IOC Report
FACTURA DE PAGO.exe

loading gif

Files

File Path
Type
Category
Malicious
FACTURA DE PAGO.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Kinna\FACTURA DE PAGO.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Kinna\FACTURA DE PAGO.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Udlaanslofterne\Incuss.Pen
ASCII text, with very long lines (3179), with CRLF, LF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0htniaqs.pgk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_41efao5z.m12.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_laf1hwwh.w4g.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xlkuzx1i.pt2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Kinna\strudsfjerenes.uns
data
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Kinna\unnamed.jpg
JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 512x512, components 3
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Klipfisks\psychograph.rut
data
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Udlaanslofterne\Dichapetalum\aktivitetsrunde.txt
ASCII text, with very long lines (360), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Udlaanslofterne\Dichapetalum\discourteously.gam
GTA audio index data (SDT)
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Uxoricidal.Cle
data
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FACTURA DE PAGO.exe
"C:\Users\user\Desktop\FACTURA DE PAGO.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$fkale=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Udlaanslofterne\Incuss.Pen';$Humongous=$fkale.SubString(4177,3);.$Humongous($fkale)"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://www.office.com/
unknown
http://nuget.org/NuGet.exe
unknown
https://api.telegram.org
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://api.telegram.org/bot
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:971342%0D%0ADate%20a
unknown
https://contoso.com/License
unknown
https://www.office.com/lB
unknown
https://contoso.com/Icon
unknown
https://drive.usercontent.google.com/
unknown
http://checkip.dyndns.org
unknown
https://drive.google.com/K
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://reallyfreegeoip.org/xml/155.94.241.186$
unknown
http://varders.kozow.com:8081
unknown
https://github.com/Pester/Pester
unknown
http://aborters.duckdns.org:8081
unknown
https://www.google.com
unknown
http://checkip.dyndns.org/
193.122.6.168
http://nsis.sf.net/NSIS_Error
unknown
http://crl.micro
unknown
https://aka.ms/pscore6lB
unknown
https://drive.google.com/
unknown
http://anotherarmy.dns.army:8081
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:971342%0D%0ADate%20and%20Time:%2021/10/2024%20/%2019:09:45%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20971342%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://drive.usercontent.google.com/j$v
unknown
https://reallyfreegeoip.org
unknown
https://apis.google.com
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/155.94.241.186
188.114.97.3
https://reallyfreegeoip.org/xml/
unknown
There are 31 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
drive.google.com
216.58.206.46
drive.usercontent.google.com
142.250.186.33
checkip.dyndns.com
193.122.6.168

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
193.122.6.168
checkip.dyndns.com
United States
142.250.186.33
drive.usercontent.google.com
United States
216.58.206.46
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
20F01000
trusted library allocation
page read and write
malicious
8D6C000
direct allocation
page execute and read and write
malicious
234E0000
trusted library allocation
page read and write
22182000
trusted library allocation
page read and write
221C0000
trusted library allocation
page read and write
53F8000
heap
page read and write
230A0000
trusted library allocation
page read and write
23190000
heap
page read and write
803E000
stack
page read and write
23700000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
2303B000
trusted library allocation
page read and write
70F0000
trusted library allocation
page execute and read and write
81D9000
heap
page read and write
23D00000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
409000
unkown
page write copy
236E0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
236E0000
trusted library allocation
page read and write
23DB0000
trusted library allocation
page read and write
235DF000
stack
page read and write
212AE000
trusted library allocation
page read and write
6E8F000
stack
page read and write
4B8000
heap
page read and write
8BE0000
trusted library allocation
page execute and read and write
234D0000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
23390000
direct allocation
page read and write
22296000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
23090000
trusted library allocation
page read and write
2114C000
trusted library allocation
page read and write
21F23000
trusted library allocation
page read and write
540F000
heap
page read and write
232EF000
heap
page read and write
234D0000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23E00000
trusted library allocation
page read and write
4B0000
heap
page read and write
21253000
trusted library allocation
page read and write
23DC0000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
232F3000
heap
page read and write
5403000
heap
page read and write
23720000
trusted library allocation
page read and write
23730000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23D30000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
20FA7000
trusted library allocation
page read and write
42F000
unkown
page read and write
23E00000
trusted library allocation
page read and write
47E0000
heap
page execute and read and write
452000
unkown
page readonly
23042000
trusted library allocation
page read and write
210BE000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
20FE000
stack
page read and write
23700000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
20FBF000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
21113000
trusted library allocation
page read and write
8C00000
direct allocation
page execute and read and write
23E10000
trusted library allocation
page read and write
8213000
heap
page read and write
221F5000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
21FE4000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
6C8000
stack
page read and write
234D0000
trusted library allocation
page read and write
5406000
heap
page read and write
22032000
trusted library allocation
page read and write
230D0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
23DB0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
54C0000
heap
page read and write
234D0000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
230B0000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
91F000
stack
page read and write
8150000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
22258000
trusted library allocation
page read and write
22230000
trusted library allocation
page read and write
23DE0000
trusted library allocation
page read and write
19A000
stack
page read and write
234D0000
trusted library allocation
page read and write
47BD000
stack
page read and write
20F7A000
trusted library allocation
page read and write
210B4000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
20B7E000
stack
page read and write
6FB0000
heap
page execute and read and write
80BE000
stack
page read and write
828D000
heap
page read and write
BC0000
trusted library allocation
page execute and read and write
23740000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
22108000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
477C000
stack
page read and write
23720000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
8160000
trusted library allocation
page read and write
21F29000
trusted library allocation
page read and write
640000
heap
page read and write
23740000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
810B000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
81E9000
heap
page read and write
23D30000
trusted library allocation
page read and write
6C00000
direct allocation
page read and write
22280000
trusted library allocation
page read and write
8244000
heap
page read and write
23D00000
trusted library allocation
page read and write
20FB3000
trusted library allocation
page read and write
22044000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
2D42000
trusted library allocation
page read and write
6B5D000
stack
page read and write
2920000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23DB0000
trusted library allocation
page read and write
8107000
trusted library allocation
page read and write
23D30000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
4BA6000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
A74000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
2D57000
trusted library allocation
page execute and read and write
23740000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
22F08000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
20F50000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
6C5D000
stack
page read and write
23E00000
trusted library allocation
page read and write
2226C000
trusted library allocation
page read and write
23DC0000
trusted library allocation
page read and write
540F000
trusted library allocation
page read and write
20D20000
remote allocation
page read and write
976C000
direct allocation
page execute and read and write
23740000
trusted library allocation
page read and write
6DCE000
stack
page read and write
73A0000
trusted library allocation
page read and write
220B6000
trusted library allocation
page read and write
234E0000
trusted library allocation
page read and write
8BAA000
stack
page read and write
230B6000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
A5E000
stack
page read and write
B60000
heap
page read and write
236FA000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
2365E000
stack
page read and write
23E00000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
22223000
trusted library allocation
page read and write
540F000
heap
page read and write
2350D000
stack
page read and write
234D0000
trusted library allocation
page read and write
23E00000
trusted library allocation
page read and write
23070000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
230B0000
trusted library allocation
page read and write
210B6000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
540A000
heap
page read and write
22252000
trusted library allocation
page read and write
232A3000
heap
page read and write
23740000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
2100A000
trusted library allocation
page read and write
ADE000
stack
page read and write
927000
heap
page read and write
5650000
direct allocation
page read and write
230A0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
7F00000
trusted library allocation
page read and write
23DF0000
trusted library allocation
page read and write
22194000
trusted library allocation
page read and write
230B0000
trusted library allocation
page read and write
21FF0000
trusted library allocation
page read and write
5630000
direct allocation
page read and write
234D1000
trusted library allocation
page read and write
20AA0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
6C10000
direct allocation
page read and write
23720000
trusted library allocation
page read and write
23DB0000
trusted library allocation
page read and write
4850000
heap
page read and write
22093000
trusted library allocation
page read and write
5380000
direct allocation
page read and write
234D0000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
7E7E000
stack
page read and write
23DE0000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
442000
unkown
page readonly
740000
heap
page read and write
236E0000
trusted library allocation
page read and write
6FF1000
heap
page read and write
23DB0000
trusted library allocation
page read and write
7D0000
heap
page read and write
23740000
trusted library allocation
page read and write
236F4000
trusted library allocation
page read and write
213F0000
trusted library allocation
page read and write
234CE000
stack
page read and write
234D0000
trusted library allocation
page read and write
234E0000
trusted library allocation
page read and write
2369E000
stack
page read and write
2305D000
trusted library allocation
page read and write
20AEE000
stack
page read and write
8E6000
heap
page read and write
23700000
trusted library allocation
page read and write
230B0000
trusted library allocation
page read and write
6A8E000
stack
page read and write
22260000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
401000
unkown
page execute read
4260000
remote allocation
page execute and read and write
23740000
trusted library allocation
page read and write
8BF0000
direct allocation
page execute and read and write
2D4A000
trusted library allocation
page execute and read and write
6BA0000
direct allocation
page read and write
23740000
trusted library allocation
page read and write
6BE0000
direct allocation
page read and write
23D00000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
8313000
heap
page read and write
230A0000
trusted library allocation
page read and write
210E1000
trusted library allocation
page read and write
220E4000
trusted library allocation
page read and write
21F8D000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
807F000
stack
page read and write
2117C000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
54B0000
direct allocation
page read and write
21FBD000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
2D3D000
trusted library allocation
page execute and read and write
21FB9000
trusted library allocation
page read and write
5490000
direct allocation
page read and write
22255000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
5690000
direct allocation
page read and write
234D0000
trusted library allocation
page read and write
49CE000
stack
page read and write
7FF0000
trusted library allocation
page read and write
236F0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
21337000
trusted library allocation
page read and write
544C000
heap
page read and write
70E0000
trusted library allocation
page read and write
5464000
heap
page read and write
20F72000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
4EE000
heap
page read and write
23DB0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23DB0000
trusted library allocation
page read and write
20EE0000
trusted library allocation
page execute and read and write
42B000
unkown
page read and write
23DA0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
232DA000
heap
page read and write
2184000
heap
page read and write
23051000
trusted library allocation
page read and write
2217A000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
21FEA000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
232F7000
heap
page read and write
23D00000
trusted library allocation
page read and write
23E00000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
5680000
direct allocation
page read and write
4DCC000
remote allocation
page execute and read and write
23020000
trusted library allocation
page read and write
20E9E000
stack
page read and write
7D94000
stack
page read and write
83D0000
trusted library allocation
page execute and read and write
23D00000
trusted library allocation
page read and write
B67000
heap
page read and write
7DA0000
heap
page read and write
2235000
heap
page read and write
23700000
trusted library allocation
page read and write
23080000
trusted library allocation
page read and write
210E5000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
6BC0000
direct allocation
page read and write
407000
unkown
page readonly
827F000
heap
page read and write
23740000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
540A000
heap
page read and write
23700000
trusted library allocation
page read and write
23DB0000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
230B0000
trusted library allocation
page read and write
23D20000
trusted library allocation
page read and write
2361E000
stack
page read and write
6ACD000
stack
page read and write
22244000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
47E5000
heap
page execute and read and write
4849000
heap
page read and write
858000
heap
page read and write
2370D000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23D30000
trusted library allocation
page read and write
2223D000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
833C000
heap
page read and write
23740000
trusted library allocation
page read and write
2D23000
trusted library allocation
page execute and read and write
23740000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23E00000
trusted library allocation
page read and write
23E10000
trusted library allocation
page read and write
23DC0000
trusted library allocation
page read and write
22053000
trusted library allocation
page read and write
21F90000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
6BB0000
direct allocation
page read and write
234D0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
221B2000
trusted library allocation
page read and write
21309000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
A7D000
trusted library allocation
page execute and read and write
234D0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
234E0000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
234E0000
trusted library allocation
page read and write
210E7000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
236E0000
trusted library allocation
page read and write
81B0000
heap
page read and write
23720000
trusted library allocation
page read and write
7FC58000
trusted library allocation
page execute and read and write
234D0000
trusted library allocation
page read and write
23E00000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
23DB0000
trusted library allocation
page read and write
71EF000
stack
page read and write
446000
unkown
page readonly
230B0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23D10000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
407000
unkown
page readonly
7F30000
heap
page read and write
23700000
trusted library allocation
page read and write
23D40000
trusted library allocation
page execute and read and write
22279000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
BB0000
heap
page readonly
401000
unkown
page execute read
2374F000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
83C0000
trusted library allocation
page execute and read and write
236E0000
trusted library allocation
page read and write
23DD0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
230B0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23E50000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
210F4000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
220F0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
209EF000
stack
page read and write
23740000
trusted library allocation
page read and write
53DE000
heap
page read and write
2DF0000
heap
page read and write
22163000
trusted library allocation
page read and write
4A51000
trusted library allocation
page read and write
56A0000
direct allocation
page read and write
20D9F000
stack
page read and write
730E000
stack
page read and write
234D0000
trusted library allocation
page read and write
722E000
stack
page read and write
23720000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
820000
heap
page read and write
2D40000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
236E0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
442000
unkown
page readonly
20F6A000
trusted library allocation
page read and write
460000
heap
page read and write
23740000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
213C2000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
20FE5000
trusted library allocation
page read and write
72C0000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
8110000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
2314E000
stack
page read and write
B10000
trusted library allocation
page read and write
7120000
trusted library allocation
page read and write
7DB0000
trusted library allocation
page execute and read and write
23740000
trusted library allocation
page read and write
7E3D000
stack
page read and write
23740000
trusted library allocation
page read and write
21365000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
540B000
heap
page read and write
234D0000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
82EF000
heap
page read and write
20C10000
heap
page read and write
230B0000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
81B8000
heap
page read and write
7110000
trusted library allocation
page read and write
221D0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
6C9A000
stack
page read and write
234D0000
trusted library allocation
page read and write
22161000
trusted library allocation
page read and write
726D000
stack
page read and write
210E9000
trusted library allocation
page read and write
2304E000
trusted library allocation
page read and write
6E0E000
stack
page read and write
20FAB000
trusted library allocation
page read and write
2DD0000
heap
page read and write
23720000
trusted library allocation
page read and write
7FF5000
trusted library allocation
page read and write
7F20000
trusted library allocation
page read and write
21280000
trusted library allocation
page read and write
23380000
direct allocation
page read and write
23D30000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
512000
heap
page read and write
5390000
heap
page read and write
7F10000
trusted library allocation
page read and write
20D5E000
stack
page read and write
23740000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23710000
trusted library allocation
page execute and read and write
20D20000
remote allocation
page read and write
5441000
heap
page read and write
23700000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
6D1A000
stack
page read and write
96000
stack
page read and write
23740000
trusted library allocation
page read and write
233B0000
direct allocation
page read and write
230A0000
trusted library allocation
page read and write
740B000
stack
page read and write
8284000
heap
page read and write
54C5000
heap
page read and write
54A0000
direct allocation
page read and write
8BF000
heap
page read and write
2D2D000
trusted library allocation
page execute and read and write
7350000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
2D24000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
68C000
stack
page read and write
452000
unkown
page readonly
8580000
trusted library allocation
page read and write
233F000
stack
page read and write
81E5000
heap
page read and write
7EC5000
trusted library allocation
page read and write
23E00000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
6B9B000
stack
page read and write
7EF0000
trusted library allocation
page read and write
539A000
heap
page read and write
2359E000
stack
page read and write
23740000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
23DB0000
trusted library allocation
page read and write
5456000
heap
page read and write
23720000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
A73000
trusted library allocation
page execute and read and write
80FE000
stack
page read and write
23DC7000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
5417000
trusted library allocation
page read and write
234D1000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
221D2000
trusted library allocation
page read and write
540A000
heap
page read and write
2229D000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
70E7000
trusted library allocation
page read and write
20BBE000
stack
page read and write
2332D000
heap
page read and write
2200E000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
2D60000
heap
page read and write
23730000
trusted library allocation
page read and write
8273000
heap
page read and write
23740000
trusted library allocation
page read and write
20FA3000
trusted library allocation
page read and write
82A7000
heap
page read and write
4A40000
heap
page execute and read and write
234D0000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
23E00000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23DB0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23730000
trusted library allocation
page execute and read and write
23E0000
heap
page read and write
8E9000
heap
page read and write
81D0000
heap
page read and write
2200000
heap
page read and write
7280000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
71AE000
stack
page read and write
5ABC000
trusted library allocation
page read and write
A9A000
heap
page read and write
23D20000
trusted library allocation
page read and write
20A2D000
stack
page read and write
2239000
heap
page read and write
7370000
trusted library allocation
page read and write
6EA1000
heap
page read and write
234D0000
trusted library allocation
page read and write
23E10000
trusted library allocation
page read and write
4F2000
heap
page read and write
22284000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
2303E000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
400000
unkown
page readonly
211EA000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
7360000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
50F000
heap
page read and write
234D0000
trusted library allocation
page read and write
230B0000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
23034000
trusted library allocation
page read and write
2D55000
trusted library allocation
page execute and read and write
2180000
heap
page read and write
23740000
trusted library allocation
page read and write
222A5000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
7100000
trusted library allocation
page read and write
4AB2000
trusted library allocation
page read and write
23E00000
trusted library allocation
page read and write
23E30000
trusted library allocation
page read and write
4840000
heap
page read and write
236E0000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
20E0A000
stack
page read and write
20D20000
remote allocation
page read and write
23700000
trusted library allocation
page read and write
2100000
heap
page read and write
21F0B000
trusted library allocation
page read and write
482E000
stack
page read and write
6ED8000
heap
page read and write
20F67000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
6EF9000
heap
page read and write
23DC0000
trusted library allocation
page read and write
23E00000
trusted library allocation
page read and write
AF5000
trusted library allocation
page execute and read and write
21FF2000
trusted library allocation
page read and write
20B2F000
stack
page read and write
212DB000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
2092E000
stack
page read and write
935000
heap
page read and write
234D0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
236F6000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
236DE000
stack
page read and write
20DB0000
direct allocation
page read and write
23E20000
trusted library allocation
page execute and read and write
234D0000
trusted library allocation
page read and write
440000
unkown
page read and write
220AB000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
83B2000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23DB0000
trusted library allocation
page read and write
209AD000
stack
page read and write
7FE0000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
840000
trusted library section
page read and write
6E4E000
stack
page read and write
234D0000
trusted library allocation
page read and write
800000
trusted library section
page read and write
23DB0000
trusted library allocation
page read and write
22173000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
23D30000
trusted library allocation
page read and write
236E0000
trusted library allocation
page read and write
23E00000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23D10000
trusted library allocation
page execute and read and write
23740000
trusted library allocation
page read and write
5C01000
trusted library allocation
page read and write
221EA000
trusted library allocation
page read and write
20EDE000
stack
page read and write
5620000
direct allocation
page read and write
22F00000
trusted library allocation
page read and write
434000
unkown
page read and write
23740000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
56B7000
heap
page read and write
409000
unkown
page read and write
8100000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
6CDE000
stack
page read and write
20570000
direct allocation
page read and write
282F000
stack
page read and write
2201C000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23DE0000
trusted library allocation
page read and write
20E10000
heap
page read and write
B5E000
stack
page read and write
23740000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
2230000
heap
page read and write
230B0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
8BD0000
trusted library allocation
page execute and read and write
2D52000
trusted library allocation
page read and write
20EF0000
heap
page execute and read and write
21FCF000
trusted library allocation
page read and write
645000
heap
page read and write
2DE0000
heap
page readonly
543C000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
2218E000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
7E80000
heap
page read and write
236F0000
trusted library allocation
page read and write
210B8000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23DB0000
trusted library allocation
page read and write
21FDE000
trusted library allocation
page read and write
23056000
trusted library allocation
page read and write
22286000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
22034000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23DB0000
trusted library allocation
page read and write
2D5B000
trusted library allocation
page execute and read and write
23720000
trusted library allocation
page read and write
20FAF000
trusted library allocation
page read and write
23E00000
trusted library allocation
page read and write
22FDC000
stack
page read and write
20F5C000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
8E3000
heap
page read and write
230A0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23D30000
trusted library allocation
page execute and read and write
56B0000
heap
page read and write
23740000
trusted library allocation
page read and write
2301E000
stack
page read and write
234D0000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
210EF000
trusted library allocation
page read and write
23DB0000
trusted library allocation
page read and write
498F000
stack
page read and write
78E000
stack
page read and write
23D30000
trusted library allocation
page read and write
22188000
trusted library allocation
page read and write
23030000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
A80000
trusted library allocation
page read and write
8BB0000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
850000
heap
page read and write
234D0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23D30000
trusted library allocation
page read and write
208D0000
heap
page read and write
23740000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
5EE000
stack
page read and write
23740000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23DB0000
trusted library allocation
page read and write
7CF000
stack
page read and write
23E00000
trusted library allocation
page read and write
81BE000
heap
page read and write
23DF0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
21F69000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
215E000
stack
page read and write
23D30000
trusted library allocation
page read and write
21FEE000
trusted library allocation
page read and write
21393000
trusted library allocation
page read and write
23DE0000
trusted library allocation
page read and write
5F0000
heap
page read and write
8DB000
heap
page read and write
20FBB000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
6F03000
heap
page read and write
230A0000
trusted library allocation
page read and write
23D00000
trusted library allocation
page read and write
4728000
trusted library allocation
page read and write
2204B000
trusted library allocation
page read and write
23D10000
trusted library allocation
page read and write
230C0000
heap
page read and write
23700000
trusted library allocation
page read and write
23D20000
trusted library allocation
page execute and read and write
234D0000
trusted library allocation
page read and write
220B4000
trusted library allocation
page read and write
23E40000
trusted library allocation
page read and write
21FBF000
trusted library allocation
page read and write
22237000
trusted library allocation
page read and write
23D00000
trusted library allocation
page execute and read and write
234D0000
trusted library allocation
page read and write
400000
unkown
page readonly
23720000
trusted library allocation
page read and write
2327E000
heap
page read and write
23240000
heap
page read and write
83F0000
trusted library allocation
page read and write
23DE0000
trusted library allocation
page read and write
BAE000
stack
page read and write
6FC0000
trusted library allocation
page read and write
889000
heap
page read and write
23720000
trusted library allocation
page read and write
23D30000
trusted library allocation
page read and write
22192000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
230A0000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
7270000
trusted library allocation
page execute and read and write
7DC0000
trusted library allocation
page read and write
446000
unkown
page readonly
234E0000
trusted library allocation
page read and write
210B0000
trusted library allocation
page read and write
20E57000
stack
page read and write
23740000
trusted library allocation
page read and write
4A0C000
stack
page read and write
2310D000
stack
page read and write
23740000
trusted library allocation
page read and write
232CD000
heap
page read and write
2202C000
trusted library allocation
page read and write
20FE7000
trusted library allocation
page read and write
23DE0000
trusted library allocation
page read and write
23DD0000
trusted library allocation
page execute and read and write
23740000
trusted library allocation
page read and write
230B0000
trusted library allocation
page read and write
7FC40000
trusted library allocation
page execute and read and write
72A0000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
81D5000
heap
page read and write
236F0000
trusted library allocation
page read and write
21F0000
heap
page read and write
857E000
stack
page read and write
5A79000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
A89000
trusted library allocation
page read and write
23DF0000
trusted library allocation
page read and write
734D000
stack
page read and write
AF2000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
21F99000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
2354E000
stack
page read and write
23740000
trusted library allocation
page read and write
21F01000
trusted library allocation
page read and write
23700000
trusted library allocation
page read and write
233E0000
direct allocation
page read and write
23740000
trusted library allocation
page read and write
21FE2000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
43CC000
remote allocation
page execute and read and write
234D0000
trusted library allocation
page read and write
6EE8000
heap
page read and write
22196000
trusted library allocation
page read and write
23036000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
234D0000
trusted library allocation
page read and write
2318E000
stack
page read and write
23740000
trusted library allocation
page read and write
73B0000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
20F9F000
trusted library allocation
page read and write
2202E000
trusted library allocation
page read and write
8BC0000
heap
page read and write
5670000
direct allocation
page read and write
23D00000
trusted library allocation
page read and write
210C3000
trusted library allocation
page read and write
234E0000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
5445000
heap
page read and write
20F76000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
A90000
heap
page read and write
233A0000
direct allocation
page read and write
21FD6000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
2121A000
trusted library allocation
page read and write
23D30000
trusted library allocation
page read and write
2111B000
trusted library allocation
page read and write
81F000
stack
page read and write
8CC000
heap
page read and write
23740000
trusted library allocation
page read and write
5640000
direct allocation
page read and write
23740000
trusted library allocation
page read and write
20DC0000
direct allocation
page read and write
AEA000
trusted library allocation
page execute and read and write
5BEC000
trusted library allocation
page read and write
23340000
heap
page execute and read and write
23700000
trusted library allocation
page read and write
816000
heap
page read and write
506000
heap
page read and write
23740000
trusted library allocation
page read and write
2215D000
trusted library allocation
page read and write
4AE000
stack
page read and write
23062000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
2D46000
trusted library allocation
page execute and read and write
23740000
trusted library allocation
page read and write
23E40000
trusted library allocation
page read and write
8140000
trusted library allocation
page read and write
23720000
trusted library allocation
page read and write
5660000
direct allocation
page read and write
6BD0000
direct allocation
page read and write
23720000
trusted library allocation
page read and write
221F3000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
20FB7000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
20A6C000
stack
page read and write
23700000
trusted library allocation
page read and write
6BF0000
direct allocation
page read and write
23740000
trusted library allocation
page read and write
23DE0000
trusted library allocation
page read and write
2096F000
stack
page read and write
22186000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
22248000
trusted library allocation
page read and write
23090000
trusted library allocation
page read and write
23DB0000
trusted library allocation
page read and write
810000
heap
page read and write
92D000
heap
page read and write
There are 966 hidden memdumps, click here to show them.