IOC Report
Urunla 0010_Fiyat Talap Teklif ID56313.exe

loading gif

Files

File Path
Type
Category
Malicious
Urunla 0010_Fiyat Talap Teklif ID56313.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Urunla 0010_Fiyat Talap Teklif ID56313.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\kmk\kmk.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\kmk\kmk.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\kmk.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Urunla 0010_Fiyat Talap Teklif ID56313.exe
"C:\Users\user\Desktop\Urunla 0010_Fiyat Talap Teklif ID56313.exe"
malicious
C:\Users\user\Desktop\Urunla 0010_Fiyat Talap Teklif ID56313.exe
"{path}"
malicious
C:\Users\user\AppData\Roaming\kmk\kmk.exe
"C:\Users\user\AppData\Roaming\kmk\kmk.exe"
malicious
C:\Users\user\AppData\Roaming\kmk\kmk.exe
"{path}"
malicious
C:\Users\user\AppData\Roaming\kmk\kmk.exe
"C:\Users\user\AppData\Roaming\kmk\kmk.exe"
malicious
C:\Users\user\AppData\Roaming\kmk\kmk.exe
"{path}"
malicious

URLs

Name
IP
Malicious
https://api.telegram.org/bot1360033246:AAF6H8m6YrL09doyxtsvJzZ_cIl__BCF4aU/
unknown
malicious
http://127.0.0.1:HTTP/1.1
unknown
http://DynDns.comDynDNS
unknown
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
unknown
https://api.telegram.org/bot1360033246:AAF6H8m6YrL09doyxtsvJzZ_cIl__BCF4aU/sendDocumentdocument-----
unknown
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
unknown
http://UZQtUP.com
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
kmk

Memdumps

Base Address
Regiontype
Protect
Malicious
2F91000
trusted library allocation
page read and write
malicious
37CD000
trusted library allocation
page read and write
malicious
3793000
trusted library allocation
page read and write
malicious
32B1000
trusted library allocation
page read and write
malicious
414000
remote allocation
page execute and read and write
5440000
trusted library allocation
page execute and read and write
C04000
trusted library allocation
page read and write
CC4000
trusted library allocation
page read and write
4385000
trusted library allocation
page read and write
156B000
trusted library allocation
page execute and read and write
5C30000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
157E000
stack
page read and write
D30000
heap
page read and write
122A000
heap
page read and write
D1CE000
stack
page read and write
753F000
stack
page read and write
415000
remote allocation
page execute and read and write
50F0000
heap
page read and write
D20000
trusted library allocation
page read and write
5470000
heap
page read and write
9A9B000
trusted library allocation
page read and write
6BE0000
trusted library section
page read and write
3726000
trusted library allocation
page read and write
C5DE000
stack
page read and write
2E87000
trusted library allocation
page execute and read and write
6BDE000
stack
page read and write
26A1000
trusted library allocation
page read and write
2E54000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
3096000
trusted library allocation
page read and write
4D10000
trusted library allocation
page execute and read and write
6ADE000
stack
page read and write
2D55000
trusted library allocation
page read and write
488C000
stack
page read and write
FFE000
stack
page read and write
1855000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
557E000
trusted library allocation
page read and write
4F3E000
stack
page read and write
2E1A000
trusted library allocation
page read and write
CF0000
trusted library allocation
page execute and read and write
2E40000
trusted library allocation
page read and write
104E000
trusted library allocation
page read and write
77E0000
heap
page read and write
6AFD000
stack
page read and write
880000
heap
page read and write
372D000
trusted library allocation
page read and write
5114000
heap
page read and write
C9E000
stack
page read and write
5690000
trusted library section
page readonly
3433000
trusted library allocation
page read and write
594B000
stack
page read and write
2E50000
trusted library allocation
page read and write
772000
heap
page read and write
5591000
trusted library allocation
page read and write
14A0000
trusted library allocation
page execute and read and write
292000
unkown
page readonly
1620000
trusted library allocation
page execute and read and write
82C000
heap
page read and write
724E000
heap
page read and write
C49E000
stack
page read and write
7F250000
trusted library allocation
page execute and read and write
36E9000
trusted library allocation
page read and write
2F2E000
stack
page read and write
DF3000
trusted library allocation
page execute and read and write
2938000
trusted library allocation
page read and write
3975000
trusted library allocation
page read and write
6730000
heap
page read and write
963000
heap
page read and write
11D0000
heap
page read and write
17CD000
stack
page read and write
2F40000
trusted library allocation
page read and write
1971000
trusted library allocation
page read and write
50E0000
heap
page read and write
6DFE000
stack
page read and write
154E000
stack
page read and write
57FC000
stack
page read and write
6F8000
stack
page read and write
1800000
heap
page read and write
2550000
heap
page read and write
66E0000
trusted library allocation
page read and write
512E000
stack
page read and write
5274000
heap
page read and write
4111000
trusted library allocation
page read and write
672E000
stack
page read and write
4CE0000
heap
page read and write
D25000
trusted library allocation
page read and write
C730000
heap
page read and write
25B4000
trusted library allocation
page read and write
77E6000
heap
page read and write
4119000
trusted library allocation
page read and write
12E0000
heap
page read and write
7240000
heap
page read and write
C32000
trusted library allocation
page read and write
E2B000
trusted library allocation
page execute and read and write
290000
unkown
page readonly
1770000
trusted library allocation
page execute and read and write
6360000
heap
page read and write
5910000
heap
page read and write
708E000
stack
page read and write
400000
remote allocation
page execute and read and write
BDE000
stack
page read and write
CE0000
trusted library allocation
page read and write
906000
heap
page read and write
55B0000
heap
page read and write
7F1E0000
trusted library allocation
page execute and read and write
1440000
heap
page read and write
860000
heap
page read and write
18D0000
heap
page read and write
638C000
heap
page read and write
5270000
trusted library allocation
page read and write
2E04000
trusted library allocation
page read and write
66DE000
stack
page read and write
CF7000
stack
page read and write
CEA000
trusted library allocation
page execute and read and write
5890000
trusted library allocation
page read and write
1630000
heap
page read and write
CD0000
trusted library allocation
page read and write
5C40000
trusted library allocation
page execute and read and write
4C60000
trusted library allocation
page read and write
3066000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
123F000
heap
page read and write
2E76000
trusted library allocation
page execute and read and write
2AFE000
trusted library allocation
page read and write
885000
heap
page read and write
51B0000
heap
page read and write
261D000
stack
page read and write
12BE000
stack
page read and write
163A000
heap
page read and write
15DE000
stack
page read and write
12C0000
heap
page read and write
5460000
heap
page execute and read and write
C4DE000
stack
page read and write
1320000
trusted library allocation
page read and write
840000
heap
page read and write
73E000
heap
page read and write
15C0000
trusted library allocation
page read and write
3DB7000
trusted library allocation
page read and write
B9F000
stack
page read and write
CB0000
trusted library allocation
page read and write
4B90000
trusted library allocation
page read and write
E0D000
trusted library allocation
page execute and read and write
105A000
stack
page read and write
CB8A000
heap
page read and write
1618000
heap
page read and write
1050000
trusted library allocation
page read and write
121E000
stack
page read and write
419000
remote allocation
page execute and read and write
55B4000
heap
page read and write
C390000
trusted library allocation
page execute and read and write
5930000
heap
page read and write
268B000
trusted library allocation
page read and write
9BC000
heap
page read and write
2EEE000
stack
page read and write
3090000
trusted library allocation
page read and write
64DF000
stack
page read and write
30F0000
trusted library allocation
page read and write
9CE000
heap
page read and write
1567000
trusted library allocation
page execute and read and write
15B4000
trusted library allocation
page read and write
2D86000
trusted library allocation
page read and write
1352000
trusted library allocation
page read and write
2B11000
trusted library allocation
page read and write
CE2000
trusted library allocation
page read and write
6CD0000
heap
page read and write
5090000
heap
page execute and read and write
19AB000
trusted library allocation
page read and write
9C1000
heap
page read and write
2DF3000
trusted library allocation
page read and write
3136000
trusted library allocation
page read and write
14EF000
stack
page read and write
E27000
trusted library allocation
page execute and read and write
13F8000
heap
page read and write
FB0000
heap
page read and write
56D0000
heap
page read and write
E22000
trusted library allocation
page read and write
5620000
heap
page execute and read and write
1780000
heap
page read and write
5B90000
trusted library allocation
page execute and read and write
1137000
stack
page read and write
D2CD000
stack
page read and write
28EE000
trusted library allocation
page read and write
6830000
heap
page read and write
15DA000
trusted library allocation
page execute and read and write
65DD000
stack
page read and write
42E5000
trusted library allocation
page read and write
4D40000
heap
page execute and read and write
CE40000
trusted library allocation
page execute and read and write
1610000
heap
page read and write
68F0000
heap
page read and write
C3B000
trusted library allocation
page execute and read and write
1254000
heap
page read and write
2E80000
trusted library allocation
page read and write
14F0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page execute and read and write
5C20000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
4DCB000
stack
page read and write
F30000
trusted library allocation
page execute and read and write
25B6000
trusted library allocation
page read and write
4D50000
trusted library section
page read and write
41A000
remote allocation
page execute and read and write
2AFB000
trusted library allocation
page read and write
2C80000
trusted library allocation
page read and write
60DD000
stack
page read and write
2B16000
trusted library allocation
page read and write
2B02000
trusted library allocation
page read and write
4CF0000
heap
page read and write
7800000
heap
page read and write
3374000
trusted library allocation
page read and write
C00000
trusted library allocation
page read and write
C03000
trusted library allocation
page execute and read and write
30C0000
trusted library allocation
page read and write
2F2C000
stack
page read and write
6B40000
trusted library allocation
page read and write
18F1000
trusted library allocation
page read and write
15D2000
trusted library allocation
page read and write
149E000
unkown
page read and write
15B3000
trusted library allocation
page execute and read and write
3BB8000
trusted library allocation
page read and write
2E53000
trusted library allocation
page read and write
5B20000
heap
page read and write
3080000
trusted library allocation
page read and write
431B000
trusted library allocation
page read and write
2B14000
trusted library allocation
page read and write
2591000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
6900000
heap
page read and write
4F40000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
26A6000
trusted library allocation
page read and write
1500000
trusted library allocation
page execute and read and write
2570000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
3FB9000
trusted library allocation
page read and write
122E000
heap
page read and write
46F8000
trusted library allocation
page read and write
1560000
trusted library allocation
page read and write
36F1000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
258E000
trusted library allocation
page read and write
403000
remote allocation
page execute and read and write
435000
remote allocation
page execute and read and write
6765000
heap
page read and write
661D000
stack
page read and write
5570000
trusted library allocation
page read and write
6E3F000
stack
page read and write
133D000
trusted library allocation
page execute and read and write
33B3000
trusted library allocation
page read and write
588E000
stack
page read and write
335E000
trusted library allocation
page read and write
2EEE000
stack
page read and write
25C0000
trusted library allocation
page read and write
3100000
heap
page execute and read and write
6763000
heap
page read and write
94B000
heap
page read and write
F20000
trusted library allocation
page execute and read and write
4B80000
heap
page read and write
4E20000
trusted library allocation
page read and write
2E07000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
6BBC000
stack
page read and write
1356000
trusted library allocation
page execute and read and write
69C8000
heap
page read and write
90A000
stack
page read and write
2DF6000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
4633000
trusted library allocation
page read and write
15E5000
trusted library allocation
page execute and read and write
C7F0000
trusted library allocation
page execute and read and write
C2A000
trusted library allocation
page execute and read and write
45E8000
trusted library allocation
page read and write
123E000
stack
page read and write
CCD000
trusted library allocation
page execute and read and write
1676000
heap
page read and write
2AEF000
stack
page read and write
3367000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
BF0000
trusted library allocation
page read and write
1414000
heap
page read and write
CFB000
trusted library allocation
page execute and read and write
A90000
heap
page read and write
2F40000
trusted library allocation
page read and write
2680000
trusted library allocation
page read and write
2B0E000
trusted library allocation
page read and write
CB80000
heap
page read and write
A7F000
stack
page read and write
2D7D000
trusted library allocation
page read and write
2D40000
heap
page execute and read and write
C7DE000
stack
page read and write
4BD0000
trusted library allocation
page read and write
2F50000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
ADE000
stack
page read and write
2F7B000
heap
page read and write
97E000
stack
page read and write
7DE000
heap
page read and write
1368000
heap
page read and write
9AE000
stack
page read and write
41E000
remote allocation
page execute and read and write
6C8E000
stack
page read and write
2F30000
trusted library allocation
page read and write
E16000
trusted library allocation
page execute and read and write
6C7C000
stack
page read and write
15E0000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
7BE000
heap
page read and write
740E000
stack
page read and write
1220000
heap
page read and write
1890000
trusted library allocation
page read and write
17D7000
heap
page read and write
D10000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
2CCE000
stack
page read and write
720000
heap
page read and write
1266000
heap
page read and write
8E4000
heap
page read and write
2E6D000
trusted library allocation
page execute and read and write
C37000
trusted library allocation
page execute and read and write
67A000
stack
page read and write
15E2000
trusted library allocation
page read and write
960000
heap
page read and write
305C000
trusted library allocation
page read and write
5610000
heap
page execute and read and write
C93E000
stack
page read and write
765E000
stack
page read and write
3356000
trusted library allocation
page read and write
2F65000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
6B30000
trusted library allocation
page execute and read and write
4130000
trusted library allocation
page read and write
56A0000
heap
page read and write
18C0000
trusted library allocation
page execute and read and write
11D7000
stack
page read and write
2F6B000
trusted library allocation
page read and write
2F44000
trusted library allocation
page read and write
43A5000
trusted library allocation
page read and write
1510000
trusted library allocation
page execute and read and write
2F70000
heap
page read and write
943E000
trusted library allocation
page read and write
710000
heap
page read and write
254C000
stack
page read and write
18E0000
trusted library allocation
page execute and read and write
11C0000
heap
page read and write
4CD0000
trusted library section
page readonly
30A6000
trusted library allocation
page read and write
11D5000
heap
page read and write
3450000
trusted library allocation
page read and write
103A000
stack
page read and write
4D10000
heap
page read and write
309E000
trusted library allocation
page read and write
CE0E000
stack
page read and write
3092000
trusted library allocation
page read and write
7F290000
trusted library allocation
page execute and read and write
104B000
trusted library allocation
page read and write
511A000
heap
page read and write
56B0000
heap
page read and write
4D60000
trusted library allocation
page read and write
1060000
heap
page read and write
430000
remote allocation
page execute and read and write
255B000
heap
page read and write
2C70000
trusted library allocation
page read and write
5650000
trusted library allocation
page execute and read and write
25D5000
trusted library allocation
page read and write
250E000
stack
page read and write
651E000
stack
page read and write
CB9F000
stack
page read and write
9B6000
heap
page read and write
CB9B000
heap
page read and write
DFD000
trusted library allocation
page execute and read and write
11B0000
heap
page read and write
514D000
stack
page read and write
2596000
trusted library allocation
page read and write
4C30000
heap
page read and write
6B47000
trusted library allocation
page read and write
6E80000
heap
page read and write
6DBE000
stack
page read and write
19C0000
trusted library allocation
page read and write
CF4F000
stack
page read and write
6B3E000
stack
page read and write
59A0000
heap
page execute and read and write
77E8000
heap
page read and write
15B0000
trusted library allocation
page read and write
1334000
trusted library allocation
page read and write
6FEF000
stack
page read and write
418000
remote allocation
page execute and read and write
1068000
heap
page read and write
72A9000
heap
page read and write
7AF000
heap
page read and write
5250000
heap
page read and write
4BF0000
trusted library allocation
page read and write
15BD000
trusted library allocation
page execute and read and write
7430000
trusted library allocation
page read and write
30A1000
trusted library allocation
page read and write
C95D000
stack
page read and write
2D51000
trusted library allocation
page read and write
4C50000
heap
page read and write
D37000
heap
page read and write
3F91000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
1565000
trusted library allocation
page execute and read and write
1580000
trusted library allocation
page read and write
32AE000
stack
page read and write
9BA000
heap
page read and write
2F7B000
trusted library allocation
page read and write
687D000
stack
page read and write
134D000
trusted library allocation
page execute and read and write
4CBB000
stack
page read and write
26EF000
stack
page read and write
D3CE000
stack
page read and write
373D000
trusted library allocation
page read and write
765000
heap
page read and write
5914000
heap
page read and write
14C0000
trusted library allocation
page read and write
C360000
trusted library allocation
page read and write
5582000
trusted library allocation
page read and write
507E000
stack
page read and write
424000
remote allocation
page execute and read and write
CF2000
trusted library allocation
page read and write
197D000
trusted library allocation
page read and write
E60000
trusted library allocation
page read and write
2E5D000
trusted library allocation
page execute and read and write
9C5000
heap
page read and write
59D0000
trusted library allocation
page execute and read and write
5B10000
heap
page read and write
18B0000
trusted library allocation
page execute and read and write
4DE5000
heap
page read and write
422000
remote allocation
page execute and read and write
19B0000
trusted library allocation
page read and write
1460000
heap
page read and write
5596000
trusted library allocation
page read and write
4D80000
heap
page read and write
1541000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
41D000
remote allocation
page execute and read and write
111A000
heap
page read and write
30B0000
trusted library allocation
page read and write
15D6000
trusted library allocation
page execute and read and write
EC0000
trusted library allocation
page read and write
427A000
trusted library allocation
page read and write
4F50000
heap
page read and write
CDD000
trusted library allocation
page execute and read and write
1350000
trusted library allocation
page read and write
1088000
heap
page read and write
4BA0000
trusted library allocation
page execute and read and write
423000
remote allocation
page execute and read and write
CB84000
heap
page read and write
3366000
trusted library allocation
page read and write
5A00000
heap
page read and write
269E000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
69FD000
stack
page read and write
3056000
trusted library allocation
page read and write
1530000
trusted library allocation
page execute and read and write
7F380000
trusted library allocation
page execute and read and write
C0D000
trusted library allocation
page execute and read and write
5260000
trusted library allocation
page execute and read and write
2ED3000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
41B3000
trusted library allocation
page read and write
42B1000
trusted library allocation
page read and write
C26000
trusted library allocation
page execute and read and write
432000
remote allocation
page execute and read and write
DF0000
trusted library allocation
page read and write
CB7E000
stack
page read and write
4B20000
trusted library allocation
page read and write
1465000
heap
page read and write
2F80000
heap
page execute and read and write
7F400000
trusted library allocation
page execute and read and write
52AB000
stack
page read and write
777000
stack
page read and write
19A9000
trusted library allocation
page read and write
1396000
heap
page read and write
CA7E000
stack
page read and write
C10000
trusted library allocation
page read and write
D27000
heap
page read and write
9B0000
heap
page read and write
C362000
trusted library allocation
page read and write
E12000
trusted library allocation
page read and write
677D000
heap
page read and write
2F30000
trusted library allocation
page execute and read and write
3D79000
trusted library allocation
page read and write
D20000
heap
page read and write
CC0000
trusted library allocation
page read and write
25DF000
stack
page read and write
6CBE000
stack
page read and write
2F7E000
trusted library allocation
page read and write
404000
remote allocation
page execute and read and write
3BA000
stack
page read and write
420000
remote allocation
page execute and read and write
C8FE000
stack
page read and write
CD80000
heap
page read and write
2D7F000
trusted library allocation
page read and write
68FE000
stack
page read and write
9D0000
heap
page read and write
CF7000
trusted library allocation
page execute and read and write
3A68000
trusted library allocation
page read and write
161E000
stack
page read and write
15CD000
trusted library allocation
page execute and read and write
41F000
remote allocation
page execute and read and write
3364000
trusted library allocation
page read and write
C61E000
stack
page read and write
556E000
stack
page read and write
55C0000
trusted library allocation
page read and write
2F69000
trusted library allocation
page read and write
687D000
stack
page read and write
2E60000
trusted library allocation
page read and write
2B60000
heap
page read and write
6382000
heap
page read and write
18A3000
trusted library allocation
page read and write
307F000
stack
page read and write
416000
remote allocation
page execute and read and write
1562000
trusted library allocation
page read and write
2E00000
heap
page read and write
2AC2000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
67DC000
stack
page read and write
2AB4000
trusted library allocation
page read and write
103E000
stack
page read and write
4FD0000
heap
page read and write
CE6000
trusted library allocation
page execute and read and write
559D000
trusted library allocation
page read and write
CC3000
trusted library allocation
page execute and read and write
6480000
trusted library allocation
page execute and read and write
51A0000
heap
page read and write
50DE000
stack
page read and write
5110000
heap
page read and write
8D0000
heap
page read and write
518E000
stack
page read and write
1340000
trusted library allocation
page read and write
1430000
heap
page read and write
58A0000
trusted library allocation
page read and write
33E8000
trusted library allocation
page read and write
1507000
heap
page read and write
26F1000
trusted library allocation
page read and write
6B7E000
stack
page read and write
CDC000
stack
page read and write
81E000
stack
page read and write
1185000
heap
page read and write
2E4F000
trusted library allocation
page read and write
41B000
remote allocation
page execute and read and write
26E1000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
2E24000
trusted library allocation
page read and write
7804000
heap
page read and write
164F000
stack
page read and write
433000
remote allocation
page execute and read and write
6959000
heap
page read and write
CD7D000
stack
page read and write
30E0000
trusted library allocation
page read and write
19BB000
trusted library allocation
page read and write
6B4A000
trusted library allocation
page read and write
FA9000
trusted library allocation
page read and write
6ABD000
stack
page read and write
D0CE000
stack
page read and write
6F32000
trusted library allocation
page read and write
1180000
heap
page read and write
43E3000
trusted library allocation
page read and write
5450000
trusted library allocation
page execute and read and write
11A0000
heap
page read and write
18A0000
trusted library allocation
page read and write
57AF000
stack
page read and write
335B000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
FA0000
trusted library allocation
page read and write
15D0000
trusted library allocation
page read and write
195B000
trusted library allocation
page read and write
F40000
heap
page read and write
4316000
trusted library allocation
page read and write
860000
heap
page read and write
17E0000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page execute and read and write
26AD000
trusted library allocation
page read and write
C71F000
stack
page read and write
EBE000
unkown
page read and write
4CC0000
heap
page read and write
19D0000
trusted library allocation
page read and write
3353000
trusted library allocation
page read and write
C85D000
stack
page read and write
7F390000
trusted library allocation
page execute and read and write
2F46000
trusted library allocation
page read and write
9760000
trusted library section
page read and write
2673000
trusted library allocation
page read and write
36F9000
trusted library allocation
page read and write
1976000
trusted library allocation
page read and write
2560000
trusted library allocation
page execute and read and write
421000
remote allocation
page execute and read and write
5630000
heap
page read and write
42D9000
trusted library allocation
page read and write
14F0000
heap
page read and write
544E000
stack
page read and write
F00000
trusted library allocation
page read and write
184E000
unkown
page read and write
308B000
trusted library allocation
page read and write
F50000
trusted library allocation
page execute and read and write
6B8E000
stack
page read and write
2E72000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
2AF0000
trusted library allocation
page read and write
703E000
stack
page read and write
DE0000
trusted library allocation
page read and write
557B000
trusted library allocation
page read and write
196E000
trusted library allocation
page read and write
4D50000
trusted library section
page readonly
558E000
trusted library allocation
page read and write
CE0000
heap
page read and write
C22000
trusted library allocation
page read and write
56C0000
heap
page read and write
2E82000
trusted library allocation
page read and write
3111000
trusted library allocation
page read and write
8EE000
heap
page read and write
E50000
trusted library allocation
page execute and read and write
CF7E000
stack
page read and write
1435000
heap
page read and write
14F3000
trusted library allocation
page read and write
4C00000
trusted library allocation
page read and write
1962000
trusted library allocation
page read and write
25E0000
heap
page execute and read and write
820000
heap
page read and write
2E88000
trusted library allocation
page read and write
840000
heap
page read and write
E75000
heap
page read and write
CEB000
heap
page read and write
30AD000
trusted library allocation
page read and write
4FD5000
heap
page read and write
17D0000
heap
page read and write
E1A000
trusted library allocation
page execute and read and write
436000
remote allocation
page execute and read and write
C9F000
stack
page read and write
3700000
trusted library allocation
page read and write
739000
heap
page read and write
CF8E000
stack
page read and write
5800000
trusted library allocation
page read and write
64DC000
stack
page read and write
15A0000
trusted library allocation
page read and write
337A000
trusted library allocation
page read and write
13E7000
heap
page read and write
E25000
trusted library allocation
page execute and read and write
C1D000
trusted library allocation
page execute and read and write
417000
remote allocation
page execute and read and write
2C6E000
stack
page read and write
174E000
stack
page read and write
5BEC000
stack
page read and write
2670000
trusted library allocation
page read and write
15E7000
trusted library allocation
page execute and read and write
5880000
trusted library allocation
page execute and read and write
C35E000
stack
page read and write
425000
remote allocation
page execute and read and write
39B4000
trusted library allocation
page read and write
DF4000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
257B000
trusted library allocation
page read and write
C720000
heap
page read and write
265E000
stack
page read and write
C960000
heap
page read and write
13DF000
heap
page read and write
19BE000
trusted library allocation
page read and write
438000
remote allocation
page execute and read and write
1158000
stack
page read and write
6990000
heap
page read and write
14B0000
trusted library allocation
page read and write
743A000
trusted library allocation
page read and write
518E000
stack
page read and write
5670000
trusted library allocation
page read and write
F13000
trusted library allocation
page read and write
1360000
heap
page read and write
1750000
heap
page read and write
775F000
stack
page read and write
30C5000
trusted library allocation
page read and write
5B80000
trusted library allocation
page execute and read and write
F10000
trusted library allocation
page read and write
730000
heap
page read and write
33AF000
trusted library allocation
page read and write
2E82000
trusted library allocation
page read and write
135A000
trusted library allocation
page execute and read and write
434000
remote allocation
page execute and read and write
431000
remote allocation
page execute and read and write
2DFB000
trusted library allocation
page read and write
1880000
trusted library allocation
page execute and read and write
59E0000
heap
page read and write
68BE000
stack
page read and write
3134000
trusted library allocation
page read and write
1247000
heap
page read and write
4CC3000
heap
page read and write
56D3000
heap
page read and write
6D3E000
stack
page read and write
4D60000
heap
page read and write
4350000
trusted library allocation
page read and write
42B0000
trusted library allocation
page read and write
8D8000
heap
page read and write
25B0000
trusted library allocation
page read and write
41FD000
trusted library allocation
page read and write
4D70000
heap
page read and write
D08F000
stack
page read and write
2E70000
trusted library allocation
page read and write
3D51000
trusted library allocation
page read and write
16D5000
heap
page read and write
15EB000
trusted library allocation
page execute and read and write
4D00000
trusted library allocation
page execute and read and write
259D000
trusted library allocation
page read and write
47DC000
stack
page read and write
2E14000
trusted library allocation
page read and write
2E8B000
trusted library allocation
page execute and read and write
17D0000
trusted library allocation
page read and write
5B0E000
stack
page read and write
36E1000
trusted library allocation
page read and write
3710000
trusted library allocation
page read and write
138A000
heap
page read and write
1A00000
heap
page read and write
1269000
heap
page read and write
1990000
heap
page execute and read and write
5C90000
heap
page read and write
69C0000
heap
page read and write
41C000
remote allocation
page execute and read and write
1240000
heap
page read and write
F80000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
6740000
heap
page read and write
7D0000
heap
page read and write
865000
heap
page read and write
2B30000
trusted library allocation
page read and write
CA9E000
stack
page read and write
4DE0000
heap
page read and write
1520000
heap
page read and write
E70000
heap
page read and write
2E7A000
trusted library allocation
page execute and read and write
7437000
trusted library allocation
page read and write
415D000
trusted library allocation
page read and write
3AA6000
trusted library allocation
page read and write
5270000
heap
page read and write
195E000
trusted library allocation
page read and write
5C8E000
stack
page read and write
3116000
trusted library allocation
page read and write
2E53000
trusted library allocation
page execute and read and write
1333000
trusted library allocation
page execute and read and write
1095000
heap
page read and write
1646000
heap
page read and write
194E000
stack
page read and write
5193000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
2B22000
trusted library allocation
page read and write
1950000
trusted library allocation
page read and write
675F000
heap
page read and write
5190000
trusted library allocation
page read and write
3FF7000
trusted library allocation
page read and write
8F9000
heap
page read and write
26D0000
heap
page execute and read and write
1500000
heap
page read and write
25D0000
trusted library allocation
page read and write
4146000
trusted library allocation
page read and write
6980000
trusted library allocation
page read and write
1261000
heap
page read and write
649E000
stack
page read and write
4DF0000
heap
page read and write
10D9000
stack
page read and write
F61000
trusted library allocation
page read and write
CA3E000
stack
page read and write
56C5000
heap
page read and write
519D000
stack
page read and write
19A0000
trusted library allocation
page read and write
3384000
trusted library allocation
page read and write
33E2000
trusted library allocation
page read and write
2DFE000
trusted library allocation
page read and write
4D30000
trusted library allocation
page read and write
4D83000
heap
page read and write
8CE000
stack
page read and write
1590000
heap
page read and write
1850000
trusted library allocation
page read and write
2B16000
trusted library allocation
page read and write
68FE000
heap
page read and write
D3D0000
heap
page read and write
There are 765 hidden memdumps, click here to show them.