IOC Report
Factura Honorarios 2024-10.exe

loading gif

Files

File Path
Type
Category
Malicious
Factura Honorarios 2024-10.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\Modspiller.Ste
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\Pjaskeriers.fra
xBase index, root pointer 0x1c00, free node pointer 0xb80000, key length 0, index options (0)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\Unfleeing\cornetcies.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\Unfleeing\dmt.roi
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\Unfleeing\hisset.tjr
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\Unfleeing\juleriernes.lia
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\Unfleeing\matematikopgavens.sti
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\Unfleeing\tipssensationens.hve
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\akvarierne.lbe
data
dropped
C:\Users\user\AppData\Local\Temp\nsn497A.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Factura Honorarios 2024-10.exe
"C:\Users\user\Desktop\Factura Honorarios 2024-10.exe"
malicious
C:\Users\user\Desktop\Factura Honorarios 2024-10.exe
"C:\Users\user\Desktop\Factura Honorarios 2024-10.exe"
malicious

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://reallyfreegeoip.org/xml/173.254.250.78$
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://www.office.com/lB
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://drive.usercontent.google.com/
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://reallyfreegeoip.org/xml/173.254.250.78
188.114.97.3
http://nsis.sf.net/NSIS_ErrorError
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
http://varders.kozow.com:8081
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:928100%0D%0ADate%20and%20Time:%2031/10/2024%20/%2001:29:36%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20928100%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://checkip.dyndns.org/
132.226.8.169
https://drive.google.com/
unknown
https://drive.usercontent.google.com/Zc
unknown
http://anotherarmy.dns.army:8081
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:928100%0D%0ADate%20a
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
drive.google.com
216.58.206.46
drive.usercontent.google.com
142.250.185.193
checkip.dyndns.com
132.226.8.169

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
132.226.8.169
checkip.dyndns.com
United States
142.250.185.193
drive.usercontent.google.com
United States
216.58.206.46
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\annoterendes\Elektroniker162\skimlen
socialpensions
HKEY_CURRENT_USER\papercutting\Uninstall\antarchistic\Tarau
Backstay
HKEY_CURRENT_USER\hydrochlorate\pyloroplasty\Accessorily213
peppe
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-10_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-10_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-10_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-10_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-10_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-10_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-10_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-10_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-10_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-10_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-10_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-10_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-10_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-10_RASMANCS
FileDirectory
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
379A1000
trusted library allocation
page read and write
malicious
1862000
remote allocation
page execute and read and write
malicious
53B2000
direct allocation
page execute and read and write
malicious
547000
heap
page read and write
39C40000
trusted library allocation
page read and write
31A0000
direct allocation
page read and write
553000
heap
page read and write
426000
unkown
page read and write
39BC0000
trusted library allocation
page read and write
461000
unkown
page read and write
39B60000
trusted library allocation
page read and write
55B000
heap
page read and write
39BC0000
trusted library allocation
page read and write
36FFF000
stack
page read and write
219E000
stack
page read and write
3AD20000
trusted library allocation
page read and write
A0000
trusted library allocation
page read and write
3ADA0000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3AD30000
trusted library allocation
page read and write
38AC3000
trusted library allocation
page read and write
409000
unkown
page write copy
493000
unkown
page readonly
38CD7000
trusted library allocation
page read and write
55B000
heap
page read and write
D0000
heap
page execute and read and write
74FF000
heap
page read and write
37A83000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
3AE60000
trusted library allocation
page read and write
3AD30000
trusted library allocation
page read and write
553000
heap
page read and write
3AD20000
trusted library allocation
page read and write
37750000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
750D000
heap
page read and write
3AD20000
trusted library allocation
page read and write
409000
unkown
page read and write
409000
unkown
page write copy
39BC0000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
39B80000
trusted library allocation
page read and write
5319000
remote allocation
page execute and read and write
3AD20000
trusted library allocation
page read and write
39B60000
trusted library allocation
page read and write
525F000
heap
page read and write
462000
unkown
page readonly
19A000
stack
page read and write
553000
heap
page read and write
3AD20000
trusted library allocation
page read and write
379F8000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
51E000
heap
page read and write
51A000
heap
page read and write
389C9000
trusted library allocation
page read and write
80000
trusted library allocation
page read and write
31D0000
direct allocation
page read and write
3ACC0000
trusted library allocation
page read and write
7498000
heap
page read and write
3AEA0000
trusted library allocation
page execute and read and write
38A35000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
557000
heap
page read and write
3776A000
trusted library allocation
page read and write
5250000
direct allocation
page execute and read and write
465000
unkown
page readonly
3AD20000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
37BBD000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
7400000
direct allocation
page read and write
3AD20000
trusted library allocation
page read and write
283E000
heap
page read and write
38C2A000
trusted library allocation
page read and write
3A3B0000
heap
page read and write
37C87000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
2B19000
remote allocation
page execute and read and write
38A25000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3ADA0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
38A28000
trusted library allocation
page read and write
38D74000
trusted library allocation
page read and write
3AD90000
trusted library allocation
page read and write
557000
heap
page read and write
3AD20000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
3AD60000
trusted library allocation
page read and write
3AD60000
trusted library allocation
page execute and read and write
39BC0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AD30000
trusted library allocation
page read and write
39B60000
trusted library allocation
page read and write
42F000
unkown
page read and write
38D1C000
trusted library allocation
page read and write
3AD10000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
376AA000
stack
page read and write
2240000
heap
page read and write
7BB2000
direct allocation
page execute and read and write
39BC0000
trusted library allocation
page read and write
3AE80000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
CB000
trusted library allocation
page execute and read and write
38CFB000
trusted library allocation
page read and write
462000
unkown
page readonly
11E000
stack
page read and write
C7000
trusted library allocation
page execute and read and write
180000
heap
page read and write
38A00000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
557000
heap
page read and write
3AE60000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
38A31000
trusted library allocation
page read and write
39BE6000
trusted library allocation
page read and write
3ADA7000
trusted library allocation
page read and write
39BD0000
trusted library allocation
page read and write
39B60000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
38CBB000
trusted library allocation
page read and write
31F0000
direct allocation
page read and write
90000
trusted library allocation
page read and write
95F000
stack
page read and write
57B000
heap
page read and write
401000
unkown
page execute read
493000
unkown
page readonly
2250000
heap
page read and write
38A7C000
trusted library allocation
page read and write
510000
heap
page read and write
754D000
heap
page read and write
38CCD000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
58E000
heap
page read and write
38B4E000
trusted library allocation
page read and write
3ACD0000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
38CBF000
trusted library allocation
page read and write
37AA7000
trusted library allocation
page read and write
55B000
heap
page read and write
39BEA000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39B60000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3AD60000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3ACE0000
trusted library allocation
page read and write
3AD30000
trusted library allocation
page read and write
39B76000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
BA000
trusted library allocation
page execute and read and write
3AD20000
trusted library allocation
page read and write
3A3E5000
heap
page read and write
39B70000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
39BE0000
trusted library allocation
page read and write
39BD0000
trusted library allocation
page read and write
39B60000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3AD30000
trusted library allocation
page read and write
39B60000
trusted library allocation
page read and write
553000
heap
page read and write
3AD20000
trusted library allocation
page read and write
39BD0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
553000
heap
page read and write
39C60000
trusted library allocation
page read and write
37B55000
trusted library allocation
page read and write
4F0000
heap
page read and write
3ACE0000
trusted library allocation
page read and write
547000
heap
page read and write
39B70000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3A3DC000
heap
page read and write
407000
unkown
page readonly
7420000
direct allocation
page read and write
3AD20000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
38D14000
trusted library allocation
page read and write
39B70000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
37A06000
trusted library allocation
page read and write
557000
heap
page read and write
37A43000
trusted library allocation
page read and write
39BD0000
trusted library allocation
page read and write
3775B000
trusted library allocation
page read and write
3A34A000
heap
page read and write
3AE60000
trusted library allocation
page read and write
39B60000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
3AD90000
trusted library allocation
page read and write
7450000
direct allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AD90000
trusted library allocation
page read and write
3A7AD000
stack
page read and write
39B50000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
39C3E000
stack
page read and write
7410000
direct allocation
page read and write
39BC0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
7119000
remote allocation
page execute and read and write
3AD30000
trusted library allocation
page read and write
37A03000
trusted library allocation
page read and write
39BD0000
trusted library allocation
page read and write
3AD30000
trusted library allocation
page read and write
72D7000
heap
page read and write
67B2000
direct allocation
page execute and read and write
39C60000
trusted library allocation
page read and write
3A3BD000
heap
page read and write
39C40000
trusted library allocation
page read and write
3A3B0000
heap
page read and write
37782000
trusted library allocation
page read and write
3ACF0000
trusted library allocation
page read and write
3A231000
heap
page read and write
39C60000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3A383000
heap
page read and write
39BC0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
462000
unkown
page readonly
3AD20000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3AE80000
trusted library allocation
page read and write
3A3B0000
heap
page read and write
38CCA000
trusted library allocation
page read and write
407000
unkown
page readonly
3AD90000
trusted library allocation
page read and write
55B000
heap
page read and write
400000
unkown
page readonly
39BC0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3A3E8000
heap
page read and write
3AD30000
trusted library allocation
page read and write
39BD0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
553000
heap
page read and write
3AE60000
trusted library allocation
page read and write
55B000
heap
page read and write
3A82E000
stack
page read and write
7470000
direct allocation
page read and write
39BC0000
trusted library allocation
page read and write
3A330000
heap
page read and write
10000000
unkown
page readonly
37B51000
trusted library allocation
page read and write
71B2000
direct allocation
page execute and read and write
3AD20000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
4919000
remote allocation
page execute and read and write
39BC0000
trusted library allocation
page read and write
37CB6000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
38A51000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
39BF0000
heap
page execute and read and write
39C40000
trusted library allocation
page read and write
376B8000
trusted library allocation
page read and write
39B70000
trusted library allocation
page read and write
99B2000
direct allocation
page execute and read and write
389A1000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3AD90000
trusted library allocation
page read and write
3AE70000
trusted library allocation
page read and write
547000
heap
page read and write
39BD0000
trusted library allocation
page read and write
39A9E000
stack
page read and write
3AD30000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
37B86000
trusted library allocation
page read and write
48D000
unkown
page readonly
3AD60000
trusted library allocation
page read and write
3AE90000
trusted library allocation
page read and write
37790000
heap
page read and write
553000
heap
page read and write
373EF000
stack
page read and write
38B4C000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
7480000
direct allocation
page read and write
38A07000
trusted library allocation
page read and write
493000
unkown
page readonly
3AE80000
trusted library allocation
page read and write
3AE60000
trusted library allocation
page read and write
3AE80000
trusted library allocation
page read and write
38C67000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
283C000
heap
page read and write
3AEB0000
trusted library allocation
page read and write
39B60000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
37DF3000
trusted library allocation
page read and write
39BD0000
trusted library allocation
page read and write
3AD60000
trusted library allocation
page read and write
547000
heap
page read and write
557000
heap
page read and write
3AD20000
trusted library allocation
page read and write
3AEB0000
trusted library allocation
page read and write
93000
trusted library allocation
page execute and read and write
3AD20000
trusted library allocation
page read and write
39B70000
trusted library allocation
page read and write
38CF0000
trusted library allocation
page read and write
3AD30000
trusted library allocation
page read and write
3AD90000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3A3E7000
heap
page read and write
3AD20000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AD90000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
2210000
heap
page read and write
7250000
heap
page read and write
3AD20000
trusted library allocation
page read and write
22E9000
heap
page read and write
37D69000
trusted library allocation
page read and write
37776000
trusted library allocation
page read and write
3AD30000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
37756000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
283A000
heap
page read and write
39B60000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3AD30000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
B6000
trusted library allocation
page execute and read and write
37BED000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
4A0000
heap
page read and write
2838000
heap
page read and write
3AD90000
trusted library allocation
page read and write
39B90000
trusted library allocation
page read and write
45F000
unkown
page read and write
547000
heap
page read and write
3AD20000
trusted library allocation
page read and write
3AD60000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3519000
remote allocation
page execute and read and write
74D2000
heap
page read and write
38BF9000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AD90000
trusted library allocation
page read and write
37D0E000
trusted library allocation
page read and write
10005000
unkown
page readonly
39BD0000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
39C70000
heap
page read and write
3AD20000
trusted library allocation
page read and write
8F30000
direct allocation
page read and write
3AAEF000
stack
page read and write
39C60000
trusted library allocation
page read and write
547000
heap
page read and write
39BC0000
trusted library allocation
page read and write
407000
unkown
page readonly
578000
heap
page read and write
72D0000
heap
page read and write
8FB2000
direct allocation
page execute and read and write
5D19000
remote allocation
page execute and read and write
3630000
trusted library allocation
page read and write
39BC1000
trusted library allocation
page read and write
3A9AF000
stack
page read and write
3AD20000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
2220000
heap
page read and write
B0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39BD0000
trusted library allocation
page read and write
557000
heap
page read and write
3AD20000
trusted library allocation
page read and write
3775E000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
37BB0000
trusted library allocation
page read and write
7505000
heap
page read and write
421000
unkown
page read and write
3AD20000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3ACD0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
37A53000
trusted library allocation
page read and write
38B2B000
trusted library allocation
page read and write
38BFB000
trusted library allocation
page read and write
38A81000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
72D7000
heap
page read and write
37C57000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39B70000
trusted library allocation
page read and write
74F7000
heap
page read and write
38C20000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
7440000
direct allocation
page read and write
22E5000
heap
page read and write
4B0000
heap
page read and write
3AD20000
trusted library allocation
page read and write
48D000
unkown
page readonly
480000
unkown
page readonly
7549000
heap
page read and write
37A57000
trusted library allocation
page read and write
C5000
trusted library allocation
page execute and read and write
55B000
heap
page read and write
39C60000
trusted library allocation
page read and write
3745D000
stack
page read and write
39C60000
trusted library allocation
page read and write
472000
unkown
page readonly
37DC4000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3AD90000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
3170000
direct allocation
page read and write
3AD20000
trusted library allocation
page read and write
37A12000
trusted library allocation
page read and write
3AD60000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
557000
heap
page read and write
3AE80000
trusted library allocation
page read and write
2100000
heap
page read and write
3AD20000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3A3BD000
heap
page read and write
3AD20000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
472000
unkown
page readonly
39C4D000
trusted library allocation
page read and write
3A96E000
stack
page read and write
472000
unkown
page readonly
465000
unkown
page readonly
39C40000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
38B7C000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
3AD00000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
42A000
unkown
page read and write
3AD20000
trusted library allocation
page read and write
372A0000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3A3BD000
heap
page read and write
38AB4000
trusted library allocation
page read and write
3AD90000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39B70000
trusted library allocation
page read and write
22E0000
heap
page read and write
272E000
stack
page read and write
3AD30000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AD30000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39BC1000
trusted library allocation
page read and write
37B60000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
37897000
stack
page read and write
3AD20000
trusted library allocation
page read and write
39BD0000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
3AE70000
trusted library allocation
page read and write
37D96000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
38ADC000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
39B70000
trusted library allocation
page read and write
2119000
remote allocation
page execute and read and write
31B0000
direct allocation
page read and write
3AE90000
trusted library allocation
page read and write
37A5B000
trusted library allocation
page read and write
39BE0000
trusted library allocation
page read and write
7430000
direct allocation
page read and write
375FE000
stack
page read and write
3AD20000
trusted library allocation
page read and write
2838000
heap
page read and write
55B000
heap
page read and write
38CB4000
trusted library allocation
page read and write
38C58000
trusted library allocation
page read and write
37B8C000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39AA0000
trusted library allocation
page read and write
37CE7000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
480000
unkown
page readonly
472000
unkown
page readonly
38AE3000
trusted library allocation
page read and write
3AD50000
trusted library allocation
page execute and read and write
557000
heap
page read and write
B2000
trusted library allocation
page read and write
3160000
direct allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AD90000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
39B50000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39B60000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
38C1E000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3E6C000
stack
page read and write
3ADA0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3AE90000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
37B5B000
trusted library allocation
page read and write
2839000
heap
page read and write
AD000
trusted library allocation
page execute and read and write
7530000
heap
page read and write
39C60000
trusted library allocation
page read and write
160000
trusted library allocation
page execute and read and write
586000
heap
page read and write
39BC0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
487000
unkown
page readonly
39BC0000
trusted library allocation
page read and write
38CFD000
trusted library allocation
page read and write
C2000
trusted library allocation
page read and write
39B80000
trusted library allocation
page read and write
375C0000
remote allocation
page read and write
38C19000
trusted library allocation
page read and write
38CA7000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
38C0B000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3AD70000
trusted library allocation
page execute and read and write
3AD20000
trusted library allocation
page read and write
3ADB0000
trusted library allocation
page execute and read and write
39BC0000
trusted library allocation
page read and write
38AA6000
trusted library allocation
page read and write
38A75000
trusted library allocation
page read and write
37B4D000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
553000
heap
page read and write
37B82000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3A3D0000
heap
page read and write
400000
unkown
page readonly
39BC0000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3ADB0000
trusted library allocation
page read and write
3AD60000
trusted library allocation
page read and write
7460000
heap
page read and write
39BC0000
trusted library allocation
page read and write
487000
unkown
page readonly
38A05000
trusted library allocation
page read and write
37B53000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
2244000
heap
page read and write
37E7D000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
3AD30000
trusted library allocation
page read and write
3A3D2000
heap
page read and write
37E21000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3763F000
stack
page read and write
3180000
direct allocation
page read and write
39B60000
trusted library allocation
page read and write
3A9EE000
stack
page read and write
3AD90000
trusted library allocation
page read and write
3799F000
stack
page read and write
39C50000
trusted library allocation
page execute and read and write
38A8A000
trusted library allocation
page read and write
38BA0000
trusted library allocation
page read and write
55B000
heap
page read and write
3AD60000
trusted library allocation
page read and write
39B60000
trusted library allocation
page read and write
71E000
stack
page read and write
389AB000
trusted library allocation
page read and write
9D000
trusted library allocation
page execute and read and write
38BF5000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
10003000
unkown
page readonly
37B91000
trusted library allocation
page read and write
3AD30000
trusted library allocation
page read and write
39BBD000
stack
page read and write
39C60000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
400000
unkown
page readonly
3ACDF000
trusted library allocation
page read and write
81F000
stack
page read and write
434000
unkown
page read and write
3AD90000
trusted library allocation
page read and write
74ED000
heap
page read and write
39C60000
trusted library allocation
page read and write
48F000
unkown
page readonly
48F000
unkown
page readonly
3AD20000
trusted library allocation
page read and write
37650000
direct allocation
page read and write
39C60000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AD80000
trusted library allocation
page read and write
3ACD0000
trusted library allocation
page read and write
3AE80000
trusted library allocation
page read and write
38A6E000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AE80000
trusted library allocation
page read and write
480000
unkown
page readonly
39BC0000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3777D000
trusted library allocation
page read and write
6719000
remote allocation
page execute and read and write
39B60000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
37A4F000
trusted library allocation
page read and write
85E000
stack
page read and write
38A57000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
283E000
heap
page read and write
424000
unkown
page read and write
8FB0000
heap
page read and write
39BC0000
trusted library allocation
page read and write
31E0000
direct allocation
page read and write
39C40000
trusted library allocation
page read and write
3AD30000
trusted library allocation
page read and write
2832000
heap
page read and write
39BC0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
85B2000
direct allocation
page execute and read and write
372EE000
stack
page read and write
3AD20000
trusted library allocation
page read and write
38AC6000
trusted library allocation
page read and write
3755E000
stack
page read and write
55B000
heap
page read and write
3AD20000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
3AD00000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
1700000
remote allocation
page execute and read and write
3F19000
remote allocation
page execute and read and write
3AD20000
trusted library allocation
page read and write
3A230000
heap
page read and write
487000
unkown
page readonly
38C2E000
trusted library allocation
page read and write
547000
heap
page read and write
553000
heap
page read and write
3AD20000
trusted library allocation
page read and write
4F5000
heap
page read and write
39C60000
trusted library allocation
page read and write
39BE4000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
750A000
heap
page read and write
3AD90000
trusted library allocation
page read and write
3AD30000
trusted library allocation
page execute and read and write
39B60000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3AEC0000
trusted library allocation
page read and write
557000
heap
page read and write
3703D000
stack
page read and write
3A3D0000
heap
page read and write
73F0000
direct allocation
page read and write
3AD20000
trusted library allocation
page read and write
750E000
heap
page read and write
39BC0000
trusted library allocation
page read and write
547000
heap
page read and write
42C000
unkown
page read and write
38A86000
trusted library allocation
page read and write
3A76E000
stack
page read and write
8F40000
direct allocation
page read and write
48F000
unkown
page readonly
401000
unkown
page execute read
3AD90000
trusted library allocation
page read and write
38CF7000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
38C25000
trusted library allocation
page read and write
547000
heap
page read and write
39B70000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
38CAE000
trusted library allocation
page read and write
401000
unkown
page execute read
39BC0000
trusted library allocation
page read and write
3AE80000
trusted library allocation
page read and write
38A7A000
trusted library allocation
page read and write
401000
unkown
page execute read
3AD30000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
3AD30000
trusted library allocation
page read and write
48F000
unkown
page readonly
578000
heap
page read and write
39BC0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
38CD0000
trusted library allocation
page read and write
38CE3000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
750E000
heap
page read and write
39BC0000
trusted library allocation
page read and write
3AD60000
trusted library allocation
page read and write
37A47000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AD60000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
3AD30000
trusted library allocation
page read and write
3AD30000
trusted library allocation
page read and write
375C0000
remote allocation
page read and write
3AD20000
trusted library allocation
page read and write
55B000
heap
page read and write
57B000
heap
page read and write
3AE80000
trusted library allocation
page read and write
38D5C000
trusted library allocation
page read and write
37771000
trusted library allocation
page read and write
3AE70000
trusted library allocation
page read and write
37660000
direct allocation
page read and write
39BC0000
trusted library allocation
page read and write
3A3E5000
heap
page read and write
37A16000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
3AE80000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3727F000
stack
page read and write
39C40000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
375C0000
remote allocation
page read and write
3ACF0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
48D000
unkown
page readonly
3AD40000
trusted library allocation
page execute and read and write
37A3F000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
170000
trusted library allocation
page read and write
3717E000
stack
page read and write
39C60000
trusted library allocation
page read and write
37E4F000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
215E000
stack
page read and write
3AE60000
trusted library allocation
page read and write
48D000
unkown
page readonly
72C0000
direct allocation
page read and write
39BC0000
trusted library allocation
page read and write
55B000
heap
page read and write
39BC0000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
389C3000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
3AD30000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
39B60000
trusted library allocation
page read and write
451000
unkown
page read and write
39BC0000
trusted library allocation
page read and write
3AD90000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
557000
heap
page read and write
3A92F000
stack
page read and write
39BC0000
trusted library allocation
page read and write
3150000
direct allocation
page read and write
38A88000
trusted library allocation
page read and write
409000
unkown
page write copy
39BD0000
trusted library allocation
page read and write
A3B2000
direct allocation
page execute and read and write
283C000
heap
page read and write
750D000
heap
page read and write
57B000
heap
page read and write
39BC0000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
282F000
stack
page read and write
465000
unkown
page readonly
39C40000
trusted library allocation
page read and write
37A0E000
trusted library allocation
page read and write
37400000
heap
page read and write
39C40000
trusted library allocation
page read and write
38AEA000
trusted library allocation
page read and write
283C000
heap
page read and write
3AD30000
trusted library allocation
page read and write
3AE80000
trusted library allocation
page read and write
462000
unkown
page readonly
480000
unkown
page readonly
3A231000
heap
page read and write
3AD30000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
39BD0000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AE80000
trusted library allocation
page read and write
407000
unkown
page readonly
557000
heap
page read and write
39B70000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
755A000
heap
page read and write
3AD20000
trusted library allocation
page read and write
39B60000
trusted library allocation
page read and write
98000
stack
page read and write
3713D000
stack
page read and write
39BC0000
trusted library allocation
page read and write
38D0D000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3ADA0000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
8F9E000
stack
page read and write
3A3A2000
heap
page read and write
400000
unkown
page readonly
3AE80000
trusted library allocation
page read and write
39BC0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AD30000
trusted library allocation
page read and write
493000
unkown
page readonly
38B43000
trusted library allocation
page read and write
38ACC000
trusted library allocation
page read and write
5DB2000
direct allocation
page execute and read and write
72D5000
heap
page read and write
39BC0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
37A3B000
trusted library allocation
page read and write
39BE0000
trusted library allocation
page read and write
39B60000
trusted library allocation
page read and write
39B60000
trusted library allocation
page read and write
31C0000
direct allocation
page read and write
487000
unkown
page readonly
547000
heap
page read and write
72A0000
heap
page read and write
39B70000
trusted library allocation
page read and write
94000
trusted library allocation
page read and write
37B84000
trusted library allocation
page read and write
7490000
heap
page read and write
755A000
heap
page read and write
3776E000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
38B88000
trusted library allocation
page read and write
3A393000
heap
page read and write
39C40000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
38A67000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
3AE60000
trusted library allocation
page read and write
39B60000
trusted library allocation
page read and write
465000
unkown
page readonly
379EC000
trusted library allocation
page read and write
3190000
direct allocation
page read and write
37B7E000
trusted library allocation
page read and write
38C2C000
trusted library allocation
page read and write
3AD30000
trusted library allocation
page read and write
553000
heap
page read and write
39BD0000
trusted library allocation
page read and write
15C000
stack
page read and write
3AD20000
trusted library allocation
page read and write
3ACC0000
trusted library allocation
page execute and read and write
3A3D2000
heap
page read and write
37A4B000
trusted library allocation
page read and write
3AE80000
trusted library allocation
page read and write
3130000
direct allocation
page read and write
376B0000
trusted library allocation
page read and write
3AD20000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
7506000
heap
page read and write
57B000
heap
page read and write
38C12000
trusted library allocation
page read and write
37D3B000
trusted library allocation
page read and write
553000
heap
page read and write
3AE80000
trusted library allocation
page read and write
3AD90000
trusted library allocation
page read and write
39BD0000
trusted library allocation
page read and write
38C4A000
trusted library allocation
page read and write
3ACC0000
trusted library allocation
page read and write
3AE90000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
3A7EF000
stack
page read and write
7506000
heap
page read and write
39BC0000
trusted library allocation
page read and write
38CA2000
trusted library allocation
page read and write
3F6B000
stack
page read and write
3AD20000
trusted library allocation
page read and write
3A66F000
stack
page read and write
10001000
unkown
page execute read
39BC0000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
39C40000
trusted library allocation
page read and write
39C60000
trusted library allocation
page read and write
There are 913 hidden memdumps, click here to show them.