IOC Report
Factura Honorarios 2024-11-17.exe

loading gif

Files

File Path
Type
Category
Malicious
Factura Honorarios 2024-11-17.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nsg8E1D.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\rigsfaellesskab\Juratid.sta
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\rigsfaellesskab\autotypes.ome
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\rigsfaellesskab\fonta.jpg
JPEG image data, baseline, precision 8, 300x400, components 3
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\rigsfaellesskab\kvaksalvere.res
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\rigsfaellesskab\ters.gra
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Factura Honorarios 2024-11-17.exe
"C:\Users\user\Desktop\Factura Honorarios 2024-11-17.exe"
malicious
C:\Users\user\Desktop\Factura Honorarios 2024-11-17.exe
"C:\Users\user\Desktop\Factura Honorarios 2024-11-17.exe"
malicious

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://drive.google.com/4
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://drive.usercontent.google.com/
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
http://varders.kozow.com:8081
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:128757%0D%0ADate%20a
unknown
http://checkip.dyndns.org/
193.122.6.168
http://anotherarmy.dns.army:8081
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:128757%0D%0ADate%20and%20Time:%2019/11/2024%20/%2002:39:03%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20128757%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
https://apis.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://drive.google.com/d
unknown
https://reallyfreegeoip.org/xml/155.94.241.187$
unknown
https://reallyfreegeoip.org/xml/155.94.241.187
188.114.97.3
https://reallyfreegeoip.org/xml/
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
142.250.185.174
drive.usercontent.google.com
172.217.16.193
reallyfreegeoip.org
188.114.97.3
api.telegram.org
149.154.167.220
checkip.dyndns.com
193.122.6.168
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
142.250.185.174
drive.google.com
United States
188.114.97.3
reallyfreegeoip.org
European Union
193.122.6.168
checkip.dyndns.com
United States
172.217.16.193
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-11-17_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-11-17_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-11-17_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-11-17_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-11-17_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-11-17_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-11-17_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-11-17_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-11-17_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-11-17_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-11-17_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-11-17_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-11-17_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Factura Honorarios 2024-11-17_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6B16000
direct allocation
page execute and read and write
malicious
35F51000
trusted library allocation
page read and write
malicious
361C8000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
756F000
stack
page read and write
357AE000
stack
page read and write
35CD0000
trusted library allocation
page read and write
36031000
trusted library allocation
page read and write
38820000
trusted library allocation
page read and write
7F16000
direct allocation
page execute and read and write
391D0000
trusted library allocation
page read and write
38DFE000
stack
page read and write
36378000
trusted library allocation
page read and write
5730000
heap
page read and write
35F00000
trusted library allocation
page read and write
39210000
trusted library allocation
page execute and read and write
36FCD000
trusted library allocation
page read and write
35B92000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
38CBE000
stack
page read and write
38820000
trusted library allocation
page read and write
372F6000
trusted library allocation
page read and write
2400000
heap
page read and write
5CE000
stack
page read and write
35F00000
trusted library allocation
page read and write
38820000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
35BA0000
trusted library allocation
page read and write
150000
trusted library allocation
page execute and read and write
B0000
trusted library allocation
page read and write
32C0000
direct allocation
page read and write
391D0000
trusted library allocation
page read and write
35AAE000
stack
page read and write
3811A000
trusted library allocation
page read and write
720000
heap
page read and write
35B81000
trusted library allocation
page read and write
59A2000
heap
page read and write
35F00000
trusted library allocation
page read and write
38820000
trusted library allocation
page read and write
38841000
heap
page read and write
372C8000
trusted library allocation
page read and write
36F5F000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
39440000
trusted library allocation
page read and write
B6000
trusted library allocation
page execute and read and write
38840000
heap
page read and write
35A0D000
stack
page read and write
CB000
trusted library allocation
page execute and read and write
35B00000
direct allocation
page read and write
35B7E000
trusted library allocation
page read and write
5910000
heap
page read and write
38820000
trusted library allocation
page read and write
37042000
trusted library allocation
page read and write
80000
trusted library allocation
page read and write
714000
heap
page read and write
360FD000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
588E000
stack
page read and write
36130000
trusted library allocation
page read and write
4086000
remote allocation
page execute and read and write
39460000
trusted library allocation
page read and write
A0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
720000
heap
page read and write
37167000
trusted library allocation
page read and write
3623C000
trusted library allocation
page read and write
36139000
trusted library allocation
page read and write
3804E000
stack
page read and write
36236000
trusted library allocation
page read and write
37242000
trusted library allocation
page read and write
35F10000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
711000
heap
page read and write
35F00000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
370B7000
trusted library allocation
page read and write
59DC000
heap
page read and write
3613E000
trusted library allocation
page read and write
360F9000
trusted library allocation
page read and write
58C0000
direct allocation
page read and write
35FED000
trusted library allocation
page read and write
35BA0000
trusted library allocation
page read and write
37350000
trusted library allocation
page read and write
35B86000
trusted library allocation
page read and write
170000
trusted library allocation
page read and write
35BA0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
38110000
trusted library allocation
page read and write
585000
heap
page read and write
373D8000
trusted library allocation
page read and write
59A2000
heap
page read and write
3280000
direct allocation
page read and write
391D0000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
391A0000
trusted library allocation
page read and write
5735000
heap
page read and write
391D0000
trusted library allocation
page read and write
35B8D000
trusted library allocation
page read and write
3686000
remote allocation
page execute and read and write
39460000
trusted library allocation
page read and write
23E0000
direct allocation
page read and write
38820000
trusted library allocation
page read and write
35BA0000
trusted library allocation
page read and write
5920000
heap
page read and write
3719C000
trusted library allocation
page read and write
39200000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
400000
unkown
page readonly
391D0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
360FF000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
746E000
stack
page read and write
373EB000
trusted library allocation
page read and write
35BB0000
trusted library allocation
page read and write
3290000
direct allocation
page read and write
38116000
trusted library allocation
page read and write
39460000
trusted library allocation
page read and write
361F4000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
36FBA000
trusted library allocation
page read and write
38820000
trusted library allocation
page read and write
36FC4000
trusted library allocation
page read and write
59DF000
heap
page read and write
391D0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
2860000
heap
page read and write
38100000
trusted library allocation
page read and write
729000
heap
page read and write
388BA000
heap
page read and write
35FFD000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
3619E000
trusted library allocation
page read and write
40A000
unkown
page read and write
35F00000
trusted library allocation
page read and write
39470000
trusted library allocation
page read and write
372CF000
trusted library allocation
page read and write
3622E000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
214E000
stack
page read and write
35F00000
trusted library allocation
page read and write
361D1000
trusted library allocation
page read and write
38877000
heap
page read and write
39440000
trusted library allocation
page read and write
2958000
heap
page read and write
35FF5000
trusted library allocation
page read and write
39200000
trusted library allocation
page read and write
5710000
heap
page read and write
39460000
trusted library allocation
page read and write
39460000
trusted library allocation
page read and write
5982000
heap
page read and write
3936F000
stack
page read and write
39200000
trusted library allocation
page read and write
35BB0000
trusted library allocation
page read and write
39180000
trusted library allocation
page read and write
5963000
heap
page read and write
391D0000
trusted library allocation
page read and write
39370000
trusted library allocation
page read and write
599F000
heap
page read and write
391D0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
372BB000
trusted library allocation
page read and write
729000
heap
page read and write
73E0000
direct allocation
page read and write
39160000
trusted library allocation
page read and write
295C000
heap
page read and write
35BA0000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
3918F000
trusted library allocation
page read and write
388BE000
heap
page read and write
180000
trusted library allocation
page read and write
725000
heap
page read and write
391D0000
trusted library allocation
page read and write
35BB0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
720000
heap
page read and write
35BA0000
trusted library allocation
page read and write
38830000
heap
page execute and read and write
39370000
trusted library allocation
page read and write
38100000
trusted library allocation
page read and write
38820000
trusted library allocation
page read and write
401000
unkown
page execute read
391E0000
trusted library allocation
page read and write
39440000
trusted library allocation
page read and write
6CF000
stack
page read and write
725000
heap
page read and write
35F00000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
740000
heap
page read and write
39160000
trusted library allocation
page read and write
388B7000
heap
page read and write
358B0000
heap
page read and write
37055000
trusted library allocation
page read and write
729000
heap
page read and write
73D0000
direct allocation
page read and write
35F00000
trusted library allocation
page read and write
39180000
trusted library allocation
page read and write
38877000
heap
page read and write
38859000
heap
page read and write
35F10000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
725000
heap
page read and write
38100000
trusted library allocation
page read and write
35BA0000
trusted library allocation
page read and write
C5000
trusted library allocation
page execute and read and write
408000
unkown
page readonly
35F00000
trusted library allocation
page read and write
B2000
trusted library allocation
page read and write
372E1000
trusted library allocation
page read and write
6E0000
heap
page read and write
40A000
unkown
page write copy
35F00000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
38820000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
39390000
trusted library allocation
page execute and read and write
39160000
trusted library allocation
page read and write
39190000
trusted library allocation
page read and write
35F10000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
39460000
trusted library allocation
page read and write
2245000
heap
page read and write
59A2000
heap
page read and write
39160000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
4B7F000
heap
page read and write
391D0000
trusted library allocation
page read and write
38110000
trusted library allocation
page read and write
3574E000
stack
page read and write
2404000
heap
page read and write
35FB1000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
580000
heap
page read and write
39180000
trusted library allocation
page read and write
35BB0000
trusted library allocation
page read and write
371FA000
trusted library allocation
page read and write
32A0000
direct allocation
page read and write
37210000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
36001000
trusted library allocation
page read and write
361F9000
trusted library allocation
page read and write
6FF45000
unkown
page readonly
391D0000
trusted library allocation
page read and write
38100000
trusted library allocation
page read and write
5900000
direct allocation
page read and write
39370000
trusted library allocation
page read and write
98000
stack
page read and write
36055000
trusted library allocation
page read and write
5890000
direct allocation
page read and write
35BA0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
73F0000
direct allocation
page read and write
391D0000
trusted library allocation
page read and write
599A000
heap
page read and write
35F00000
trusted library allocation
page read and write
39200000
trusted library allocation
page execute and read and write
35F00000
trusted library allocation
page read and write
38844000
heap
page read and write
35F10000
trusted library allocation
page read and write
36231000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
59DF000
heap
page read and write
729000
heap
page read and write
37304000
trusted library allocation
page read and write
388A6000
heap
page read and write
38880000
heap
page read and write
39370000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
35D70000
trusted library allocation
page read and write
5928000
heap
page read and write
39460000
trusted library allocation
page read and write
3560E000
stack
page read and write
39200000
trusted library allocation
page read and write
35FE9000
trusted library allocation
page read and write
39370000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
36FC9000
trusted library allocation
page read and write
370A1000
trusted library allocation
page read and write
38110000
trusted library allocation
page read and write
3926E000
stack
page read and write
5737000
heap
page read and write
39380000
trusted library allocation
page read and write
8916000
direct allocation
page execute and read and write
295A000
heap
page read and write
36132000
trusted library allocation
page read and write
2C86000
remote allocation
page execute and read and write
35F00000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
35A70000
remote allocation
page read and write
39160000
trusted library allocation
page read and write
38820000
trusted library allocation
page read and write
3702C000
trusted library allocation
page read and write
6116000
direct allocation
page execute and read and write
39490000
trusted library allocation
page read and write
38820000
trusted library allocation
page read and write
38820000
trusted library allocation
page read and write
36221000
trusted library allocation
page read and write
35B7A000
trusted library allocation
page read and write
36005000
trusted library allocation
page read and write
91F000
stack
page read and write
391D0000
trusted library allocation
page read and write
7516000
direct allocation
page execute and read and write
39160000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
725000
heap
page read and write
38890000
heap
page read and write
598C000
heap
page read and write
35F00000
trusted library allocation
page read and write
39200000
trusted library allocation
page read and write
35BB0000
trusted library allocation
page read and write
19A000
stack
page read and write
35F40000
heap
page execute and read and write
39160000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
35A70000
remote allocation
page read and write
3550D000
stack
page read and write
720000
heap
page read and write
35BA0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
38820000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
39460000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
729000
heap
page read and write
391D0000
trusted library allocation
page read and write
386E1000
heap
page read and write
284F000
stack
page read and write
36F51000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
39370000
trusted library allocation
page read and write
714000
heap
page read and write
39160000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
2210000
heap
page read and write
391D0000
trusted library allocation
page read and write
59DF000
heap
page read and write
391D0000
trusted library allocation
page read and write
388BF000
heap
page read and write
36240000
trusted library allocation
page read and write
AD000
trusted library allocation
page execute and read and write
35F00000
trusted library allocation
page read and write
5999000
heap
page read and write
3713C000
trusted library allocation
page read and write
38820000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
401000
unkown
page execute read
35F00000
trusted library allocation
page read and write
38E7E000
stack
page read and write
38DBF000
stack
page read and write
35F00000
trusted library allocation
page read and write
36FAC000
trusted library allocation
page read and write
4B70000
direct allocation
page execute and read and write
5C1F000
stack
page read and write
39160000
trusted library allocation
page read and write
372A2000
trusted library allocation
page read and write
740000
heap
page read and write
360C9000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
35FF1000
trusted library allocation
page read and write
39370000
trusted library allocation
page read and write
36FC0000
trusted library allocation
page read and write
35BA0000
trusted library allocation
page read and write
38850000
heap
page read and write
7580000
heap
page read and write
2240000
heap
page read and write
35F00000
trusted library allocation
page read and write
386E1000
heap
page read and write
391A0000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
59DC000
heap
page read and write
38820000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
480000
heap
page read and write
361BE000
trusted library allocation
page read and write
38C7E000
stack
page read and write
38100000
trusted library allocation
page read and write
1886000
remote allocation
page execute and read and write
729000
heap
page read and write
35F00000
trusted library allocation
page read and write
39440000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
35CD8000
trusted library allocation
page read and write
3610D000
trusted library allocation
page read and write
391E0000
trusted library allocation
page execute and read and write
391E0000
trusted library allocation
page read and write
40A000
unkown
page write copy
39160000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
38114000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
20F0000
heap
page read and write
6E8000
heap
page read and write
39370000
trusted library allocation
page read and write
35F10000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
35BA0000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
39370000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
20E0000
heap
page read and write
3250000
direct allocation
page read and write
44D000
unkown
page readonly
4A86000
remote allocation
page execute and read and write
358AF000
stack
page read and write
44D000
unkown
page readonly
93000
trusted library allocation
page execute and read and write
35F00000
trusted library allocation
page read and write
391C0000
trusted library allocation
page read and write
36009000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
59DC000
heap
page read and write
39160000
trusted library allocation
page read and write
400000
unkown
page readonly
35B10000
direct allocation
page read and write
391D0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
391B0000
trusted library allocation
page read and write
388BA000
heap
page read and write
725000
heap
page read and write
35BA0000
trusted library allocation
page read and write
36053000
trusted library allocation
page read and write
58B0000
direct allocation
page read and write
4D16000
direct allocation
page execute and read and write
2955000
heap
page read and write
37330000
trusted library allocation
page read and write
388C000
stack
page read and write
35EFE000
stack
page read and write
740000
heap
page read and write
35F00000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
58E0000
direct allocation
page read and write
391D0000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
36FD8000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
6FF40000
unkown
page readonly
35F00000
trusted library allocation
page read and write
372AE000
trusted library allocation
page read and write
427000
unkown
page read and write
391D0000
trusted library allocation
page read and write
42B000
unkown
page read and write
3882D000
trusted library allocation
page read and write
39370000
trusted library allocation
page read and write
388BE000
heap
page read and write
391D0000
trusted library allocation
page read and write
218E000
stack
page read and write
35DB0000
heap
page read and write
35F00000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
38E3F000
stack
page read and write
361CD000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
408000
unkown
page readonly
391D0000
trusted library allocation
page read and write
39220000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
39200000
trusted library allocation
page read and write
39200000
trusted library allocation
page read and write
2956000
heap
page read and write
35B60000
trusted library allocation
page read and write
14C000
stack
page read and write
38820000
trusted library allocation
page read and write
37415000
trusted library allocation
page read and write
38820000
trusted library allocation
page read and write
729000
heap
page read and write
35F00000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
38820000
trusted library allocation
page read and write
35760000
trusted library allocation
page read and write
39470000
trusted library allocation
page read and write
35BA0000
trusted library allocation
page read and write
38820000
trusted library allocation
page read and write
39387000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
3564E000
stack
page read and write
39450000
trusted library allocation
page read and write
36F64000
trusted library allocation
page read and write
39450000
trusted library allocation
page read and write
39440000
trusted library allocation
page read and write
388A1000
heap
page read and write
44D000
unkown
page readonly
38100000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
39370000
trusted library allocation
page read and write
36F71000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
38820000
trusted library allocation
page read and write
2220000
heap
page read and write
38820000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
38850000
heap
page read and write
391D0000
trusted library allocation
page read and write
3590D000
stack
page read and write
35F00000
trusted library allocation
page read and write
3270000
direct allocation
page read and write
35F00000
trusted library allocation
page read and write
36107000
trusted library allocation
page read and write
39200000
trusted library allocation
page read and write
2951000
heap
page read and write
35F00000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
378C000
stack
page read and write
714000
heap
page read and write
39470000
trusted library allocation
page read and write
35BB0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
39200000
trusted library allocation
page read and write
5700000
heap
page read and write
39440000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
39380000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
35BB0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
3721F000
trusted library allocation
page read and write
5B1F000
stack
page read and write
39370000
trusted library allocation
page read and write
372DA000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
38820000
trusted library allocation
page read and write
35D70000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
35FBB000
trusted library allocation
page read and write
725000
heap
page read and write
388BC000
heap
page read and write
39460000
trusted library allocation
page read and write
5993000
heap
page read and write
37081000
trusted library allocation
page read and write
35B66000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
36F6B000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
160000
trusted library allocation
page read and write
35BA0000
trusted library allocation
page read and write
58A0000
direct allocation
page read and write
38820000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
37114000
trusted library allocation
page read and write
35F01000
trusted library allocation
page read and write
39440000
trusted library allocation
page read and write
2230000
direct allocation
page read and write
391D0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
372E6000
trusted library allocation
page read and write
3612A000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
36FD2000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
23F0000
direct allocation
page read and write
38887000
heap
page read and write
584E000
stack
page read and write
6FF43000
unkown
page readonly
C7000
trusted library allocation
page execute and read and write
391D0000
trusted library allocation
page read and write
39390000
trusted library allocation
page read and write
32B0000
direct allocation
page read and write
5716000
direct allocation
page execute and read and write
372EB000
trusted library allocation
page read and write
81E000
stack
page read and write
59DB000
heap
page read and write
373C3000
trusted library allocation
page read and write
73D000
heap
page read and write
37257000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
39370000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
35EBF000
stack
page read and write
35BB0000
trusted library allocation
page read and write
38820000
trusted library allocation
page read and write
36234000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
38B7F000
stack
page read and write
38820000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
560000
heap
page read and write
38820000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
59EC000
heap
page read and write
44A000
unkown
page read and write
391D0000
trusted library allocation
page read and write
3623A000
trusted library allocation
page read and write
5737000
heap
page read and write
190000
trusted library allocation
page read and write
C2000
trusted library allocation
page read and write
39480000
trusted library allocation
page execute and read and write
39460000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
39370000
trusted library allocation
page read and write
35BB6000
trusted library allocation
page read and write
35B6E000
trusted library allocation
page read and write
234F000
stack
page read and write
39460000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
35BB0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
39170000
trusted library allocation
page read and write
94000
trusted library allocation
page read and write
38878000
heap
page read and write
408000
unkown
page readonly
35BB0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
36F79000
trusted library allocation
page read and write
35DAD000
stack
page read and write
39490000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
361C6000
trusted library allocation
page read and write
38820000
trusted library allocation
page read and write
58F0000
direct allocation
page read and write
39370000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
39460000
trusted library allocation
page read and write
39460000
trusted library allocation
page read and write
35F99000
trusted library allocation
page read and write
5993000
heap
page read and write
36FCF000
trusted library allocation
page read and write
35BA0000
trusted library allocation
page read and write
42D000
unkown
page read and write
38820000
trusted library allocation
page read and write
35BA0000
trusted library allocation
page read and write
720000
heap
page read and write
35BB0000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
37419000
trusted library allocation
page read and write
5486000
remote allocation
page execute and read and write
90000
trusted library allocation
page read and write
3712A000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
38120000
heap
page read and write
38820000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
386E0000
heap
page read and write
35CC7000
stack
page read and write
35AEF000
stack
page read and write
40A000
unkown
page write copy
720000
heap
page read and write
39200000
trusted library allocation
page read and write
36FB3000
trusted library allocation
page read and write
714000
heap
page read and write
720000
heap
page read and write
9D000
trusted library allocation
page execute and read and write
16E0000
remote allocation
page execute and read and write
401000
unkown
page execute read
39380000
trusted library allocation
page read and write
435000
unkown
page read and write
37366000
trusted library allocation
page read and write
39380000
trusted library allocation
page read and write
35A70000
remote allocation
page read and write
391D0000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
35D80000
trusted library allocation
page read and write
35FC3000
trusted library allocation
page read and write
35B6B000
trusted library allocation
page read and write
39170000
trusted library allocation
page execute and read and write
35F00000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
38F7F000
stack
page read and write
35F00000
trusted library allocation
page read and write
35BC0000
heap
page read and write
BA000
trusted library allocation
page execute and read and write
6FF41000
unkown
page execute read
73C0000
direct allocation
page read and write
391D0000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
38877000
heap
page read and write
391D0000
trusted library allocation
page read and write
401000
unkown
page execute read
391D0000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
714000
heap
page read and write
39370000
trusted library allocation
page read and write
3716A000
trusted library allocation
page read and write
740000
heap
page read and write
44D000
unkown
page readonly
35F00000
trusted library allocation
page read and write
38100000
trusted library allocation
page read and write
391F0000
trusted library allocation
page execute and read and write
10E000
stack
page read and write
59A2000
heap
page read and write
725000
heap
page read and write
35F00000
trusted library allocation
page read and write
35BA0000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
35F3D000
stack
page read and write
39160000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
35F10000
trusted library allocation
page read and write
35BA0000
trusted library allocation
page read and write
59DF000
heap
page read and write
430000
unkown
page read and write
35F01000
trusted library allocation
page read and write
39160000
trusted library allocation
page read and write
714000
heap
page read and write
391D0000
trusted library allocation
page read and write
39370000
trusted library allocation
page read and write
3881F000
stack
page read and write
35BA0000
trusted library allocation
page read and write
36101000
trusted library allocation
page read and write
58D0000
direct allocation
page read and write
3260000
direct allocation
page read and write
391D0000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
2286000
remote allocation
page execute and read and write
39200000
trusted library allocation
page read and write
361C3000
trusted library allocation
page read and write
35FBF000
trusted library allocation
page read and write
39450000
trusted library allocation
page read and write
35B5A000
stack
page read and write
38820000
trusted library allocation
page read and write
35BA0000
trusted library allocation
page read and write
400000
unkown
page readonly
35F00000
trusted library allocation
page read and write
23D0000
direct allocation
page read and write
388BA000
heap
page read and write
37186000
trusted library allocation
page read and write
391E0000
trusted library allocation
page read and write
39370000
trusted library allocation
page read and write
38100000
trusted library allocation
page read and write
39460000
trusted library allocation
page read and write
400000
unkown
page readonly
422000
unkown
page read and write
39190000
trusted library allocation
page read and write
35FF9000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
38F80000
trusted library allocation
page execute and read and write
391D0000
trusted library allocation
page read and write
35F00000
trusted library allocation
page read and write
408000
unkown
page readonly
38820000
trusted library allocation
page read and write
394A0000
trusted library allocation
page read and write
59DF000
heap
page read and write
38820000
trusted library allocation
page read and write
391B0000
trusted library allocation
page read and write
38820000
trusted library allocation
page read and write
39470000
trusted library allocation
page read and write
35F10000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
599A000
heap
page read and write
39460000
trusted library allocation
page read and write
388BE000
heap
page read and write
39170000
trusted library allocation
page read and write
391D0000
trusted library allocation
page read and write
2850000
heap
page read and write
391D0000
trusted library allocation
page read and write
35FA6000
trusted library allocation
page read and write
38820000
trusted library allocation
page read and write
There are 786 hidden memdumps, click here to show them.