IOC Report
Wuerth_factura_4052073226..exe

loading gif

Files

File Path
Type
Category
Malicious
Wuerth_factura_4052073226..exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nsf6188.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\Sympodia\broletto\Imminute.dro
data
dropped
C:\Users\user\Sympodia\broletto\Kbenhavnerbegivenhed\theravada.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Sympodia\broletto\Orfgild.Sub
data
dropped
C:\Users\user\Sympodia\broletto\antagonister.kid
data
dropped
C:\Users\user\Sympodia\broletto\magtpolitiske.ret
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Wuerth_factura_4052073226..exe
"C:\Users\user\Desktop\Wuerth_factura_4052073226..exe"
malicious
C:\Users\user\Desktop\Wuerth_factura_4052073226..exe
"C:\Users\user\Desktop\Wuerth_factura_4052073226..exe"
malicious

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://drive.usercontent.google.com/&
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:405464%0D%0ADate%20and%20Time:%2019/10/2024%20/%2007:08:06%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20405464%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://drive.google.com/=y
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:405464%0D%0ADate%20a
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
https://reallyfreegeoip.org/xml/155.94.241.186$
unknown
http://varders.kozow.com:8081
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com
unknown
http://checkip.dyndns.org/
132.226.8.169
https://drive.google.com/
unknown
http://anotherarmy.dns.army:8081
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://reallyfreegeoip.org
unknown
https://drive.usercontent.google.com/:
unknown
https://apis.google.com
unknown
https://drive.usercontent.google.com/~
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://reallyfreegeoip.org/xml/155.94.241.186
188.114.96.3
https://chrome.google.com/webstore?hl=enlBjq
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
drive.google.com
142.250.185.206
drive.usercontent.google.com
216.58.206.65
checkip.dyndns.com
132.226.8.169

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
132.226.8.169
checkip.dyndns.com
United States
142.250.185.206
drive.google.com
United States
216.58.206.65
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wuerth_factura_4052073226_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wuerth_factura_4052073226_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wuerth_factura_4052073226_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wuerth_factura_4052073226_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wuerth_factura_4052073226_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wuerth_factura_4052073226_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wuerth_factura_4052073226_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wuerth_factura_4052073226_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wuerth_factura_4052073226_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wuerth_factura_4052073226_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wuerth_factura_4052073226_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wuerth_factura_4052073226_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wuerth_factura_4052073226_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Wuerth_factura_4052073226_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5BC2000
direct allocation
page execute and read and write
malicious
37401000
trusted library allocation
page read and write
malicious
2F22000
remote allocation
page execute and read and write
malicious
370B0000
trusted library allocation
page read and write
3A800000
trusted library allocation
page read and write
17C000
stack
page read and write
400000
unkown
page readonly
39640000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
39640000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
6EE6000
heap
page read and write
37673000
trusted library allocation
page read and write
386D7000
trusted library allocation
page read and write
3A29E000
stack
page read and write
3730F000
stack
page read and write
3841B000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
6CA0000
heap
page read and write
370B0000
trusted library allocation
page read and write
38772000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
373DD000
trusted library allocation
page read and write
6EEE000
heap
page read and write
39DC0000
trusted library allocation
page read and write
80000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A6A0000
trusted library allocation
page read and write
401000
unkown
page execute read
39640000
trusted library allocation
page read and write
40A000
unkown
page read and write
BA000
trusted library allocation
page execute and read and write
370B0000
trusted library allocation
page read and write
F0000
heap
page read and write
39DC0000
trusted library allocation
page read and write
8DC2000
direct allocation
page execute and read and write
36FF0000
remote allocation
page read and write
3A8F0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
782000
unkown
page read and write
984000
heap
page read and write
370B0000
trusted library allocation
page read and write
39640000
trusted library allocation
page read and write
3A800000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
3848F000
trusted library allocation
page read and write
B2000
trusted library allocation
page read and write
39640000
trusted library allocation
page read and write
36ACF000
stack
page read and write
3A680000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
7DD000
unkown
page readonly
39640000
trusted library allocation
page read and write
37653000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
376F0000
trusted library allocation
page read and write
376FB000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
6F37000
heap
page read and write
39DC0000
trusted library allocation
page read and write
2E20000
direct allocation
page read and write
3A650000
trusted library allocation
page read and write
38429000
trusted library allocation
page read and write
3A60F000
trusted library allocation
page read and write
395A0000
trusted library allocation
page read and write
375C1000
trusted library allocation
page read and write
395C0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A807000
trusted library allocation
page read and write
3A31E000
stack
page read and write
3A600000
trusted library allocation
page read and write
5722000
remote allocation
page execute and read and write
3A680000
trusted library allocation
page read and write
3A8E0000
trusted library allocation
page read and write
6F25000
heap
page read and write
3A650000
trusted library allocation
page read and write
39CBB000
heap
page read and write
388CD000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
2DE0000
direct allocation
page read and write
39DC0000
trusted library allocation
page read and write
3A640000
trusted library allocation
page read and write
7B3000
unkown
page read and write
3A910000
trusted library allocation
page read and write
3A910000
trusted library allocation
page read and write
6E78000
heap
page read and write
39660000
trusted library allocation
page read and write
3A660000
trusted library allocation
page read and write
387A3000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
13E000
stack
page read and write
39CC6000
heap
page read and write
3A650000
trusted library allocation
page read and write
38485000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
3A620000
trusted library allocation
page read and write
B75000
heap
page read and write
39640000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
26D0000
heap
page read and write
38798000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3767B000
trusted library allocation
page read and write
B0000
trusted library allocation
page read and write
3744D000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
374A9000
trusted library allocation
page read and write
95E000
stack
page read and write
39640000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
330C000
stack
page read and write
3A8E0000
trusted library allocation
page read and write
3A610000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
6EEB000
heap
page read and write
370B0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A8F0000
trusted library allocation
page read and write
6ECD000
heap
page read and write
39640000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
9A0000
heap
page read and write
3A650000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
25C5000
heap
page read and write
7A9000
unkown
page read and write
3A650000
trusted library allocation
page read and write
8860000
direct allocation
page read and write
2E00000
direct allocation
page read and write
3A650000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
387E7000
trusted library allocation
page read and write
2770000
direct allocation
page read and write
370B0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
8810000
direct allocation
page read and write
374BD000
trusted library allocation
page read and write
3A11E000
stack
page read and write
39640000
trusted library allocation
page read and write
388A2000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
7A6000
unkown
page read and write
39660000
trusted library allocation
page read and write
3A41F000
stack
page read and write
38792000
trusted library allocation
page read and write
2E10000
direct allocation
page read and write
370B0000
trusted library allocation
page read and write
376DF000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
2E50000
direct allocation
page read and write
370B0000
trusted library allocation
page read and write
3963E000
stack
page read and write
2E60000
direct allocation
page read and write
38472000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
8830000
direct allocation
page read and write
3A650000
trusted library allocation
page read and write
C2000
trusted library allocation
page read and write
4D22000
remote allocation
page execute and read and write
370B0000
trusted library allocation
page read and write
38890000
trusted library allocation
page read and write
373B6000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
375AE000
trusted library allocation
page read and write
AD000
trusted library allocation
page execute and read and write
3A650000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
3A8E0000
trusted library allocation
page read and write
375DF000
trusted library allocation
page read and write
36FF0000
remote allocation
page read and write
370B0000
trusted library allocation
page read and write
39656000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
395A0000
trusted library allocation
page read and write
90000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
39640000
trusted library allocation
page read and write
3767D000
trusted library allocation
page read and write
3A8C0000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
3846B000
trusted library allocation
page read and write
39D6D000
stack
page read and write
3A680000
trusted library allocation
page execute and read and write
370B0000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
395A0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
3757E000
trusted library allocation
page read and write
39C86000
heap
page read and write
3A8E0000
trusted library allocation
page read and write
B9A000
heap
page read and write
374A5000
trusted library allocation
page read and write
373BB000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A680000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A800000
trusted library allocation
page read and write
7DD000
unkown
page readonly
39DC0000
trusted library allocation
page read and write
375B6000
trusted library allocation
page read and write
3A680000
trusted library allocation
page read and write
D3F000
stack
page read and write
39C30000
heap
page read and write
3A5F0000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
370C0000
heap
page read and write
D0000
trusted library allocation
page execute and read and write
39660000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
3A900000
trusted library allocation
page execute and read and write
370B0000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
6D50000
heap
page read and write
3A650000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
10005000
unkown
page readonly
3A680000
trusted library allocation
page read and write
3A660000
trusted library allocation
page execute and read and write
370B0000
trusted library allocation
page read and write
39670000
heap
page read and write
3A630000
trusted library allocation
page read and write
395A0000
trusted library allocation
page read and write
894D000
stack
page read and write
39DC0000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
3A15E000
stack
page read and write
3A650000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
47C2000
direct allocation
page execute and read and write
370B0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
6EEE000
heap
page read and write
6FC2000
direct allocation
page execute and read and write
375E5000
trusted library allocation
page read and write
3840F000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
36BD0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
37837000
trusted library allocation
page read and write
388D1000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
376ED000
trusted library allocation
page read and write
373BE000
trusted library allocation
page read and write
3A810000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
3A8D0000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
38807000
trusted library allocation
page read and write
B79000
heap
page read and write
370B0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
386F9000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
373F0000
heap
page execute and read and write
376F3000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
259E000
stack
page read and write
3856F000
trusted library allocation
page read and write
3A8E0000
trusted library allocation
page read and write
6D55000
heap
page read and write
3A650000
trusted library allocation
page read and write
3A8E0000
trusted library allocation
page read and write
ADF000
stack
page read and write
37474000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
254E000
stack
page read and write
401000
unkown
page execute read
370B0000
trusted library allocation
page read and write
7AE000
unkown
page read and write
9D000
trusted library allocation
page execute and read and write
36D1F000
stack
page read and write
3A650000
trusted library allocation
page read and write
40A000
unkown
page write copy
3881D000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
400000
unkown
page readonly
39660000
trusted library allocation
page read and write
37310000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
6ED7000
heap
page read and write
3A650000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
39640000
trusted library allocation
page read and write
3A8E0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3879E000
trusted library allocation
page read and write
3A8E0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
37678000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
65C2000
direct allocation
page execute and read and write
3A650000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
39CE5000
heap
page read and write
400000
unkown
page readonly
36C1E000
stack
page read and write
374E5000
trusted library allocation
page read and write
408000
unkown
page readonly
370B0000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
375BC000
trusted library allocation
page read and write
374AD000
trusted library allocation
page read and write
39640000
trusted library allocation
page read and write
38759000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
37090000
direct allocation
page read and write
370B0000
trusted library allocation
page read and write
37682000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
39640000
trusted library allocation
page read and write
3847C000
trusted library allocation
page read and write
37318000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
394FE000
stack
page read and write
39650000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
6EB2000
heap
page read and write
39DC0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
39DD0000
heap
page execute and read and write
370B0000
trusted library allocation
page read and write
6EEB000
heap
page read and write
39660000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
3A600000
trusted library allocation
page read and write
37686000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
384FA000
trusted library allocation
page read and write
3A25F000
stack
page read and write
373D1000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
395A0000
trusted library allocation
page read and write
3A8F0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
3A8E0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
370A0000
trusted library allocation
page read and write
90E000
stack
page read and write
3922000
remote allocation
page execute and read and write
395A0000
trusted library allocation
page read and write
6F24000
heap
page read and write
395FD000
stack
page read and write
3A650000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
395A0000
trusted library allocation
page read and write
38653000
trusted library allocation
page read and write
93000
trusted library allocation
page execute and read and write
370B0000
trusted library allocation
page read and write
10000000
unkown
page readonly
3861F000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
40A000
unkown
page write copy
387BB000
trusted library allocation
page read and write
37080000
direct allocation
page read and write
3A650000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
7CD000
unkown
page readonly
395B0000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
370B1000
trusted library allocation
page read and write
1B22000
remote allocation
page execute and read and write
3A650000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
400000
unkown
page readonly
36FF0000
remote allocation
page read and write
9D0000
heap
page read and write
88CE000
stack
page read and write
370A0000
trusted library allocation
page read and write
3A5F0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
36EE0000
heap
page read and write
8840000
direct allocation
page read and write
39DC0000
trusted library allocation
page read and write
374A1000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
373CA000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
395A0000
trusted library allocation
page read and write
385F4000
trusted library allocation
page read and write
375B2000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3887A000
trusted library allocation
page read and write
2522000
remote allocation
page execute and read and write
36E8E000
stack
page read and write
3A8C0000
trusted library allocation
page read and write
B8C000
heap
page read and write
370B0000
trusted library allocation
page read and write
376F5000
trusted library allocation
page read and write
408000
unkown
page readonly
370B0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A8D0000
trusted library allocation
page read and write
8870000
direct allocation
page read and write
1A50000
remote allocation
page execute and read and write
3A680000
trusted library allocation
page read and write
E0000
trusted library allocation
page read and write
374B1000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
6EEE000
heap
page read and write
375B4000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
2DD0000
direct allocation
page read and write
36BCD000
stack
page read and write
401000
unkown
page execute read
39660000
trusted library allocation
page read and write
3A8C0000
trusted library allocation
page read and write
B40000
heap
page read and write
6EEE000
heap
page read and write
83C2000
direct allocation
page execute and read and write
3A7F0000
trusted library allocation
page read and write
25C0000
heap
page read and write
3A650000
trusted library allocation
page read and write
77C000
unkown
page read and write
376F9000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
9D5000
heap
page read and write
B1E000
stack
page read and write
376A9000
trusted library allocation
page read and write
375F2000
trusted library allocation
page read and write
37207000
stack
page read and write
376FF000
trusted library allocation
page read and write
38787000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
3966D000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
39650000
trusted library allocation
page read and write
6D10000
direct allocation
page read and write
3A7F0000
trusted library allocation
page read and write
3870F000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
2790000
heap
page read and write
38421000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
BA9000
heap
page read and write
370B0000
trusted library allocation
page read and write
340D000
stack
page read and write
370B0000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
373E2000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
B47000
heap
page read and write
370B0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
395A0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
401000
unkown
page execute read
3A650000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
373CE000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
3A680000
trusted library allocation
page read and write
38765000
trusted library allocation
page read and write
B86000
heap
page read and write
385E1000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A8E0000
trusted library allocation
page read and write
3A660000
trusted library allocation
page read and write
180000
trusted library allocation
page read and write
6EE6000
heap
page read and write
408000
unkown
page readonly
38478000
trusted library allocation
page read and write
7CD000
unkown
page readonly
38464000
trusted library allocation
page read and write
19A000
stack
page read and write
39DC0000
trusted library allocation
page read and write
395A0000
trusted library allocation
page read and write
3A8D0000
trusted library allocation
page read and write
37465000
trusted library allocation
page read and write
39CE2000
heap
page read and write
79C2000
direct allocation
page execute and read and write
3749D000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
6EEE000
heap
page read and write
C7000
trusted library allocation
page execute and read and write
3A600000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
3706F000
stack
page read and write
3A2DF000
stack
page read and write
3A650000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
7CD000
unkown
page readonly
39654000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
39DAF000
stack
page read and write
A0000
trusted library allocation
page read and write
6B80000
heap
page read and write
3710A000
stack
page read and write
3A5F0000
trusted library allocation
page execute and read and write
3965A000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
395A0000
trusted library allocation
page read and write
3A680000
trusted library allocation
page read and write
3850D000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
3A620000
trusted library allocation
page read and write
2E30000
direct allocation
page read and write
3A8E0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
6D40000
direct allocation
page read and write
97C2000
direct allocation
page execute and read and write
370B0000
trusted library allocation
page read and write
375E7000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
46F0000
direct allocation
page execute and read and write
3848A000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
4322000
remote allocation
page execute and read and write
38401000
trusted library allocation
page read and write
3A810000
trusted library allocation
page execute and read and write
10001000
unkown
page execute read
370B0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
408000
unkown
page readonly
6D20000
direct allocation
page read and write
370B0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
386B2000
trusted library allocation
page read and write
3A680000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
373B0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A01F000
stack
page read and write
3A670000
trusted library allocation
page execute and read and write
370B0000
trusted library allocation
page read and write
B6000
trusted library allocation
page execute and read and write
6B22000
remote allocation
page execute and read and write
6D00000
direct allocation
page read and write
980000
heap
page read and write
3A920000
trusted library allocation
page read and write
789000
unkown
page read and write
370B0000
trusted library allocation
page read and write
395A6000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
2CDF000
stack
page read and write
370B0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
3A8C0000
trusted library allocation
page read and write
2DF0000
direct allocation
page read and write
26CF000
stack
page read and write
3A650000
trusted library allocation
page read and write
3A8E0000
trusted library allocation
page read and write
3A8E0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
26E0000
heap
page read and write
890E000
stack
page read and write
3A7F0000
trusted library allocation
page read and write
38487000
trusted library allocation
page read and write
386C8000
trusted library allocation
page read and write
8980000
heap
page read and write
3A650000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
38481000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
3A8C0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
7A4000
unkown
page read and write
94000
trusted library allocation
page read and write
373D6000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
38414000
trusted library allocation
page read and write
3A680000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
C5000
trusted library allocation
page execute and read and write
370B0000
trusted library allocation
page read and write
39CD2000
heap
page read and write
39650000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
3A610000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
40A000
unkown
page write copy
3A650000
trusted library allocation
page read and write
3702E000
stack
page read and write
370B0000
trusted library allocation
page read and write
3A660000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
CB000
trusted library allocation
page execute and read and write
39DB0000
trusted library allocation
page execute and read and write
39660000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
387AE000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
7CD000
unkown
page readonly
370B0000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
6E60000
direct allocation
page read and write
6E70000
heap
page read and write
3A8C0000
trusted library allocation
page read and write
385CC000
trusted library allocation
page read and write
370B1000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
38539000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
3A630000
trusted library allocation
page read and write
3A800000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
37508000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
786000
unkown
page read and write
98000
stack
page read and write
370B0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
51C2000
direct allocation
page execute and read and write
2BDF000
stack
page read and write
3863E000
trusted library allocation
page read and write
910000
heap
page read and write
2780000
direct allocation
page read and write
3A650000
trusted library allocation
page read and write
6EEB000
heap
page read and write
370B0000
trusted library allocation
page read and write
395B0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
37470000
trusted library allocation
page read and write
39640000
trusted library allocation
page read and write
3A680000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
3A8E0000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
369CF000
stack
page read and write
36D30000
heap
page read and write
3A8C0000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
3A690000
trusted library allocation
page execute and read and write
3877F000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
8850000
direct allocation
page read and write
374B5000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
6D30000
heap
page read and write
370B0000
trusted library allocation
page read and write
39DC0000
trusted library allocation
page read and write
BA4000
heap
page read and write
3745A000
trusted library allocation
page read and write
6EDF000
heap
page read and write
375E3000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
376AF000
trusted library allocation
page read and write
39CB0000
heap
page read and write
6122000
remote allocation
page execute and read and write
38559000
trusted library allocation
page read and write
38622000
trusted library allocation
page read and write
3A8E0000
trusted library allocation
page read and write
7CA000
unkown
page read and write
3A7F0000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
7DD000
unkown
page readonly
39DC0000
trusted library allocation
page read and write
8820000
direct allocation
page read and write
374B9000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
370B0000
trusted library allocation
page read and write
384E4000
trusted library allocation
page read and write
7DD000
unkown
page readonly
7F0000
heap
page read and write
2E40000
direct allocation
page read and write
3A650000
trusted library allocation
page read and write
3A8F0000
trusted library allocation
page read and write
36D8E000
stack
page read and write
3A7F0000
trusted library allocation
page read and write
10003000
unkown
page readonly
3750A000
trusted library allocation
page read and write
3A650000
trusted library allocation
page read and write
375ED000
trusted library allocation
page read and write
37478000
trusted library allocation
page read and write
There are 733 hidden memdumps, click here to show them.