IOC Report
TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe

loading gif

Files

File Path
Type
Category
Malicious
TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpA1D9.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\YzkHZRBcm.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\YzkHZRBcm.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\YzkHZRBcm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5bn3unq5.hm4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e1ow2caw.1w2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fu4vlatk.dz3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h0ewghyt.rk4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i4vqduig.rrn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l2ro0tgd.c0k.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pdkzyv3j.i0x.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wqrqawvp.mcx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpB2D1.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe
"C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YzkHZRBcm.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YzkHZRBcm" /XML "C:\Users\user\AppData\Local\Temp\tmpA1D9.tmp"
malicious
C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe
"C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exe"
malicious
C:\Users\user\AppData\Roaming\YzkHZRBcm.exe
C:\Users\user\AppData\Roaming\YzkHZRBcm.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YzkHZRBcm" /XML "C:\Users\user\AppData\Local\Temp\tmpB2D1.tmp"
malicious
C:\Users\user\AppData\Roaming\YzkHZRBcm.exe
"C:\Users\user\AppData\Roaming\YzkHZRBcm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://aborters.duckdns.org:8081
unknown
malicious
http://anotherarmy.dns.army:8081
unknown
malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:124406%0D%0ADate%20a
unknown
https://www.office.com/lB
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:124406%0D%0ADate%20and%20Time:%2007/10/2024%20/%2021:07:08%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20124406%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.96.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
http://varders.kozow.com:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://checkip.dyndns.org/
132.226.247.73
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:124406%0D%0ADate%20and%20Time:%2007/10/2024%20/%2020:57:33%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20124406%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
132.226.247.73

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YzkHZRBcm_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YzkHZRBcm_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YzkHZRBcm_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YzkHZRBcm_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YzkHZRBcm_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YzkHZRBcm_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YzkHZRBcm_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YzkHZRBcm_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YzkHZRBcm_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YzkHZRBcm_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YzkHZRBcm_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YzkHZRBcm_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YzkHZRBcm_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YzkHZRBcm_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
432000
remote allocation
page execute and read and write
malicious
2EE1000
trusted library allocation
page read and write
malicious
4349000
trusted library allocation
page read and write
malicious
3001000
trusted library allocation
page read and write
malicious
3051000
trusted library allocation
page read and write
BE0000
heap
page read and write
42AD000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
656E000
stack
page read and write
5348000
trusted library allocation
page read and write
2FD1000
trusted library allocation
page read and write
31C4000
trusted library allocation
page read and write
106E000
stack
page read and write
3393000
trusted library allocation
page read and write
9AEE000
stack
page read and write
5066000
trusted library allocation
page read and write
415A000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
2F92000
trusted library allocation
page read and write
5072000
trusted library allocation
page read and write
C40000
heap
page read and write
443000
remote allocation
page execute and read and write
7D80000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
2F3F000
trusted library allocation
page read and write
1B40000
trusted library allocation
page read and write
58A5000
trusted library allocation
page read and write
1298000
trusted library allocation
page read and write
58A0000
trusted library allocation
page read and write
FC5000
trusted library allocation
page execute and read and write
66DE000
stack
page read and write
43B0000
trusted library allocation
page read and write
3114000
trusted library allocation
page read and write
53AD000
trusted library allocation
page read and write
E10000
heap
page read and write
330B000
trusted library allocation
page read and write
54FA000
trusted library allocation
page read and write
74200000
unkown
page readonly
113F000
stack
page read and write
31F3000
heap
page read and write
2E5D000
trusted library allocation
page read and write
1138000
heap
page read and write
5D55000
heap
page read and write
7F4E000
stack
page read and write
31A3000
trusted library allocation
page read and write
5D50000
heap
page read and write
38F7000
trusted library allocation
page read and write
31CE000
stack
page read and write
109A000
unkown
page readonly
6A40000
trusted library allocation
page execute and read and write
2E10000
trusted library allocation
page read and write
AC0E000
stack
page read and write
4006000
trusted library allocation
page read and write
54F6000
trusted library allocation
page read and write
11E0000
heap
page read and write
2C91000
trusted library allocation
page read and write
7CA0000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
456D000
trusted library allocation
page read and write
5D3E000
stack
page read and write
6F5E000
stack
page read and write
CF7000
stack
page read and write
4144000
trusted library allocation
page read and write
33C4000
trusted library allocation
page read and write
5A90000
trusted library allocation
page read and write
4311000
trusted library allocation
page read and write
ED6000
heap
page read and write
EB3000
trusted library allocation
page execute and read and write
368F000
trusted library allocation
page read and write
E24000
trusted library allocation
page read and write
3197000
trusted library allocation
page read and write
63D0000
heap
page read and write
B25E000
stack
page read and write
5084000
trusted library allocation
page read and write
3720000
trusted library allocation
page read and write
3EEF000
trusted library allocation
page read and write
2DE7000
trusted library allocation
page read and write
3097000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
72FE000
stack
page read and write
BAF000
unkown
page read and write
4289000
trusted library allocation
page read and write
1620000
trusted library allocation
page read and write
42B6000
trusted library allocation
page read and write
3149000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
E40000
heap
page read and write
141F000
stack
page read and write
7BCD000
heap
page read and write
300F000
trusted library allocation
page read and write
3069000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
2C8E000
trusted library allocation
page read and write
188E000
stack
page read and write
3C31000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page execute and read and write
401C000
trusted library allocation
page read and write
309B000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
2D00000
heap
page read and write
2DD6000
trusted library allocation
page read and write
E48000
heap
page read and write
699F000
stack
page read and write
41B7000
trusted library allocation
page read and write
410B000
trusted library allocation
page read and write
12B0000
trusted library allocation
page execute and read and write
E3D000
trusted library allocation
page execute and read and write
F9B000
trusted library allocation
page execute and read and write
2F16000
trusted library allocation
page read and write
328B000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
541A000
trusted library allocation
page read and write
11D0000
heap
page read and write
E60000
heap
page read and write
1640000
heap
page read and write
42B8000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
5881000
trusted library allocation
page read and write
4023000
trusted library allocation
page read and write
42B2000
trusted library allocation
page read and write
A46E000
stack
page read and write
41CC000
trusted library allocation
page read and write
3FB3000
trusted library allocation
page read and write
2E48000
trusted library allocation
page read and write
7FC00000
trusted library allocation
page execute and read and write
31E0000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
16F9000
heap
page read and write
70DE000
stack
page read and write
306D000
trusted library allocation
page read and write
382D000
trusted library allocation
page read and write
37DA000
trusted library allocation
page read and write
3077000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
51F3000
heap
page read and write
65DC000
heap
page read and write
51F0000
heap
page read and write
41F4000
trusted library allocation
page read and write
2C9D000
trusted library allocation
page read and write
112A000
stack
page read and write
F92000
trusted library allocation
page read and write
50A5000
trusted library allocation
page read and write
41DF000
trusted library allocation
page read and write
B01C000
stack
page read and write
9CED000
stack
page read and write
1630000
trusted library allocation
page read and write
430C000
trusted library allocation
page read and write
4099000
trusted library allocation
page read and write
2F32000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
B11C000
stack
page read and write
418C000
trusted library allocation
page read and write
3206000
trusted library allocation
page read and write
1130000
heap
page read and write
800D000
stack
page read and write
6AD7000
trusted library allocation
page read and write
EB4000
trusted library allocation
page read and write
2EED000
trusted library allocation
page read and write
672E000
stack
page read and write
1B60000
heap
page read and write
3111000
trusted library allocation
page read and write
2FA2000
trusted library allocation
page read and write
2E1F000
trusted library allocation
page read and write
990000
heap
page read and write
F9E000
stack
page read and write
1550000
heap
page read and write
4315000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
338D000
trusted library allocation
page read and write
F80000
trusted library allocation
page read and write
2EAF000
trusted library allocation
page read and write
1B30000
trusted library allocation
page read and write
2FBC000
trusted library allocation
page read and write
37EF000
trusted library allocation
page read and write
11B0000
heap
page read and write
31BA000
trusted library allocation
page read and write
1000000
heap
page read and write
FCB000
trusted library allocation
page execute and read and write
F7E000
stack
page read and write
70E0000
trusted library allocation
page read and write
35EA000
trusted library allocation
page read and write
2C8A000
trusted library allocation
page read and write
2E9A000
trusted library allocation
page read and write
336D000
trusted library allocation
page read and write
7421D000
unkown
page read and write
1020000
trusted library allocation
page execute and read and write
5AA0000
trusted library allocation
page execute and read and write
2F9A000
trusted library allocation
page read and write
5A50000
heap
page read and write
1236000
trusted library allocation
page execute and read and write
3060000
heap
page read and write
681D000
stack
page read and write
2E0E000
stack
page read and write
5FDE000
stack
page read and write
B15E000
stack
page read and write
50F0000
heap
page read and write
7140000
heap
page read and write
3278000
trusted library allocation
page read and write
1030000
heap
page read and write
3856000
trusted library allocation
page read and write
100E000
stack
page read and write
5BF0000
heap
page read and write
36CD000
trusted library allocation
page read and write
38ED000
trusted library allocation
page read and write
2F59000
trusted library allocation
page read and write
3119000
trusted library allocation
page read and write
1B4B000
trusted library allocation
page execute and read and write
2C7B000
trusted library allocation
page read and write
5886000
trusted library allocation
page read and write
1180000
heap
page read and write
42BB000
trusted library allocation
page read and write
123E000
stack
page read and write
5500000
heap
page read and write
41A3000
trusted library allocation
page read and write
43DE000
trusted library allocation
page read and write
330F000
trusted library allocation
page read and write
38F9000
trusted library allocation
page read and write
4001000
trusted library allocation
page read and write
3FC2000
trusted library allocation
page read and write
310B000
trusted library allocation
page read and write
2F69000
trusted library allocation
page read and write
54F4000
trusted library allocation
page read and write
1090000
heap
page read and write
2FDE000
stack
page read and write
E75000
heap
page read and write
2F54000
trusted library allocation
page read and write
30B8000
trusted library allocation
page read and write
982D000
stack
page read and write
40D0000
trusted library allocation
page read and write
33A0000
trusted library allocation
page read and write
2DBE000
stack
page read and write
1B42000
trusted library allocation
page read and write
2EC4000
trusted library allocation
page read and write
EB8000
heap
page read and write
7BC8000
heap
page read and write
583F000
stack
page read and write
6C17000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
432B000
trusted library allocation
page read and write
31B6000
trusted library allocation
page read and write
587E000
trusted library allocation
page read and write
9BEE000
stack
page read and write
38F4000
trusted library allocation
page read and write
3DAD000
trusted library allocation
page read and write
30AC000
trusted library allocation
page read and write
32B8000
trusted library allocation
page read and write
1B3A000
trusted library allocation
page execute and read and write
3330000
heap
page execute and read and write
3787000
trusted library allocation
page read and write
403C000
trusted library allocation
page read and write
7421F000
unkown
page readonly
2F92000
trusted library allocation
page read and write
30AE000
stack
page read and write
6B30000
heap
page read and write
12D0000
heap
page read and write
659E000
heap
page read and write
3185000
trusted library allocation
page read and write
3282000
trusted library allocation
page read and write
305D000
trusted library allocation
page read and write
5044000
trusted library allocation
page read and write
4512000
trusted library allocation
page read and write
31BE000
trusted library allocation
page read and write
32AC000
trusted library allocation
page read and write
30A5000
trusted library allocation
page read and write
9C0000
heap
page read and write
67DE000
stack
page read and write
12AE000
stack
page read and write
74216000
unkown
page readonly
BEA000
stack
page read and write
419B000
trusted library allocation
page read and write
5120000
heap
page read and write
542D000
trusted library allocation
page read and write
41F8000
trusted library allocation
page read and write
FB2000
trusted library allocation
page read and write
37C5000
trusted library allocation
page read and write
70E3000
trusted library allocation
page read and write
C6F000
stack
page read and write
2CB0000
trusted library allocation
page read and write
165B000
heap
page read and write
2ED8000
trusted library allocation
page read and write
30B5000
trusted library allocation
page read and write
1190000
heap
page read and write
1070000
heap
page read and write
31F0000
heap
page read and write
6C10000
trusted library allocation
page read and write
2F8A000
trusted library allocation
page read and write
4026000
trusted library allocation
page read and write
6B9A000
trusted library allocation
page read and write
E82000
heap
page read and write
5410000
trusted library section
page readonly
12C0000
trusted library allocation
page read and write
442000
remote allocation
page execute and read and write
AE8F000
stack
page read and write
54B0000
heap
page read and write
3320000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
FEF000
stack
page read and write
2DF5000
trusted library allocation
page read and write
AD8E000
stack
page read and write
970000
heap
page read and write
3880000
trusted library allocation
page read and write
9CF8000
heap
page read and write
42BE000
trusted library allocation
page read and write
413F000
trusted library allocation
page read and write
6B80000
trusted library allocation
page execute and read and write
6AF0000
trusted library allocation
page execute and read and write
444000
remote allocation
page execute and read and write
ED0000
heap
page read and write
5864000
trusted library allocation
page read and write
1098000
heap
page read and write
5A40000
trusted library section
page readonly
5373000
heap
page read and write
1B67000
heap
page read and write
1330000
trusted library allocation
page execute and read and write
6C03000
trusted library allocation
page read and write
406A000
trusted library allocation
page read and write
574E000
stack
page read and write
1120000
trusted library allocation
page read and write
586B000
trusted library allocation
page read and write
198E000
stack
page read and write
1B2D000
trusted library allocation
page execute and read and write
4CFC000
stack
page read and write
5A8E000
stack
page read and write
EA0000
trusted library allocation
page read and write
69F0000
trusted library allocation
page execute and read and write
30B0000
trusted library allocation
page read and write
3117000
trusted library allocation
page read and write
3193000
trusted library allocation
page read and write
3023000
trusted library allocation
page read and write
1232000
trusted library allocation
page read and write
1005000
heap
page read and write
3F9D000
trusted library allocation
page read and write
AAA000
stack
page read and write
30E2000
trusted library allocation
page read and write
11D6000
heap
page read and write
375E000
trusted library allocation
page read and write
930000
heap
page read and write
163D000
trusted library allocation
page execute and read and write
FC0000
trusted library allocation
page read and write
5920000
trusted library allocation
page execute and read and write
5450000
trusted library allocation
page read and write
3749000
trusted library allocation
page read and write
2F2B000
trusted library allocation
page read and write
2F7E000
trusted library allocation
page read and write
379C000
trusted library allocation
page read and write
3200000
heap
page read and write
3613000
trusted library allocation
page read and write
30EE000
stack
page read and write
31D4000
trusted library allocation
page read and write
CD0000
heap
page read and write
C2E000
stack
page read and write
31BC000
trusted library allocation
page read and write
1114000
trusted library allocation
page read and write
2E48000
trusted library allocation
page read and write
36F6000
trusted library allocation
page read and write
3191000
trusted library allocation
page read and write
F97000
trusted library allocation
page execute and read and write
38A9000
trusted library allocation
page read and write
65CF000
heap
page read and write
54F0000
trusted library allocation
page read and write
37B1000
trusted library allocation
page read and write
52B0000
trusted library allocation
page execute and read and write
31C9000
trusted library allocation
page read and write
2F82000
trusted library allocation
page read and write
41E2000
trusted library allocation
page read and write
686E000
stack
page read and write
339C000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
1245000
trusted library allocation
page execute and read and write
3EA1000
trusted library allocation
page read and write
5900000
trusted library allocation
page execute and read and write
6AA0000
trusted library allocation
page read and write
2E4D000
stack
page read and write
2F9E000
trusted library allocation
page read and write
4FDE000
stack
page read and write
5910000
heap
page read and write
58D0000
trusted library allocation
page read and write
A42F000
stack
page read and write
6A00000
trusted library allocation
page read and write
7B80000
heap
page read and write
682E000
stack
page read and write
EFF000
heap
page read and write
7B7E000
stack
page read and write
4199000
trusted library allocation
page read and write
30A4000
trusted library allocation
page read and write
5132000
trusted library allocation
page read and write
32A9000
trusted library allocation
page read and write
4190000
trusted library allocation
page read and write
3D8D000
trusted library allocation
page read and write
3287000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
386B000
trusted library allocation
page read and write
314B000
heap
page read and write
306B000
trusted library allocation
page read and write
4229000
trusted library allocation
page read and write
5D40000
trusted library allocation
page read and write
32BE000
trusted library allocation
page read and write
5A20000
trusted library allocation
page execute and read and write
3B69000
trusted library allocation
page read and write
3272000
trusted library allocation
page read and write
3D32000
trusted library allocation
page read and write
1B36000
trusted library allocation
page execute and read and write
1504000
trusted library allocation
page read and write
97E000
unkown
page read and write
3395000
trusted library allocation
page read and write
3199000
trusted library allocation
page read and write
A8CE000
stack
page read and write
41EF000
trusted library allocation
page read and write
171E000
heap
page read and write
6BA0000
trusted library allocation
page execute and read and write
ECD000
trusted library allocation
page execute and read and write
9F2E000
stack
page read and write
71FE000
stack
page read and write
E4E000
heap
page read and write
7BCB000
heap
page read and write
1354000
trusted library allocation
page read and write
2FC9000
trusted library allocation
page read and write
5505000
heap
page read and write
6A30000
trusted library allocation
page execute and read and write
5930000
trusted library allocation
page execute and read and write
1242000
trusted library allocation
page read and write
3281000
trusted library allocation
page read and write
6F60000
heap
page read and write
538E000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
5386000
trusted library allocation
page read and write
6FA0000
heap
page read and write
30C1000
trusted library allocation
page read and write
153C000
stack
page read and write
42FF000
trusted library allocation
page read and write
304D000
trusted library allocation
page read and write
EBD000
trusted library allocation
page execute and read and write
68EE000
stack
page read and write
11F8000
heap
page read and write
40BA000
trusted library allocation
page read and write
160E000
stack
page read and write
30A8000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page execute and read and write
3F02000
trusted library allocation
page read and write
30E7000
trusted library allocation
page read and write
9CF0000
heap
page read and write
2FF0000
heap
page execute and read and write
5428000
trusted library allocation
page read and write
309D000
trusted library allocation
page read and write
551D000
stack
page read and write
7BE4000
heap
page read and write
63C0000
heap
page read and write
54A0000
heap
page read and write
506D000
trusted library allocation
page read and write
1633000
trusted library allocation
page execute and read and write
3EE1000
trusted library allocation
page read and write
560D000
stack
page read and write
AD4E000
stack
page read and write
FA0000
heap
page read and write
30BC000
trusted library allocation
page read and write
128E000
stack
page read and write
88D000
stack
page read and write
30A0000
trusted library allocation
page read and write
11F5000
heap
page read and write
1684000
heap
page read and write
1230000
trusted library allocation
page read and write
E33000
trusted library allocation
page read and write
458D000
trusted library allocation
page read and write
5500000
heap
page read and write
53A1000
trusted library allocation
page read and write
32B4000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
327C000
trusted library allocation
page read and write
2E30000
heap
page read and write
2C76000
trusted library allocation
page read and write
6B60000
trusted library allocation
page execute and read and write
31E1000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
5620000
heap
page read and write
3895000
trusted library allocation
page read and write
6C30000
trusted library allocation
page execute and read and write
F8A000
trusted library allocation
page execute and read and write
11A0000
heap
page read and write
315D000
trusted library allocation
page read and write
3628000
trusted library allocation
page read and write
FC2000
trusted library allocation
page read and write
2F86000
trusted library allocation
page read and write
320A000
trusted library allocation
page read and write
420E000
trusted library allocation
page read and write
111D000
trusted library allocation
page execute and read and write
AB0E000
stack
page read and write
2C96000
trusted library allocation
page read and write
4209000
trusted library allocation
page read and write
5370000
heap
page read and write
5416000
trusted library allocation
page read and write
7CB0000
trusted library allocation
page read and write
42C1000
trusted library allocation
page read and write
11FB000
heap
page read and write
1163000
heap
page read and write
114B000
heap
page read and write
3773000
trusted library allocation
page read and write
31ED000
trusted library allocation
page read and write
2B61000
trusted library allocation
page read and write
3225000
trusted library allocation
page read and write
5430000
heap
page execute and read and write
3EFB000
trusted library allocation
page read and write
4029000
trusted library allocation
page read and write
689E000
stack
page read and write
51E0000
trusted library allocation
page execute and read and write
9F6E000
stack
page read and write
71B0000
trusted library allocation
page execute and read and write
3BAC000
trusted library allocation
page read and write
3076000
trusted library allocation
page read and write
35C7000
trusted library allocation
page read and write
2C7E000
trusted library allocation
page read and write
2ED0000
heap
page execute and read and write
1634000
trusted library allocation
page read and write
184F000
stack
page read and write
4305000
trusted library allocation
page read and write
3F09000
trusted library allocation
page read and write
A7CE000
stack
page read and write
5910000
trusted library allocation
page read and write
2ADE000
stack
page read and write
7E0E000
stack
page read and write
420D000
trusted library allocation
page read and write
BCD000
stack
page read and write
102E000
stack
page read and write
C0A000
stack
page read and write
330F000
stack
page read and write
54E0000
trusted library allocation
page read and write
2F54000
trusted library allocation
page read and write
4341000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
35FF000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
3818000
trusted library allocation
page read and write
65E2000
heap
page read and write
3198000
trusted library allocation
page read and write
1360000
heap
page read and write
66AD000
stack
page read and write
2E71000
trusted library allocation
page read and write
F50000
heap
page read and write
AC4E000
stack
page read and write
5480000
heap
page execute and read and write
1540000
trusted library allocation
page read and write
38C4000
trusted library allocation
page read and write
36B8000
trusted library allocation
page read and write
32FC000
trusted library allocation
page read and write
131E000
unkown
page read and write
5090000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
FB7000
heap
page read and write
41E8000
trusted library allocation
page read and write
425D000
trusted library allocation
page read and write
F34000
heap
page read and write
7BD7000
heap
page read and write
4388000
trusted library allocation
page read and write
5503000
heap
page read and write
4015000
trusted library allocation
page read and write
41DD000
trusted library allocation
page read and write
5922000
trusted library allocation
page read and write
2E86000
trusted library allocation
page read and write
6B5E000
stack
page read and write
FBA000
trusted library allocation
page execute and read and write
66EF000
stack
page read and write
3EF4000
trusted library allocation
page read and write
3305000
trusted library allocation
page read and write
7F0F000
stack
page read and write
3167000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
C80000
heap
page read and write
65BC000
heap
page read and write
4293000
trusted library allocation
page read and write
31D0000
trusted library allocation
page execute and read and write
3065000
trusted library allocation
page read and write
3E1D000
trusted library allocation
page read and write
145E000
stack
page read and write
FE0000
trusted library allocation
page read and write
685E000
stack
page read and write
318D000
trusted library allocation
page read and write
FB0000
heap
page read and write
E10000
trusted library allocation
page read and write
7C80000
trusted library section
page read and write
363D000
trusted library allocation
page read and write
A1EC000
stack
page read and write
1010000
heap
page read and write
538B000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
3BEF000
trusted library allocation
page read and write
E2D000
trusted library allocation
page execute and read and write
1158000
heap
page read and write
303F000
unkown
page read and write
2F02000
trusted library allocation
page read and write
319D000
trusted library allocation
page read and write
539A000
trusted library allocation
page read and write
40F0000
trusted library allocation
page read and write
30AA000
trusted library allocation
page read and write
7D89000
trusted library allocation
page read and write
4121000
trusted library allocation
page read and write
75E2000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
2B20000
heap
page read and write
6C20000
trusted library allocation
page read and write
93A000
stack
page read and write
1B47000
trusted library allocation
page execute and read and write
1650000
heap
page read and write
7CF0000
trusted library section
page read and write
422000
remote allocation
page execute and read and write
3269000
trusted library allocation
page read and write
2C6F000
stack
page read and write
5C3B000
stack
page read and write
3397000
trusted library allocation
page read and write
30C9000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
CCE000
unkown
page read and write
7421D000
unkown
page read and write
709E000
stack
page read and write
3C73000
trusted library allocation
page read and write
3651000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
7F8E000
stack
page read and write
38D8000
trusted library allocation
page read and write
F86000
trusted library allocation
page execute and read and write
3189000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
52C0000
heap
page execute and read and write
1B32000
trusted library allocation
page read and write
3073000
trusted library allocation
page read and write
40AF000
trusted library allocation
page read and write
1247000
trusted library allocation
page execute and read and write
1692000
heap
page read and write
3038000
trusted library allocation
page read and write
3062000
trusted library allocation
page read and write
3278000
trusted library allocation
page read and write
540B000
stack
page read and write
45CF000
trusted library allocation
page read and write
2F5D000
trusted library allocation
page read and write
10C3000
heap
page read and write
74201000
unkown
page execute read
5510000
heap
page read and write
14E0000
heap
page read and write
2FFA000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
3068000
trusted library allocation
page read and write
40C1000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
306B000
trusted library allocation
page read and write
327A000
trusted library allocation
page read and write
588D000
trusted library allocation
page read and write
5A60000
heap
page execute and read and write
3200000
trusted library allocation
page read and write
99EF000
stack
page read and write
5AB0000
trusted library allocation
page read and write
5086000
trusted library allocation
page read and write
57A4000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
31E3000
trusted library allocation
page read and write
3734000
trusted library allocation
page read and write
123A000
trusted library allocation
page execute and read and write
3285000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
6570000
heap
page read and write
2F8E000
trusted library allocation
page read and write
367B000
trusted library allocation
page read and write
4280000
trusted library allocation
page read and write
3842000
trusted library allocation
page read and write
10C6000
heap
page read and write
7FCE000
stack
page read and write
168F000
heap
page read and write
65A0000
heap
page read and write
4B68000
trusted library allocation
page read and write
4124000
trusted library allocation
page read and write
2F4A000
trusted library allocation
page read and write
A6CE000
stack
page read and write
112D000
trusted library allocation
page execute and read and write
42A9000
trusted library allocation
page read and write
426B000
trusted library allocation
page read and write
40EC000
trusted library allocation
page read and write
A9D0000
heap
page read and write
316C000
trusted library allocation
page read and write
3252000
trusted library allocation
page read and write
318B000
trusted library allocation
page read and write
9AB000
heap
page read and write
2B1B000
stack
page read and write
3F4D000
trusted library allocation
page read and write
2B50000
heap
page execute and read and write
11B9000
heap
page read and write
975000
heap
page read and write
30E4000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
8CA000
stack
page read and write
3078000
trusted library allocation
page read and write
53B2000
trusted library allocation
page read and write
9D08000
heap
page read and write
6A20000
trusted library allocation
page execute and read and write
3CF8000
trusted library allocation
page read and write
165E000
heap
page read and write
3300000
trusted library allocation
page read and write
980000
heap
page read and write
6A5E000
stack
page read and write
9A0000
heap
page read and write
FB6000
trusted library allocation
page execute and read and write
53A6000
trusted library allocation
page read and write
E84000
heap
page read and write
3803000
trusted library allocation
page read and write
6A10000
trusted library allocation
page execute and read and write
A32D000
stack
page read and write
308B000
trusted library allocation
page read and write
6C70000
heap
page read and write
505E000
trusted library allocation
page read and write
5610000
heap
page read and write
32B2000
trusted library allocation
page read and write
97EE000
stack
page read and write
A9CD000
stack
page read and write
419E000
trusted library allocation
page read and write
2F96000
trusted library allocation
page read and write
7F6C0000
trusted library allocation
page execute and read and write
310D000
trusted library allocation
page read and write
68AF000
stack
page read and write
43DB000
trusted library allocation
page read and write
EF7000
stack
page read and write
6C40000
trusted library allocation
page read and write
3341000
trusted library allocation
page read and write
370B000
trusted library allocation
page read and write
5BD0000
heap
page read and write
3073000
trusted library allocation
page read and write
38BE000
trusted library allocation
page read and write
4021000
trusted library allocation
page read and write
1510000
heap
page read and write
30F8000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
416B000
trusted library allocation
page read and write
9E2E000
stack
page read and write
3140000
heap
page read and write
32EF000
trusted library allocation
page read and write
421000
remote allocation
page execute and read and write
A2EC000
stack
page read and write
1506000
trusted library allocation
page read and write
14F7000
stack
page read and write
5440000
trusted library allocation
page execute and read and write
584E000
stack
page read and write
30DE000
trusted library allocation
page read and write
74C0000
heap
page read and write
5892000
trusted library allocation
page read and write
2DFC000
stack
page read and write
6AC0000
trusted library allocation
page read and write
7A7E000
stack
page read and write
5A9D000
trusted library allocation
page read and write
6B00000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
1B23000
trusted library allocation
page read and write
307B000
trusted library allocation
page read and write
4195000
trusted library allocation
page read and write
541B000
stack
page read and write
30E8000
trusted library allocation
page read and write
124B000
trusted library allocation
page execute and read and write
F82000
trusted library allocation
page read and write
A56E000
stack
page read and write
E0E000
stack
page read and write
6AE0000
trusted library allocation
page read and write
3154000
trusted library allocation
page read and write
69EE000
stack
page read and write
6D60000
heap
page read and write
42C0000
trusted library allocation
page read and write
A06E000
stack
page read and write
1165000
heap
page read and write
3DEF000
trusted library allocation
page read and write
309F000
trusted library allocation
page read and write
3264000
trusted library allocation
page read and write
2FE5000
trusted library allocation
page read and write
E23000
trusted library allocation
page execute and read and write
30A0000
trusted library allocation
page read and write
326F000
trusted library allocation
page read and write
3FDA000
trusted library allocation
page read and write
9B0000
heap
page read and write
36A4000
trusted library allocation
page read and write
2E0A000
trusted library allocation
page read and write
2FA7000
trusted library allocation
page read and write
3666000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
BA7000
stack
page read and write
5380000
trusted library allocation
page read and write
38F1000
trusted library allocation
page read and write
35D5000
trusted library allocation
page read and write
2FEB000
trusted library allocation
page read and write
36E2000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
30B4000
trusted library allocation
page read and write
2DD8000
trusted library allocation
page read and write
63EE000
heap
page read and write
6B70000
trusted library allocation
page execute and read and write
FF2000
unkown
page readonly
3308000
trusted library allocation
page read and write
FC7000
trusted library allocation
page execute and read and write
5061000
trusted library allocation
page read and write
53FD000
stack
page read and write
50D0000
trusted library allocation
page read and write
1113000
trusted library allocation
page execute and read and write
16EE000
heap
page read and write
40DF000
trusted library allocation
page read and write
E5E000
stack
page read and write
42FA000
trusted library allocation
page read and write
504B000
trusted library allocation
page read and write
1B20000
trusted library allocation
page read and write
314D000
trusted library allocation
page read and write
439D000
trusted library allocation
page read and write
16D9000
heap
page read and write
2E33000
trusted library allocation
page read and write
FF0000
unkown
page readonly
3B61000
trusted library allocation
page read and write
65D3000
heap
page read and write
7180000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
5500000
heap
page read and write
There are 805 hidden memdumps, click here to show them.