IOC Report
F#U0130YAT TEKL#U0130F.exe

loading gif

Files

File Path
Type
Category
Malicious
F#U0130YAT TEKL#U0130F.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\directory\name.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
data
modified
malicious
C:\Users\user\AppData\Local\Temp\Charley
ASCII text, with very long lines (29714), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\aut2DED.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut2E3D.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut5C12.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut5C51.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autBC22.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autBC81.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\vitraillist
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F.exe
"C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F.exe"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious

URLs

Name
IP
Malicious
mail.aquareklam.com
malicious
https://api.ipify.org/
104.26.12.205
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://mail.aquareklam.com
unknown

Domains

Name
IP
Malicious
mail.aquareklam.com
37.247.115.2
malicious
api.ipify.org
104.26.12.205

IPs

IP
Domain
Country
Malicious
37.247.115.2
mail.aquareklam.com
Turkey
malicious
104.26.12.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
system
page execute and read and write
malicious
3694000
trusted library allocation
page read and write
malicious
3670000
direct allocation
page read and write
malicious
36CE000
trusted library allocation
page read and write
malicious
2BBF000
trusted library allocation
page read and write
malicious
36C7000
trusted library allocation
page read and write
malicious
3B41000
trusted library allocation
page read and write
malicious
12A0000
direct allocation
page read and write
malicious
270F000
heap
page read and write
malicious
36BF000
trusted library allocation
page read and write
malicious
2B94000
trusted library allocation
page read and write
malicious
2AE0000
trusted library section
page read and write
malicious
2BC7000
trusted library allocation
page read and write
malicious
5240000
trusted library section
page read and write
malicious
FA0000
direct allocation
page execute and read and write
75A000
stack
page read and write
3D9E000
direct allocation
page read and write
63A000
stack
page read and write
2904C712000
heap
page read and write
5A8A000
heap
page read and write
149A000
heap
page read and write
16A2000
heap
page read and write
729E000
direct allocation
page read and write
7630000
heap
page read and write
D273EFE000
stack
page read and write
3170000
heap
page read and write
3F80000
direct allocation
page read and write
1388000
stack
page read and write
BE4000
heap
page read and write
36C0000
direct allocation
page read and write
6554000
trusted library allocation
page read and write
5B8B000
trusted library allocation
page read and write
C78000
heap
page read and write
164F000
heap
page read and write
4704000
trusted library allocation
page read and write
26C0000
trusted library section
page read and write
2904C9C0000
heap
page read and write
A49E000
direct allocation
page read and write
3C00000
direct allocation
page read and write
D2743FE000
stack
page read and write
146F000
stack
page read and write
2F90000
trusted library allocation
page read and write
5A86000
heap
page read and write
BA0000
heap
page read and write
13B0000
heap
page read and write
5EBE000
stack
page read and write
607E000
stack
page read and write
36E0000
trusted library allocation
page read and write
4A9E000
direct allocation
page read and write
144B000
stack
page read and write
5C40000
trusted library allocation
page read and write
62CE000
stack
page read and write
66A0000
trusted library allocation
page read and write
5124000
heap
page read and write
3A60000
direct allocation
page read and write
3D2D000
direct allocation
page read and write
16B2000
heap
page read and write
FB0000
unkown
page readonly
5BAD000
trusted library allocation
page read and write
16FB000
heap
page read and write
15D0000
heap
page read and write
2BBD000
trusted library allocation
page read and write
5B92000
trusted library allocation
page read and write
2835000
trusted library allocation
page execute and read and write
39FE000
direct allocation
page read and write
A90000
trusted library section
page read and write
3610000
trusted library allocation
page read and write
BCB000
heap
page read and write
980000
unkown
page readonly
5220000
trusted library allocation
page read and write
FB1000
unkown
page execute read
16FA000
heap
page read and write
2AD0000
heap
page execute and read and write
3B83000
direct allocation
page read and write
2F8D000
trusted library allocation
page execute and read and write
13A7000
heap
page read and write
2904C6E0000
heap
page read and write
16B8000
heap
page read and write
164B000
heap
page read and write
149A000
heap
page read and write
BF2000
heap
page read and write
1380000
heap
page read and write
16FB000
heap
page read and write
13FB000
heap
page read and write
16B0000
heap
page read and write
6560000
trusted library allocation
page execute and read and write
3860000
direct allocation
page read and write
AFF000
heap
page read and write
2904C764000
heap
page read and write
2A92000
trusted library allocation
page read and write
65BE000
stack
page read and write
104C000
unkown
page readonly
869E000
direct allocation
page read and write
7010000
trusted library allocation
page execute and read and write
D2740FF000
stack
page read and write
283B000
trusted library allocation
page execute and read and write
28E0000
trusted library allocation
page execute and read and write
319F000
heap
page read and write
13B4000
heap
page read and write
A4C000
unkown
page write copy
1452000
heap
page read and write
BD1000
heap
page read and write
2AC0000
heap
page execute and read and write
981000
unkown
page execute read
3D29000
direct allocation
page read and write
3D29000
direct allocation
page read and write
BE3000
heap
page read and write
3D2D000
direct allocation
page read and write
C78000
heap
page read and write
FB1000
unkown
page execute read
51B1000
heap
page read and write
2822000
trusted library allocation
page read and write
426000
system
page execute and read and write
BD1000
heap
page read and write
6F27000
trusted library allocation
page read and write
5C4E000
trusted library allocation
page read and write
13F0000
heap
page read and write
67DF000
stack
page read and write
26E7000
heap
page read and write
37E3000
direct allocation
page read and write
1388000
heap
page read and write
3710000
direct allocation
page read and write
603E000
stack
page read and write
BD0000
heap
page read and write
3A4E000
direct allocation
page read and write
33EE000
stack
page read and write
511E000
stack
page read and write
14D0000
heap
page read and write
13B2000
heap
page read and write
C01000
heap
page read and write
1B40000
direct allocation
page read and write
1600000
heap
page read and write
3989000
direct allocation
page read and write
3989000
direct allocation
page read and write
322D000
heap
page read and write
5AF4000
heap
page read and write
A2F000
stack
page read and write
6C60000
heap
page read and write
5D9C000
stack
page read and write
107C000
unkown
page write copy
1601000
heap
page read and write
13FB000
heap
page read and write
3297000
heap
page read and write
57AF000
stack
page read and write
1595000
heap
page read and write
3710000
direct allocation
page read and write
B3C000
heap
page read and write
36C0000
direct allocation
page read and write
13AC000
heap
page read and write
39D9000
direct allocation
page read and write
16EB000
heap
page read and write
107C000
unkown
page read and write
13B2000
heap
page read and write
39DD000
direct allocation
page read and write
3A60000
direct allocation
page read and write
3833000
direct allocation
page read and write
52B0000
trusted library allocation
page read and write
1481000
heap
page read and write
2904C9CE000
heap
page read and write
5AB0000
heap
page read and write
6F20000
trusted library allocation
page read and write
13FB000
heap
page read and write
C1B000
heap
page read and write
3860000
direct allocation
page read and write
5FFB000
stack
page read and write
6F09000
trusted library allocation
page read and write
DCF000
stack
page read and write
E1E000
stack
page read and write
5128000
heap
page read and write
39DD000
direct allocation
page read and write
16E9000
heap
page read and write
A70000
heap
page read and write
5230000
trusted library allocation
page read and write
2FA7000
trusted library allocation
page execute and read and write
1590000
heap
page read and write
282A000
trusted library allocation
page execute and read and write
5E9E000
direct allocation
page read and write
16B0000
heap
page read and write
2F73000
trusted library allocation
page execute and read and write
1072000
unkown
page readonly
15F4000
heap
page read and write
6110000
heap
page read and write
3D2D000
direct allocation
page read and write
980000
unkown
page readonly
16D1000
heap
page read and write
1602000
heap
page read and write
4CDE000
stack
page read and write
3400000
heap
page read and write
5B9E000
trusted library allocation
page read and write
A0E000
stack
page read and write
2904C737000
heap
page read and write
6F10000
heap
page read and write
664E000
stack
page read and write
9FE000
stack
page read and write
3230000
heap
page read and write
6C40000
trusted library allocation
page execute and read and write
1289000
stack
page read and write
6EE8000
trusted library allocation
page read and write
1080000
unkown
page write copy
1603000
heap
page read and write
143E000
stack
page read and write
158A000
heap
page read and write
6EC0000
heap
page read and write
398D000
direct allocation
page read and write
16E9000
heap
page read and write
688E000
stack
page read and write
FB0000
unkown
page readonly
33F0000
heap
page execute and read and write
3A60000
direct allocation
page read and write
BE4000
heap
page read and write
6EE0000
trusted library allocation
page read and write
3D9E000
direct allocation
page read and write
4693000
trusted library allocation
page read and write
15F7000
heap
page read and write
2B90000
trusted library allocation
page read and write
2F7D000
trusted library allocation
page execute and read and write
26E0000
heap
page read and write
1072000
unkown
page readonly
BE3000
heap
page read and write
BD4000
heap
page read and write
16E9000
heap
page read and write
2F80000
trusted library allocation
page read and write
315C000
stack
page read and write
1290000
heap
page read and write
C1B000
heap
page read and write
3626000
trusted library allocation
page read and write
2813000
trusted library allocation
page read and write
3B83000
direct allocation
page read and write
6C20000
trusted library allocation
page read and write
3290000
heap
page read and write
3D2D000
direct allocation
page read and write
13A4000
heap
page read and write
B2C000
heap
page read and write
5FFE000
stack
page read and write
13B0000
heap
page read and write
6A0F000
stack
page read and write
BE4000
heap
page read and write
142F000
stack
page read and write
1184000
heap
page read and write
613C000
stack
page read and write
39D9000
direct allocation
page read and write
16E9000
heap
page read and write
1160000
direct allocation
page execute and read and write
104C000
unkown
page readonly
339F000
stack
page read and write
107C000
unkown
page write copy
13B2000
heap
page read and write
6C10000
trusted library allocation
page read and write
2804000
trusted library allocation
page read and write
BD4000
heap
page read and write
3173000
heap
page read and write
689E000
direct allocation
page read and write
3C04000
trusted library allocation
page read and write
5C60000
heap
page read and write
A54000
unkown
page readonly
3710000
direct allocation
page read and write
D2741FE000
stack
page read and write
5A80000
heap
page read and write
DBF000
stack
page read and write
1B7E000
stack
page read and write
56AE000
stack
page read and write
3641000
trusted library allocation
page read and write
2FA0000
trusted library allocation
page read and write
6540000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
473A000
trusted library allocation
page read and write
36BD000
trusted library allocation
page read and write
1072000
unkown
page readonly
73D0000
heap
page read and write
5DBD000
stack
page read and write
D2744FE000
stack
page read and write
13B2000
heap
page read and write
BE3000
heap
page read and write
A1C000
unkown
page readonly
153D000
heap
page read and write
149B000
heap
page read and write
2AAD000
trusted library allocation
page read and write
BE3000
heap
page read and write
7C9E000
direct allocation
page read and write
512C000
heap
page read and write
C1B000
heap
page read and write
3C00000
direct allocation
page read and write
5AB7000
heap
page read and write
5156000
heap
page read and write
DEF000
stack
page read and write
445000
system
page execute and read and write
F4D000
stack
page read and write
6120000
trusted library allocation
page execute and read and write
3478000
trusted library allocation
page read and write
281D000
trusted library allocation
page execute and read and write
3C39000
trusted library allocation
page read and write
5E9C000
stack
page read and write
2AA6000
trusted library allocation
page read and write
3B83000
direct allocation
page read and write
3683000
trusted library allocation
page read and write
B80000
heap
page read and write
7D0000
heap
page read and write
668E000
stack
page read and write
3860000
direct allocation
page read and write
5BA1000
trusted library allocation
page read and write
28DC000
stack
page read and write
2FA5000
trusted library allocation
page execute and read and write
36C0000
direct allocation
page read and write
AB0000
heap
page read and write
2F74000
trusted library allocation
page read and write
5AA0000
heap
page read and write
1490000
heap
page read and write
5120000
heap
page read and write
6100000
trusted library allocation
page read and write
BD0000
heap
page read and write
3D9E000
direct allocation
page read and write
5BCF000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
2B7A000
trusted library allocation
page read and write
1498000
heap
page read and write
6D9E000
stack
page read and write
540C000
stack
page read and write
367A000
trusted library allocation
page read and write
46E0000
trusted library allocation
page read and write
15C0000
heap
page read and write
C1B000
heap
page read and write
A60000
heap
page read and write
39D9000
direct allocation
page read and write
AD8000
heap
page read and write
549E000
direct allocation
page read and write
A1B000
stack
page read and write
556E000
stack
page read and write
2910000
heap
page read and write
289E000
stack
page read and write
3D9E000
direct allocation
page read and write
B7B000
heap
page read and write
2370000
heap
page read and write
C1B000
heap
page read and write
2810000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
FB1000
unkown
page execute read
2B83000
trusted library allocation
page read and write
398D000
direct allocation
page read and write
700F000
stack
page read and write
B10000
heap
page read and write
3160000
trusted library allocation
page execute and read and write
6FCD000
stack
page read and write
3D29000
direct allocation
page read and write
2904C7B9000
heap
page read and write
377A000
trusted library allocation
page read and write
5140000
heap
page read and write
2A3E000
stack
page read and write
15D8000
heap
page read and write
2904C6B0000
heap
page read and write
149A000
heap
page read and write
4641000
trusted library allocation
page read and write
104C000
unkown
page readonly
2820000
trusted library allocation
page read and write
2330000
heap
page read and write
5B9A000
trusted library allocation
page read and write
2BCD000
trusted library allocation
page read and write
2A8B000
trusted library allocation
page read and write
981000
unkown
page execute read
1470000
heap
page read and write
52D0000
heap
page read and write
1080000
unkown
page write copy
DFF000
stack
page read and write
16FB000
heap
page read and write
4B48000
trusted library allocation
page read and write
6548000
trusted library allocation
page read and write
A42000
unkown
page readonly
3989000
direct allocation
page read and write
2904C9C5000
heap
page read and write
409E000
direct allocation
page read and write
A42000
unkown
page readonly
B00000
heap
page read and write
1460000
heap
page read and write
3280000
trusted library allocation
page read and write
3D9E000
direct allocation
page read and write
16A2000
heap
page read and write
164B000
heap
page read and write
6D5E000
stack
page read and write
2BDF000
trusted library allocation
page read and write
5A7E000
stack
page read and write
A70000
heap
page read and write
1069000
stack
page read and write
1603000
heap
page read and write
16FB000
heap
page read and write
7C0000
heap
page read and write
6570000
trusted library allocation
page read and write
640E000
stack
page read and write
68CE000
stack
page read and write
FB1000
unkown
page execute read
7F8000
stack
page read and write
14CD000
heap
page read and write
398D000
direct allocation
page read and write
A1C000
unkown
page readonly
2BD7000
trusted library allocation
page read and write
39FE000
direct allocation
page read and write
A54000
unkown
page readonly
36BB000
trusted library allocation
page read and write
3D29000
direct allocation
page read and write
1468000
heap
page read and write
F0E000
stack
page read and write
1084000
unkown
page readonly
3833000
direct allocation
page read and write
51E0000
heap
page read and write
AA0000
heap
page read and write
66A7000
trusted library allocation
page read and write
27F0000
heap
page read and write
13B4000
heap
page read and write
BE3000
heap
page read and write
F90000
heap
page read and write
5B72000
heap
page read and write
37E3000
direct allocation
page read and write
16FB000
heap
page read and write
C20000
heap
page read and write
DDB000
stack
page read and write
39DD000
direct allocation
page read and write
75F0000
heap
page read and write
3234000
heap
page read and write
16FB000
heap
page read and write
38B0000
direct allocation
page read and write
68DE000
stack
page read and write
1460000
heap
page read and write
3B83000
direct allocation
page read and write
A50000
unkown
page write copy
ABE000
stack
page read and write
2B30000
heap
page read and write
15B0000
heap
page read and write
3460000
heap
page read and write
5183000
heap
page read and write
3624000
trusted library allocation
page read and write
3B83000
direct allocation
page read and write
6F30000
trusted library allocation
page read and write
13B4000
heap
page read and write
16FB000
heap
page read and write
3C00000
direct allocation
page read and write
BC4000
heap
page read and write
16E9000
heap
page read and write
5209000
heap
page read and write
7F880000
trusted library allocation
page execute and read and write
2850000
trusted library allocation
page read and write
16FB000
heap
page read and write
3D2D000
direct allocation
page read and write
3620000
trusted library allocation
page read and write
360E000
stack
page read and write
2F92000
trusted library allocation
page read and write
2830000
trusted library allocation
page read and write
CDE000
stack
page read and write
422000
system
page execute and read and write
3A4E000
direct allocation
page read and write
31DF000
heap
page read and write
D273CFA000
stack
page read and write
AFD000
stack
page read and write
CC1000
heap
page read and write
1F7E000
stack
page read and write
3D2D000
direct allocation
page read and write
145F000
stack
page read and write
38B0000
direct allocation
page read and write
C1B000
heap
page read and write
14AA000
heap
page read and write
3FD0000
direct allocation
page read and write
650E000
stack
page read and write
C1B000
heap
page read and write
1440000
heap
page read and write
13B2000
heap
page read and write
2FD0000
heap
page read and write
909E000
direct allocation
page read and write
DDF000
stack
page read and write
2B41000
trusted library allocation
page read and write
BD0000
heap
page read and write
2803000
trusted library allocation
page execute and read and write
6F00000
trusted library allocation
page read and write
2904E350000
heap
page read and write
C03000
heap
page read and write
518E000
heap
page read and write
2F96000
trusted library allocation
page execute and read and write
A3F000
stack
page read and write
1452000
heap
page read and write
2C7A000
trusted library allocation
page read and write
3630000
heap
page execute and read and write
3A4E000
direct allocation
page read and write
2920000
trusted library allocation
page read and write
4091000
direct allocation
page read and write
BA8000
heap
page read and write
566F000
stack
page read and write
BD2000
heap
page read and write
63CE000
stack
page read and write
610D000
trusted library allocation
page read and write
149A000
heap
page read and write
6EF4000
trusted library allocation
page read and write
1613000
heap
page read and write
1492000
heap
page read and write
2F9A000
trusted library allocation
page execute and read and write
AD0000
heap
page read and write
6E9E000
stack
page read and write
7FD40000
trusted library allocation
page execute and read and write
6ED0000
trusted library allocation
page execute and read and write
2F50000
trusted library section
page read and write
16E2000
heap
page read and write
2904C79C000
heap
page read and write
1480000
trusted library section
page read and write
5B86000
trusted library allocation
page read and write
C01000
heap
page read and write
37E3000
direct allocation
page read and write
6550000
trusted library allocation
page read and write
550C000
stack
page read and write
2A9A000
trusted library allocation
page read and write
38B0000
direct allocation
page read and write
5B80000
trusted library allocation
page read and write
C03000
heap
page read and write
311E000
stack
page read and write
2A80000
trusted library allocation
page read and write
2350000
direct allocation
page execute and read and write
3D29000
direct allocation
page read and write
13B2000
heap
page read and write
6C5D000
stack
page read and write
23A0000
heap
page read and write
684E000
stack
page read and write
2837000
trusted library allocation
page execute and read and write
2FC0000
trusted library allocation
page read and write
FB0000
unkown
page readonly
2A8E000
trusted library allocation
page read and write
3C00000
direct allocation
page read and write
280D000
trusted library allocation
page execute and read and write
1180000
heap
page read and write
16FB000
heap
page read and write
2F60000
trusted library allocation
page read and write
107C000
unkown
page read and write
1600000
heap
page read and write
3690000
trusted library allocation
page read and write
2374000
heap
page read and write
2A7E000
stack
page read and write
57BD000
trusted library allocation
page read and write
104C000
unkown
page readonly
B0A000
heap
page read and write
6EF0000
trusted library allocation
page read and write
3833000
direct allocation
page read and write
2826000
trusted library allocation
page execute and read and write
3A60000
direct allocation
page read and write
603E000
stack
page read and write
2904C9CC000
heap
page read and write
2A9E000
trusted library allocation
page read and write
14AA000
heap
page read and write
15AE000
stack
page read and write
2930000
heap
page read and write
FB0000
unkown
page readonly
1190000
heap
page read and write
BF2000
heap
page read and write
5EFD000
stack
page read and write
BE4000
heap
page read and write
3D29000
direct allocation
page read and write
2AA1000
trusted library allocation
page read and write
1460000
heap
page read and write
6140000
trusted library allocation
page execute and read and write
3D9E000
direct allocation
page read and write
2933000
heap
page read and write
13C4000
heap
page read and write
6A10000
heap
page read and write
2BD5000
trusted library allocation
page read and write
3C00000
direct allocation
page read and write
A4C000
unkown
page read and write
B0D000
heap
page read and write
AA5000
heap
page read and write
1084000
unkown
page readonly
14EE000
heap
page read and write
9A9E000
direct allocation
page read and write
16BF000
heap
page read and write
690E000
stack
page read and write
2F83000
trusted library allocation
page read and write
1084000
unkown
page readonly
39FE000
direct allocation
page read and write
13B2000
heap
page read and write
2800000
trusted library allocation
page read and write
BD4000
heap
page read and write
2832000
trusted library allocation
page read and write
3C00000
direct allocation
page read and write
2904C700000
heap
page read and write
D2745FF000
stack
page read and write
57C0000
heap
page read and write
2FA2000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
1072000
unkown
page readonly
14CB000
heap
page read and write
3650000
trusted library allocation
page read and write
3A60000
direct allocation
page read and write
F1E000
stack
page read and write
C1B000
heap
page read and write
3B83000
direct allocation
page read and write
149A000
heap
page read and write
5B8E000
trusted library allocation
page read and write
D273DFE000
stack
page read and write
13FF000
heap
page read and write
28F0000
trusted library allocation
page read and write
16A2000
heap
page read and write
6EED000
trusted library allocation
page read and write
2BBB000
trusted library allocation
page read and write
6690000
heap
page read and write
1B70000
heap
page read and write
5EFE000
stack
page read and write
5BA6000
trusted library allocation
page read and write
1600000
heap
page read and write
1452000
heap
page read and write
2FAB000
trusted library allocation
page execute and read and write
2F70000
trusted library allocation
page read and write
2B37000
heap
page read and write
1462000
heap
page read and write
6FA000
stack
page read and write
3A60000
direct allocation
page read and write
C1B000
heap
page read and write
19AF000
stack
page read and write
BE4000
heap
page read and write
D2746FB000
stack
page read and write
5BB2000
trusted library allocation
page read and write
2904C6C0000
heap
page read and write
BCC000
heap
page read and write
149A000
heap
page read and write
1084000
unkown
page readonly
There are 604 hidden memdumps, click here to show them.