IOC Report
rFa24c148.exe

loading gif

Files

File Path
Type
Category
Malicious
rFa24c148.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\Pjaskeriers.fra
xBase index, root pointer 0x1c00, free node pointer 0xb80000, key length 0, index options (0)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\akvarierne.lbe
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\cornetcies.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\dmt.roi
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\hisset.tjr
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\juleriernes.lia
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\matematikopgavens.sti
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\rygmarvsprvens.Beg
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\tipssensationens.hve
data
dropped
C:\Users\user\AppData\Local\Temp\nsnA538.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rFa24c148.exe
"C:\Users\user\Desktop\rFa24c148.exe"
malicious
C:\Users\user\Desktop\rFa24c148.exe
"C:\Users\user\Desktop\rFa24c148.exe"
malicious

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:124406%0D%0ADate%20a
unknown
https://www.office.com/lB
unknown
https://drive.usercontent.google.com/
unknown
http://checkip.dyndns.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:124406%0D%0ADate%20and%20Time:%2028/10/2024%20/%2012:44:28%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20124406%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://nsis.sf.net/NSIS_ErrorError
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://reallyfreegeoip.org/xml/155.94.241.188$
unknown
http://varders.kozow.com:8081
unknown
http://aborters.duckdns.org:8081
unknown
https://www.google.com
unknown
http://checkip.dyndns.org/
193.122.6.168
https://drive.google.com/
unknown
http://anotherarmy.dns.army:8081
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
https://apis.google.com
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/155.94.241.188
188.114.96.3
https://reallyfreegeoip.org/xml/
unknown
There are 18 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
drive.google.com
172.217.18.110
drive.usercontent.google.com
142.250.185.225
checkip.dyndns.com
193.122.6.168

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
193.122.6.168
checkip.dyndns.com
United States
172.217.18.110
drive.google.com
United States
142.250.185.225
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\annoterendes\Elektroniker162\skimlen
socialpensions
HKEY_CURRENT_USER\papercutting\Uninstall\antarchistic\Tarau
Backstay
HKEY_CURRENT_USER\hydrochlorate\pyloroplasty\Accessorily213
peppe
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rFa24c148_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rFa24c148_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rFa24c148_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rFa24c148_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rFa24c148_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rFa24c148_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rFa24c148_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rFa24c148_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rFa24c148_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rFa24c148_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rFa24c148_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rFa24c148_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rFa24c148_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rFa24c148_RASMANCS
FileDirectory
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
33441000
trusted library allocation
page read and write
malicious
52E5000
direct allocation
page execute and read and write
malicious
36730000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
407000
unkown
page readonly
368E0000
trusted library allocation
page read and write
3637F000
stack
page read and write
367B0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
421000
unkown
page read and write
35D60000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
35CB0000
trusted library allocation
page read and write
225E000
stack
page read and write
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
30E0000
direct allocation
page read and write
3E5C000
stack
page read and write
487000
unkown
page readonly
36810000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
492E000
stack
page read and write
36810000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36900000
trusted library allocation
page read and write
2DA0000
direct allocation
page read and write
36900000
trusted library allocation
page read and write
35DFE000
heap
page read and write
3368A000
trusted library allocation
page read and write
344CD000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
CB000
trusted library allocation
page execute and read and write
36760000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
493000
unkown
page readonly
42C000
unkown
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367E0000
trusted library allocation
page read and write
367E0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
5240000
direct allocation
page execute and read and write
3452F000
trusted library allocation
page read and write
35D66000
trusted library allocation
page read and write
401000
unkown
page execute read
33412000
trusted library allocation
page read and write
33547000
trusted library allocation
page read and write
409000
unkown
page write copy
367A0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
33627000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
3452D000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
35DEE000
heap
page read and write
36820000
trusted library allocation
page read and write
368E0000
trusted library allocation
page read and write
2D50000
direct allocation
page read and write
333E6000
trusted library allocation
page read and write
35CB0000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
346FD000
trusted library allocation
page read and write
35DF2000
heap
page read and write
355E0000
trusted library allocation
page read and write
3627E000
stack
page read and write
2CE0000
heap
page read and write
36730000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
3362D000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
2751000
heap
page read and write
35E00000
heap
page read and write
36810000
trusted library allocation
page read and write
2E26000
heap
page read and write
30C0000
direct allocation
page read and write
330F0000
heap
page read and write
36540000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
2E0E000
heap
page read and write
367B0000
trusted library allocation
page read and write
500000
heap
page read and write
36730000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
2E26000
heap
page read and write
355E0000
trusted library allocation
page read and write
338F5000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
5CC000
heap
page read and write
462000
unkown
page readonly
355E0000
trusted library allocation
page read and write
2758000
heap
page read and write
35D4E000
stack
page read and write
2BA5000
remote allocation
page execute and read and write
33430000
heap
page execute and read and write
367E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
5CE5000
direct allocation
page execute and read and write
5CE000
heap
page read and write
59C000
heap
page read and write
347D4000
trusted library allocation
page read and write
33659000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
36900000
trusted library allocation
page read and write
409000
unkown
page write copy
34730000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
363BE000
stack
page read and write
3348E000
trusted library allocation
page read and write
472000
unkown
page readonly
34760000
trusted library allocation
page read and write
59C000
heap
page read and write
355E0000
trusted library allocation
page read and write
330D0000
direct allocation
page read and write
355E0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
34793000
trusted library allocation
page read and write
480000
unkown
page readonly
335F6000
trusted library allocation
page read and write
33401000
trusted library allocation
page read and write
409000
unkown
page write copy
355E0000
trusted library allocation
page read and write
33757000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
472000
unkown
page readonly
333FE000
trusted library allocation
page read and write
42F000
unkown
page read and write
2754000
heap
page read and write
355E0000
trusted library allocation
page read and write
337B4000
trusted library allocation
page read and write
36820000
trusted library allocation
page read and write
170000
trusted library allocation
page read and write
336BA000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36900000
trusted library allocation
page read and write
5A8000
heap
page read and write
33040000
remote allocation
page read and write
367A0000
trusted library allocation
page read and write
5C5000
heap
page read and write
48F000
unkown
page readonly
505000
heap
page read and write
367B0000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
2E62000
heap
page read and write
5AC000
heap
page read and write
36810000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
180000
trusted library allocation
page read and write
4B0000
heap
page read and write
367A0000
trusted library allocation
page read and write
35CB0000
trusted library allocation
page read and write
32EDE000
stack
page read and write
367A0000
trusted library allocation
page read and write
34775000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
5C5000
heap
page read and write
A0000
trusted library allocation
page read and write
35CB0000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
5A8000
heap
page read and write
367B0000
trusted library allocation
page execute and read and write
34521000
trusted library allocation
page read and write
93000
trusted library allocation
page execute and read and write
367A0000
trusted library allocation
page read and write
35D89000
heap
page read and write
35E21000
heap
page read and write
34645000
trusted library allocation
page read and write
2265000
heap
page read and write
3349B000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
5C5000
heap
page read and write
367A0000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
5C5000
heap
page read and write
35DF0000
heap
page read and write
493000
unkown
page readonly
32D6E000
stack
page read and write
3623F000
stack
page read and write
4880000
direct allocation
page read and write
355E0000
trusted library allocation
page read and write
367E0000
trusted library allocation
page read and write
363FF000
stack
page read and write
36900000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
56E000
heap
page read and write
3444B000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
35CB0000
trusted library allocation
page read and write
48D000
unkown
page readonly
451000
unkown
page read and write
355E0000
trusted library allocation
page read and write
36910000
trusted library allocation
page read and write
487000
unkown
page readonly
36540000
trusted library allocation
page read and write
3462D000
trusted library allocation
page read and write
80000
trusted library allocation
page read and write
407000
unkown
page readonly
355E0000
trusted library allocation
page read and write
346D1000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
B0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
344D6000
trusted library allocation
page read and write
335F4000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
2E6B000
heap
page read and write
355E0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
409000
unkown
page read and write
355E0000
trusted library allocation
page read and write
32AFF000
stack
page read and write
367E0000
trusted library allocation
page read and write
35D50000
trusted library allocation
page read and write
367F0000
trusted library allocation
page execute and read and write
2DB8000
heap
page read and write
496D000
stack
page read and write
90000
trusted library allocation
page read and write
36760000
trusted library allocation
page read and write
5AC000
heap
page read and write
355E0000
trusted library allocation
page read and write
35D50000
trusted library allocation
page read and write
35D50000
trusted library allocation
page read and write
346B7000
trusted library allocation
page read and write
334DE000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
48D000
unkown
page readonly
36540000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
368E0000
trusted library allocation
page read and write
35D6A000
trusted library allocation
page read and write
275D000
heap
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
346B0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
33040000
remote allocation
page read and write
35D50000
trusted library allocation
page read and write
400000
unkown
page readonly
355E0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
2CD0000
heap
page read and write
367A0000
trusted library allocation
page read and write
3450C000
trusted library allocation
page read and write
333EE000
trusted library allocation
page read and write
34786000
trusted library allocation
page read and write
10001000
unkown
page execute read
35E3C000
heap
page read and write
B2000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
36780000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
36910000
trusted library allocation
page read and write
36770000
trusted library allocation
page read and write
35D50000
trusted library allocation
page read and write
401000
unkown
page execute read
367A0000
trusted library allocation
page read and write
35CB0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
48E0000
heap
page read and write
35E15000
heap
page read and write
3653F000
stack
page read and write
2DF2000
heap
page read and write
36827000
trusted library allocation
page read and write
487000
unkown
page readonly
92F000
stack
page read and write
94000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
487000
unkown
page readonly
367E0000
trusted library allocation
page execute and read and write
367B0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
3469A000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
3456F000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
34527000
trusted library allocation
page read and write
3553E000
stack
page read and write
36540000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
35BB0000
heap
page read and write
367A0000
trusted library allocation
page read and write
36900000
trusted library allocation
page read and write
3120000
direct allocation
page read and write
465000
unkown
page readonly
493000
unkown
page readonly
355E0000
trusted library allocation
page read and write
4820000
direct allocation
page read and write
334EE000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
3452B000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
B6000
trusted library allocation
page execute and read and write
355E0000
trusted library allocation
page read and write
3470D000
trusted library allocation
page read and write
35D60000
trusted library allocation
page read and write
4830000
direct allocation
page read and write
367B0000
trusted library allocation
page read and write
2DB0000
heap
page read and write
355E0000
trusted library allocation
page read and write
35DF6000
heap
page read and write
35CB0000
trusted library allocation
page read and write
2E1F000
heap
page read and write
2D00000
heap
page read and write
36730000
trusted library allocation
page read and write
30D0000
direct allocation
page read and write
35D50000
trusted library allocation
page read and write
36900000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
347E2000
trusted library allocation
page read and write
34796000
trusted library allocation
page read and write
5B0000
heap
page read and write
335F2000
trusted library allocation
page read and write
3477A000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
36920000
trusted library allocation
page execute and read and write
42A000
unkown
page read and write
367B0000
trusted library allocation
page read and write
32E6F000
stack
page read and write
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
3F5B000
stack
page read and write
36900000
trusted library allocation
page read and write
344A6000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
33340000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
524F000
heap
page read and write
32CFD000
stack
page read and write
367A0000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
35BB1000
heap
page read and write
367A0000
trusted library allocation
page read and write
36900000
trusted library allocation
page read and write
35D64000
trusted library allocation
page read and write
5AC000
heap
page read and write
367A0000
trusted library allocation
page read and write
36770000
trusted library allocation
page read and write
34559000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
36750000
trusted library allocation
page read and write
2754000
heap
page read and write
3643E000
stack
page read and write
347C2000
trusted library allocation
page read and write
462000
unkown
page readonly
36540000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
33899000
trusted library allocation
page read and write
54E000
stack
page read and write
400000
unkown
page readonly
367A0000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
5B0000
heap
page read and write
335FC000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
34469000
trusted library allocation
page read and write
3456B000
trusted library allocation
page read and write
3590000
heap
page read and write
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
360BF000
stack
page read and write
355E0000
trusted library allocation
page read and write
35D50000
trusted library allocation
page read and write
48D000
unkown
page readonly
36540000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367C0000
trusted library allocation
page execute and read and write
36810000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
15C000
stack
page read and write
36810000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
34588000
trusted library allocation
page read and write
35D80000
heap
page read and write
36540000
trusted library allocation
page read and write
48B0000
direct allocation
page read and write
355E0000
trusted library allocation
page read and write
346D3000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
35D9A000
heap
page read and write
5AC000
heap
page read and write
2E1F000
heap
page read and write
2756000
heap
page read and write
20F0000
heap
page read and write
33040000
remote allocation
page read and write
35CC0000
trusted library allocation
page read and write
20F4000
heap
page read and write
367A0000
trusted library allocation
page read and write
346EF000
trusted library allocation
page read and write
36940000
trusted library allocation
page read and write
33420000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
35E21000
heap
page read and write
48F000
unkown
page readonly
36730000
trusted library allocation
page read and write
368F0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
424000
unkown
page read and write
36830000
trusted library allocation
page read and write
36830000
trusted library allocation
page execute and read and write
367B0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
33625000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
33348000
trusted library allocation
page read and write
3380F000
trusted library allocation
page read and write
361BE000
stack
page read and write
401000
unkown
page execute read
367B0000
trusted library allocation
page read and write
36780000
trusted library allocation
page read and write
35E0D000
heap
page read and write
367A0000
trusted library allocation
page read and write
367E0000
trusted library allocation
page read and write
35CB0000
trusted library allocation
page read and write
3479E000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
35E0F000
heap
page read and write
33728000
trusted library allocation
page read and write
347A9000
trusted library allocation
page read and write
334F6000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
334FE000
trusted library allocation
page read and write
36750000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36900000
trusted library allocation
page read and write
35CC0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
2100000
heap
page read and write
36740000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
4890000
direct allocation
page read and write
355E0000
trusted library allocation
page read and write
22AE000
stack
page read and write
3383D000
trusted library allocation
page read and write
48F000
unkown
page readonly
355E0000
trusted library allocation
page read and write
334A6000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
59C000
heap
page read and write
35E36000
heap
page read and write
5B0000
heap
page read and write
36900000
trusted library allocation
page read and write
32E80000
heap
page read and write
355E0000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
347DB000
trusted library allocation
page read and write
462000
unkown
page readonly
5A8000
heap
page read and write
367B0000
trusted library allocation
page read and write
335EE000
trusted library allocation
page read and write
3454B000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
98000
stack
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
347C4000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
3340D000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
2D07000
heap
page read and write
367A0000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
36820000
trusted library allocation
page read and write
3476E000
trusted library allocation
page read and write
560000
heap
page read and write
36730000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
3150000
direct allocation
page read and write
35D50000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
480000
unkown
page readonly
36790000
trusted library allocation
page read and write
2E26000
heap
page read and write
3451F000
trusted library allocation
page read and write
59C000
heap
page read and write
367A0000
trusted library allocation
page read and write
345F1000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
35E21000
heap
page read and write
344F6000
trusted library allocation
page read and write
36930000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
35E0E000
heap
page read and write
19A000
stack
page read and write
36540000
trusted library allocation
page read and write
5AC000
heap
page read and write
367A0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
82F000
stack
page read and write
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
C7000
trusted library allocation
page execute and read and write
35D0D000
stack
page read and write
334E2000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
2759000
heap
page read and write
333EB000
trusted library allocation
page read and write
48D000
unkown
page readonly
35E13000
heap
page read and write
34463000
trusted library allocation
page read and write
344CA000
trusted library allocation
page read and write
35BB1000
heap
page read and write
36900000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
407000
unkown
page readonly
407000
unkown
page readonly
36550000
trusted library allocation
page execute and read and write
367A0000
trusted library allocation
page read and write
3140000
direct allocation
page read and write
35D50000
trusted library allocation
page read and write
35CB0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
35CB0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
4FE000
stack
page read and write
346CB000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
34513000
trusted library allocation
page read and write
472000
unkown
page readonly
3654D000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
465000
unkown
page readonly
36900000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
36900000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
32FDE000
stack
page read and write
355E0000
trusted library allocation
page read and write
368E0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367D0000
trusted library allocation
page execute and read and write
C5000
trusted library allocation
page execute and read and write
355E0000
trusted library allocation
page read and write
AD000
trusted library allocation
page execute and read and write
36810000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
3469E000
trusted library allocation
page read and write
11E000
stack
page read and write
346CF000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
35D60000
trusted library allocation
page read and write
34621000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
5C5000
heap
page read and write
367A0000
trusted library allocation
page read and write
334B4000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
160000
trusted library allocation
page execute and read and write
367E0000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
2E61000
heap
page read and write
48A0000
direct allocation
page read and write
401000
unkown
page execute read
36910000
trusted library allocation
page read and write
34569000
trusted library allocation
page read and write
10000000
unkown
page readonly
36730000
trusted library allocation
page read and write
33420000
trusted library allocation
page read and write
66E5000
direct allocation
page execute and read and write
367A0000
trusted library allocation
page read and write
36740000
trusted library allocation
page execute and read and write
30A0000
direct allocation
page read and write
334B8000
trusted library allocation
page read and write
35CB6000
trusted library allocation
page read and write
3160000
direct allocation
page read and write
367A0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
368E0000
trusted library allocation
page read and write
35D70000
heap
page execute and read and write
355E0000
trusted library allocation
page read and write
361FD000
stack
page read and write
355E1000
trusted library allocation
page read and write
367E0000
trusted library allocation
page read and write
5C5000
heap
page read and write
347BE000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
400000
unkown
page readonly
34790000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
3386B000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
45F000
unkown
page read and write
367A0000
trusted library allocation
page read and write
5A8000
heap
page read and write
36540000
trusted library allocation
page read and write
2752000
heap
page read and write
355E0000
trusted library allocation
page read and write
400000
unkown
page readonly
36800000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
33786000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
59C000
heap
page read and write
355E0000
trusted library allocation
page read and write
334E6000
trusted library allocation
page read and write
344FC000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
5AC000
heap
page read and write
5CE000
heap
page read and write
3080000
heap
page read and write
355E0000
trusted library allocation
page read and write
30F0000
direct allocation
page read and write
36730000
trusted library allocation
page read and write
3313A000
stack
page read and write
355E0000
trusted library allocation
page read and write
32BFE000
stack
page read and write
36820000
trusted library allocation
page read and write
1700000
remote allocation
page execute and read and write
346A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
5A8000
heap
page read and write
355E0000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
2D07000
heap
page read and write
35CD0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
33237000
stack
page read and write
36900000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
59C000
heap
page read and write
33623000
trusted library allocation
page read and write
BA000
trusted library allocation
page execute and read and write
368F0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
5CB000
heap
page read and write
338C7000
trusted library allocation
page read and write
355E1000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
355F0000
heap
page read and write
5B0000
heap
page read and write
33525000
trusted library allocation
page read and write
346C3000
trusted library allocation
page read and write
35CB0000
trusted library allocation
page read and write
334F2000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
337E1000
trusted library allocation
page read and write
344FA000
trusted library allocation
page read and write
2E1F000
heap
page read and write
367B0000
trusted library allocation
page read and write
33924000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
465000
unkown
page readonly
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
5B0000
heap
page read and write
3361F000
trusted library allocation
page read and write
334EA000
trusted library allocation
page read and write
461000
unkown
page read and write
36750000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
345F3000
trusted library allocation
page read and write
34590000
trusted library allocation
page read and write
462000
unkown
page readonly
35D50000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
333E0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
48F000
unkown
page readonly
367E0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
334FA000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
35D50000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
33406000
trusted library allocation
page read and write
3100000
direct allocation
page read and write
335CF000
trusted library allocation
page read and write
465000
unkown
page readonly
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
34441000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
3130000
direct allocation
page read and write
2260000
heap
page read and write
36810000
trusted library allocation
page read and write
368E0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
C2000
trusted library allocation
page read and write
333FA000
trusted library allocation
page read and write
35D50000
trusted library allocation
page read and write
347B7000
trusted library allocation
page read and write
3620000
trusted library allocation
page read and write
35BE6000
heap
page read and write
2D05000
heap
page read and write
367B0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
23AF000
stack
page read and write
36730000
trusted library allocation
page read and write
480000
unkown
page readonly
35D50000
trusted library allocation
page read and write
49B0000
heap
page read and write
36930000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
2E18000
heap
page read and write
355E0000
trusted library allocation
page read and write
524F000
heap
page read and write
367A0000
trusted library allocation
page read and write
35E36000
heap
page read and write
355E0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
34781000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
34581000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
36910000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
434000
unkown
page read and write
3675F000
trusted library allocation
page read and write
5A8000
heap
page read and write
367A0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
2400000
heap
page read and write
10005000
unkown
page readonly
355E0000
trusted library allocation
page read and write
368F0000
trusted library allocation
page read and write
4A0000
heap
page read and write
35D50000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
3451B000
trusted library allocation
page read and write
330E0000
direct allocation
page read and write
367A0000
trusted library allocation
page read and write
275E000
heap
page read and write
36540000
trusted library allocation
page read and write
346C5000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
480000
unkown
page readonly
355E0000
trusted library allocation
page read and write
3110000
direct allocation
page read and write
426000
unkown
page read and write
367A0000
trusted library allocation
page read and write
34571000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
4870000
direct allocation
page read and write
3470F000
trusted library allocation
page read and write
5C5000
heap
page read and write
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
215E000
stack
page read and write
36810000
trusted library allocation
page read and write
32D20000
trusted library allocation
page read and write
5B0000
heap
page read and write
36810000
trusted library allocation
page read and write
33632000
trusted library allocation
page read and write
569000
heap
page read and write
10003000
unkown
page readonly
355E0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
367E0000
trusted library allocation
page read and write
345E8000
trusted library allocation
page read and write
346BF000
trusted library allocation
page read and write
4850000
direct allocation
page read and write
367A0000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
34727000
trusted library allocation
page read and write
3307E000
stack
page read and write
367A0000
trusted library allocation
page read and write
D0000
heap
page read and write
5A8000
heap
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
35DD7000
heap
page read and write
36730000
trusted library allocation
page read and write
472000
unkown
page readonly
4840000
direct allocation
page read and write
9D000
trusted library allocation
page execute and read and write
17A5000
remote allocation
page execute and read and write
36730000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
36540000
trusted library allocation
page read and write
5B0000
heap
page read and write
2269000
heap
page read and write
367A0000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36740000
trusted library allocation
page read and write
49AD000
stack
page read and write
493000
unkown
page readonly
36540000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
36730000
trusted library allocation
page read and write
34732000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
368E0000
trusted library allocation
page read and write
345D0000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
4860000
direct allocation
page read and write
2E78000
heap
page read and write
35D50000
trusted library allocation
page read and write
3333F000
stack
page read and write
330BF000
stack
page read and write
367A0000
trusted library allocation
page read and write
355E0000
trusted library allocation
page read and write
2E23000
heap
page read and write
33601000
trusted library allocation
page read and write
21A5000
remote allocation
page execute and read and write
334B0000
trusted library allocation
page read and write
5AC000
heap
page read and write
367A0000
trusted library allocation
page read and write
There are 886 hidden memdumps, click here to show them.