IOC Report
hesaphareketi-01.pdf.SCR.exe

loading gif

Files

File Path
Type
Category
Malicious
hesaphareketi-01.pdf.SCR.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x10f7c474, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\cbsBVT.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\hesaphareketi-01.pdf.SCR.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gjzmj1vw.pxj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gvhm5xf5.uqc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_py0uxfau.tk4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xlcbossz.gmt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
modified
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\hesaphareketi-01.pdf.SCR.exe
"C:\Users\user\Desktop\hesaphareketi-01.pdf.SCR.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"Powershell.exe" ??????????-??????????E??????????x??????????e??????????c??????????u??????????t??????????i??????????o??????????n??????????P??????????o??????????l??????????i??????????c??????????y?????????? ??????????B??????????y??????????p??????????a??????????s??????????s?????????? ??????????-??????????c??????????o??????????m??????????m??????????a??????????n??????????d ?????????C?????????o?????????p?????????y?????????-?????????I?????????t?????????e?????????m 'C:\Users\user\Desktop\hesaphareketi-01.pdf.SCR.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tt.exe'
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe
"C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe"
malicious
C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe
"C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
https://aka..winsvrxd
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
https://contoso.com/License
unknown
http://www.tiro.com
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://go.micros
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
https://g.live.com/odclientsettings/Prod.C:
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://api.ipify.org
unknown
https://g.live.com/odclientsettings/ProdV2
unknown
https://aka.ms/pscore6lB
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
https://api.ipify.org/
104.26.12.205
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://sectigo.com/CPS0
unknown
http://ocsp.sectigo.com0-
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/Icon
unknown
http://crl.ver)
unknown
https://api.ipify.org/t
unknown
https://github.com/sam210723/goesrecv-monitor/releases/latest
unknown
https://github.com/Pester/Pester
unknown
http://www.carterandcone.coml
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
unknown
http://business29.web-hosting.com
unknown
https://vksdr.com/goesrecv-monitor
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.fontbureau.com/designers8
unknown
There are 46 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ipify.org
104.26.12.205
business29.web-hosting.com
198.54.114.199

IPs

IP
Domain
Country
Malicious
198.54.114.199
business29.web-hosting.com
United States
104.26.12.205
api.ipify.org
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
cbsBVT
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3739000
trusted library allocation
page read and write
malicious
2EA4000
trusted library allocation
page read and write
malicious
2E9C000
trusted library allocation
page read and write
malicious
2E71000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
773E000
stack
page read and write
4BF0000
trusted library allocation
page read and write
8A22000
trusted library allocation
page read and write
686D000
stack
page read and write
8820000
heap
page read and write
616E000
stack
page read and write
7F1E0000
trusted library allocation
page execute and read and write
5466000
trusted library allocation
page read and write
1F37AE4D000
trusted library allocation
page read and write
6A1E000
trusted library allocation
page read and write
119D000
trusted library allocation
page execute and read and write
1F37AD00000
heap
page read and write
1030000
trusted library allocation
page read and write
4B9E000
trusted library allocation
page read and write
79BC000
heap
page read and write
7BD0000
trusted library allocation
page read and write
547A000
trusted library allocation
page read and write
1F3756B4000
heap
page read and write
2580000
heap
page read and write
6A40000
trusted library allocation
page read and write
1F37AEF1000
trusted library allocation
page read and write
11ED000
heap
page read and write
799C000
heap
page read and write
7C00000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
F0E000
stack
page read and write
5A0E000
stack
page read and write
7B5F000
stack
page read and write
4EF0000
trusted library section
page read and write
2CFC000
stack
page read and write
75C0000
heap
page read and write
2CBE000
stack
page read and write
2910000
trusted library allocation
page read and write
5510000
heap
page read and write
6AF0000
trusted library allocation
page read and write
5050000
heap
page read and write
71F0000
heap
page execute and read and write
D34F37B000
stack
page read and write
1F37AEFF000
trusted library allocation
page read and write
1F37AE70000
remote allocation
page read and write
1525000
trusted library allocation
page execute and read and write
7A5E000
stack
page read and write
57CE000
stack
page read and write
7B1E000
stack
page read and write
D9C000
stack
page read and write
1F375729000
heap
page read and write
690000
heap
page read and write
1F37AC74000
heap
page read and write
1F37AAE0000
trusted library allocation
page read and write
1F3764F0000
trusted library section
page readonly
71E000
stack
page read and write
CF2000
trusted library allocation
page read and write
58CE000
stack
page read and write
1F37ACE3000
heap
page read and write
69F0000
heap
page read and write
7BF0000
trusted library allocation
page read and write
627C000
heap
page read and write
4C30000
heap
page read and write
7991000
heap
page read and write
3420000
heap
page read and write
4BE0000
trusted library allocation
page read and write
1F37AD02000
heap
page read and write
51FC000
trusted library allocation
page read and write
8670000
trusted library allocation
page execute and read and write
88AA000
heap
page read and write
564C000
stack
page read and write
5A4D000
stack
page read and write
8770000
trusted library allocation
page read and write
D34DE77000
stack
page read and write
87B0000
trusted library allocation
page read and write
1F37AD0A000
heap
page read and write
32DE000
stack
page read and write
1F375F02000
heap
page read and write
5ABE000
stack
page read and write
1170000
trusted library allocation
page read and write
4E28000
trusted library allocation
page read and write
8690000
heap
page read and write
548D000
trusted library allocation
page read and write
D34E77E000
unkown
page readonly
D34E57E000
unkown
page readonly
4BD0000
trusted library allocation
page read and write
11BB000
heap
page read and write
1044000
trusted library allocation
page read and write
2B31000
trusted library allocation
page read and write
1F375640000
heap
page read and write
4C30000
heap
page read and write
5EAB000
trusted library allocation
page read and write
7A17000
heap
page read and write
791E000
stack
page read and write
4C00000
heap
page readonly
3417000
heap
page read and write
546B000
trusted library allocation
page read and write
4BD5000
trusted library allocation
page execute and read and write
1F375613000
heap
page read and write
1F37ACF2000
heap
page read and write
1F37AAD0000
trusted library allocation
page read and write
3E88000
trusted library allocation
page read and write
CE0000
trusted library allocation
page read and write
5D09000
trusted library allocation
page read and write
5486000
trusted library allocation
page read and write
CC3000
trusted library allocation
page execute and read and write
2C70000
heap
page execute and read and write
33E4000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
5E93000
trusted library allocation
page read and write
DD8000
heap
page read and write
11B0000
heap
page read and write
1F3764E0000
trusted library section
page readonly
790000
heap
page read and write
1184000
trusted library allocation
page read and write
4C00000
trusted library allocation
page read and write
1210000
trusted library allocation
page read and write
2D00000
trusted library allocation
page execute and read and write
33D0000
trusted library allocation
page read and write
5492000
trusted library allocation
page read and write
252000
unkown
page readonly
676E000
stack
page read and write
1F37AF1A000
trusted library allocation
page read and write
B60000
heap
page read and write
7F2000
heap
page read and write
773000
trusted library allocation
page execute and read and write
4D5A000
trusted library allocation
page read and write
A3C000
stack
page read and write
4C20000
trusted library allocation
page read and write
7A14000
heap
page read and write
E22000
heap
page read and write
76FE000
stack
page read and write
2460000
trusted library allocation
page execute and read and write
1F37AE8E000
trusted library allocation
page read and write
1F37AC54000
heap
page read and write
7ADE000
stack
page read and write
1F375E02000
heap
page read and write
D34ECFE000
stack
page read and write
4C40000
trusted library allocation
page execute and read and write
DA0000
heap
page read and write
7C20000
trusted library allocation
page read and write
4BEF000
trusted library allocation
page read and write
873E000
stack
page read and write
4BB6000
trusted library allocation
page read and write
CD0000
trusted library allocation
page read and write
4B94000
trusted library allocation
page read and write
7BC0000
trusted library allocation
page read and write
4C60000
heap
page read and write
4BF5000
trusted library allocation
page read and write
6A27000
trusted library allocation
page read and write
5500000
heap
page read and write
5840000
heap
page read and write
826000
heap
page read and write
1230000
trusted library allocation
page read and write
5887000
heap
page read and write
1F375F1A000
heap
page read and write
75D0000
heap
page read and write
CEA000
trusted library allocation
page execute and read and write
1F3765F0000
trusted library allocation
page read and write
2E5F000
trusted library allocation
page read and write
5010000
heap
page execute and read and write
6278000
heap
page read and write
1540000
heap
page read and write
634D000
heap
page read and write
10F8000
stack
page read and write
8862000
heap
page read and write
D34EBFE000
stack
page read and write
4BC2000
trusted library allocation
page read and write
1F37AE08000
trusted library allocation
page read and write
3090000
heap
page read and write
787000
stack
page read and write
8780000
trusted library allocation
page read and write
D34E67B000
stack
page read and write
1F37567D000
heap
page read and write
6C22000
trusted library allocation
page read and write
4F60000
heap
page execute and read and write
6D3C000
stack
page read and write
1F37AEE8000
trusted library allocation
page read and write
1180000
trusted library allocation
page read and write
750E000
stack
page read and write
5660000
heap
page read and write
748E000
stack
page read and write
1F37AC1F000
heap
page read and write
1F375F13000
heap
page read and write
1F37AEE5000
trusted library allocation
page read and write
5060000
heap
page read and write
1F37AB00000
trusted library allocation
page read and write
DB0000
heap
page read and write
8D3F000
stack
page read and write
5460000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
6A30000
trusted library allocation
page execute and read and write
CE6000
trusted library allocation
page execute and read and write
1F37562B000
heap
page read and write
5D01000
trusted library allocation
page read and write
11F0000
heap
page read and write
5B57000
heap
page read and write
D34E279000
stack
page read and write
7C50000
trusted library allocation
page read and write
51AE000
stack
page read and write
7BA000
heap
page read and write
7A1E000
stack
page read and write
6A20000
trusted library allocation
page read and write
740E000
stack
page read and write
5440000
trusted library allocation
page read and write
D34EF7E000
unkown
page readonly
5472000
trusted library allocation
page read and write
8C4E000
stack
page read and write
5650000
trusted library allocation
page read and write
85E000
heap
page read and write
7A9E000
stack
page read and write
121B000
trusted library allocation
page execute and read and write
88B0000
heap
page read and write
D34EA7E000
unkown
page readonly
5504000
heap
page read and write
4BD2000
trusted library allocation
page read and write
2A20000
heap
page read and write
4FBD000
stack
page read and write
5AF0000
heap
page read and write
54AA000
trusted library allocation
page read and write
760000
heap
page read and write
77D000
trusted library allocation
page execute and read and write
1F37AA50000
trusted library allocation
page read and write
1F37568E000
heap
page read and write
33F0000
trusted library allocation
page read and write
4C70000
heap
page execute and read and write
7C30000
trusted library allocation
page read and write
1520000
trusted library allocation
page read and write
8BC0000
trusted library allocation
page read and write
833000
heap
page read and write
1F376091000
trusted library allocation
page read and write
D34F07E000
unkown
page readonly
118D000
trusted library allocation
page execute and read and write
1F37AAE0000
trusted library allocation
page read and write
71F5000
heap
page execute and read and write
8A61000
trusted library allocation
page read and write
1F37AE6F000
trusted library allocation
page read and write
1F37C000000
heap
page read and write
8CD0000
heap
page read and write
1F3756FF000
heap
page read and write
8A40000
trusted library allocation
page execute and read and write
4CC0000
trusted library section
page read and write
250000
unkown
page readonly
3070000
heap
page read and write
4B90000
trusted library allocation
page read and write
1F37AEF4000
trusted library allocation
page read and write
289E000
stack
page read and write
CFB000
trusted library allocation
page execute and read and write
1252000
heap
page read and write
784000
trusted library allocation
page read and write
A5F000
stack
page read and write
1F375674000
heap
page read and write
5EA4000
trusted library allocation
page read and write
2B2E000
stack
page read and write
1F37AC00000
heap
page read and write
DE0000
heap
page read and write
1F37AE56000
trusted library allocation
page read and write
7999000
heap
page read and write
774000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
1F376340000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
E33000
heap
page read and write
1F37AE6C000
trusted library allocation
page read and write
1054000
trusted library allocation
page read and write
1F37AEA3000
trusted library allocation
page read and write
77BE000
stack
page read and write
D34EEFE000
stack
page read and write
1512000
trusted library allocation
page read and write
DA0000
heap
page read and write
4BF0000
trusted library allocation
page read and write
7C10000
trusted library allocation
page read and write
780000
trusted library allocation
page read and write
104D000
trusted library allocation
page execute and read and write
4C80000
trusted library allocation
page execute and read and write
7C80000
trusted library allocation
page read and write
1F37AC8F000
heap
page read and write
33E0000
trusted library allocation
page read and write
8760000
trusted library allocation
page execute and read and write
25F0000
heap
page execute and read and write
CB0000
trusted library allocation
page read and write
D34EE7E000
unkown
page readonly
25E000
unkown
page readonly
6B20000
trusted library allocation
page execute and read and write
2E21000
trusted library allocation
page read and write
8777000
trusted library allocation
page read and write
D34D88C000
stack
page read and write
2E98000
trusted library allocation
page read and write
2FC000
stack
page read and write
662D000
stack
page read and write
1183000
trusted library allocation
page execute and read and write
4BB1000
trusted library allocation
page read and write
1F376A11000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
79D1000
heap
page read and write
723E000
stack
page read and write
1F37ABB0000
trusted library allocation
page read and write
1F37AE15000
trusted library allocation
page read and write
744A000
stack
page read and write
D34E37E000
unkown
page readonly
25A0000
trusted library allocation
page read and write
88CE000
heap
page read and write
1190000
trusted library allocation
page read and write
86FD000
stack
page read and write
1F37AB10000
trusted library allocation
page read and write
79B4000
heap
page read and write
1F3756A0000
heap
page read and write
DF4000
heap
page read and write
28F0000
heap
page read and write
1F37ACF9000
heap
page read and write
1F3756B0000
heap
page read and write
7C40000
trusted library allocation
page read and write
DA7000
heap
page read and write
D34E47B000
stack
page read and write
7FE000
heap
page read and write
4CBE000
stack
page read and write
2C60000
trusted library allocation
page read and write
4FCB000
stack
page read and write
CC4000
trusted library allocation
page read and write
6D0000
heap
page read and write
7B9D000
stack
page read and write
2720000
heap
page read and write
7F1F8000
trusted library allocation
page execute and read and write
CAF000
stack
page read and write
D34E17E000
unkown
page readonly
D34ED7E000
unkown
page readonly
3080000
heap
page read and write
2DF7000
stack
page read and write
D34FA7E000
unkown
page readonly
68AE000
stack
page read and write
6270000
heap
page read and write
2731000
trusted library allocation
page read and write
B80000
heap
page read and write
4D01000
trusted library allocation
page read and write
2317000
trusted library allocation
page execute and read and write
69AE000
stack
page read and write
33ED000
trusted library allocation
page execute and read and write
73CE000
stack
page read and write
1F3764A0000
trusted library section
page readonly
5080000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
1F37AE72000
trusted library allocation
page read and write
6A13000
trusted library allocation
page read and write
1F37AC42000
heap
page read and write
1F37AAB0000
trusted library allocation
page read and write
7800000
trusted library allocation
page read and write
738E000
stack
page read and write
1050000
trusted library allocation
page read and write
6B6E000
stack
page read and write
1F3764D0000
trusted library section
page readonly
1F3764B0000
trusted library section
page readonly
5A3D000
stack
page read and write
4C33000
heap
page read and write
1F375713000
heap
page read and write
1043000
trusted library allocation
page execute and read and write
6A00000
trusted library allocation
page read and write
28E0000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
8660000
heap
page read and write
8740000
heap
page read and write
231B000
trusted library allocation
page execute and read and write
D3A000
stack
page read and write
1F37AE00000
trusted library allocation
page read and write
28DD000
stack
page read and write
79B9000
heap
page read and write
26FE000
stack
page read and write
3360000
heap
page read and write
329E000
stack
page read and write
2E57000
trusted library allocation
page read and write
7A5E000
stack
page read and write
CA5000
heap
page read and write
DD0000
heap
page read and write
5AF5000
heap
page read and write
51AC000
trusted library allocation
page read and write
257F000
stack
page read and write
1F37AE70000
remote allocation
page read and write
1240000
heap
page read and write
2631000
trusted library allocation
page read and write
1F37AE70000
remote allocation
page read and write
237E000
stack
page read and write
4C2E000
stack
page read and write
7A1B000
heap
page read and write
8E8000
heap
page read and write
88A0000
heap
page read and write
2DBC000
stack
page read and write
6D5000
heap
page read and write
798000
heap
page read and write
1F37AE10000
trusted library allocation
page read and write
D34F47E000
unkown
page readonly
797B000
heap
page read and write
7D0000
heap
page read and write
1F37AAC0000
trusted library allocation
page read and write
88A4000
heap
page read and write
590E000
stack
page read and write
88B6000
heap
page read and write
D34EAFE000
stack
page read and write
3E49000
trusted library allocation
page read and write
1546000
heap
page read and write
1F376A40000
trusted library allocation
page read and write
1F375F00000
heap
page read and write
B2E000
stack
page read and write
245D000
stack
page read and write
74CB000
stack
page read and write
8890000
heap
page read and write
D5E000
stack
page read and write
A2E000
stack
page read and write
11A5000
heap
page read and write
54A4000
trusted library allocation
page read and write
7B3000
heap
page read and write
4C18000
trusted library allocation
page read and write
2E1F000
stack
page read and write
734B000
stack
page read and write
1256000
heap
page read and write
100E000
stack
page read and write
1F37AE18000
trusted library allocation
page read and write
1F3764C0000
trusted library section
page readonly
11E3000
heap
page read and write
1F37AC61000
heap
page read and write
8898000
heap
page read and write
8C50000
trusted library allocation
page read and write
1F375C80000
trusted library allocation
page read and write
4B80000
trusted library allocation
page read and write
482B000
stack
page read and write
7BB0000
trusted library allocation
page execute and read and write
7AE000
heap
page read and write
717E000
stack
page read and write
D10000
trusted library allocation
page read and write
CDD000
trusted library allocation
page execute and read and write
1F37AB00000
trusted library allocation
page read and write
151A000
trusted library allocation
page execute and read and write
1217000
trusted library allocation
page execute and read and write
7B5E000
stack
page read and write
7D5000
heap
page read and write
3400000
trusted library allocation
page read and write
E06000
heap
page read and write
1F37AA40000
trusted library allocation
page read and write
1F37ACCE000
heap
page read and write
D34E07E000
stack
page read and write
C9E000
stack
page read and write
7F610000
trusted library allocation
page execute and read and write
1F37AE00000
trusted library allocation
page read and write
2D10000
heap
page read and write
4E56000
trusted library allocation
page read and write
1F37AC4F000
heap
page read and write
3A2000
unkown
page readonly
2330000
trusted library allocation
page read and write
70FE000
stack
page read and write
2E61000
trusted library allocation
page read and write
6D7D000
stack
page read and write
B5E000
stack
page read and write
77DE000
stack
page read and write
5D68000
trusted library allocation
page read and write
CF7000
trusted library allocation
page execute and read and write
5AB7000
trusted library allocation
page read and write
30BC000
heap
page read and write
6C00000
trusted library allocation
page read and write
D34EB7E000
unkown
page readonly
1F3754F0000
heap
page read and write
9E0000
heap
page read and write
4BC0000
heap
page execute and read and write
79A2000
heap
page read and write
3428000
heap
page read and write
CCD000
trusted library allocation
page execute and read and write
1F37AEBA000
trusted library allocation
page read and write
1F37AE20000
trusted library allocation
page read and write
1F3756A2000
heap
page read and write
4B70000
trusted library allocation
page execute and read and write
1F37ACF5000
heap
page read and write
1150000
heap
page read and write
DAF000
stack
page read and write
D34F17E000
stack
page read and write
1F375626000
heap
page read and write
1F37ABA0000
trusted library allocation
page read and write
8750000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
877A000
trusted library allocation
page read and write
77F0000
heap
page execute and read and write
3B31000
trusted library allocation
page read and write
1F37AAE1000
trusted library allocation
page read and write
660000
heap
page read and write
1F37ACE7000
heap
page read and write
33F9000
trusted library allocation
page read and write
CA0000
heap
page read and write
5680000
heap
page execute and read and write
50AE000
stack
page read and write
7F0000
heap
page read and write
7F8000
heap
page read and write
D34E97E000
unkown
page readonly
7BA0000
trusted library allocation
page read and write
4F70000
trusted library section
page readonly
670000
heap
page read and write
3A0000
unkown
page readonly
5B10000
heap
page read and write
51B0000
trusted library allocation
page read and write
1F37AAD0000
trusted library allocation
page read and write
7939000
heap
page read and write
1F375F1A000
heap
page read and write
68A000
stack
page read and write
1F375600000
heap
page read and write
1510000
trusted library allocation
page read and write
900000
heap
page read and write
672F000
stack
page read and write
875D000
trusted library allocation
page read and write
2310000
trusted library allocation
page read and write
3FA000
stack
page read and write
127C000
heap
page read and write
2620000
heap
page execute and read and write
5450000
trusted library allocation
page read and write
33E3000
trusted library allocation
page execute and read and write
7832000
heap
page read and write
3076000
heap
page read and write
1F375E00000
heap
page read and write
3E21000
trusted library allocation
page read and write
CD3000
trusted library allocation
page read and write
1F37ACAF000
heap
page read and write
79D6000
heap
page read and write
BAE000
stack
page read and write
1F37AE91000
trusted library allocation
page read and write
D34DF7E000
unkown
page readonly
1F375679000
heap
page read and write
1F37AEA0000
trusted library allocation
page read and write
D34E87B000
stack
page read and write
124A000
heap
page read and write
D34E9FE000
stack
page read and write
1F375E15000
heap
page read and write
87C0000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
3410000
heap
page read and write
547E000
trusted library allocation
page read and write
4CD0000
trusted library allocation
page execute and read and write
D34EC7E000
unkown
page readonly
71BE000
stack
page read and write
1F3755F0000
heap
page read and write
6C0000
trusted library allocation
page read and write
7993000
heap
page read and write
4CFF000
stack
page read and write
1527000
trusted library allocation
page execute and read and write
4C50000
trusted library allocation
page read and write
1F37ACC6000
heap
page read and write
4F80000
trusted library allocation
page read and write
777E000
stack
page read and write
3390000
heap
page read and write
340A000
trusted library allocation
page execute and read and write
1F37AC2C000
heap
page read and write
5B45000
heap
page read and write
6290000
heap
page read and write
D34F9FE000
stack
page read and write
1F375702000
heap
page read and write
4B9B000
trusted library allocation
page read and write
D34EFFE000
stack
page read and write
7000000
heap
page read and write
1227000
heap
page read and write
2E9A000
trusted library allocation
page read and write
331E000
stack
page read and write
4BAE000
trusted library allocation
page read and write
1F37567B000
heap
page read and write
54A0000
trusted library allocation
page read and write
5A7D000
stack
page read and write
154C000
heap
page read and write
5B00000
heap
page read and write
2470000
heap
page read and write
713F000
stack
page read and write
1F37AEFC000
trusted library allocation
page read and write
1F37ABA0000
trusted library allocation
page read and write
4BD0000
trusted library allocation
page read and write
472E000
stack
page read and write
2E6D000
trusted library allocation
page read and write
1F37AE64000
trusted library allocation
page read and write
7C7000
heap
page read and write
83C0000
trusted library allocation
page read and write
75E000
stack
page read and write
11A0000
heap
page read and write
DB0000
heap
page read and write
7C60000
trusted library allocation
page read and write
2700000
heap
page read and write
8680000
trusted library allocation
page read and write
1F375510000
heap
page read and write
4EE0000
heap
page read and write
4C70000
trusted library allocation
page read and write
1F37ACC4000
heap
page read and write
51A6000
trusted library allocation
page read and write
578C000
stack
page read and write
730D000
stack
page read and write
1233000
heap
page read and write
3173000
heap
page read and write
1060000
heap
page read and write
1516000
trusted library allocation
page execute and read and write
335F000
stack
page read and write
DEF000
heap
page read and write
D34F27E000
unkown
page readonly
6C0F000
stack
page read and write
1F37AF07000
trusted library allocation
page read and write
62C1000
heap
page read and write
4BBD000
trusted library allocation
page read and write
754A000
stack
page read and write
1F375695000
heap
page read and write
1F375D90000
trusted library section
page read and write
1522000
trusted library allocation
page read and write
5EB3000
trusted library allocation
page read and write
1F37AE0E000
trusted library allocation
page read and write
B3A000
stack
page read and write
794F000
heap
page read and write
3631000
trusted library allocation
page read and write
3731000
trusted library allocation
page read and write
5D29000
trusted library allocation
page read and write
79AD000
heap
page read and write
51D0000
trusted library allocation
page read and write
8A50000
trusted library allocation
page read and write
1242000
heap
page read and write
30C8000
heap
page read and write
152B000
trusted library allocation
page execute and read and write
6B00000
trusted library allocation
page execute and read and write
2920000
heap
page execute and read and write
1F37AEC2000
trusted library allocation
page read and write
D34EDFE000
stack
page read and write
546E000
trusted library allocation
page read and write
727E000
stack
page read and write
78DF000
stack
page read and write
1F37AB14000
trusted library allocation
page read and write
1F37565B000
heap
page read and write
There are 611 hidden memdumps, click here to show them.