IOC Report
Fa24c148.exe

loading gif

Files

File Path
Type
Category
Malicious
Fa24c148.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\Pjaskeriers.fra
xBase index, root pointer 0x1c00, free node pointer 0xb80000, key length 0, index options (0)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\akvarierne.lbe
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\cornetcies.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\dmt.roi
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\hisset.tjr
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\juleriernes.lia
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\matematikopgavens.sti
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\rygmarvsprvens.Beg
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\gunrack\Iglus237\unsealer\tipssensationens.hve
data
dropped
C:\Users\user\AppData\Local\Temp\nslCCA0.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Fa24c148.exe
"C:\Users\user\Desktop\Fa24c148.exe"
malicious
C:\Users\user\Desktop\Fa24c148.exe
"C:\Users\user\Desktop\Fa24c148.exe"
malicious

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:888683%0D%0ADate%20a
unknown
https://www.office.com/lB
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://drive.usercontent.google.com/
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://reallyfreegeoip.org/xml/155.94.241.188$
unknown
https://www.ecosia.org/newtab/
unknown
http://varders.kozow.com:8081
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com
unknown
http://checkip.dyndns.org/
132.226.247.73
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:888683%0D%0ADate%20and%20Time:%2028/10/2024%20/%2022:44:07%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20888683%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://drive.google.com/
unknown
http://anotherarmy.dns.army:8081
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://drive.google.com/o
unknown
https://reallyfreegeoip.org
unknown
https://apis.google.com
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://reallyfreegeoip.org/xml/155.94.241.188
188.114.97.3
https://reallyfreegeoip.org/xml/
unknown
There are 28 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
drive.google.com
142.250.185.206
drive.usercontent.google.com
142.250.186.65
checkip.dyndns.com
132.226.247.73

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
142.250.185.206
drive.google.com
United States
142.250.186.65
drive.usercontent.google.com
United States
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\annoterendes\Elektroniker162\skimlen
socialpensions
HKEY_CURRENT_USER\papercutting\Uninstall\antarchistic\Tarau
Backstay
HKEY_CURRENT_USER\hydrochlorate\pyloroplasty\Accessorily213
peppe
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fa24c148_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fa24c148_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fa24c148_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fa24c148_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fa24c148_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fa24c148_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fa24c148_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fa24c148_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fa24c148_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fa24c148_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fa24c148_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fa24c148_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fa24c148_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Fa24c148_RASMANCS
FileDirectory
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
335C1000
trusted library allocation
page read and write
malicious
5425000
direct allocation
page execute and read and write
malicious
261E000
stack
page read and write
2EE0000
direct allocation
page read and write
36770000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
36940000
trusted library allocation
page read and write
33679000
trusted library allocation
page read and write
335A0000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
35E60000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
409B000
stack
page read and write
367A0000
trusted library allocation
page read and write
346D7000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
90000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
36900000
trusted library allocation
page read and write
35E09000
heap
page read and write
367A0000
trusted library allocation
page read and write
6C3000
heap
page read and write
367A0000
trusted library allocation
page read and write
33619000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
B6000
trusted library allocation
page execute and read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
3398B000
trusted library allocation
page read and write
5E25000
direct allocation
page execute and read and write
333D7000
stack
page read and write
6C7000
heap
page read and write
6C7000
heap
page read and write
334EB000
trusted library allocation
page read and write
2755000
heap
page read and write
32FDD000
stack
page read and write
35770000
trusted library allocation
page read and write
33140000
remote allocation
page read and write
2F6F000
heap
page read and write
3360D000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
3306C000
heap
page read and write
2E60000
direct allocation
page read and write
6C3000
heap
page read and write
4A0000
heap
page read and write
33590000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
462000
unkown
page readonly
33590000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
331BF000
stack
page read and write
367B0000
trusted library allocation
page read and write
36830000
trusted library allocation
page execute and read and write
367A0000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
345E9000
trusted library allocation
page read and write
367E0000
trusted library allocation
page read and write
10001000
unkown
page execute read
33879000
trusted library allocation
page read and write
337AE000
trusted library allocation
page read and write
1700000
remote allocation
page execute and read and write
33238000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
33530000
trusted library allocation
page read and write
36827000
trusted library allocation
page read and write
3270000
direct allocation
page read and write
6E9000
heap
page read and write
367A0000
trusted library allocation
page read and write
33773000
trusted library allocation
page read and write
421000
unkown
page read and write
335A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
3576A000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
6B7000
heap
page read and write
367B0000
trusted library allocation
page read and write
368E0000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
2EB0000
direct allocation
page read and write
36900000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
6C3000
heap
page read and write
367A0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
3365D000
trusted library allocation
page read and write
348F3000
trusted library allocation
page read and write
42C000
unkown
page read and write
6C7000
heap
page read and write
33590000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
61E000
stack
page read and write
335A0000
trusted library allocation
page read and write
368E0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
34628000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
480000
unkown
page readonly
33530000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
3675F000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
3462A000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
9D000
trusted library allocation
page execute and read and write
367E0000
trusted library allocation
page execute and read and write
34699000
trusted library allocation
page read and write
346E7000
trusted library allocation
page read and write
2EA0000
direct allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
215E000
stack
page read and write
367A0000
trusted library allocation
page read and write
3481C000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
472000
unkown
page readonly
35E50000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36760000
trusted library allocation
page read and write
461000
unkown
page read and write
6EC000
heap
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
2FB7000
heap
page read and write
409000
unkown
page write copy
35E06000
heap
page read and write
367A0000
trusted library allocation
page read and write
35DED000
heap
page read and write
36830000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
34771000
trusted library allocation
page read and write
35DF5000
heap
page read and write
D0000
heap
page read and write
33590000
trusted library allocation
page read and write
33530000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
34841000
trusted library allocation
page read and write
2FAE000
stack
page read and write
368F0000
trusted library allocation
page read and write
3380E000
trusted library allocation
page read and write
401000
unkown
page execute read
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
275D000
heap
page read and write
345CB000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
35760000
trusted library allocation
page read and write
493000
unkown
page readonly
367A0000
trusted library allocation
page read and write
480000
unkown
page readonly
AD000
trusted library allocation
page execute and read and write
640000
heap
page read and write
367A0000
trusted library allocation
page read and write
348ED000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
336A4000
trusted library allocation
page read and write
2180000
heap
page read and write
36820000
trusted library allocation
page read and write
337B3000
trusted library allocation
page read and write
C2000
trusted library allocation
page read and write
10003000
unkown
page readonly
2F7E000
heap
page read and write
32F0000
direct allocation
page read and write
35DDC000
heap
page read and write
338D8000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
409000
unkown
page write copy
400000
unkown
page readonly
480000
unkown
page readonly
35770000
trusted library allocation
page read and write
34835000
trusted library allocation
page read and write
409000
unkown
page read and write
33230000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
2BA5000
remote allocation
page execute and read and write
35DCF000
heap
page read and write
33590000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
32C1D000
stack
page read and write
35770000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
34921000
trusted library allocation
page read and write
35780000
trusted library allocation
page execute and read and write
33530000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
335A0000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
36900000
trusted library allocation
page read and write
36820000
trusted library allocation
page read and write
345E3000
trusted library allocation
page read and write
367C0000
trusted library allocation
page execute and read and write
2752000
heap
page read and write
3300000
direct allocation
page read and write
33740000
trusted library allocation
page read and write
2E80000
direct allocation
page read and write
33590000
trusted library allocation
page read and write
98000
stack
page read and write
33675000
trusted library allocation
page read and write
33506000
trusted library allocation
page read and write
17A5000
remote allocation
page execute and read and write
334E6000
trusted library allocation
page read and write
33A71000
trusted library allocation
page read and write
348D7000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
36910000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
5CE000
stack
page read and write
367B0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
3467A000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
348DE000
trusted library allocation
page read and write
426000
unkown
page read and write
367A0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
97F000
stack
page read and write
367A0000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
33530000
trusted library allocation
page read and write
680000
heap
page read and write
35770000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
487000
unkown
page readonly
33AA0000
trusted library allocation
page read and write
33540000
trusted library allocation
page read and write
35DF1000
heap
page read and write
5D5000
heap
page read and write
275D000
heap
page read and write
35E50000
trusted library allocation
page read and write
465000
unkown
page readonly
360BF000
stack
page read and write
33637000
trusted library allocation
page read and write
472000
unkown
page readonly
346ED000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
2F76000
heap
page read and write
35E50000
trusted library allocation
page read and write
5D0000
heap
page read and write
33501000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
336C7000
trusted library allocation
page read and write
36910000
trusted library allocation
page read and write
2F64000
heap
page read and write
B2000
trusted library allocation
page read and write
33550000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
6C3000
heap
page read and write
33530000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
336C9000
trusted library allocation
page read and write
35760000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
360FE000
stack
page read and write
4A5D000
stack
page read and write
68A000
heap
page read and write
2F69000
heap
page read and write
367E0000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
400000
unkown
page readonly
36920000
trusted library allocation
page execute and read and write
465000
unkown
page readonly
33A43000
trusted library allocation
page read and write
331D0000
direct allocation
page read and write
2753000
heap
page read and write
367A0000
trusted library allocation
page read and write
6F8000
heap
page read and write
2F6F000
heap
page read and write
35770000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
35DF5000
heap
page read and write
3487B000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
335A0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
3488B000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
36820000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
6CB000
heap
page read and write
487000
unkown
page readonly
400000
unkown
page readonly
2E90000
direct allocation
page read and write
36900000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
21A5000
remote allocation
page execute and read and write
33590000
trusted library allocation
page read and write
346EF000
trusted library allocation
page read and write
93000
trusted library allocation
page execute and read and write
367B0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
36900000
trusted library allocation
page read and write
407000
unkown
page readonly
367E0000
trusted library allocation
page read and write
34906000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
34706000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
33665000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36900000
trusted library allocation
page read and write
32ADF000
stack
page read and write
6CB000
heap
page read and write
3484D000
trusted library allocation
page read and write
34940000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
35DF9000
heap
page read and write
367A0000
trusted library allocation
page read and write
48F000
unkown
page readonly
36780000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36800000
trusted library allocation
page read and write
2757000
heap
page read and write
33140000
remote allocation
page read and write
363FE000
stack
page read and write
3483D000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
94000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
2EC0000
direct allocation
page read and write
348FB000
trusted library allocation
page read and write
6825000
direct allocation
page execute and read and write
367B0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367B0000
trusted library allocation
page execute and read and write
33540000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
35E70000
heap
page execute and read and write
271F000
stack
page read and write
33591000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
34938000
trusted library allocation
page read and write
3330000
direct allocation
page read and write
335A0000
trusted library allocation
page read and write
401000
unkown
page execute read
6B7000
heap
page read and write
35770000
trusted library allocation
page read and write
B0000
trusted library allocation
page read and write
35764000
trusted library allocation
page read and write
487000
unkown
page readonly
33590000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
32D0000
direct allocation
page read and write
36810000
trusted library allocation
page read and write
33633000
trusted library allocation
page read and write
34648000
trusted library allocation
page read and write
348F0000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
36900000
trusted library allocation
page read and write
2F7E000
heap
page read and write
347C3000
trusted library allocation
page read and write
32D1E000
stack
page read and write
228E000
stack
page read and write
346C9000
trusted library allocation
page read and write
367F0000
trusted library allocation
page execute and read and write
362BE000
stack
page read and write
2F7A000
heap
page read and write
3643F000
stack
page read and write
33669000
trusted library allocation
page read and write
48F000
unkown
page readonly
367A0000
trusted library allocation
page read and write
34980000
trusted library allocation
page read and write
2290000
heap
page read and write
480000
unkown
page readonly
33590000
trusted library allocation
page read and write
35DF1000
heap
page read and write
3482E000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
33540000
trusted library allocation
page read and write
3491F000
trusted library allocation
page read and write
538F000
heap
page read and write
367A0000
trusted library allocation
page read and write
C7000
trusted library allocation
page execute and read and write
472000
unkown
page readonly
33590000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
34624000
trusted library allocation
page read and write
6B7000
heap
page read and write
367A0000
trusted library allocation
page read and write
33671000
trusted library allocation
page read and write
160000
trusted library allocation
page execute and read and write
367B0000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
6C3000
heap
page read and write
348D2000
trusted library allocation
page read and write
3366D000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
6C7000
heap
page read and write
367E0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
35DC4000
heap
page read and write
36750000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
33030000
heap
page read and write
36810000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
48D000
unkown
page readonly
367A0000
trusted library allocation
page read and write
6CB000
heap
page read and write
3322A000
stack
page read and write
2295000
heap
page read and write
367B0000
trusted library allocation
page read and write
401000
unkown
page execute read
2F5D000
heap
page read and write
33590000
trusted library allocation
page read and write
4A90000
heap
page read and write
33590000
trusted library allocation
page read and write
368F0000
trusted library allocation
page read and write
34849000
trusted library allocation
page read and write
36900000
trusted library allocation
page read and write
33591000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
337DE000
trusted library allocation
page read and write
6E9000
heap
page read and write
367A0000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
3395D000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
368E0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
33530000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
33540000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
35E06000
heap
page read and write
33590000
trusted library allocation
page read and write
6B7000
heap
page read and write
10005000
unkown
page readonly
68E000
heap
page read and write
33590000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
332D0000
heap
page read and write
33590000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
6CB000
heap
page read and write
36760000
trusted library allocation
page read and write
2299000
heap
page read and write
15C000
stack
page read and write
33590000
trusted library allocation
page read and write
33560000
trusted library allocation
page read and write
36900000
trusted library allocation
page read and write
32E6F000
stack
page read and write
493000
unkown
page readonly
367A0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
424000
unkown
page read and write
33590000
trusted library allocation
page read and write
346E9000
trusted library allocation
page read and write
32D20000
trusted library allocation
page read and write
2DF0000
heap
page read and write
346A9000
trusted library allocation
page read and write
472000
unkown
page readonly
367A0000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
434000
unkown
page read and write
33530000
trusted library allocation
page read and write
33520000
trusted library allocation
page read and write
45F000
unkown
page read and write
367A0000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
367D0000
trusted library allocation
page execute and read and write
35E50000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
31D0000
heap
page read and write
35E50000
trusted library allocation
page read and write
335A0000
trusted library allocation
page read and write
462000
unkown
page readonly
35E50000
trusted library allocation
page read and write
36820000
trusted library allocation
page read and write
2F42000
heap
page read and write
33782000
trusted library allocation
page read and write
33540000
trusted library allocation
page read and write
3F9C000
stack
page read and write
367A0000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
33530000
trusted library allocation
page read and write
3481E000
trusted library allocation
page read and write
2EF0000
heap
page read and write
347AB000
trusted library allocation
page read and write
34931000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
3486D000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
3577D000
trusted library allocation
page read and write
36930000
trusted library allocation
page read and write
A0000
trusted library allocation
page read and write
32B0000
direct allocation
page read and write
367A0000
trusted library allocation
page read and write
2759000
heap
page read and write
36750000
trusted library allocation
page read and write
3464B000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
32A0000
direct allocation
page read and write
334DF000
stack
page read and write
36900000
trusted library allocation
page read and write
335A0000
trusted library allocation
page read and write
674000
heap
page read and write
3377D000
trusted library allocation
page read and write
367E0000
trusted library allocation
page read and write
33530000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
34674000
trusted library allocation
page read and write
32E80000
heap
page read and write
2E45000
heap
page read and write
337A4000
trusted library allocation
page read and write
401000
unkown
page execute read
3479F000
trusted library allocation
page read and write
33520000
trusted library allocation
page read and write
407000
unkown
page readonly
36790000
trusted library allocation
page read and write
345C1000
trusted library allocation
page read and write
4A1E000
stack
page read and write
334FE000
trusted library allocation
page read and write
465000
unkown
page readonly
6C7000
heap
page read and write
32E0000
direct allocation
page read and write
35D50000
heap
page read and write
35766000
trusted library allocation
page read and write
346FF000
trusted library allocation
page read and write
334FA000
trusted library allocation
page read and write
400000
unkown
page readonly
335A0000
trusted library allocation
page read and write
6CB000
heap
page read and write
33590000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
363BF000
stack
page read and write
36930000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
CB000
trusted library allocation
page execute and read and write
367A0000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
3484F000
trusted library allocation
page read and write
32D6E000
stack
page read and write
33530000
trusted library allocation
page read and write
6C3000
heap
page read and write
6EC000
heap
page read and write
80000
trusted library allocation
page read and write
170000
trusted library allocation
page read and write
2CD0000
heap
page read and write
35DCF000
heap
page read and write
462000
unkown
page readonly
3470E000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
3474E000
trusted library allocation
page read and write
335A0000
trusted library allocation
page read and write
367E0000
trusted library allocation
page read and write
33530000
trusted library allocation
page read and write
368E0000
trusted library allocation
page read and write
48D000
unkown
page readonly
367A0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
462000
unkown
page readonly
367A0000
trusted library allocation
page read and write
3320000
direct allocation
page read and write
368F0000
trusted library allocation
page read and write
337A8000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
334EE000
trusted library allocation
page read and write
33530000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
6CB000
heap
page read and write
35770000
trusted library allocation
page read and write
34658000
trusted library allocation
page read and write
35DED000
heap
page read and write
36810000
trusted library allocation
page read and write
346AD000
trusted library allocation
page read and write
335A0000
trusted library allocation
page read and write
33550000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
2753000
heap
page read and write
33590000
trusted library allocation
page read and write
368E0000
trusted library allocation
page read and write
33546000
trusted library allocation
page read and write
10000000
unkown
page readonly
35770000
trusted library allocation
page read and write
339E7000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
34678000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
32BDE000
stack
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
180000
trusted library allocation
page read and write
368E0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
3647E000
stack
page read and write
670000
heap
page read and write
35790000
heap
page read and write
465000
unkown
page readonly
35770000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
3623D000
stack
page read and write
33590000
trusted library allocation
page read and write
6CB000
heap
page read and write
3469D000
trusted library allocation
page read and write
5380000
direct allocation
page execute and read and write
33590000
trusted library allocation
page read and write
275E000
heap
page read and write
493000
unkown
page readonly
348E3000
trusted library allocation
page read and write
2FC6000
heap
page read and write
42A000
unkown
page read and write
33590000
trusted library allocation
page read and write
275D000
heap
page read and write
3379F000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
3476F000
trusted library allocation
page read and write
6C3000
heap
page read and write
367E0000
trusted library allocation
page read and write
35DD3000
heap
page read and write
6C7000
heap
page read and write
3469F000
trusted library allocation
page read and write
580000
heap
page read and write
35770000
trusted library allocation
page read and write
34766000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
34654000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
36900000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
6C7000
heap
page read and write
34998000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
36770000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
48D000
unkown
page readonly
346A5000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
348CB000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
335B0000
heap
page execute and read and write
361FE000
stack
page read and write
367A0000
trusted library allocation
page read and write
6B7000
heap
page read and write
35E50000
trusted library allocation
page read and write
3468A000
trusted library allocation
page read and write
2E70000
direct allocation
page read and write
2F08000
heap
page read and write
334E0000
trusted library allocation
page read and write
32EDD000
stack
page read and write
35E50000
trusted library allocation
page read and write
BA000
trusted library allocation
page execute and read and write
33590000
trusted library allocation
page read and write
367E0000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
33777000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
32C0000
direct allocation
page read and write
3627F000
stack
page read and write
367A0000
trusted library allocation
page read and write
49A0000
direct allocation
page read and write
C5000
trusted library allocation
page execute and read and write
35E50000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
87F000
stack
page read and write
337D1000
trusted library allocation
page read and write
33540000
trusted library allocation
page read and write
33908000
trusted library allocation
page read and write
33530000
trusted library allocation
page read and write
3376F000
trusted library allocation
page read and write
36910000
trusted library allocation
page read and write
36910000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
451000
unkown
page read and write
33590000
trusted library allocation
page read and write
2F76000
heap
page read and write
3317E000
stack
page read and write
35E50000
trusted library allocation
page read and write
33540000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
33930000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
33750000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
33140000
remote allocation
page read and write
35DD3000
heap
page read and write
367A0000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
335A0000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
35E60000
trusted library allocation
page execute and read and write
19A000
stack
page read and write
2FB9000
heap
page read and write
33540000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
2F00000
heap
page read and write
35DB5000
heap
page read and write
33590000
trusted library allocation
page read and write
36900000
trusted library allocation
page read and write
36750000
trusted library allocation
page read and write
493000
unkown
page readonly
36780000
trusted library allocation
page read and write
36900000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
49C0000
direct allocation
page read and write
346AB000
trusted library allocation
page read and write
3358D000
stack
page read and write
33624000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
35DF1000
heap
page read and write
33530000
trusted library allocation
page read and write
48F000
unkown
page readonly
35DAA000
heap
page read and write
36900000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
335A0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
33530000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
367B0000
trusted library allocation
page read and write
356BE000
stack
page read and write
35770000
trusted library allocation
page read and write
48D000
unkown
page readonly
367B0000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
33A15000
trusted library allocation
page read and write
33540000
trusted library allocation
page read and write
35DDC000
heap
page read and write
35E50000
trusted library allocation
page read and write
34843000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
2ED0000
direct allocation
page read and write
36900000
trusted library allocation
page read and write
35D52000
heap
page read and write
35DED000
heap
page read and write
35770000
trusted library allocation
page read and write
33540000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
335A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
3760000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
35DDC000
heap
page read and write
33530000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
368E0000
trusted library allocation
page read and write
33530000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
35760000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
3657F000
stack
page read and write
367A0000
trusted library allocation
page read and write
339B9000
trusted library allocation
page read and write
33540000
trusted library allocation
page read and write
348C5000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
367E0000
trusted library allocation
page read and write
338A8000
trusted library allocation
page read and write
42F000
unkown
page read and write
2E40000
heap
page read and write
487000
unkown
page readonly
34691000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
33530000
trusted library allocation
page read and write
34818000
trusted library allocation
page read and write
35E50000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
11E000
stack
page read and write
3491B000
trusted library allocation
page read and write
30AE000
stack
page read and write
331E0000
direct allocation
page read and write
3362F000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
35E60000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
3367D000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
33661000
trusted library allocation
page read and write
31C0000
heap
page read and write
48F000
unkown
page readonly
33590000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
3290000
direct allocation
page read and write
367B0000
trusted library allocation
page read and write
49B0000
direct allocation
page read and write
367E0000
trusted library allocation
page read and write
34914000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
3310000
direct allocation
page read and write
33590000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
6B7000
heap
page read and write
367A0000
trusted library allocation
page read and write
33512000
trusted library allocation
page read and write
33530000
trusted library allocation
page read and write
407000
unkown
page readonly
33590000
trusted library allocation
page read and write
34851000
trusted library allocation
page read and write
367A0000
trusted library allocation
page read and write
335A0000
trusted library allocation
page read and write
33590000
trusted library allocation
page read and write
35770000
trusted library allocation
page read and write
409000
unkown
page write copy
3350D000
trusted library allocation
page read and write
36810000
trusted library allocation
page read and write
407000
unkown
page readonly
35E50000
trusted library allocation
page read and write
There are 883 hidden memdumps, click here to show them.