IOC Report
Facturas.exe

loading gif

Files

File Path
Type
Category
Malicious
Facturas.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Id.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Id.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Id.vbs
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataAgrYXqvU.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataBXpKTjRE.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataEHCgjwEU.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataGBsLLrRN.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataJIKawXjD.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataJaavKlQS.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataMwoscjvf.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataOkwBKOVT.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataQduyKGov.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataQeSjVzIZ.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataQusNBrHR.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataSJubBUuq.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataSojrcmUK.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataUvBHOTmz.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataWJHHDcgI.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataXHmOQNcn.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataYDwqSImV.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataYcBvAOIs.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDatabAqDBDQx.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDatadMAuPpXP.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDatadxlIRQxn.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDatagUhjsYUm.txt
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDatakfcNOgdK.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDatakrnXjDpS.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDatalMReqyDc.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataloUgZKVK.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDatalpqVYngJ.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDatamftqRlyP.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataoZHPMIPe.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataplcniLBk.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDatarxjoXUur.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDatasTLASBBX.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDatasTikdtTB.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDatatkwhzWpE.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDatawyUxZCIx.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataxcLNpFXH.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDatayYYgRewy.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\KeyDataytxpjpTS.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\LogabacusPqxXfnFffmMmEflyaway
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\WebData
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\cookies.db
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\cookies.db-shm
data
dropped
There are 36 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Facturas.exe
"C:\Users\user\Desktop\Facturas.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Id.vbs"
malicious
C:\Users\user\AppData\Roaming\Id.exe
"C:\Users\user\AppData\Roaming\Id.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious

URLs

Name
IP
Malicious
http://showip.netdD
unknown
https://fundingchoicesmessages.google.com/i/pub-8790158038613050?ers=1
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://showip.netth?
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://showip.net/R
unknown
https://github.com/mgravell/protobuf-net
unknown
http://showip.net/Z
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://showip.net/g
unknown
http://showip.net/
unknown
http://showip.net/e1
unknown
http://showip.net
unknown
http://showip.nets
unknown
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
showip.net
162.55.60.2

IPs

IP
Domain
Country
Malicious
162.55.60.2
showip.net
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
3F10000
trusted library allocation
page read and write
malicious
3FBA000
trusted library allocation
page read and write
malicious
2DF1000
trusted library allocation
page read and write
malicious
2B21000
trusted library allocation
page read and write
malicious
4070000
trusted library allocation
page read and write
malicious
3DD3000
trusted library allocation
page read and write
malicious
3D59000
trusted library allocation
page read and write
malicious
5B70000
trusted library section
page read and write
malicious
401000
remote allocation
page execute and read and write
malicious
1FA3DF80000
heap
page read and write
360E000
stack
page read and write
2DD0000
trusted library allocation
page read and write
5390000
heap
page read and write
3162000
trusted library allocation
page read and write
3367000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
2F99000
trusted library allocation
page read and write
31D6000
trusted library allocation
page read and write
2FC9000
trusted library allocation
page read and write
3041000
trusted library allocation
page read and write
7FE000
stack
page read and write
43E000
remote allocation
page execute and read and write
2DCE000
trusted library allocation
page read and write
4DF8000
trusted library allocation
page read and write
2FDB000
trusted library allocation
page read and write
2FCE000
trusted library allocation
page read and write
3F06000
trusted library allocation
page read and write
2CED000
trusted library allocation
page read and write
3087000
trusted library allocation
page read and write
2CD6000
trusted library allocation
page read and write
1FA3E156000
heap
page read and write
3070000
trusted library allocation
page read and write
3487000
trusted library allocation
page read and write
2F78000
trusted library allocation
page read and write
3325000
trusted library allocation
page read and write
2A6E000
stack
page read and write
14CC000
stack
page read and write
2DD4000
trusted library allocation
page read and write
31DB000
trusted library allocation
page read and write
348F000
trusted library allocation
page read and write
2FDF000
trusted library allocation
page read and write
3476000
trusted library allocation
page read and write
31B5000
trusted library allocation
page read and write
F73000
heap
page read and write
1178000
heap
page read and write
3072000
trusted library allocation
page read and write
30C3000
trusted library allocation
page read and write
32F1000
trusted library allocation
page read and write
3035000
trusted library allocation
page read and write
2DBB000
trusted library allocation
page read and write
505E000
stack
page read and write
54EA000
trusted library allocation
page read and write
34C9000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
30D3000
trusted library allocation
page read and write
73D00000
unkown
page readonly
341E000
trusted library allocation
page read and write
2FF2000
trusted library allocation
page read and write
3277000
trusted library allocation
page read and write
3149000
trusted library allocation
page read and write
313F000
trusted library allocation
page read and write
3457000
trusted library allocation
page read and write
34BA000
trusted library allocation
page read and write
3470000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
7A0000
heap
page read and write
5682000
trusted library allocation
page read and write
2D7F000
trusted library allocation
page read and write
2ABE000
stack
page read and write
576E000
stack
page read and write
400000
remote allocation
page execute and read and write
52EE000
stack
page read and write
3194000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
F1E000
stack
page read and write
3C90000
heap
page read and write
30DC000
trusted library allocation
page read and write
7FB000
stack
page read and write
6020000
heap
page read and write
288E000
stack
page read and write
337E000
trusted library allocation
page read and write
305F000
trusted library allocation
page read and write
66BE000
stack
page read and write
2830000
heap
page read and write
3015000
trusted library allocation
page read and write
3052000
trusted library allocation
page read and write
2FEA000
trusted library allocation
page read and write
D20000
heap
page read and write
30A2000
trusted library allocation
page read and write
3132000
trusted library allocation
page read and write
D30000
heap
page read and write
2E63000
trusted library allocation
page read and write
3115000
trusted library allocation
page read and write
3273000
trusted library allocation
page read and write
5A33000
heap
page read and write
30A0000
trusted library allocation
page read and write
2F88000
trusted library allocation
page read and write
FF3000
heap
page read and write
F20000
heap
page read and write
3053000
trusted library allocation
page read and write
31F1000
trusted library allocation
page read and write
32CC000
trusted library allocation
page read and write
2D71000
trusted library allocation
page read and write
2CF9000
trusted library allocation
page read and write
3009000
trusted library allocation
page read and write
303D000
trusted library allocation
page read and write
3061000
trusted library allocation
page read and write
2CDA000
trusted library allocation
page read and write
33E2000
trusted library allocation
page read and write
3EA9000
trusted library allocation
page read and write
1138000
heap
page read and write
30C6000
trusted library allocation
page read and write
3192000
trusted library allocation
page read and write
2CAC000
trusted library allocation
page read and write
313C000
trusted library allocation
page read and write
2E48000
trusted library allocation
page read and write
3461000
trusted library allocation
page read and write
2FE9000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
306C000
trusted library allocation
page read and write
5A82000
heap
page read and write
2FBE000
trusted library allocation
page read and write
2FF8000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
3361000
trusted library allocation
page read and write
2CE4000
trusted library allocation
page read and write
338F000
trusted library allocation
page read and write
D74000
trusted library allocation
page read and write
3412000
trusted library allocation
page read and write
3051000
trusted library allocation
page read and write
5A12000
heap
page read and write
378D000
stack
page read and write
2C98000
trusted library allocation
page read and write
28CD000
stack
page read and write
30DB000
trusted library allocation
page read and write
3049000
trusted library allocation
page read and write
2967000
heap
page read and write
B9A000
stack
page read and write
307F000
trusted library allocation
page read and write
BBC000
stack
page read and write
33DE000
trusted library allocation
page read and write
DA2000
trusted library allocation
page read and write
A1FD4FF000
stack
page read and write
2E46000
trusted library allocation
page read and write
33B2000
trusted library allocation
page read and write
307C000
trusted library allocation
page read and write
33D7000
trusted library allocation
page read and write
3198000
trusted library allocation
page read and write
3308000
trusted library allocation
page read and write
2E04000
trusted library allocation
page read and write
3365000
trusted library allocation
page read and write
11DB000
heap
page read and write
2B0C000
trusted library allocation
page read and write
42B000
remote allocation
page execute and read and write
2FB6000
trusted library allocation
page read and write
3213000
trusted library allocation
page read and write
2D9E000
trusted library allocation
page read and write
2FC4000
trusted library allocation
page read and write
2FAE000
trusted library allocation
page read and write
368F000
stack
page read and write
30C5000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
2DDC000
trusted library allocation
page read and write
FBE000
stack
page read and write
5420000
trusted library allocation
page read and write
13FD000
trusted library allocation
page execute and read and write
30F6000
trusted library allocation
page read and write
2D7D000
trusted library allocation
page read and write
3393000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
30B1000
trusted library allocation
page read and write
2DF3000
trusted library allocation
page read and write
3004000
trusted library allocation
page read and write
2D47000
trusted library allocation
page read and write
F56000
heap
page read and write
3493000
trusted library allocation
page read and write
3024000
trusted library allocation
page read and write
2CA6000
trusted library allocation
page read and write
7FFB1E3A0000
unkown
page readonly
2F82000
trusted library allocation
page read and write
D7D000
trusted library allocation
page execute and read and write
327D000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
CD0000
heap
page read and write
344D000
trusted library allocation
page read and write
3395000
trusted library allocation
page read and write
2C85000
trusted library allocation
page read and write
333C000
trusted library allocation
page read and write
3029000
trusted library allocation
page read and write
313A000
trusted library allocation
page read and write
2F42000
trusted library allocation
page read and write
2DF1000
trusted library allocation
page read and write
122A000
heap
page read and write
301B000
trusted library allocation
page read and write
2FFA000
trusted library allocation
page read and write
3166000
trusted library allocation
page read and write
2C7F000
trusted library allocation
page read and write
3153000
trusted library allocation
page read and write
3179000
trusted library allocation
page read and write
5D0E000
stack
page read and write
347D000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
2B0E000
trusted library allocation
page read and write
1184000
heap
page read and write
304A000
trusted library allocation
page read and write
F3E000
heap
page read and write
30C0000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
3306000
trusted library allocation
page read and write
2E5F000
trusted library allocation
page read and write
3006000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
3442000
trusted library allocation
page read and write
27D0000
heap
page read and write
2CF1000
trusted library allocation
page read and write
32D3000
trusted library allocation
page read and write
EF7000
stack
page read and write
5070000
trusted library allocation
page read and write
3202000
trusted library allocation
page read and write
336C000
trusted library allocation
page read and write
3138000
trusted library allocation
page read and write
2D77000
trusted library allocation
page read and write
2D7B000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
65BE000
stack
page read and write
3321000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
335B000
trusted library allocation
page read and write
28CD000
stack
page read and write
3440000
trusted library allocation
page read and write
A9B000
stack
page read and write
304C000
trusted library allocation
page read and write
3275000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
347A000
trusted library allocation
page read and write
3135000
trusted library allocation
page read and write
11F9000
heap
page read and write
FD0000
heap
page read and write
2CC3000
trusted library allocation
page read and write
FB6000
heap
page read and write
2B70000
trusted library allocation
page read and write
58C5000
trusted library allocation
page read and write
3350000
trusted library allocation
page read and write
73C000
stack
page read and write
348D000
trusted library allocation
page read and write
3090000
trusted library allocation
page read and write
2E4C000
trusted library allocation
page read and write
2FC6000
trusted library allocation
page read and write
309E000
trusted library allocation
page read and write
2FCA000
trusted library allocation
page read and write
2DD6000
trusted library allocation
page read and write
33E4000
trusted library allocation
page read and write
1027000
heap
page read and write
411000
remote allocation
page execute and read and write
13F0000
trusted library allocation
page read and write
3109000
trusted library allocation
page read and write
2E18000
trusted library allocation
page read and write
346E000
trusted library allocation
page read and write
1422000
trusted library allocation
page read and write
652F000
stack
page read and write
54B0000
trusted library allocation
page execute and read and write
2FCD000
trusted library allocation
page read and write
2DF5000
trusted library allocation
page read and write
58E6000
trusted library allocation
page read and write
2E2B000
trusted library allocation
page read and write
3092000
trusted library allocation
page read and write
66C0000
heap
page read and write
3083000
trusted library allocation
page read and write
2D8E000
trusted library allocation
page read and write
3117000
trusted library allocation
page read and write
D28000
heap
page read and write
345D000
trusted library allocation
page read and write
3416000
trusted library allocation
page read and write
2DA9000
trusted library allocation
page read and write
3106000
trusted library allocation
page read and write
311D000
trusted library allocation
page read and write
2D5C000
trusted library allocation
page read and write
1FA3E060000
heap
page read and write
3152000
trusted library allocation
page read and write
31ED000
trusted library allocation
page read and write
343C000
trusted library allocation
page read and write
56D2000
trusted library allocation
page read and write
343A000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
1FA3E17D000
heap
page read and write
4250000
heap
page read and write
32CE000
trusted library allocation
page read and write
2C96000
trusted library allocation
page read and write
5475000
trusted library allocation
page read and write
7FFB1E3B6000
unkown
page readonly
E54000
heap
page read and write
2E44000
trusted library allocation
page read and write
5A8E000
heap
page read and write
330C000
trusted library allocation
page read and write
308E000
trusted library allocation
page read and write
2CE2000
trusted library allocation
page read and write
1416000
trusted library allocation
page execute and read and write
54DD000
trusted library allocation
page read and write
3B0C000
stack
page read and write
2FF0000
trusted library allocation
page read and write
3158000
trusted library allocation
page read and write
2CA8000
trusted library allocation
page read and write
3028000
trusted library allocation
page read and write
2E12000
trusted library allocation
page read and write
ECB000
heap
page read and write
B70000
heap
page read and write
2C94000
trusted library allocation
page read and write
DA7000
trusted library allocation
page execute and read and write
3494000
heap
page read and write
5C70000
trusted library allocation
page execute and read and write
3082000
trusted library allocation
page read and write
5790000
trusted library allocation
page execute and read and write
3D4D000
trusted library allocation
page read and write
4F8E000
stack
page read and write
316C000
trusted library allocation
page read and write
2DA6000
trusted library allocation
page read and write
370F000
stack
page read and write
30FB000
trusted library allocation
page read and write
311B000
trusted library allocation
page read and write
30E4000
trusted library allocation
page read and write
3399000
trusted library allocation
page read and write
39C0000
heap
page read and write
55E0000
trusted library allocation
page execute and read and write
FE0000
heap
page read and write
7FFB1E3C0000
unkown
page read and write
3478000
trusted library allocation
page read and write
5A69000
heap
page read and write
3B45000
trusted library allocation
page read and write
2D22000
trusted library allocation
page read and write
32DF000
trusted library allocation
page read and write
34CF000
trusted library allocation
page read and write
2FEC000
trusted library allocation
page read and write
300B000
trusted library allocation
page read and write
2DD2000
trusted library allocation
page read and write
2D9C000
trusted library allocation
page read and write
334C000
trusted library allocation
page read and write
1130000
heap
page read and write
31D8000
trusted library allocation
page read and write
2E1A000
trusted library allocation
page read and write
554E000
stack
page read and write
38CE000
stack
page read and write
3B77000
heap
page read and write
2DEB000
trusted library allocation
page read and write
2D2A000
trusted library allocation
page read and write
5690000
trusted library allocation
page execute and read and write
5C50000
trusted library allocation
page execute and read and write
30AB000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
32B1000
trusted library allocation
page read and write
30AF000
trusted library allocation
page read and write
3002000
trusted library allocation
page read and write
32EF000
trusted library allocation
page read and write
302F000
trusted library allocation
page read and write
3011000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
A1FD9FD000
stack
page read and write
3423000
trusted library allocation
page read and write
D96000
trusted library allocation
page execute and read and write
3170000
trusted library allocation
page read and write
2CF7000
trusted library allocation
page read and write
315C000
trusted library allocation
page read and write
2C9A000
trusted library allocation
page read and write
5C80000
trusted library section
page read and write
304D000
trusted library allocation
page read and write
32C0000
heap
page read and write
2D58000
trusted library allocation
page read and write
302B000
trusted library allocation
page read and write
56D0000
trusted library allocation
page read and write
5C10000
trusted library allocation
page execute and read and write
32CA000
trusted library allocation
page read and write
30A4000
trusted library allocation
page read and write
43D000
remote allocation
page execute and read and write
40F0000
heap
page read and write
2E65000
trusted library allocation
page read and write
31D2000
trusted library allocation
page read and write
3121000
trusted library allocation
page read and write
D3C000
heap
page read and write
2FAC000
trusted library allocation
page read and write
5445000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
2DC4000
trusted library allocation
page read and write
3481000
trusted library allocation
page read and write
2E14000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
73D01000
unkown
page execute read
2FE7000
trusted library allocation
page read and write
3495000
trusted library allocation
page read and write
33FD000
trusted library allocation
page read and write
33D3000
trusted library allocation
page read and write
3204000
trusted library allocation
page read and write
2FAA000
trusted library allocation
page read and write
642E000
stack
page read and write
5A15000
heap
page read and write
331F000
trusted library allocation
page read and write
2963000
heap
page read and write
425000
remote allocation
page execute and read and write
303F000
trusted library allocation
page read and write
1FA3E194000
heap
page read and write
2D62000
trusted library allocation
page read and write
10E0000
heap
page read and write
3459000
trusted library allocation
page read and write
73D16000
unkown
page readonly
306A000
trusted library allocation
page read and write
2D5E000
trusted library allocation
page read and write
300D000
trusted library allocation
page read and write
2FF8000
trusted library allocation
page read and write
33D9000
trusted library allocation
page read and write
30E6000
trusted library allocation
page read and write
B65000
heap
page read and write
2DA4000
trusted library allocation
page read and write
34CD000
trusted library allocation
page read and write
1FA3E1EE000
heap
page read and write
53EE000
stack
page read and write
35AE000
stack
page read and write
2FB0000
trusted library allocation
page read and write
3453000
trusted library allocation
page read and write
5440000
heap
page execute and read and write
3298000
trusted library allocation
page read and write
2E33000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
2814000
heap
page read and write
118A000
heap
page read and write
316E000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
1FA3E32B000
heap
page read and write
2E67000
trusted library allocation
page read and write
F64000
heap
page read and write
3000000
trusted library allocation
page read and write
427000
remote allocation
page execute and read and write
331D000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
3033000
trusted library allocation
page read and write
5C20000
trusted library allocation
page execute and read and write
33D5000
trusted library allocation
page read and write
30F7000
trusted library allocation
page read and write
3066000
trusted library allocation
page read and write
603C000
heap
page read and write
54C0000
trusted library allocation
page read and write
30F2000
trusted library allocation
page read and write
313D000
trusted library allocation
page read and write
D2E000
stack
page read and write
3115000
trusted library allocation
page read and write
56DA000
trusted library allocation
page read and write
2E61000
trusted library allocation
page read and write
302D000
trusted library allocation
page read and write
31BF000
trusted library allocation
page read and write
309F000
trusted library allocation
page read and write
33EF000
trusted library allocation
page read and write
73D1D000
unkown
page read and write
2F9D000
trusted library allocation
page read and write
3149000
trusted library allocation
page read and write
B60000
heap
page read and write
A1FDBFE000
stack
page read and write
385E000
stack
page read and write
FAB000
heap
page read and write
3125000
trusted library allocation
page read and write
34AC000
stack
page read and write
3304000
trusted library allocation
page read and write
2CBF000
trusted library allocation
page read and write
2D28000
trusted library allocation
page read and write
292D000
stack
page read and write
E0E000
stack
page read and write
73D1D000
unkown
page read and write
2968000
heap
page read and write
3046000
trusted library allocation
page read and write
30A7000
trusted library allocation
page read and write
33FD000
stack
page read and write
2CF5000
trusted library allocation
page read and write
2FD2000
trusted library allocation
page read and write
3123000
trusted library allocation
page read and write
2D26000
trusted library allocation
page read and write
5080000
heap
page execute and read and write
2D75000
trusted library allocation
page read and write
E2A000
heap
page read and write
2FE3000
trusted library allocation
page read and write
2D08000
trusted library allocation
page read and write
56C0000
trusted library allocation
page execute and read and write
2CAA000
trusted library allocation
page read and write
30C2000
trusted library allocation
page read and write
A00000
unkown
page readonly
D73000
trusted library allocation
page execute and read and write
31BB000
trusted library allocation
page read and write
3007000
trusted library allocation
page read and write
32AB000
trusted library allocation
page read and write
FE5000
heap
page read and write
11E0000
heap
page read and write
2B40000
heap
page read and write
333E000
trusted library allocation
page read and write
2CAE000
trusted library allocation
page read and write
2FEE000
trusted library allocation
page read and write
2FDB000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
5FE0000
trusted library allocation
page execute and read and write
A02000
unkown
page readonly
13E0000
trusted library allocation
page read and write
32AF000
trusted library allocation
page read and write
3156000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
2B1E000
stack
page read and write
2FEB000
trusted library allocation
page read and write
4253000
heap
page read and write
D7E000
heap
page read and write
31BD000
trusted library allocation
page read and write
326F000
trusted library allocation
page read and write
347F000
trusted library allocation
page read and write
318A000
trusted library allocation
page read and write
341C000
trusted library allocation
page read and write
3455000
trusted library allocation
page read and write
2FD9000
trusted library allocation
page read and write
73D1D000
unkown
page read and write
334E000
trusted library allocation
page read and write
D76000
heap
page read and write
2FA2000
trusted library allocation
page read and write
30C1000
trusted library allocation
page read and write
33B6000
trusted library allocation
page read and write
3279000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
A1FD6FE000
stack
page read and write
30D7000
trusted library allocation
page read and write
3177000
trusted library allocation
page read and write
3064000
trusted library allocation
page read and write
2E35000
trusted library allocation
page read and write
2B10000
heap
page execute and read and write
30DF000
trusted library allocation
page read and write
3386000
trusted library allocation
page read and write
32E7000
trusted library allocation
page read and write
13F4000
trusted library allocation
page read and write
3143000
trusted library allocation
page read and write
31E9000
trusted library allocation
page read and write
345B000
trusted library allocation
page read and write
1FA3E080000
heap
page read and write
2E4A000
trusted library allocation
page read and write
339F000
trusted library allocation
page read and write
3323000
trusted library allocation
page read and write
51EE000
stack
page read and write
1427000
trusted library allocation
page execute and read and write
3011000
trusted library allocation
page read and write
2D45000
trusted library allocation
page read and write
39D5000
heap
page read and write
5B60000
trusted library allocation
page execute and read and write
2FD7000
trusted library allocation
page read and write
318C000
trusted library allocation
page read and write
42C000
remote allocation
page execute and read and write
3157000
trusted library allocation
page read and write
122E000
heap
page read and write
33DC000
trusted library allocation
page read and write
3445000
trusted library allocation
page read and write
129D000
stack
page read and write
1FA3E167000
heap
page read and write
333A000
trusted library allocation
page read and write
32A9000
trusted library allocation
page read and write
3B60000
heap
page read and write
F20000
heap
page read and write
5430000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
2FE5000
trusted library allocation
page read and write
F73000
heap
page read and write
30C9000
trusted library allocation
page read and write
3C1F000
trusted library allocation
page read and write
CE5000
heap
page read and write
CCF000
stack
page read and write
2AC0000
heap
page read and write
3168000
trusted library allocation
page read and write
3031000
trusted library allocation
page read and write
3164000
trusted library allocation
page read and write
38B0000
heap
page read and write
6560000
trusted library allocation
page execute and read and write
34D1000
trusted library allocation
page read and write
3345000
trusted library allocation
page read and write
319B000
trusted library allocation
page read and write
2CCA000
trusted library allocation
page read and write
101F000
stack
page read and write
33E6000
trusted library allocation
page read and write
2FF6000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
347E000
stack
page read and write
30D5000
trusted library allocation
page read and write
1FA3E141000
heap
page read and write
30A6000
trusted library allocation
page read and write
32C4000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
F77000
heap
page read and write
2FF2000
trusted library allocation
page read and write
30F5000
trusted library allocation
page read and write
34A4000
trusted library allocation
page read and write
541E000
trusted library allocation
page read and write
33EB000
trusted library allocation
page read and write
2FE6000
trusted library allocation
page read and write
3119000
trusted library allocation
page read and write
330E000
trusted library allocation
page read and write
388F000
stack
page read and write
A1FDAFE000
stack
page read and write
3175000
trusted library allocation
page read and write
31B7000
trusted library allocation
page read and write
13F3000
trusted library allocation
page execute and read and write
3BE8000
trusted library allocation
page read and write
1FA3FC20000
heap
page read and write
3363000
trusted library allocation
page read and write
D70000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
339B000
trusted library allocation
page read and write
1028000
trusted library allocation
page read and write
2B00000
trusted library allocation
page read and write
3136000
trusted library allocation
page read and write
308C000
trusted library allocation
page read and write
30D9000
trusted library allocation
page read and write
3253000
trusted library allocation
page read and write
30C4000
trusted library allocation
page read and write
314B000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
2DED000
trusted library allocation
page read and write
3AF0000
heap
page read and write
3391000
trusted library allocation
page read and write
5D20000
trusted library allocation
page execute and read and write
3147000
trusted library allocation
page read and write
56E0000
trusted library allocation
page execute and read and write
5940000
trusted library allocation
page read and write
5060000
trusted library allocation
page read and write
2E38000
trusted library allocation
page read and write
304E000
trusted library allocation
page read and write
2D2C000
trusted library allocation
page read and write
301D000
trusted library allocation
page read and write
2FDE000
trusted library allocation
page read and write
3489000
trusted library allocation
page read and write
2E69000
trusted library allocation
page read and write
2B70000
heap
page read and write
3414000
trusted library allocation
page read and write
3119000
trusted library allocation
page read and write
1FA3E138000
heap
page read and write
327B000
trusted library allocation
page read and write
5550000
trusted library section
page read and write
412000
remote allocation
page execute and read and write
2D5A000
trusted library allocation
page read and write
30A9000
trusted library allocation
page read and write
3382000
trusted library allocation
page read and write
30A5000
trusted library allocation
page read and write
E61000
heap
page read and write
3357000
trusted library allocation
page read and write
2DB0000
heap
page execute and read and write
2CFE000
trusted library allocation
page read and write
317F000
trusted library allocation
page read and write
1120000
heap
page read and write
3400000
heap
page read and write
3402000
trusted library allocation
page read and write
2C90000
trusted library allocation
page read and write
E20000
heap
page read and write
30F8000
trusted library allocation
page read and write
317B000
trusted library allocation
page read and write
314D000
trusted library allocation
page read and write
3A0D000
stack
page read and write
32A1000
trusted library allocation
page read and write
5C60000
trusted library allocation
page read and write
307A000
trusted library allocation
page read and write
34C7000
trusted library allocation
page read and write
2D2F000
trusted library allocation
page read and write
2960000
heap
page read and write
3065000
trusted library allocation
page read and write
307B000
trusted library allocation
page read and write
32EB000
trusted library allocation
page read and write
30CA000
trusted library allocation
page read and write
309C000
trusted library allocation
page read and write
43F000
remote allocation
page execute and read and write
D94000
heap
page read and write
2FB2000
trusted library allocation
page read and write
3154000
trusted library allocation
page read and write
3057000
trusted library allocation
page read and write
339D000
trusted library allocation
page read and write
32ED000
trusted library allocation
page read and write
32AD000
trusted library allocation
page read and write
311B000
trusted library allocation
page read and write
2D7E000
stack
page read and write
E2E000
heap
page read and write
30A3000
trusted library allocation
page read and write
D8D000
trusted library allocation
page execute and read and write
317D000
trusted library allocation
page read and write
2C9C000
trusted library allocation
page read and write
2960000
heap
page read and write
11C1000
heap
page read and write
2D80000
trusted library allocation
page execute and read and write
305A000
trusted library allocation
page read and write
14D0000
heap
page read and write
315A000
trusted library allocation
page read and write
30C7000
trusted library allocation
page read and write
F70000
heap
page read and write
2D9A000
trusted library allocation
page read and write
4C1E000
stack
page read and write
2D3D000
trusted library allocation
page read and write
3068000
trusted library allocation
page read and write
5466000
trusted library allocation
page read and write
423000
remote allocation
page execute and read and write
2E6B000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
3155000
trusted library allocation
page read and write
57B0000
heap
page read and write
115D000
stack
page read and write
311D000
trusted library allocation
page read and write
12D0000
heap
page read and write
3449000
trusted library allocation
page read and write
33AF000
stack
page read and write
306E000
trusted library allocation
page read and write
2DBD000
trusted library allocation
page read and write
3063000
trusted library allocation
page read and write
2FFA000
trusted library allocation
page read and write
148E000
stack
page read and write
2FCC000
trusted library allocation
page read and write
2DBF000
trusted library allocation
page read and write
328E000
trusted library allocation
page read and write
337C000
trusted library allocation
page read and write
31B9000
trusted library allocation
page read and write
7B0000
heap
page read and write
3044000
trusted library allocation
page read and write
2CA0000
trusted library allocation
page read and write
2C92000
trusted library allocation
page read and write
1412000
trusted library allocation
page read and write
3410000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
5B10000
trusted library section
page read and write
3290000
trusted library allocation
page read and write
10EE000
stack
page read and write
545F000
trusted library allocation
page read and write
A1FD3FE000
stack
page read and write
DA0000
heap
page read and write
7FFB1E3C5000
unkown
page readonly
33F9000
trusted library allocation
page read and write
1FA3E325000
heap
page read and write
314F000
trusted library allocation
page read and write
375E000
stack
page read and write
3167000
trusted library allocation
page read and write
F50000
trusted library allocation
page execute read
2E31000
trusted library allocation
page read and write
D92000
trusted library allocation
page read and write
3037000
trusted library allocation
page read and write
2CFB000
trusted library allocation
page read and write
34CB000
trusted library allocation
page read and write
31B3000
trusted library allocation
page read and write
3141000
trusted library allocation
page read and write
32C8000
trusted library allocation
page read and write
3067000
trusted library allocation
page read and write
3081000
trusted library allocation
page read and write
D89000
trusted library allocation
page read and write
2CEB000
trusted library allocation
page read and write
301A000
trusted library allocation
page read and write
1035000
heap
page read and write
2FCF000
trusted library allocation
page read and write
2D90000
heap
page read and write
2DDA000
trusted library allocation
page read and write
5A10000
heap
page read and write
440000
remote allocation
page execute and read and write
3013000
trusted library allocation
page read and write
3084000
trusted library allocation
page read and write
2FD1000
trusted library allocation
page read and write
2CC7000
trusted library allocation
page read and write
1110000
heap
page read and write
EFE000
heap
page read and write
32E9000
trusted library allocation
page read and write
4040000
heap
page read and write
30AD000
trusted library allocation
page read and write
3B21000
trusted library allocation
page read and write
3338000
trusted library allocation
page read and write
2F9B000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
1011000
heap
page read and write
57A0000
trusted library allocation
page execute and read and write
2B80000
trusted library allocation
page read and write
329D000
trusted library allocation
page read and write
40F3000
heap
page read and write
305D000
trusted library allocation
page read and write
5A3F000
heap
page read and write
32C2000
trusted library allocation
page read and write
3145000
trusted library allocation
page read and write
3418000
trusted library allocation
page read and write
310C000
trusted library allocation
page read and write
3190000
trusted library allocation
page read and write
2C81000
trusted library allocation
page read and write
13DE000
stack
page read and write
2CDC000
trusted library allocation
page read and write
2ACF000
stack
page read and write
2CBD000
trusted library allocation
page read and write
31D4000
trusted library allocation
page read and write
3369000
trusted library allocation
page read and write
30E4000
trusted library allocation
page read and write
DAB000
trusted library allocation
page execute and read and write
2CDE000
trusted library allocation
page read and write
2FF4000
trusted library allocation
page read and write
309A000
trusted library allocation
page read and write
2FC8000
trusted library allocation
page read and write
3311000
trusted library allocation
page read and write
306B000
trusted library allocation
page read and write
E10000
trusted library allocation
page execute and read and write
3DF1000
trusted library allocation
page read and write
304F000
trusted library allocation
page read and write
5473000
trusted library allocation
page read and write
343E000
trusted library allocation
page read and write
32D0000
trusted library allocation
page read and write
3421000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
3264000
trusted library allocation
page read and write
2D4A000
trusted library allocation
page read and write
114B000
heap
page read and write
39CF000
stack
page read and write
2FB8000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
33FF000
trusted library allocation
page read and write
335F000
trusted library allocation
page read and write
3055000
trusted library allocation
page read and write
2AF0000
trusted library allocation
page read and write
318E000
trusted library allocation
page read and write
3328000
trusted library allocation
page read and write
2970000
heap
page read and write
30DE000
trusted library allocation
page read and write
2D18000
trusted library allocation
page read and write
125E000
stack
page read and write
3069000
trusted library allocation
page read and write
7FFB1E3C2000
unkown
page readonly
3256000
trusted library allocation
page read and write
CE0000
heap
page read and write
30BE000
trusted library allocation
page read and write
424000
remote allocation
page execute and read and write
35B0000
heap
page read and write
3009000
trusted library allocation
page read and write
30DA000
trusted library allocation
page read and write
301C000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
3013000
trusted library allocation
page read and write
300D000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
A1FD2FA000
stack
page read and write
2D0C000
trusted library allocation
page read and write
3173000
trusted library allocation
page read and write
2DC1000
trusted library allocation
page read and write
3251000
trusted library allocation
page read and write
28E0000
heap
page read and write
5410000
trusted library allocation
page read and write
302A000
trusted library allocation
page read and write
3026000
trusted library allocation
page read and write
30DD000
trusted library allocation
page read and write
2DD8000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
30CC000
trusted library allocation
page read and write
3430000
heap
page read and write
2D73000
trusted library allocation
page read and write
F12000
heap
page read and write
2FB4000
trusted library allocation
page read and write
A1FDCFB000
stack
page read and write
43C000
remote allocation
page execute and read and write
3098000
trusted library allocation
page read and write
3089000
trusted library allocation
page read and write
2EFF000
trusted library allocation
page read and write
141A000
trusted library allocation
page execute and read and write
2810000
heap
page read and write
41E0000
heap
page read and write
3085000
trusted library allocation
page read and write
31CE000
trusted library allocation
page read and write
3151000
trusted library allocation
page read and write
2CD8000
trusted library allocation
page read and write
304B000
trusted library allocation
page read and write
341A000
trusted library allocation
page read and write
AFB000
stack
page read and write
1400000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
31EF000
trusted library allocation
page read and write
2D24000
trusted library allocation
page read and write
5E2F000
stack
page read and write
30FD000
trusted library allocation
page read and write
3336000
trusted library allocation
page read and write
3474000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
3342000
trusted library allocation
page read and write
2FFC000
trusted library allocation
page read and write
3095000
trusted library allocation
page read and write
121A000
heap
page read and write
30FA000
trusted library allocation
page read and write
2FBA000
trusted library allocation
page read and write
DCE000
heap
page read and write
32C6000
trusted library allocation
page read and write
30E2000
trusted library allocation
page read and write
30CC000
trusted library allocation
page read and write
140D000
trusted library allocation
page execute and read and write
2D8B000
trusted library allocation
page read and write
3296000
trusted library allocation
page read and write
5770000
trusted library section
page read and write
2FFE000
trusted library allocation
page read and write
2F97000
trusted library allocation
page read and write
D9A000
trusted library allocation
page execute and read and write
2CC1000
trusted library allocation
page read and write
2B60000
heap
page read and write
2C9E000
trusted library allocation
page read and write
301E000
trusted library allocation
page read and write
10C0000
heap
page read and write
3490000
heap
page read and write
2DE0000
heap
page read and write
F30000
heap
page read and write
33AE000
trusted library allocation
page read and write
32F4000
trusted library allocation
page read and write
3491000
trusted library allocation
page read and write
2CC5000
trusted library allocation
page read and write
311F000
trusted library allocation
page read and write
73D1D000
unkown
page read and write
5C00000
trusted library allocation
page read and write
538E000
stack
page read and write
1FA3E1CE000
heap
page read and write
5930000
trusted library allocation
page execute and read and write
3022000
trusted library allocation
page read and write
33B4000
trusted library allocation
page read and write
348B000
trusted library allocation
page read and write
142B000
trusted library allocation
page execute and read and write
EF4000
heap
page read and write
D80000
trusted library allocation
page read and write
1030000
heap
page read and write
30FF000
trusted library allocation
page read and write
F3A000
heap
page read and write
E00000
heap
page read and write
2DE8000
heap
page read and write
302D000
trusted library allocation
page read and write
2C8E000
trusted library allocation
page read and write
3294000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
2800000
heap
page read and write
2D04000
trusted library allocation
page read and write
D00000
trusted library allocation
page execute read
2E1D000
trusted library allocation
page read and write
2E01000
trusted library allocation
page read and write
1FA3E320000
heap
page read and write
7FFB1E3A1000
unkown
page execute read
3397000
trusted library allocation
page read and write
28E9000
heap
page read and write
A1FD7FE000
stack
page read and write
73D1F000
unkown
page readonly
413000
remote allocation
page execute and read and write
32B4000
trusted library allocation
page read and write
426000
remote allocation
page execute and read and write
31D0000
trusted library allocation
page read and write
FBF000
heap
page read and write
5460000
trusted library allocation
page read and write
2D3F000
trusted library allocation
page read and write
32D5000
trusted library allocation
page read and write
1FA3E130000
heap
page read and write
33F7000
trusted library allocation
page read and write
33FB000
trusted library allocation
page read and write
3196000
trusted library allocation
page read and write
30E1000
trusted library allocation
page read and write
2FE1000
trusted library allocation
page read and write
2B49000
heap
page read and write
2DA2000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
AF7000
stack
page read and write
There are 937 hidden memdumps, click here to show them.