page read and write
|
||
51EE000
|
stack
|
page read and write
|
||
290E000
|
trusted library allocation
|
page read and write
|
||
F8C000
|
stack
|
page read and write
|
||
756E000
|
stack
|
page read and write
|
||
4FDD000
|
stack
|
page read and write
|
||
4C5D000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
heap
|
page read and write
|
||
288D000
|
stack
|
page read and write
|
||
3BF4000
|
trusted library allocation
|
page read and write
|
||
60BD000
|
trusted library allocation
|
page read and write
|
||
4D9B000
|
stack
|
page read and write
|
||
6E5E000
|
stack
|
page read and write
|
||
4B1B000
|
stack
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
4C80000
|
trusted library allocation
|
page read and write
|
||
4E87000
|
trusted library allocation
|
page read and write
|
||
4988000
|
trusted library allocation
|
page read and write
|
||
5F9F000
|
stack
|
page read and write
|
||
709E000
|
stack
|
page read and write
|
||
D44000
|
trusted library allocation
|
page read and write
|
||
6B2E000
|
heap
|
page read and write
|
||
4A7E000
|
stack
|
page read and write
|
||
F90000
|
heap
|
page execute and read and write
|
||
E1D000
|
trusted library allocation
|
page execute and read and write
|
||
2914000
|
trusted library allocation
|
page read and write
|
||
5270000
|
trusted library allocation
|
page read and write
|
||
6C48000
|
heap
|
page read and write
|
||
3AED000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
639F000
|
stack
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
70DE000
|
stack
|
page read and write
|
||
37B1000
|
trusted library allocation
|
page read and write
|
||
7680000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page execute and read and write
|
||
415000
|
remote allocation
|
page execute and read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
E67000
|
heap
|
page read and write
|
||
B3CC000
|
stack
|
page read and write
|
||
7510000
|
trusted library allocation
|
page read and write
|
||
2AB1000
|
trusted library allocation
|
page read and write
|
||
992000
|
trusted library allocation
|
page read and write
|
||
766F000
|
stack
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
964000
|
trusted library allocation
|
page read and write
|
||
514B000
|
stack
|
page read and write
|
||
772E000
|
stack
|
page read and write
|
||
980000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
614A000
|
trusted library allocation
|
page read and write
|
||
538D000
|
stack
|
page read and write
|
||
F1F000
|
heap
|
page read and write
|
||
7270000
|
trusted library allocation
|
page execute and read and write
|
||
73AE000
|
stack
|
page read and write
|
||
AF7000
|
stack
|
page read and write
|
||
2ADE000
|
trusted library allocation
|
page read and write
|
||
60C0000
|
trusted library allocation
|
page execute and read and write
|
||
2A64000
|
trusted library allocation
|
page read and write
|
||
75DE000
|
trusted library allocation
|
page read and write
|
||
F28000
|
heap
|
page read and write
|
||
2DFA000
|
heap
|
page read and write
|
||
4F32000
|
trusted library allocation
|
page read and write
|
||
B17000
|
heap
|
page read and write
|
||
D62000
|
trusted library allocation
|
page read and write
|
||
2A91000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
trusted library allocation
|
page execute and read and write
|
||
2A38000
|
trusted library allocation
|
page read and write
|
||
A28000
|
heap
|
page read and write
|
||
621E000
|
stack
|
page read and write
|
||
3A91000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
7570000
|
trusted library section
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page execute and read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
4F1E000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
B6AE000
|
stack
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
BB6F000
|
stack
|
page read and write
|
||
7960000
|
trusted library allocation
|
page read and write
|
||
BEA000
|
heap
|
page read and write
|
||
6260000
|
trusted library allocation
|
page execute and read and write
|
||
7A0D000
|
stack
|
page read and write
|
||
2A5E000
|
trusted library allocation
|
page read and write
|
||
28DB000
|
trusted library allocation
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
F26000
|
heap
|
page read and write
|
||
3F2000
|
unkown
|
page readonly
|
||
5150000
|
trusted library section
|
page readonly
|
||
2A27000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
trusted library allocation
|
page read and write
|
||
B83000
|
trusted library allocation
|
page execute and read and write
|
||
6EF9000
|
heap
|
page read and write
|
||
C23000
|
heap
|
page read and write
|
||
FFF000
|
stack
|
page read and write
|
||
B84000
|
trusted library allocation
|
page read and write
|
||
BBA000
|
trusted library allocation
|
page execute and read and write
|
||
A71000
|
heap
|
page read and write
|
||
2D99000
|
stack
|
page read and write
|
||
97D000
|
trusted library allocation
|
page execute and read and write
|
||
6144000
|
trusted library allocation
|
page read and write
|
||
41A000
|
remote allocation
|
page execute and read and write
|
||
2920000
|
heap
|
page read and write
|
||
6C7D000
|
heap
|
page read and write
|
||
BBF000
|
unkown
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
7FA000
|
stack
|
page read and write
|
||
5FA8000
|
heap
|
page read and write
|
||
960000
|
trusted library allocation
|
page read and write
|
||
5030000
|
heap
|
page execute and read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
6240000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
FB4000
|
trusted library allocation
|
page read and write
|
||
63A0000
|
heap
|
page read and write
|
||
4C56000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
trusted library allocation
|
page read and write
|
||
7950000
|
trusted library allocation
|
page execute and read and write
|
||
9C0000
|
heap
|
page read and write
|
||
47EC000
|
stack
|
page read and write
|
||
2930000
|
trusted library allocation
|
page read and write
|
||
29E4000
|
trusted library allocation
|
page read and write
|
||
CEE000
|
stack
|
page read and write
|
||
3AE4000
|
trusted library allocation
|
page read and write
|
||
B6B0000
|
heap
|
page read and write
|
||
66DE000
|
stack
|
page read and write
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
CB9000
|
heap
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
28C0000
|
trusted library allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
60E7000
|
trusted library allocation
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
BAA000
|
heap
|
page read and write
|
||
4F0B000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
2B9F000
|
trusted library allocation
|
page read and write
|
||
B24000
|
heap
|
page read and write
|
||
5285000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
6180000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
72AE000
|
stack
|
page read and write
|
||
416000
|
remote allocation
|
page execute and read and write
|
||
26F5000
|
trusted library allocation
|
page execute and read and write
|
||
6270000
|
trusted library allocation
|
page read and write
|
||
937000
|
stack
|
page read and write
|
||
6B95000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
4F1A000
|
trusted library allocation
|
page read and write
|
||
27AE000
|
stack
|
page read and write
|
||
74EE000
|
stack
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
986000
|
trusted library allocation
|
page execute and read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
26F7000
|
trusted library allocation
|
page execute and read and write
|
||
BAD000
|
trusted library allocation
|
page execute and read and write
|
||
60FE000
|
stack
|
page read and write
|
||
997000
|
trusted library allocation
|
page execute and read and write
|
||
29B0000
|
heap
|
page execute and read and write
|
||
9CE000
|
stack
|
page read and write
|
||
6C3F000
|
heap
|
page read and write
|
||
B60E000
|
stack
|
page read and write
|
||
62A0000
|
heap
|
page read and write
|
||
4F50000
|
heap
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
27CB000
|
trusted library allocation
|
page read and write
|
||
6C80000
|
heap
|
page read and write
|
||
513D000
|
stack
|
page read and write
|
||
6C35000
|
heap
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page execute and read and write
|
||
4F44000
|
trusted library allocation
|
page read and write
|
||
39D0000
|
trusted library allocation
|
page read and write
|
||
950000
|
trusted library allocation
|
page read and write
|
||
6F53000
|
heap
|
page read and write
|
||
6146000
|
trusted library allocation
|
page read and write
|
||
4E92000
|
trusted library allocation
|
page read and write
|
||
716E000
|
stack
|
page read and write
|
||
3218000
|
heap
|
page read and write
|
||
39CF000
|
trusted library allocation
|
page read and write
|
||
CC1000
|
heap
|
page read and write
|
||
99B000
|
trusted library allocation
|
page execute and read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
heap
|
page read and write
|
||
2BB4000
|
trusted library allocation
|
page read and write
|
||
7969000
|
trusted library allocation
|
page read and write
|
||
279E000
|
stack
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
48EC000
|
stack
|
page read and write
|
||
5150000
|
heap
|
page read and write
|
||
60BA000
|
trusted library allocation
|
page read and write
|
||
D77000
|
trusted library allocation
|
page execute and read and write
|
||
ACB000
|
heap
|
page read and write
|
||
4DA3000
|
heap
|
page read and write
|
||
5FA2000
|
heap
|
page read and write
|
||
2D1E000
|
stack
|
page read and write
|
||
26F2000
|
trusted library allocation
|
page read and write
|
||
702E000
|
stack
|
page read and write
|
||
5160000
|
heap
|
page read and write
|
||
27C9000
|
trusted library allocation
|
page read and write
|
||
412000
|
remote allocation
|
page execute and read and write
|
||
C7E000
|
stack
|
page read and write
|
||
4E6C000
|
trusted library allocation
|
page read and write
|
||
3B9B000
|
trusted library allocation
|
page read and write
|
||
6C4F000
|
heap
|
page read and write
|
||
28EA000
|
trusted library allocation
|
page read and write
|
||
762E000
|
stack
|
page read and write
|
||
27A0000
|
trusted library allocation
|
page execute and read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
28BE000
|
stack
|
page read and write
|
||
28D0000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page execute and read and write
|
||
2A3C000
|
trusted library allocation
|
page read and write
|
||
CEE000
|
stack
|
page read and write
|
||
4E7E000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
BCB000
|
trusted library allocation
|
page execute and read and write
|
||
AF9000
|
heap
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
543E000
|
stack
|
page read and write
|
||
6F62000
|
heap
|
page read and write
|
||
772E000
|
stack
|
page read and write
|
||
5020000
|
trusted library allocation
|
page execute and read and write
|
||
B0D000
|
heap
|
page read and write
|
||
4E8D000
|
trusted library allocation
|
page read and write
|
||
BC7000
|
trusted library allocation
|
page execute and read and write
|
||
6F5E000
|
stack
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
2C81000
|
trusted library allocation
|
page read and write
|
||
3B59000
|
trusted library allocation
|
page read and write
|
||
26E6000
|
trusted library allocation
|
page execute and read and write
|
||
7FE000
|
stack
|
page read and write
|
||
2BBE000
|
trusted library allocation
|
page read and write
|
||
A55000
|
heap
|
page read and write
|
||
2997000
|
trusted library allocation
|
page read and write
|
||
2A77000
|
trusted library allocation
|
page read and write
|
||
28EE000
|
trusted library allocation
|
page read and write
|
||
726F000
|
stack
|
page read and write
|
||
9C5000
|
heap
|
page read and write
|
||
4C62000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
5140000
|
heap
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
6740000
|
heap
|
page read and write
|
||
C08000
|
heap
|
page read and write
|
||
4C34000
|
trusted library allocation
|
page read and write
|
||
2B95000
|
trusted library allocation
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
4F46000
|
trusted library allocation
|
page read and write
|
||
BB6000
|
trusted library allocation
|
page execute and read and write
|
||
4C85000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
heap
|
page read and write
|
||
28FD000
|
trusted library allocation
|
page read and write
|
||
4E1D000
|
stack
|
page read and write
|
||
C15000
|
heap
|
page read and write
|
||
4F20000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
C96000
|
heap
|
page read and write
|
||
9B0000
|
trusted library allocation
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
6F01000
|
heap
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
28E2000
|
trusted library allocation
|
page read and write
|
||
3B70000
|
trusted library allocation
|
page read and write
|
||
73A000
|
stack
|
page read and write
|
||
BEE000
|
heap
|
page read and write
|
||
2923000
|
heap
|
page read and write
|
||
62B0000
|
heap
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page read and write
|
||
4F06000
|
trusted library allocation
|
page read and write
|
||
60B6000
|
trusted library allocation
|
page read and write
|
||
6170000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
7A4E000
|
stack
|
page read and write
|
||
ADE000
|
heap
|
page read and write
|
||
6160000
|
trusted library allocation
|
page execute and read and write
|
||
2BCB000
|
trusted library allocation
|
page read and write
|
||
60A0000
|
trusted library allocation
|
page read and write
|
||
64A0000
|
heap
|
page read and write
|
||
D50000
|
trusted library allocation
|
page read and write
|
There are 533 hidden memdumps, click here to show them.