IOC Report
#U015eirket arac#U0131n#U0131z taraf#U0131ndan dikkatsiz s#U00fcr#U00fc#U015f tespit edildi.exe

loading gif

Files

File Path
Type
Category
Malicious
#U015eirket arac#U0131n#U0131z taraf#U0131ndan dikkatsiz s#U00fcr#U00fc#U015f tespit edildi.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\directory\name.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\aut8564.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut85A3.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autAD6F.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autADBE.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autD5A8.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autD616.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\dews
ASCII text, with very long lines (29744), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\iodization
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\#U015eirket arac#U0131n#U0131z taraf#U0131ndan dikkatsiz s#U00fcr#U00fc#U015f tespit edildi.exe
"C:\Users\user\Desktop\#U015eirket arac#U0131n#U0131z taraf#U0131ndan dikkatsiz s#U00fcr#U00fc#U015f tespit edildi.exe"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\Desktop\#U015eirket arac#U0131n#U0131z taraf#U0131ndan dikkatsiz s#U00fcr#U00fc#U015f tespit edildi.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\#U015eirket arac#U0131n#U0131z taraf#U0131ndan dikkatsiz s#U00fcr#U00fc#U015f tespit edildi.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious

URLs

Name
IP
Malicious
https://api.telegram.org/bot7188891594:AAFqtGlOuSCribG96uEQ5BTtToaiuTn9Ees/sendDocument
149.154.167.220
https://api.telegram.org/bot7188891594:AAFqtGlOuSCribG96uEQ5BTtToaiuTn9Ees/
unknown
https://account.dyn.com/
unknown
https://api.telegram.org
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3248000
trusted library allocation
page read and write
malicious
321E000
trusted library allocation
page read and write
malicious
5170000
trusted library section
page read and write
malicious
2C7F000
trusted library allocation
page read and write
malicious
2C99000
trusted library allocation
page read and write
malicious
3C6E000
trusted library allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
325F000
trusted library allocation
page read and write
malicious
272F000
heap
page read and write
malicious
1410000
direct allocation
page read and write
malicious
2B30000
trusted library section
page read and write
malicious
2C31000
trusted library allocation
page read and write
malicious
2480000
direct allocation
page read and write
malicious
3279000
trusted library allocation
page read and write
malicious
3FFD000
direct allocation
page read and write
D00000
trusted library allocation
page read and write
58FE000
stack
page read and write
15EE000
heap
page read and write
AFE000
heap
page read and write
15EE000
heap
page read and write
69F0000
trusted library allocation
page read and write
4211000
trusted library allocation
page read and write
15CF000
heap
page read and write
82F000
stack
page read and write
9EB000
heap
page read and write
2E8F000
heap
page read and write
15BD000
heap
page read and write
990000
direct allocation
page execute and read and write
984E000
direct allocation
page read and write
42D9000
direct allocation
page read and write
59A0000
heap
page read and write
67D0000
trusted library allocation
page execute and read and write
6660000
trusted library allocation
page execute and read and write
7180000
heap
page read and write
2BB0000
heap
page execute and read and write
B32000
unkown
page readonly
1830000
heap
page read and write
3D30000
direct allocation
page read and write
1400000
heap
page read and write
344E000
direct allocation
page read and write
1851000
heap
page read and write
2CB8000
trusted library allocation
page read and write
2B2E000
stack
page read and write
2D96000
trusted library allocation
page read and write
5230000
heap
page execute and read and write
428D000
direct allocation
page read and write
118A000
heap
page read and write
134E000
stack
page read and write
102000
unkown
page readonly
D78000
heap
page read and write
6F78000
heap
page read and write
15BF000
heap
page read and write
567F000
stack
page read and write
305B000
trusted library allocation
page read and write
5EAC000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
2898000
trusted library allocation
page read and write
15CE000
heap
page read and write
5210000
trusted library allocation
page read and write
4133000
direct allocation
page read and write
6D3D000
stack
page read and write
3D30000
direct allocation
page read and write
9B0000
heap
page read and write
D20000
trusted library allocation
page read and write
265E084C000
heap
page read and write
5CCE000
stack
page read and write
15DE000
heap
page read and write
B3D000
heap
page read and write
6BFE000
stack
page read and write
F6E000
stack
page read and write
B44000
unkown
page readonly
32C5000
trusted library allocation
page read and write
43A000
stack
page read and write
6CF0000
heap
page read and write
406E000
direct allocation
page read and write
6150000
trusted library allocation
page read and write
3372000
trusted library allocation
page read and write
BF0000
heap
page read and write
56C0000
heap
page read and write
30CE000
stack
page read and write
150F000
heap
page read and write
42FE000
direct allocation
page read and write
42D7000
trusted library allocation
page read and write
5362000
heap
page read and write
67C0000
trusted library allocation
page read and write
2D2B000
trusted library allocation
page read and write
3ED0000
direct allocation
page read and write
2E00000
heap
page read and write
2DB0000
heap
page execute and read and write
7150000
trusted library allocation
page read and write
3E53000
direct allocation
page read and write
1180000
heap
page read and write
42DD000
direct allocation
page read and write
11EF000
stack
page read and write
5BCE000
stack
page read and write
CEE000
stack
page read and write
2D62000
trusted library allocation
page read and write
B32000
unkown
page readonly
B40000
unkown
page write copy
32EA000
trusted library allocation
page read and write
5E8D000
stack
page read and write
2C7D000
trusted library allocation
page read and write
32D1000
trusted library allocation
page read and write
3387000
trusted library allocation
page read and write
2D38000
trusted library allocation
page read and write
AC3000
heap
page read and write
171C000
heap
page read and write
2846000
heap
page read and write
1C6F000
stack
page read and write
3FFD000
direct allocation
page read and write
185F000
heap
page read and write
113E000
stack
page read and write
A70000
unkown
page readonly
2BCE000
trusted library allocation
page read and write
12E0000
heap
page read and write
30EF000
trusted library allocation
page read and write
A71000
unkown
page execute read
3ED0000
direct allocation
page read and write
445000
system
page execute and read and write
B3C000
unkown
page write copy
6147000
trusted library allocation
page read and write
2BE1000
trusted library allocation
page read and write
12B4000
trusted library allocation
page read and write
265E084E000
heap
page read and write
B0C000
unkown
page readonly
6BBF000
stack
page read and write
2BC0000
trusted library allocation
page read and write
A50000
heap
page read and write
697D000
stack
page read and write
B2D000
heap
page read and write
306E000
trusted library allocation
page read and write
3030000
trusted library allocation
page read and write
2930000
heap
page read and write
3441000
direct allocation
page read and write
B44000
unkown
page readonly
66E0000
trusted library allocation
page read and write
102000
unkown
page readonly
4010000
direct allocation
page read and write
3FFD000
direct allocation
page read and write
336E000
trusted library allocation
page read and write
1777000
heap
page read and write
5340000
heap
page read and write
32B6000
trusted library allocation
page read and write
5730000
heap
page read and write
DCF000
heap
page read and write
422000
system
page execute and read and write
24D0000
heap
page read and write
6CFE000
stack
page read and write
1840000
heap
page read and write
B3C000
unkown
page write copy
BA0000
heap
page read and write
30E0000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
2E4F000
heap
page read and write
17F5000
heap
page read and write
4160000
direct allocation
page read and write
A70000
heap
page read and write
6F3E000
stack
page read and write
6690000
trusted library allocation
page execute and read and write
56BE000
stack
page read and write
2C87000
trusted library allocation
page read and write
265E0510000
heap
page read and write
3FFD000
direct allocation
page read and write
265E0840000
heap
page read and write
40000
unkown
page readonly
5383000
heap
page read and write
2A24000
heap
page read and write
1851000
heap
page read and write
66A4000
trusted library allocation
page read and write
DAA000
heap
page read and write
D10000
trusted library allocation
page read and write
108A000
stack
page read and write
1871000
heap
page read and write
16E8000
heap
page read and write
1777000
heap
page read and write
5EA6000
trusted library allocation
page read and write
D70000
heap
page read and write
56DA000
heap
page read and write
EFC25FF000
stack
page read and write
12A0000
trusted library allocation
page read and write
2F70000
heap
page read and write
1478000
heap
page read and write
2F88000
trusted library allocation
page read and write
5970000
trusted library allocation
page execute and read and write
7190000
trusted library allocation
page execute and read and write
32FB000
trusted library allocation
page read and write
5707000
heap
page read and write
2C83000
trusted library allocation
page read and write
1290000
heap
page read and write
177F000
heap
page read and write
530D000
stack
page read and write
15FE000
heap
page read and write
B1C000
heap
page read and write
3FF9000
direct allocation
page read and write
3277000
trusted library allocation
page read and write
56A0000
heap
page read and write
434E000
direct allocation
page read and write
2A10000
trusted library allocation
page read and write
870000
heap
page read and write
D3A000
trusted library allocation
page execute and read and write
4289000
direct allocation
page read and write
D47000
trusted library allocation
page execute and read and write
17D9000
heap
page read and write
3FC0000
direct allocation
page read and write
A47000
heap
page read and write
15DD000
heap
page read and write
2820000
trusted library allocation
page execute and read and write
42DD000
direct allocation
page read and write
265E0845000
heap
page read and write
3FFD000
direct allocation
page read and write
B90000
trusted library section
page read and write
2470000
direct allocation
page execute and read and write
BA7000
heap
page read and write
2D65000
trusted library allocation
page execute and read and write
69E0000
trusted library allocation
page execute and read and write
593E000
stack
page read and write
D32000
trusted library allocation
page read and write
5342000
heap
page read and write
16E0000
heap
page read and write
66A0000
trusted library allocation
page read and write
11AA000
heap
page read and write
533E000
stack
page read and write
609C000
stack
page read and write
980000
heap
page read and write
32FF000
trusted library allocation
page read and write
2A20000
heap
page read and write
41000
unkown
page execute read
1140000
trusted library section
page read and write
9E2000
heap
page read and write
B2D000
heap
page read and write
4289000
direct allocation
page read and write
3040000
heap
page read and write
29F0000
trusted library allocation
page read and write
662E000
unkown
page read and write
5703000
heap
page read and write
656E000
stack
page read and write
4235000
trusted library allocation
page read and write
A70000
unkown
page readonly
58FF000
stack
page read and write
B1D000
heap
page read and write
BA5000
heap
page read and write
80F000
stack
page read and write
30D4000
trusted library allocation
page read and write
32F8000
trusted library allocation
page read and write
6170000
trusted library allocation
page execute and read and write
6EA000
stack
page read and write
2810000
trusted library allocation
page read and write
2980000
heap
page read and write
144F000
stack
page read and write
53B4000
heap
page read and write
B70000
heap
page read and write
40E3000
direct allocation
page read and write
B1D000
heap
page read and write
2BED000
trusted library allocation
page read and write
53BA000
heap
page read and write
2D0A000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
3C5D000
trusted library allocation
page read and write
5984000
trusted library allocation
page read and write
2F6C000
stack
page read and write
12D6000
trusted library allocation
page execute and read and write
41B0000
direct allocation
page read and write
2840000
heap
page read and write
53C5000
heap
page read and write
1780000
heap
page read and write
3303000
trusted library allocation
page read and write
4160000
direct allocation
page read and write
11DC000
stack
page read and write
B2B000
heap
page read and write
EFC26FE000
stack
page read and write
12B0000
trusted library allocation
page read and write
10C000
unkown
page read and write
57FD000
stack
page read and write
DD0000
heap
page read and write
D23000
trusted library allocation
page read and write
3D30000
direct allocation
page read and write
110000
unkown
page write copy
12E5000
heap
page read and write
DAC000
heap
page read and write
3D2D000
trusted library allocation
page read and write
1620000
heap
page read and write
7140000
trusted library allocation
page execute and read and write
D13000
trusted library allocation
page execute and read and write
2D6B000
trusted library allocation
page execute and read and write
15A8000
heap
page read and write
3D30000
direct allocation
page read and write
3267000
trusted library allocation
page read and write
EFC23FE000
stack
page read and write
5C4E000
direct allocation
page read and write
A71000
unkown
page execute read
56A2000
heap
page read and write
1808000
heap
page read and write
4265000
trusted library allocation
page read and write
2DA2000
trusted library allocation
page read and write
5A6C000
stack
page read and write
152F000
heap
page read and write
12BD000
trusted library allocation
page execute and read and write
56AA000
heap
page read and write
22DE000
stack
page read and write
E55000
heap
page read and write
EFC29FE000
stack
page read and write
30D6000
trusted library allocation
page read and write
41000
unkown
page execute read
2D92000
trusted library allocation
page read and write
484E000
direct allocation
page read and write
2D80000
trusted library allocation
page read and write
553C000
stack
page read and write
32CD000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
646E000
stack
page read and write
2D3C000
trusted library allocation
page read and write
844E000
direct allocation
page read and write
5B6C000
stack
page read and write
406E000
direct allocation
page read and write
B1D000
heap
page read and write
41B0000
direct allocation
page read and write
6DBE000
unkown
page read and write
3E53000
direct allocation
page read and write
325D000
trusted library allocation
page read and write
4133000
direct allocation
page read and write
3ED0000
direct allocation
page read and write
B0D000
heap
page read and write
7E8000
stack
page read and write
42D9000
direct allocation
page read and write
1841000
heap
page read and write
2DA0000
trusted library allocation
page read and write
D36000
trusted library allocation
page execute and read and write
265E0610000
heap
page read and write
B0E000
heap
page read and write
3D30000
direct allocation
page read and write
2D9E000
trusted library allocation
page read and write
56A4000
heap
page read and write
B0C000
unkown
page readonly
71A0000
trusted library allocation
page read and write
1832000
heap
page read and write
5940000
trusted library allocation
page execute and read and write
42FE000
direct allocation
page read and write
DC0000
heap
page read and write
53E5000
heap
page read and write
3076000
trusted library allocation
page read and write
1850000
heap
page read and write
265E0618000
heap
page read and write
337E000
trusted library allocation
page read and write
14AC000
heap
page read and write
EFC2AFF000
stack
page read and write
A50000
heap
page read and write
40000
unkown
page readonly
29EE000
stack
page read and write
5EA3000
trusted library allocation
page read and write
5930000
heap
page read and write
9EC000
heap
page read and write
12D2000
trusted library allocation
page read and write
6160000
trusted library allocation
page execute and read and write
D30000
trusted library allocation
page read and write
5D0E000
stack
page read and write
10C000
unkown
page write copy
12C0000
trusted library allocation
page read and write
9EC000
heap
page read and write
B44000
unkown
page readonly
5090000
heap
page read and write
A4A000
stack
page read and write
42DD000
direct allocation
page read and write
3ED0000
direct allocation
page read and write
900000
heap
page read and write
655E000
stack
page read and write
1350000
heap
page read and write
7A4E000
direct allocation
page read and write
B0C000
unkown
page readonly
11AD000
heap
page read and write
D9F000
heap
page read and write
2BD2000
trusted library allocation
page read and write
41B0000
direct allocation
page read and write
A70000
unkown
page readonly
D50000
heap
page read and write
38F4000
heap
page read and write
D4B000
trusted library allocation
page execute and read and write
42CD000
trusted library allocation
page read and write
3E4E000
direct allocation
page read and write
6180000
trusted library allocation
page read and write
67B2000
heap
page read and write
AFE000
heap
page read and write
EFC28FD000
stack
page read and write
320E000
stack
page read and write
3380000
direct allocation
page read and write
3ED0000
direct allocation
page read and write
74AF000
stack
page read and write
3FF9000
direct allocation
page read and write
EFC22FE000
stack
page read and write
171C000
heap
page read and write
15DE000
heap
page read and write
83F000
stack
page read and write
1460000
direct allocation
page read and write
14BE000
stack
page read and write
265E0640000
heap
page read and write
66C0000
heap
page read and write
B44000
unkown
page readonly
B3C000
unkown
page read and write
14AC000
heap
page read and write
8E4E000
direct allocation
page read and write
5E4D000
stack
page read and write
406E000
direct allocation
page read and write
677E000
stack
page read and write
B40000
unkown
page write copy
6A4E000
stack
page read and write
4D2D000
stack
page read and write
2CAA000
trusted library allocation
page read and write
67BE000
stack
page read and write
9EC000
heap
page read and write
5E9D000
trusted library allocation
page read and write
145F000
stack
page read and write
3211000
trusted library allocation
page read and write
40E3000
direct allocation
page read and write
32BD000
trusted library allocation
page read and write
329C000
trusted library allocation
page read and write
38F0000
heap
page read and write
42D9000
direct allocation
page read and write
434E000
direct allocation
page read and write
2DA7000
trusted library allocation
page read and write
A47000
heap
page read and write
676E000
stack
page read and write
1777000
heap
page read and write
12CD000
trusted library allocation
page execute and read and write
7500000
heap
page read and write
3382000
trusted library allocation
page read and write
40E3000
direct allocation
page read and write
5080000
heap
page read and write
B3D000
heap
page read and write
3ED0000
direct allocation
page read and write
323D000
trusted library allocation
page read and write
7FF000
stack
page read and write
1470000
heap
page read and write
704E000
direct allocation
page read and write
3318000
trusted library allocation
page read and write
15FE000
heap
page read and write
2CC8000
trusted library allocation
page read and write
265E2180000
heap
page read and write
59ED000
stack
page read and write
150F000
heap
page read and write
3263000
trusted library allocation
page read and write
1296000
heap
page read and write
2BDE000
trusted library allocation
page read and write
B6E000
stack
page read and write
3E53000
direct allocation
page read and write
13E0000
direct allocation
page execute and read and write
2DA0000
trusted library allocation
page read and write
41000
unkown
page execute read
1712000
heap
page read and write
65AD000
stack
page read and write
D42000
trusted library allocation
page read and write
265E05F0000
heap
page read and write
5073000
heap
page read and write
67B0000
heap
page read and write
CF0000
trusted library section
page read and write
32C9000
trusted library allocation
page read and write
DF0000
trusted library section
page read and write
57BE000
stack
page read and write
9B7000
heap
page read and write
2CFD000
trusted library allocation
page read and write
288E000
stack
page read and write
6CDE000
stack
page read and write
150F000
heap
page read and write
14F0000
heap
page read and write
3FC0000
direct allocation
page read and write
5EA0000
trusted library allocation
page read and write
524E000
direct allocation
page read and write
305E000
trusted library allocation
page read and write
A71000
unkown
page execute read
150F000
heap
page read and write
A70000
unkown
page readonly
1150000
heap
page read and write
EFC2BFB000
stack
page read and write
521D000
trusted library allocation
page read and write
53B7000
heap
page read and write
297C000
stack
page read and write
3B70000
heap
page read and write
1841000
heap
page read and write
128D000
stack
page read and write
11CE000
stack
page read and write
5220000
trusted library allocation
page read and write
B3C000
unkown
page read and write
2F74000
heap
page read and write
6D7E000
unkown
page read and write
51FC000
stack
page read and write
2C20000
heap
page read and write
434E000
direct allocation
page read and write
12C3000
trusted library allocation
page read and write
2EDF000
heap
page read and write
2CB4000
trusted library allocation
page read and write
2FE0000
heap
page read and write
6EBF000
stack
page read and write
3FF9000
direct allocation
page read and write
7F180000
trusted library allocation
page execute and read and write
2DFE000
stack
page read and write
171C000
heap
page read and write
114000
unkown
page readonly
DCC000
heap
page read and write
B0C000
unkown
page readonly
3FFD000
direct allocation
page read and write
6140000
trusted library allocation
page read and write
B32000
unkown
page readonly
32D9000
trusted library allocation
page read and write
65EE000
unkown
page read and write
1841000
heap
page read and write
69D0000
heap
page read and write
2D4D000
trusted library allocation
page read and write
265E0710000
heap
page read and write
265E0622000
heap
page read and write
E20000
heap
page read and write
67B8000
heap
page read and write
73AE000
stack
page read and write
12DA000
trusted library allocation
page execute and read and write
3FC0000
direct allocation
page read and write
3D30000
direct allocation
page read and write
66B0000
trusted library allocation
page read and write
D2D000
trusted library allocation
page execute and read and write
67AE000
stack
page read and write
3C31000
trusted library allocation
page read and write
428D000
direct allocation
page read and write
14AC000
heap
page read and write
3071000
trusted library allocation
page read and write
15D4000
heap
page read and write
5226000
trusted library allocation
page read and write
166E000
stack
page read and write
2CBC000
trusted library allocation
page read and write
3FF9000
direct allocation
page read and write
2E20000
heap
page read and write
150F000
heap
page read and write
1EDE000
stack
page read and write
406E000
direct allocation
page read and write
4010000
direct allocation
page read and write
2D90000
trusted library allocation
page execute and read and write
DC000
unkown
page readonly
1871000
heap
page read and write
42B3000
trusted library allocation
page read and write
2BE6000
trusted library allocation
page read and write
4160000
direct allocation
page read and write
672F000
stack
page read and write
1832000
heap
page read and write
11BF000
stack
page read and write
5370000
heap
page read and write
13D0000
heap
page read and write
147F000
stack
page read and write
14A4000
heap
page read and write
5346000
heap
page read and write
16D0000
heap
page read and write
612E000
stack
page read and write
CAF000
stack
page read and write
2A00000
trusted library allocation
page read and write
15BF000
heap
page read and write
1831000
heap
page read and write
32D5000
trusted library allocation
page read and write
130E000
stack
page read and write
330B000
trusted library allocation
page read and write
3FF9000
direct allocation
page read and write
3E53000
direct allocation
page read and write
337A000
trusted library allocation
page read and write
32C1000
trusted library allocation
page read and write
3294000
trusted library allocation
page read and write
3CF7000
trusted library allocation
page read and write
1610000
heap
page read and write
307D000
trusted library allocation
page read and write
148F000
stack
page read and write
3307000
trusted library allocation
page read and write
3E53000
direct allocation
page read and write
328A000
trusted library allocation
page read and write
A71000
unkown
page execute read
118D000
heap
page read and write
5E90000
trusted library allocation
page read and write
A51000
heap
page read and write
5990000
trusted library allocation
page read and write
1507000
heap
page read and write
557E000
stack
page read and write
67B5000
heap
page read and write
146B000
stack
page read and write
15DD000
heap
page read and write
265E0675000
heap
page read and write
2FE4000
heap
page read and write
67D9000
heap
page read and write
1871000
heap
page read and write
1158000
heap
page read and write
15FE000
heap
page read and write
2D67000
trusted library allocation
page execute and read and write
2D9A000
trusted library allocation
page read and write
D5A000
stack
page read and write
D14000
trusted library allocation
page read and write
4289000
direct allocation
page read and write
DC000
unkown
page readonly
32DD000
trusted library allocation
page read and write
206E000
stack
page read and write
11FF000
stack
page read and write
332D000
trusted library allocation
page read and write
179F000
heap
page read and write
430E000
trusted library allocation
page read and write
1360000
heap
page read and write
664E000
direct allocation
page read and write
6EFE000
stack
page read and write
940000
heap
page read and write
7F800000
trusted library allocation
page execute and read and write
1842000
heap
page read and write
81C000
stack
page read and write
57F0000
heap
page execute and read and write
2D8E000
trusted library allocation
page read and write
177A000
heap
page read and write
3376000
trusted library allocation
page read and write
3298000
trusted library allocation
page read and write
9E4000
heap
page read and write
4133000
direct allocation
page read and write
3B74000
heap
page read and write
2D60000
trusted library allocation
page read and write
42FE000
direct allocation
page read and write
10F8000
stack
page read and write
5E0F000
stack
page read and write
14A2000
heap
page read and write
12B3000
trusted library allocation
page execute and read and write
428D000
direct allocation
page read and write
3330000
direct allocation
page read and write
406E000
direct allocation
page read and write
5714000
heap
page read and write
9E3000
heap
page read and write
EFC1FDA000
stack
page read and write
32A9000
trusted library allocation
page read and write
2C97000
trusted library allocation
page read and write
3062000
trusted library allocation
page read and write
2D5E000
stack
page read and write
2830000
trusted library allocation
page read and write
A50000
heap
page read and write
3E53000
direct allocation
page read and write
114000
unkown
page readonly
11FF000
heap
page read and write
6F40000
heap
page read and write
5709000
heap
page read and write
D1D000
trusted library allocation
page execute and read and write
15EC000
heap
page read and write
30D0000
trusted library allocation
page read and write
1861000
heap
page read and write
3FF9000
direct allocation
page read and write
665B000
stack
page read and write
B3D000
heap
page read and write
66E7000
trusted library allocation
page read and write
160E000
stack
page read and write
3100000
heap
page read and write
1510000
heap
page read and write
A47000
heap
page read and write
184F000
heap
page read and write
2BA0000
trusted library allocation
page read and write
331C000
trusted library allocation
page read and write
2BCB000
trusted library allocation
page read and write
406E000
direct allocation
page read and write
4010000
direct allocation
page read and write
D45000
trusted library allocation
page execute and read and write
B32000
unkown
page readonly
1861000
heap
page read and write
There are 642 hidden memdumps, click here to show them.