IOC Report
Fac.exe

loading gif

Files

File Path
Type
Category
Malicious
Fac.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nsr797A.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\rigsfaellesskab\Faaborgs\kvaksalvere.res
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\rigsfaellesskab\Faaborgs\ters.gra
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\rigsfaellesskab\Inhomogenitet.Udg
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\rigsfaellesskab\autotypes.ome
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\rigsfaellesskab\fonta.jpg
JPEG image data, baseline, precision 8, 300x400, components 3
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Fac.exe
"C:\Users\user\Desktop\Fac.exe"
malicious
C:\Users\user\Desktop\Fac.exe
"C:\Users\user\Desktop\Fac.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://www.google.com/chrome/next-steps.html?brand=CHWL&statcb=0&installdataindex=empty&defaultbrow
unknown
https://uk.search.yahoo.com/favicon.icohttps://uk.search.yahoo.com/search
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.autoitscript.com/site/autoit/downloads/https://www.autoitscript.com/site/autoit/download
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
https://eicar.org/
unknown
https://www.google.com/chrome/?&brand=CHWL&utm_campaign=en&utm_source=en-et-na-us-chrome-bubble&utm_
unknown
https://www.office.com/lB
unknown
https://dl.packetstormsecurity.net/Crackers/bios/BIOS320.EXE
unknown
https://support.google.com/chrome/?p=plugin_flash
unknown
https://www.google.com/https://www.google.com/chrome/?&brand=CHWL&utm_campaign=en&utm_source=en-et-n
unknown
https://chrome.google.com/webstore?hl=en
unknown
http://varders.kozow.com:8081
unknown
https://www.google.com
unknown
https://sdlc-esd.oracle.com/ESD6/JSCDL/jdk/8u301-b09/d3c52aa6bfa54d3ca74e617f18309292/JavaSetup8u301
unknown
https://www.eicar.org/download-anti-malware-testfile/:
unknown
http://checkip.dyndns.org/
193.122.6.168
https://packetstormsecurity.com/https://packetstormsecurity.com/files/download/22459/BIOS320.EXEhttp
unknown
https://uk.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://dl.google.com/tag/s/appguid%3D%7B8A69D345-D564-463C-AFF1-A69D9E530F96%7D%26iid%3D%7B9AB9339B
unknown
https://drive.google.com/
unknown
https://cdn.stubdownloader.services.mozilla.com/builds/firefox-latest-ssl/en-GB/win64/b5110ff5d41570
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://secure.eicar.org/eicar.com;
unknown
https://reallyfreegeoip.org/xml/191.96.150.191
104.21.67.152
http://reallyfreegeoip.org
unknown
https://api.telegram
unknown
https://javadl.oracle.com/webapps/download/AutoDL?BundleId=245029_d3c52aa6bfa54d3ca74e617f18309292K
unknown
https://secure.eicar.org/eicar.com.txtD
unknown
https://stubdownloader.services.mozilla.com/?attribution_code=c291cmNlPXd3dy5nb29nbGUuY29tJm1lZGl1bT
unknown
https://apis.google.com
unknown
https://reallyfreegeoip.org/xml/191.96.150.191$
unknown
http://checkip.dyndns.com
unknown
https://ocsp.quovadisoffshore.com0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/
unknown
https://www.office.com/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://secure.eicar.org/eicar.com
unknown
https://www.autoitscript.com/cgi-bin/getfile.pl?autoit3/autoit-v3-setup.exe
unknown
https://packetstormsecurity.com/files/download/22459/BIOS320.EXE
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://drive.usercontent.google.com/
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:855271%0D%0ADate%20and%20Time:%2018/11/2024%20/%2016:31:29%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20855271%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://checkip.dyndns.org
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://secure.eicar.org/eicar.com.txt/
unknown
https://www.google.com/search?q=eicar
unknown
https://secure.eicar.org/eicar.com/
unknown
http://aborters.duckdns.org:8081
unknown
https://www.autoitscript.com/site/autoit/downloads/
unknown
https://www.eicar.org/download-anti-malware-testfile/Download
unknown
https://www.eicar.org/download-anti-malware-testfile/
unknown
https://packetstormsecurity.com/
unknown
http://anotherarmy.dns.army:8081
unknown
https://www.eicar.org/
unknown
https://reallyfreegeoip.org
unknown
http://www.quovadis.bm0
unknown
https://www.autoitscript.com/files/autoit3/autoit-v3-setup.exeQ
unknown
https://packetstormsecurity.com/files/22459/BIOS320.EXE.html
unknown
http://api.telegram.org
unknown
https://www.eicar.org/https://eicar.org/https://www.eicar.org/download-anti-malware-testfile/https:/
unknown
https://www.google.com/
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:855271%0D%0ADate%20a
unknown
https://secure.eicar.org/eicar.com.txt
unknown
There are 58 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
142.251.41.14
drive.usercontent.google.com
142.250.72.97
reallyfreegeoip.org
104.21.67.152
api.telegram.org
149.154.167.220
checkip.dyndns.com
193.122.6.168
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
142.251.41.14
drive.google.com
United States
104.21.67.152
reallyfreegeoip.org
United States
193.122.6.168
checkip.dyndns.com
United States
142.250.72.97
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fac_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fac_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fac_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fac_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fac_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fac_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fac_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fac_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fac_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fac_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fac_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fac_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fac_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fac_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6462000
direct allocation
page execute and read and write
malicious
33C31000
trusted library allocation
page read and write
malicious
37020000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
36F90000
trusted library allocation
page read and write
36F7F000
trusted library allocation
page read and write
34F9C000
trusted library allocation
page read and write
33E12000
trusted library allocation
page read and write
33BC0000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
4C0000
heap
page read and write
33950000
trusted library allocation
page read and write
37110000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
34E38000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
5A62000
direct allocation
page execute and read and write
366D0000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
34E36000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
3363F000
stack
page read and write
36FA0000
trusted library allocation
page read and write
33D40000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
94E000
stack
page read and write
34EF8000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
5062000
direct allocation
page execute and read and write
36FD0000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
36FF0000
trusted library allocation
page read and write
37110000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
160000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
35DCE000
stack
page read and write
33CDF000
trusted library allocation
page read and write
33CCB000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
42B000
unkown
page read and write
366D0000
trusted library allocation
page read and write
3795000
heap
page read and write
36FD0000
trusted library allocation
page read and write
52B0000
heap
page read and write
370F0000
trusted library allocation
page read and write
36C30000
trusted library allocation
page execute and read and write
33950000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
35F16000
heap
page read and write
33CDB000
trusted library allocation
page read and write
33D4A000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
337FF000
stack
page read and write
36FB0000
trusted library allocation
page read and write
33650000
heap
page read and write
36FD0000
trusted library allocation
page read and write
34E1E000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
7CF000
stack
page read and write
373B000
heap
page read and write
36FD0000
trusted library allocation
page read and write
34C3F000
trusted library allocation
page read and write
C5000
trusted library allocation
page execute and read and write
4D2000
heap
page read and write
37110000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33BC0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
37010000
trusted library allocation
page read and write
4DB000
heap
page read and write
36FD0000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
522E000
stack
page read and write
36FD0000
trusted library allocation
page read and write
80000
trusted library allocation
page read and write
33B7B000
trusted library allocation
page read and write
27FE000
stack
page read and write
32F0000
direct allocation
page read and write
36FD0000
trusted library allocation
page read and write
2908000
heap
page read and write
36C2F000
stack
page read and write
366D0000
trusted library allocation
page read and write
4C4000
heap
page read and write
366B0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33C98000
trusted library allocation
page read and write
28FF000
stack
page read and write
33E28000
trusted library allocation
page read and write
5170000
direct allocation
page read and write
4C0000
heap
page read and write
33950000
trusted library allocation
page read and write
2C82000
remote allocation
page execute and read and write
34DC7000
trusted library allocation
page read and write
366B0000
trusted library allocation
page read and write
34DA8000
trusted library allocation
page read and write
33CCF000
trusted library allocation
page read and write
3740000
heap
page read and write
33B9D000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
34D28000
trusted library allocation
page read and write
36BAF000
stack
page read and write
36FD0000
trusted library allocation
page read and write
34CF2000
trusted library allocation
page read and write
36670000
trusted library allocation
page read and write
34C9A000
trusted library allocation
page read and write
33B8A000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
36F80000
trusted library allocation
page read and write
33DEA000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
37110000
trusted library allocation
page read and write
3320000
direct allocation
page read and write
4D2000
heap
page read and write
37020000
trusted library allocation
page read and write
37030000
trusted library allocation
page read and write
36AAE000
stack
page read and write
33D48000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
34DB4000
trusted library allocation
page read and write
33CC7000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
366D5000
trusted library allocation
page read and write
366E0000
heap
page execute and read and write
33E8D000
trusted library allocation
page read and write
34E00000
trusted library allocation
page read and write
80E000
stack
page read and write
180000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
33EF7000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
34E8D000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page execute and read and write
32B0000
direct allocation
page read and write
427000
unkown
page read and write
33C20000
heap
page read and write
36FD0000
trusted library allocation
page read and write
2905000
heap
page read and write
36FD0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
37110000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
37030000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33B91000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
37030000
trusted library allocation
page read and write
36A0000
direct allocation
page read and write
4AF000
heap
page read and write
33950000
trusted library allocation
page read and write
37110000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33CE3000
trusted library allocation
page read and write
373D000
heap
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
30000
heap
page read and write
33E81000
trusted library allocation
page read and write
2905000
heap
page read and write
34C47000
trusted library allocation
page read and write
33CFC000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
4BB000
heap
page read and write
4AF000
heap
page read and write
36FA0000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
366CA000
trusted library allocation
page read and write
2909000
heap
page read and write
33BA2000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
4C4000
heap
page read and write
338DF000
stack
page read and write
36F60000
trusted library allocation
page read and write
366C6000
trusted library allocation
page read and write
2900000
heap
page read and write
CB000
trusted library allocation
page execute and read and write
19A000
stack
page read and write
33A67000
stack
page read and write
33E7D000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33D7F000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33C7E000
trusted library allocation
page read and write
34FCA000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
3230000
heap
page read and write
33D11000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
36FE0000
trusted library allocation
page execute and read and write
33D5B000
trusted library allocation
page read and write
36FE0000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
435000
unkown
page read and write
33950000
trusted library allocation
page read and write
40A000
unkown
page write copy
4DB000
heap
page read and write
5F5000
heap
page read and write
37020000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
36C0000
heap
page read and write
36FA0000
trusted library allocation
page read and write
37120000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
A0000
trusted library allocation
page read and write
35EF9000
heap
page read and write
33950000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
37100000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33BE0000
trusted library allocation
page read and write
33B70000
trusted library allocation
page read and write
37110000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33DF8000
trusted library allocation
page read and write
33D54000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33F38000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
400000
unkown
page readonly
373A000
heap
page read and write
37140000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
36F50000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
34CB0000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
33F4A000
trusted library allocation
page read and write
32C0000
direct allocation
page read and write
33BC0000
trusted library allocation
page read and write
33CD7000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
33F46000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
37040000
trusted library allocation
page execute and read and write
34C96000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
4DB000
heap
page read and write
33EFE000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
3650000
direct allocation
page read and write
33950000
trusted library allocation
page read and write
4AF000
heap
page read and write
33BC6000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
C2000
trusted library allocation
page read and write
36E4E000
stack
page read and write
33951000
trusted library allocation
page read and write
40A000
unkown
page read and write
36FD0000
trusted library allocation
page read and write
366B0000
trusted library allocation
page read and write
93000
trusted library allocation
page execute and read and write
36FD0000
trusted library allocation
page read and write
10E000
stack
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
34DC0000
trusted library allocation
page read and write
34F56000
trusted library allocation
page read and write
36670000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
33C88000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
34F94000
trusted library allocation
page read and write
34F86000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
3300000
direct allocation
page read and write
34C53000
trusted library allocation
page read and write
37110000
trusted library allocation
page read and write
33BC0000
trusted library allocation
page read and write
2474000
heap
page read and write
33F05000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
34F20000
trusted library allocation
page read and write
35C38000
trusted library allocation
page read and write
14E000
stack
page read and write
36FD0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33D7D000
trusted library allocation
page read and write
36B0000
direct allocation
page read and write
36FD0000
trusted library allocation
page read and write
4BB000
heap
page read and write
33950000
trusted library allocation
page read and write
37120000
trusted library allocation
page read and write
401000
unkown
page execute read
36FD0000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
366C0000
trusted library allocation
page read and write
98000
stack
page read and write
34EF6000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
3620000
heap
page read and write
37020000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
35FAE000
stack
page read and write
3389E000
stack
page read and write
70173000
unkown
page readonly
36FA0000
trusted library allocation
page read and write
150000
trusted library allocation
page execute and read and write
36571000
heap
page read and write
37100000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
401000
unkown
page execute read
36FD0000
trusted library allocation
page read and write
4D2000
heap
page read and write
37020000
trusted library allocation
page read and write
3310000
direct allocation
page read and write
34C98000
trusted library allocation
page read and write
526D000
stack
page read and write
430000
unkown
page read and write
33BC0000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
3500000
heap
page read and write
2240000
heap
page read and write
33860000
remote allocation
page read and write
370F0000
trusted library allocation
page read and write
37040000
trusted library allocation
page read and write
33BB0000
heap
page execute and read and write
33E89000
trusted library allocation
page read and write
32E0000
direct allocation
page read and write
33950000
trusted library allocation
page read and write
3A60000
heap
page read and write
37020000
trusted library allocation
page read and write
3640000
direct allocation
page read and write
36FE0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
36F70000
trusted library allocation
page read and write
34C31000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
4D8000
heap
page read and write
36FD0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
34E3E000
trusted library allocation
page read and write
4BB000
heap
page read and write
36A2E000
stack
page read and write
35EB0000
heap
page read and write
36FA0000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
408000
unkown
page readonly
C7000
trusted library allocation
page execute and read and write
33950000
trusted library allocation
page read and write
37150000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
A4F000
stack
page read and write
34E30000
trusted library allocation
page read and write
4AF000
heap
page read and write
33950000
trusted library allocation
page read and write
36670000
trusted library allocation
page read and write
33BC0000
trusted library allocation
page read and write
44D000
unkown
page readonly
36FD0000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
37120000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33B96000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
400000
unkown
page readonly
36FA0000
trusted library allocation
page read and write
37110000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
366C4000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
37130000
trusted library allocation
page execute and read and write
36FA0000
trusted library allocation
page read and write
3740000
heap
page read and write
36FD0000
trusted library allocation
page read and write
33B8E000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
1882000
remote allocation
page execute and read and write
36FD0000
trusted library allocation
page read and write
4AF000
heap
page read and write
33950000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
34E86000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
4D2000
heap
page read and write
36FD0000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
34D10000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
90F000
stack
page read and write
A50000
heap
page read and write
400000
unkown
page readonly
33950000
trusted library allocation
page read and write
36F50000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
36FB0000
trusted library allocation
page execute and read and write
33950000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
4BB000
heap
page read and write
34D12000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
34F50000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
3680000
direct allocation
page read and write
36F70000
trusted library allocation
page read and write
34DDE000
trusted library allocation
page read and write
94000
trusted library allocation
page read and write
22E0000
heap
page read and write
366D0000
trusted library allocation
page read and write
34F24000
trusted library allocation
page read and write
B0000
trusted library allocation
page read and write
33900000
direct allocation
page read and write
33950000
trusted library allocation
page read and write
370F0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
42D000
unkown
page read and write
408000
unkown
page readonly
190000
trusted library allocation
page read and write
4C0000
heap
page read and write
B6000
trusted library allocation
page execute and read and write
33860000
remote allocation
page read and write
190000
trusted library allocation
page read and write
33C8E000
trusted library allocation
page read and write
33BC0000
trusted library allocation
page read and write
37110000
trusted library allocation
page read and write
5190000
direct allocation
page read and write
33950000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
36FC0000
trusted library allocation
page execute and read and write
36FD0000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
3507000
heap
page read and write
36FD0000
trusted library allocation
page read and write
366C0000
trusted library allocation
page read and write
36F90000
trusted library allocation
page read and write
34F9A000
trusted library allocation
page read and write
34E7A000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
366B0000
trusted library allocation
page read and write
4C4000
heap
page read and write
3280000
direct allocation
page read and write
36FD0000
trusted library allocation
page read and write
245F000
stack
page read and write
36F60000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
366AD000
stack
page read and write
33950000
trusted library allocation
page read and write
4C4000
heap
page read and write
33950000
trusted library allocation
page read and write
36BEE000
stack
page read and write
3394A000
stack
page read and write
36F4F000
stack
page read and write
36FA0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33E06000
trusted library allocation
page read and write
333FE000
stack
page read and write
33BC0000
trusted library allocation
page read and write
36670000
trusted library allocation
page read and write
370F0000
trusted library allocation
page read and write
33D8C000
trusted library allocation
page read and write
35F1A000
heap
page read and write
3480000
heap
page read and write
33B7E000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
37110000
trusted library allocation
page read and write
3690000
direct allocation
page read and write
33D46000
trusted library allocation
page read and write
36570000
heap
page read and write
36FD0000
trusted library allocation
page read and write
373B000
heap
page read and write
35FB0000
heap
page read and write
33950000
trusted library allocation
page read and write
3C5C000
stack
page read and write
33950000
trusted library allocation
page read and write
33D81000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
334FD000
stack
page read and write
B2000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
34CF8000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
400000
unkown
page readonly
370F0000
trusted library allocation
page read and write
332FF000
stack
page read and write
16E0000
remote allocation
page execute and read and write
36670000
trusted library allocation
page read and write
36571000
heap
page read and write
37020000
trusted library allocation
page read and write
4AF000
heap
page read and write
36FA0000
trusted library allocation
page read and write
44D000
unkown
page readonly
3692F000
stack
page read and write
33950000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
33951000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
34F0E000
trusted library allocation
page read and write
4DB000
heap
page read and write
401000
unkown
page execute read
33D79000
trusted library allocation
page read and write
34C56000
trusted library allocation
page read and write
2350000
heap
page read and write
3B5C000
stack
page read and write
37020000
trusted library allocation
page read and write
366B0000
trusted library allocation
page read and write
2355000
heap
page read and write
5BE000
stack
page read and write
AD000
trusted library allocation
page execute and read and write
3353E000
stack
page read and write
36FD0000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
35EE1000
heap
page read and write
3660000
direct allocation
page read and write
33950000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
2900000
heap
page read and write
33950000
trusted library allocation
page read and write
40A000
unkown
page write copy
5F0000
heap
page read and write
36FD0000
trusted library allocation
page read and write
33CC3000
trusted library allocation
page read and write
3507000
heap
page read and write
37037000
trusted library allocation
page read and write
34E6E000
trusted library allocation
page read and write
33E8F000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
36C8000
heap
page read and write
2909000
heap
page read and write
33BD0000
trusted library allocation
page read and write
70170000
unkown
page readonly
33950000
trusted library allocation
page read and write
33CA0000
trusted library allocation
page read and write
33C9C000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
170000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
34FE2000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
408000
unkown
page readonly
4BB000
heap
page read and write
34CC6000
trusted library allocation
page read and write
37030000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
35EB0000
heap
page read and write
4C0000
heap
page read and write
4BB000
heap
page read and write
36FA0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
32D0000
direct allocation
page read and write
36FE0000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
4D2000
heap
page read and write
401000
unkown
page execute read
5180000
direct allocation
page read and write
373D000
heap
page read and write
3505000
heap
page read and write
33950000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
4C4000
heap
page read and write
33950000
trusted library allocation
page read and write
3704000
heap
page read and write
366D0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
34FD7000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
4DB000
heap
page read and write
33CD3000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
35E70000
heap
page read and write
70175000
unkown
page readonly
36FD0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
44D000
unkown
page readonly
4C4000
heap
page read and write
BA000
trusted library allocation
page execute and read and write
34FE9000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
4D2000
heap
page read and write
35EB0000
heap
page read and write
33950000
trusted library allocation
page read and write
488000
heap
page read and write
36FA0000
trusted library allocation
page read and write
33F3E000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
4EC0000
direct allocation
page execute and read and write
33BC0000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
34C59000
trusted library allocation
page read and write
33B6F000
stack
page read and write
36FD0000
trusted library allocation
page read and write
3797000
heap
page read and write
4C0000
heap
page read and write
366D0000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
422000
unkown
page read and write
33F3B000
trusted library allocation
page read and write
32A0000
direct allocation
page read and write
366D0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
37110000
trusted library allocation
page read and write
35E92000
heap
page read and write
51EE000
stack
page read and write
5160000
direct allocation
page read and write
36FA0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33E84000
trusted library allocation
page read and write
33F0C000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33F40000
trusted library allocation
page read and write
36FE0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
3785000
heap
page read and write
36FA0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
9D000
trusted library allocation
page execute and read and write
33F44000
trusted library allocation
page read and write
34E40000
trusted library allocation
page read and write
36FB0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
37100000
trusted library allocation
page read and write
33BD0000
trusted library allocation
page read and write
2282000
remote allocation
page execute and read and write
33BC0000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
37000000
trusted library allocation
page execute and read and write
4C4000
heap
page read and write
36FD0000
trusted library allocation
page read and write
33BC0000
trusted library allocation
page read and write
2470000
heap
page read and write
34C4D000
trusted library allocation
page read and write
33C1D000
stack
page read and write
4C0000
heap
page read and write
34CC2000
trusted library allocation
page read and write
37110000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
4D2000
heap
page read and write
36A6F000
stack
page read and write
3733000
heap
page read and write
33860000
remote allocation
page read and write
37140000
trusted library allocation
page read and write
366C0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
37110000
trusted library allocation
page read and write
480000
heap
page read and write
36FD0000
trusted library allocation
page read and write
338F0000
direct allocation
page read and write
34E19000
trusted library allocation
page read and write
34E02000
trusted library allocation
page read and write
90000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
232E000
stack
page read and write
36FA0000
trusted library allocation
page read and write
44D000
unkown
page readonly
34E06000
trusted library allocation
page read and write
70171000
unkown
page execute read
3740000
heap
page read and write
4DB000
heap
page read and write
40A000
unkown
page write copy
3270000
direct allocation
page read and write
33950000
trusted library allocation
page read and write
34F70000
trusted library allocation
page read and write
366B0000
trusted library allocation
page read and write
366D0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
4BB000
heap
page read and write
3725000
heap
page read and write
44A000
unkown
page read and write
35E95000
heap
page read and write
370F0000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
3290000
direct allocation
page read and write
36FD0000
trusted library allocation
page read and write
37120000
trusted library allocation
page read and write
35F1D000
heap
page read and write
36F80000
trusted library allocation
page read and write
33B76000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
366B0000
trusted library allocation
page read and write
370F0000
trusted library allocation
page read and write
36FA0000
trusted library allocation
page read and write
4C0000
heap
page read and write
33950000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
36670000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
36FE0000
trusted library allocation
page read and write
34F6E000
trusted library allocation
page read and write
33950000
trusted library allocation
page read and write
37110000
trusted library allocation
page read and write
30000
heap
page read and write
33950000
trusted library allocation
page read and write
3740000
heap
page read and write
366B0000
trusted library allocation
page read and write
36670000
trusted library allocation
page read and write
408000
unkown
page readonly
33950000
trusted library allocation
page read and write
336FE000
stack
page read and write
35F0A000
heap
page read and write
3785000
heap
page read and write
33D87000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
3670000
direct allocation
page read and write
33960000
heap
page read and write
There are 770 hidden memdumps, click here to show them.