IOC Report
GeriOdemeBildirimi942.rar.xlxs.pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
GeriOdemeBildirimi942.rar.xlxs.pdf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\GeriOdemeBildirimi942.rar.xlxs.pdf.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpF6B6.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\SOFcFE.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\SOFcFE.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SOFcFE.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0kwp5mcr.1ew.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2udamgpn.4ht.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5cfeqqlb.miq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5xrtsjvy.xpt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e2teh2jh.fsg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ore2exho.n4u.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vo3sef0r.azf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wpwtzsyd.zea.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp1AF7.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
"C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SOFcFE.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmpF6B6.tmp"
malicious
C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
"C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe"
malicious
C:\Users\user\AppData\Roaming\SOFcFE.exe
C:\Users\user\AppData\Roaming\SOFcFE.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmp1AF7.tmp"
malicious
C:\Users\user\AppData\Roaming\SOFcFE.exe
"C:\Users\user\AppData\Roaming\SOFcFE.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://aborters.duckdns.org:8081
unknown
malicious
http://anotherarmy.dns.army:8081
unknown
malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://www.office.com/lB
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://checkip.dyndns.org
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20a
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.96.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
http://varders.kozow.com:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20and%20Time:%2003/10/2024%20/%2015:39:59%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724471%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://checkip.dyndns.org/
193.122.130.0
http://51.38.247.67:8081/_send_.php?L
unknown
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20and%20Time:%2003/10/2024%20/%2021:14:30%0D%0ACountry%20Name:%20%0D%0A%5B%20724471%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://awaratrendz.com
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
awaratrendz.com
119.18.54.39
malicious
reallyfreegeoip.org
188.114.96.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
193.122.130.0

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
119.18.54.39
awaratrendz.com
India
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
132.226.8.169
unknown
United States
193.122.130.0
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GeriOdemeBildirimi942_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOFcFE_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2C21000
trusted library allocation
page read and write
malicious
2E12000
trusted library allocation
page read and write
malicious
46FA000
trusted library allocation
page read and write
malicious
4431000
trusted library allocation
page read and write
malicious
2F7F000
trusted library allocation
page read and write
malicious
436000
remote allocation
page execute and read and write
malicious
2D91000
trusted library allocation
page read and write
malicious
435000
remote allocation
page execute and read and write
malicious
2E90000
heap
page execute and read and write
6C30000
heap
page read and write
6A80000
trusted library allocation
page read and write
51F3000
heap
page read and write
4166000
trusted library allocation
page read and write
C90000
heap
page read and write
116D000
heap
page read and write
2CC3000
trusted library allocation
page read and write
6B76000
trusted library allocation
page read and write
68DE000
stack
page read and write
CBCE000
stack
page read and write
4D00000
trusted library allocation
page read and write
3119000
trusted library allocation
page read and write
30CA000
stack
page read and write
2CCF000
trusted library allocation
page read and write
512A000
trusted library allocation
page read and write
52E2000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
6644000
heap
page read and write
528E000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
3E2C000
trusted library allocation
page read and write
592A000
trusted library allocation
page read and write
679E000
stack
page read and write
6A70000
trusted library allocation
page execute and read and write
3087000
trusted library allocation
page read and write
146D000
trusted library allocation
page read and write
C6CE000
stack
page read and write
DDE000
stack
page read and write
2590000
trusted library allocation
page read and write
1461000
trusted library allocation
page read and write
2680000
trusted library allocation
page read and write
2C0E000
stack
page read and write
13D0000
trusted library allocation
page read and write
CC0E000
stack
page read and write
13EE000
stack
page read and write
3DB9000
trusted library allocation
page read and write
BE7000
stack
page read and write
6B75000
trusted library allocation
page read and write
420000
remote allocation
page execute and read and write
262E000
stack
page read and write
3C89000
trusted library allocation
page read and write
2F89000
trusted library allocation
page read and write
3EA7000
trusted library allocation
page read and write
25C7000
trusted library allocation
page execute and read and write
6BA0000
trusted library allocation
page read and write
3114000
trusted library allocation
page read and write
4EB0000
trusted library section
page readonly
2FB1000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page execute and read and write
3420000
heap
page read and write
3FE8000
trusted library allocation
page read and write
516F000
trusted library allocation
page read and write
4113000
trusted library allocation
page read and write
3EDF000
trusted library allocation
page read and write
5F0000
heap
page read and write
6BE9000
trusted library allocation
page read and write
310A000
trusted library allocation
page read and write
5280000
heap
page read and write
2690000
heap
page read and write
102D000
trusted library allocation
page execute and read and write
30EA000
trusted library allocation
page read and write
4129000
trusted library allocation
page read and write
C70E000
stack
page read and write
9BC000
heap
page read and write
511E000
trusted library allocation
page read and write
307E000
stack
page read and write
2CD7000
trusted library allocation
page read and write
2F0B000
trusted library allocation
page read and write
10EF000
heap
page read and write
5628000
trusted library allocation
page read and write
942000
heap
page read and write
2790000
heap
page execute and read and write
259D000
trusted library allocation
page execute and read and write
4CF5000
trusted library allocation
page read and write
6F40000
heap
page read and write
25A0000
trusted library allocation
page read and write
2EC8000
trusted library allocation
page read and write
3029000
trusted library allocation
page read and write
CA8C000
stack
page read and write
675E000
stack
page read and write
3DEB000
trusted library allocation
page read and write
2E74000
trusted library allocation
page read and write
2F21000
trusted library allocation
page read and write
C67000
heap
page read and write
2FB8000
trusted library allocation
page read and write
65EE000
stack
page read and write
4097000
trusted library allocation
page read and write
2EA1000
trusted library allocation
page read and write
3CEF000
trusted library allocation
page read and write
2D10000
heap
page read and write
7580000
heap
page read and write
3081000
trusted library allocation
page read and write
3E7B000
trusted library allocation
page read and write
3FC9000
trusted library allocation
page read and write
EF7000
stack
page read and write
2D80000
heap
page read and write
757E000
stack
page read and write
30BC000
trusted library allocation
page read and write
3C2F000
trusted library allocation
page read and write
696E000
stack
page read and write
4169000
trusted library allocation
page read and write
3C43000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
2DDB000
trusted library allocation
page read and write
570D000
stack
page read and write
3035000
trusted library allocation
page read and write
3ED5000
trusted library allocation
page read and write
1280000
heap
page read and write
2C7D000
trusted library allocation
page read and write
5926000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
5370000
trusted library section
page readonly
4E30000
trusted library allocation
page execute and read and write
25B0000
trusted library allocation
page read and write
6AC0000
trusted library allocation
page execute and read and write
5170000
heap
page read and write
1420000
heap
page read and write
3DB2000
trusted library allocation
page read and write
2E70000
heap
page read and write
3E47000
trusted library allocation
page read and write
6688000
heap
page read and write
5626000
trusted library allocation
page read and write
C48E000
stack
page read and write
1262000
heap
page read and write
2D05000
trusted library allocation
page read and write
2E76000
trusted library allocation
page read and write
AE0000
heap
page read and write
5781000
trusted library allocation
page read and write
593D000
trusted library allocation
page read and write
6B70000
heap
page read and write
52F0000
trusted library allocation
page execute and read and write
1016000
heap
page read and write
2FE0000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
2E04000
trusted library allocation
page read and write
10A0000
trusted library allocation
page execute and read and write
5296000
trusted library allocation
page read and write
2E73000
heap
page read and write
1000000
heap
page read and write
2EF5000
trusted library allocation
page read and write
5060000
trusted library allocation
page execute and read and write
2DE8000
trusted library allocation
page read and write
3003000
trusted library allocation
page read and write
6F60000
heap
page read and write
2C35000
trusted library allocation
page read and write
7062000
trusted library allocation
page read and write
3F94000
trusted library allocation
page read and write
2E41000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
2CF5000
trusted library allocation
page read and write
2E80000
heap
page read and write
65DE000
stack
page read and write
538E000
heap
page read and write
3E45000
trusted library allocation
page read and write
1260000
heap
page read and write
2FAF000
trusted library allocation
page read and write
2FB3000
trusted library allocation
page read and write
2D64000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
5300000
trusted library allocation
page read and write
C84E000
stack
page read and write
51ED000
stack
page read and write
4F9C000
stack
page read and write
2EE2000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
5430000
heap
page read and write
4DBE000
stack
page read and write
275E000
trusted library allocation
page read and write
25AD000
trusted library allocation
page execute and read and write
527D000
stack
page read and write
CDD000
stack
page read and write
5440000
heap
page read and write
6655000
heap
page read and write
3E72000
trusted library allocation
page read and write
4046000
trusted library allocation
page read and write
2C2C000
stack
page read and write
6B67000
trusted library allocation
page read and write
68AF000
stack
page read and write
2FAE000
unkown
page read and write
5795000
heap
page read and write
2D4E000
stack
page read and write
51F0000
heap
page read and write
6BB2000
trusted library allocation
page read and write
5616000
trusted library allocation
page read and write
57DE000
stack
page read and write
2E85000
trusted library allocation
page read and write
527B000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
2B00000
heap
page read and write
2ABC000
stack
page read and write
139D000
trusted library allocation
page execute and read and write
127D000
trusted library allocation
page execute and read and write
2E35000
trusted library allocation
page read and write
2FF5000
trusted library allocation
page read and write
2CCB000
trusted library allocation
page read and write
2FFF000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
6668000
heap
page read and write
3EA9000
trusted library allocation
page read and write
980000
unkown
page readonly
42D000
remote allocation
page execute and read and write
2786000
trusted library allocation
page read and write
6A6E000
stack
page read and write
4038000
trusted library allocation
page read and write
421B000
trusted library allocation
page read and write
52A2000
trusted library allocation
page read and write
4F2D000
stack
page read and write
6B60000
trusted library allocation
page read and write
3E5B000
trusted library allocation
page read and write
9D1E000
stack
page read and write
6BB5000
trusted library allocation
page read and write
13B7000
trusted library allocation
page execute and read and write
C80E000
stack
page read and write
2E24000
trusted library allocation
page read and write
38E2000
trusted library allocation
page read and write
2E96000
trusted library allocation
page read and write
2E46000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
3EC8000
trusted library allocation
page read and write
38A9000
trusted library allocation
page read and write
30BF000
stack
page read and write
1030000
trusted library allocation
page read and write
BA5000
heap
page read and write
2F41000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
4E40000
trusted library allocation
page read and write
144B000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
104A000
trusted library allocation
page execute and read and write
103D000
trusted library allocation
page execute and read and write
639E000
stack
page read and write
BD0000
heap
page read and write
2ECE000
trusted library allocation
page read and write
7585000
heap
page read and write
3ED7000
trusted library allocation
page read and write
418A000
trusted library allocation
page read and write
1000000
heap
page read and write
3EA1000
trusted library allocation
page read and write
4085000
trusted library allocation
page read and write
AE5000
heap
page read and write
982000
unkown
page readonly
4EC0000
heap
page read and write
6B40000
trusted library allocation
page read and write
1006000
heap
page read and write
77BE000
stack
page read and write
78BE000
stack
page read and write
665B000
heap
page read and write
54C0000
trusted library allocation
page execute and read and write
1024000
trusted library allocation
page read and write
672E000
stack
page read and write
2F27000
trusted library allocation
page read and write
2FEC000
trusted library allocation
page read and write
6B64000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
664C000
heap
page read and write
B4A000
stack
page read and write
1130000
trusted library allocation
page read and write
2F54000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
111E000
stack
page read and write
2594000
trusted library allocation
page read and write
2F16000
trusted library allocation
page read and write
7130000
heap
page read and write
2E30000
trusted library allocation
page read and write
3DD5000
trusted library allocation
page read and write
2947000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
6BAB000
heap
page read and write
9CC0000
trusted library allocation
page execute and read and write
52FE000
stack
page read and write
AE9000
stack
page read and write
C32E000
stack
page read and write
110E000
stack
page read and write
4326000
trusted library allocation
page read and write
73C8F000
unkown
page readonly
5790000
heap
page read and write
4EC3000
heap
page read and write
25B6000
trusted library allocation
page execute and read and write
2E90000
heap
page read and write
FBE000
stack
page read and write
10BE000
heap
page read and write
511B000
trusted library allocation
page read and write
C94E000
stack
page read and write
2CBF000
trusted library allocation
page read and write
54A0000
heap
page read and write
3EE5000
trusted library allocation
page read and write
FF4000
trusted library allocation
page read and write
3E28000
trusted library allocation
page read and write
2F1E000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
274B000
trusted library allocation
page read and write
EF7000
stack
page read and write
2DF6000
trusted library allocation
page read and write
112A000
trusted library allocation
page execute and read and write
C98C000
stack
page read and write
2CD3000
trusted library allocation
page read and write
D0CF000
stack
page read and write
13B5000
trusted library allocation
page execute and read and write
6B80000
trusted library allocation
page read and write
5383000
heap
page read and write
2670000
trusted library allocation
page execute and read and write
3D42000
trusted library allocation
page read and write
6DAE000
stack
page read and write
40B6000
trusted library allocation
page read and write
3E5D000
trusted library allocation
page read and write
4014000
trusted library allocation
page read and write
73C8D000
unkown
page read and write
5290000
heap
page read and write
6BE0000
trusted library allocation
page read and write
6B00000
trusted library allocation
page read and write
2DD9000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
125E000
stack
page read and write
308B000
trusted library allocation
page read and write
4D70000
heap
page read and write
5510000
heap
page execute and read and write
6BA6000
heap
page read and write
1260000
trusted library allocation
page read and write
4D98000
trusted library allocation
page read and write
512E000
trusted library allocation
page read and write
2ED4000
trusted library allocation
page read and write
CACE000
stack
page read and write
3FCF000
trusted library allocation
page read and write
413B000
trusted library allocation
page read and write
671D000
stack
page read and write
3FBC000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
1273000
trusted library allocation
page execute and read and write
5100000
trusted library allocation
page read and write
C66D000
stack
page read and write
3FA7000
trusted library allocation
page read and write
C60000
heap
page read and write
2DAB000
trusted library allocation
page read and write
499B000
stack
page read and write
42A1000
trusted library allocation
page read and write
1178000
heap
page read and write
2DDD000
trusted library allocation
page read and write
5156000
trusted library allocation
page read and write
2E1E000
stack
page read and write
276D000
trusted library allocation
page read and write
1042000
trusted library allocation
page read and write
5276000
trusted library allocation
page read and write
2F18000
trusted library allocation
page read and write
649E000
stack
page read and write
6B10000
trusted library allocation
page execute and read and write
5880000
trusted library allocation
page execute and read and write
3008000
trusted library allocation
page read and write
3E83000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
25CB000
trusted library allocation
page execute and read and write
58A000
stack
page read and write
5930000
trusted library allocation
page read and write
900000
heap
page read and write
3F57000
trusted library allocation
page read and write
75A5000
heap
page read and write
CF8C000
stack
page read and write
2CDB000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
2A7E000
stack
page read and write
5161000
trusted library allocation
page read and write
2F23000
trusted library allocation
page read and write
3C49000
trusted library allocation
page read and write
6B91000
heap
page read and write
691E000
stack
page read and write
342A000
heap
page read and write
1274000
trusted library allocation
page read and write
1400000
heap
page read and write
32EE000
stack
page read and write
BBE000
stack
page read and write
2FBC000
trusted library allocation
page read and write
3F1E000
trusted library allocation
page read and write
26A8000
trusted library allocation
page read and write
B2E000
stack
page read and write
6B6E000
stack
page read and write
2F91000
trusted library allocation
page read and write
561A000
trusted library allocation
page read and write
73C70000
unkown
page readonly
2DE3000
trusted library allocation
page read and write
2B12000
trusted library allocation
page read and write
666D000
heap
page read and write
125B000
heap
page read and write
5924000
trusted library allocation
page read and write
3F19000
trusted library allocation
page read and write
6AE0000
trusted library allocation
page execute and read and write
3D06000
trusted library allocation
page read and write
5E6F000
heap
page read and write
429000
remote allocation
page execute and read and write
64DE000
stack
page read and write
2EA7000
trusted library allocation
page read and write
2740000
trusted library allocation
page read and write
4034000
trusted library allocation
page read and write
3085000
trusted library allocation
page read and write
2E38000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
FE8000
heap
page read and write
3030000
heap
page read and write
310F000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
4EAB000
stack
page read and write
2F14000
trusted library allocation
page read and write
6A5E000
stack
page read and write
5090000
heap
page read and write
FFE000
stack
page read and write
3ECF000
trusted library allocation
page read and write
4041000
trusted library allocation
page read and write
5270000
trusted library allocation
page read and write
54B0000
heap
page read and write
6AB0000
trusted library allocation
page execute and read and write
1080000
heap
page read and write
13B0000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
3F30000
trusted library allocation
page read and write
2DA7000
trusted library allocation
page read and write
2C40000
heap
page execute and read and write
2DDE000
trusted library allocation
page read and write
3C3B000
trusted library allocation
page read and write
2E94000
trusted library allocation
page read and write
65F0000
heap
page read and write
64AE000
stack
page read and write
63AE000
stack
page read and write
2B03000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
307C000
trusted library allocation
page read and write
3DF5000
trusted library allocation
page read and write
528A000
trusted library allocation
page read and write
3112000
trusted library allocation
page read and write
2F5C000
trusted library allocation
page read and write
6B27000
trusted library allocation
page read and write
2CDF000
trusted library allocation
page read and write
105B000
trusted library allocation
page execute and read and write
266C000
stack
page read and write
6BC0000
trusted library allocation
page read and write
2B01000
trusted library allocation
page read and write
119A000
heap
page read and write
5380000
heap
page read and write
31FB000
heap
page read and write
2CF0000
trusted library allocation
page read and write
FF3000
trusted library allocation
page execute and read and write
2B24000
trusted library allocation
page read and write
332F000
stack
page read and write
C5CE000
stack
page read and write
1264000
heap
page read and write
2EDA000
trusted library allocation
page read and write
2CC7000
trusted library allocation
page read and write
6BD0000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
3DA5000
trusted library allocation
page read and write
E50000
heap
page read and write
FFD000
trusted library allocation
page execute and read and write
1052000
trusted library allocation
page read and write
F70000
heap
page read and write
2F45000
trusted library allocation
page read and write
328F000
unkown
page read and write
3D62000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
91F000
heap
page read and write
9FA000
heap
page read and write
121E000
stack
page read and write
3D78000
trusted library allocation
page read and write
126A000
heap
page read and write
2F4F000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
1126000
trusted library allocation
page execute and read and write
10CF000
heap
page read and write
3C34000
trusted library allocation
page read and write
5175000
heap
page read and write
302F000
trusted library allocation
page read and write
3F24000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
13A6000
trusted library allocation
page execute and read and write
9280000
trusted library allocation
page read and write
2FE5000
trusted library allocation
page read and write
2F49000
trusted library allocation
page read and write
2FA7000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page execute and read and write
10B0000
heap
page read and write
934000
heap
page read and write
25C0000
trusted library allocation
page read and write
2DB1000
trusted library allocation
page read and write
307F000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
6A90000
trusted library allocation
page execute and read and write
532D000
stack
page read and write
76BE000
stack
page read and write
3CD9000
trusted library allocation
page read and write
689F000
stack
page read and write
CE8C000
stack
page read and write
1390000
trusted library allocation
page read and write
3ED1000
trusted library allocation
page read and write
536C000
stack
page read and write
B09000
stack
page read and write
3D16000
trusted library allocation
page read and write
25BA000
trusted library allocation
page execute and read and write
5580000
trusted library allocation
page read and write
5136000
trusted library allocation
page read and write
6BF0000
heap
page read and write
1046000
trusted library allocation
page execute and read and write
3EAF000
trusted library allocation
page read and write
9285000
trusted library allocation
page read and write
2DA9000
trusted library allocation
page read and write
1466000
trusted library allocation
page read and write
5840000
trusted library allocation
page execute and read and write
5050000
heap
page read and write
CD0F000
stack
page read and write
662D000
heap
page read and write
3130000
heap
page read and write
BC0000
heap
page read and write
AD0000
heap
page read and write
13AA000
trusted library allocation
page execute and read and write
434000
remote allocation
page execute and read and write
3079000
trusted library allocation
page read and write
C40000
heap
page read and write
2D50000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
F75000
heap
page read and write
664F000
heap
page read and write
CD4E000
stack
page read and write
3F4A000
trusted library allocation
page read and write
2580000
trusted library allocation
page read and write
42F000
remote allocation
page execute and read and write
2E08000
trusted library allocation
page read and write
67AE000
stack
page read and write
2C96000
trusted library allocation
page read and write
1013000
heap
page read and write
A000000
trusted library section
page read and write
2BED000
stack
page read and write
2E9E000
trusted library allocation
page read and write
928F000
trusted library allocation
page read and write
142B000
stack
page read and write
2C7E000
stack
page read and write
2DB6000
trusted library allocation
page read and write
40FA000
trusted library allocation
page read and write
2EA3000
trusted library allocation
page read and write
311D000
trusted library allocation
page read and write
90A000
heap
page read and write
CFCE000
stack
page read and write
2C9A000
trusted library allocation
page read and write
13E0000
heap
page read and write
2C87000
trusted library allocation
page read and write
CE4E000
stack
page read and write
2BEE000
stack
page read and write
5E50000
heap
page read and write
2593000
trusted library allocation
page execute and read and write
5380000
heap
page read and write
6BA9000
trusted library allocation
page read and write
5870000
trusted library section
page read and write
2DD5000
trusted library allocation
page read and write
3C21000
trusted library allocation
page read and write
28A1000
trusted library allocation
page read and write
289E000
stack
page read and write
2C92000
trusted library allocation
page read and write
4CE0000
trusted library allocation
page read and write
513D000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
4D40000
heap
page execute and read and write
2766000
trusted library allocation
page read and write
BC0000
heap
page read and write
3F98000
trusted library allocation
page read and write
998C000
trusted library allocation
page read and write
5614000
trusted library allocation
page read and write
2DEA000
trusted library allocation
page read and write
2E98000
trusted library allocation
page read and write
2E39000
trusted library allocation
page read and write
529D000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
1170000
heap
page read and write
25C2000
trusted library allocation
page read and write
3031000
trusted library allocation
page read and write
38A1000
trusted library allocation
page read and write
6CAE000
stack
page read and write
111D000
trusted library allocation
page execute and read and write
2E8B000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
10C4000
heap
page read and write
13B2000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
5040000
heap
page read and write
108E000
heap
page read and write
2C30000
trusted library allocation
page execute and read and write
676E000
stack
page read and write
C2E000
stack
page read and write
BA0000
heap
page read and write
9260000
trusted library allocation
page execute and read and write
3F42000
trusted library allocation
page read and write
42E000
remote allocation
page execute and read and write
38CA000
trusted library allocation
page read and write
2F47000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
695E000
stack
page read and write
113B000
trusted library allocation
page execute and read and write
6B50000
trusted library allocation
page execute and read and write
25B2000
trusted library allocation
page read and write
587E000
stack
page read and write
2FE1000
trusted library allocation
page read and write
6A90000
trusted library allocation
page execute and read and write
2F24000
trusted library allocation
page read and write
428000
remote allocation
page execute and read and write
1023000
trusted library allocation
page execute and read and write
12CE000
stack
page read and write
3EDA000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
5E40000
heap
page read and write
10E4000
heap
page read and write
1057000
trusted library allocation
page execute and read and write
6A70000
trusted library allocation
page execute and read and write
1160000
trusted library allocation
page execute and read and write
1400000
heap
page read and write
75BE000
heap
page read and write
6661000
heap
page read and write
2E31000
trusted library allocation
page read and write
33E0000
heap
page read and write
2761000
trusted library allocation
page read and write
4043000
trusted library allocation
page read and write
54E0000
heap
page read and write
3DFD000
trusted library allocation
page read and write
145E000
trusted library allocation
page read and write
73C8D000
unkown
page read and write
73C86000
unkown
page readonly
1120000
trusted library allocation
page read and write
11A7000
heap
page read and write
409D000
trusted library allocation
page read and write
4C28000
trusted library allocation
page read and write
1487000
heap
page read and write
3ECC000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
2D29000
trusted library allocation
page read and write
988000
heap
page read and write
F30000
heap
page read and write
5122000
trusted library allocation
page read and write
308D000
stack
page read and write
3110000
trusted library allocation
page read and write
5630000
heap
page execute and read and write
5154000
trusted library allocation
page read and write
6BA4000
trusted library allocation
page read and write
9CD0000
trusted library allocation
page read and write
403D000
trusted library allocation
page read and write
1143000
heap
page read and write
6AA0000
trusted library allocation
page execute and read and write
1122000
trusted library allocation
page read and write
64EE000
stack
page read and write
41F000
remote allocation
page execute and read and write
6B0B000
trusted library allocation
page read and write
B70000
heap
page read and write
1480000
heap
page read and write
90E000
heap
page read and write
5070000
trusted library allocation
page read and write
2784000
trusted library allocation
page read and write
43AC000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page execute and read and write
1135000
trusted library allocation
page execute and read and write
65E0000
heap
page read and write
10F1000
heap
page read and write
562D000
trusted library allocation
page read and write
404C000
trusted library allocation
page read and write
2F18000
trusted library allocation
page read and write
3F6A000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
6A80000
trusted library allocation
page execute and read and write
9270000
trusted library allocation
page read and write
13A2000
trusted library allocation
page read and write
5590000
heap
page execute and read and write
2D70000
trusted library allocation
page read and write
2E3A000
stack
page read and write
6B90000
trusted library allocation
page read and write
31F0000
heap
page read and write
303B000
trusted library allocation
page read and write
6A6E000
stack
page read and write
2FF0000
heap
page read and write
11AC000
heap
page read and write
13AE000
stack
page read and write
3FFD000
trusted library allocation
page read and write
32A0000
heap
page read and write
306C000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
FE0000
heap
page read and write
2CE0000
trusted library allocation
page read and write
6B77000
heap
page read and write
3290000
heap
page read and write
10BB000
heap
page read and write
2AFE000
stack
page read and write
40A0000
trusted library allocation
page read and write
2C10000
heap
page execute and read and write
6638000
heap
page read and write
2E3D000
trusted library allocation
page read and write
BD0000
heap
page read and write
3FFA000
trusted library allocation
page read and write
5170000
trusted library allocation
page read and write
3DAC000
trusted library allocation
page read and write
2FA9000
trusted library allocation
page read and write
527E000
trusted library allocation
page read and write
C86E000
stack
page read and write
1132000
trusted library allocation
page read and write
12AF000
stack
page read and write
2E4A000
trusted library allocation
page read and write
30D0000
heap
page read and write
6B07000
trusted library allocation
page read and write
5131000
trusted library allocation
page read and write
443000
remote allocation
page execute and read and write
C94E000
stack
page read and write
118E000
heap
page read and write
25E0000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
402000
remote allocation
page execute and read and write
5291000
trusted library allocation
page read and write
408A000
trusted library allocation
page read and write
CA4F000
stack
page read and write
3F34000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
2780000
trusted library allocation
page read and write
58A0000
trusted library allocation
page execute and read and write
8F7000
stack
page read and write
324E000
unkown
page read and write
FE0000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
5116000
trusted library allocation
page read and write
2FEF000
unkown
page read and write
4D82000
trusted library allocation
page read and write
759E000
heap
page read and write
1137000
trusted library allocation
page execute and read and write
4CF0000
trusted library allocation
page read and write
3C41000
trusted library allocation
page read and write
13BB000
trusted library allocation
page execute and read and write
3140000
trusted library allocation
page read and write
3FB4000
trusted library allocation
page read and write
3F2B000
trusted library allocation
page read and write
1008000
heap
page read and write
73C71000
unkown
page execute read
5142000
trusted library allocation
page read and write
4090000
trusted library allocation
page read and write
C58F000
stack
page read and write
11A4000
heap
page read and write
747E000
stack
page read and write
There are 734 hidden memdumps, click here to show them.