IOC Report
RFQPO3D93876738.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
RFQPO3D93876738.scr.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RFQPO3D93876738._69117b6fa6abf2ab552dc9e9e6eebfb7cefe11e1_bcac15c1_27a11465-d65d-4af1-9f91-68ca1f60d89f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCA61.tmp.dmp
Mini DuMP crash report, 16 streams, Mon Jul 22 15:52:09 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC46.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC76.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AddInProcess32.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_13w5zsur.1xi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4nqchips.teg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d03rotq0.ztr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ppdfzt4y.u2z.psm1
ASCII text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RFQPO3D93876738.scr.exe
"C:\Users\user\Desktop\RFQPO3D93876738.scr.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RFQPO3D93876738.scr.exe" -Force
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7368 -s 1044
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://r10.o.lencr.org0#
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://r10.i.lencr.org/0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s82.gocheapweb.com
51.195.88.199
malicious
bg.microsoft.map.fastly.net
199.232.210.172
api.ipify.org
104.26.12.205

IPs

IP
Domain
Country
Malicious
212.162.149.48
unknown
Netherlands
malicious
51.195.88.199
s82.gocheapweb.com
France
malicious
104.26.12.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
EnableLUA
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance
Enabled
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{4ca10891-862f-464f-86f9-d59d88798a79}\Root\InventoryApplicationFile\rfqpo3d93876738.|ea480d527b81cb2d
ProgramId
\REGISTRY\A\{4ca10891-862f-464f-86f9-d59d88798a79}\Root\InventoryApplicationFile\rfqpo3d93876738.|ea480d527b81cb2d
FileId
\REGISTRY\A\{4ca10891-862f-464f-86f9-d59d88798a79}\Root\InventoryApplicationFile\rfqpo3d93876738.|ea480d527b81cb2d
LowerCaseLongPath
\REGISTRY\A\{4ca10891-862f-464f-86f9-d59d88798a79}\Root\InventoryApplicationFile\rfqpo3d93876738.|ea480d527b81cb2d
LongPathHash
\REGISTRY\A\{4ca10891-862f-464f-86f9-d59d88798a79}\Root\InventoryApplicationFile\rfqpo3d93876738.|ea480d527b81cb2d
Name
\REGISTRY\A\{4ca10891-862f-464f-86f9-d59d88798a79}\Root\InventoryApplicationFile\rfqpo3d93876738.|ea480d527b81cb2d
OriginalFileName
\REGISTRY\A\{4ca10891-862f-464f-86f9-d59d88798a79}\Root\InventoryApplicationFile\rfqpo3d93876738.|ea480d527b81cb2d
Publisher
\REGISTRY\A\{4ca10891-862f-464f-86f9-d59d88798a79}\Root\InventoryApplicationFile\rfqpo3d93876738.|ea480d527b81cb2d
Version
\REGISTRY\A\{4ca10891-862f-464f-86f9-d59d88798a79}\Root\InventoryApplicationFile\rfqpo3d93876738.|ea480d527b81cb2d
BinFileVersion
\REGISTRY\A\{4ca10891-862f-464f-86f9-d59d88798a79}\Root\InventoryApplicationFile\rfqpo3d93876738.|ea480d527b81cb2d
BinaryType
\REGISTRY\A\{4ca10891-862f-464f-86f9-d59d88798a79}\Root\InventoryApplicationFile\rfqpo3d93876738.|ea480d527b81cb2d
ProductName
\REGISTRY\A\{4ca10891-862f-464f-86f9-d59d88798a79}\Root\InventoryApplicationFile\rfqpo3d93876738.|ea480d527b81cb2d
ProductVersion
\REGISTRY\A\{4ca10891-862f-464f-86f9-d59d88798a79}\Root\InventoryApplicationFile\rfqpo3d93876738.|ea480d527b81cb2d
LinkDate
\REGISTRY\A\{4ca10891-862f-464f-86f9-d59d88798a79}\Root\InventoryApplicationFile\rfqpo3d93876738.|ea480d527b81cb2d
BinProductVersion
\REGISTRY\A\{4ca10891-862f-464f-86f9-d59d88798a79}\Root\InventoryApplicationFile\rfqpo3d93876738.|ea480d527b81cb2d
AppxPackageFullName
\REGISTRY\A\{4ca10891-862f-464f-86f9-d59d88798a79}\Root\InventoryApplicationFile\rfqpo3d93876738.|ea480d527b81cb2d
AppxPackageRelativeId
\REGISTRY\A\{4ca10891-862f-464f-86f9-d59d88798a79}\Root\InventoryApplicationFile\rfqpo3d93876738.|ea480d527b81cb2d
Size
\REGISTRY\A\{4ca10891-862f-464f-86f9-d59d88798a79}\Root\InventoryApplicationFile\rfqpo3d93876738.|ea480d527b81cb2d
Language
\REGISTRY\A\{4ca10891-862f-464f-86f9-d59d88798a79}\Root\InventoryApplicationFile\rfqpo3d93876738.|ea480d527b81cb2d
Usn
There are 31 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
2422D352000
trusted library allocation
page read and write
malicious
2F35000
trusted library allocation
page read and write
malicious
7860000
trusted library section
page read and write
malicious
7200000
trusted library section
page read and write
malicious
2E61000
trusted library allocation
page read and write
malicious
2422D096000
trusted library allocation
page read and write
malicious
7BB3000
heap
page read and write
7C6A000
heap
page read and write
310B000
trusted library allocation
page read and write
7FFAAC580000
trusted library allocation
page read and write
7FFAAC446000
trusted library allocation
page execute and read and write
7C62000
heap
page read and write
7BF8000
heap
page read and write
2422B439000
heap
page read and write
1040000
heap
page read and write
2F25000
trusted library allocation
page read and write
2422B3D0000
heap
page read and write
242457C5000
heap
page read and write
33C1000
trusted library allocation
page read and write
6CCE000
stack
page read and write
71FE000
stack
page read and write
2423D59D000
trusted library allocation
page read and write
7FFB07390000
unkown
page readonly
7DF0000
trusted library allocation
page read and write
7C02000
heap
page read and write
7F19000
trusted library allocation
page read and write
138E000
stack
page read and write
58A9000
stack
page read and write
F4E000
stack
page read and write
7B9D000
heap
page read and write
7857000
stack
page read and write
5A6E000
stack
page read and write
2422D011000
trusted library allocation
page read and write
FD5000
heap
page read and write
32A6000
trusted library allocation
page read and write
3F23000
trusted library allocation
page read and write
3357000
trusted library allocation
page read and write
13E0000
heap
page read and write
7BAA000
heap
page read and write
6E0F000
stack
page read and write
7FC0000
trusted library allocation
page execute and read and write
684E000
stack
page read and write
7FFAAC504000
trusted library allocation
page read and write
132B000
trusted library allocation
page execute and read and write
2FA5000
trusted library allocation
page read and write
8020000
trusted library allocation
page read and write
1023000
trusted library allocation
page execute and read and write
3343000
trusted library allocation
page read and write
7C3A000
heap
page read and write
7F3F000
trusted library allocation
page read and write
7C20000
heap
page read and write
79C0000
trusted library allocation
page read and write
2423D198000
trusted library allocation
page read and write
4136000
trusted library allocation
page read and write
7FFAAC360000
trusted library allocation
page read and write
409B000
trusted library allocation
page read and write
B9B000
stack
page read and write
65DB000
heap
page read and write
3ECF000
trusted library allocation
page read and write
7BCE000
heap
page read and write
2422B710000
heap
page read and write
7FFAAC41C000
trusted library allocation
page execute and read and write
7DC0000
trusted library allocation
page read and write
336E000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
CCC3DFF000
stack
page read and write
3427000
trusted library allocation
page read and write
7D70000
trusted library allocation
page read and write
78B0000
trusted library allocation
page read and write
3EA3000
trusted library allocation
page read and write
2F9D000
trusted library allocation
page read and write
2FAA000
trusted library allocation
page read and write
2422D01C000
trusted library allocation
page read and write
326A000
trusted library allocation
page read and write
7F80000
trusted library allocation
page execute and read and write
400C000
trusted library allocation
page read and write
3439000
trusted library allocation
page read and write
6F4E000
stack
page read and write
79A0000
trusted library allocation
page execute and read and write
2422B5F8000
heap
page read and write
10D5000
heap
page read and write
7FFAAC372000
trusted library allocation
page read and write
78A2000
trusted library section
page read and write
6EE0F000
unkown
page readonly
78E1000
trusted library allocation
page read and write
6D0E000
stack
page read and write
400000
remote allocation
page execute and read and write
7B7A000
heap
page read and write
24245790000
heap
page read and write
7BB0000
heap
page read and write
3328000
trusted library allocation
page read and write
3E91000
trusted library allocation
page read and write
2F31000
trusted library allocation
page read and write
33F0000
trusted library allocation
page read and write
32B1000
trusted library allocation
page read and write
7C24000
heap
page read and write
24245880000
heap
page read and write
7F58000
trusted library allocation
page read and write
7F70000
trusted library allocation
page read and write
2422B600000
trusted library section
page read and write
76FE000
stack
page read and write
563B000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
6EE0D000
unkown
page read and write
7C19000
heap
page read and write
7FFB073B2000
unkown
page readonly
3472000
trusted library allocation
page read and write
7DB0000
trusted library allocation
page execute and read and write
7E70000
trusted library allocation
page read and write
5A80000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
40F5000
trusted library allocation
page read and write
78F5000
trusted library allocation
page read and write
4F5C000
stack
page read and write
78FA000
trusted library allocation
page read and write
3EAF000
trusted library allocation
page read and write
4119000
trusted library allocation
page read and write
7FFAAC38D000
trusted library allocation
page execute and read and write
7FFAAC55C000
trusted library allocation
page read and write
7FFAAC530000
trusted library allocation
page read and write
CCC42FB000
stack
page read and write
CCC40FE000
stack
page read and write
7BE6000
heap
page read and write
7970000
trusted library allocation
page read and write
2422B310000
heap
page read and write
7F2F000
trusted library allocation
page read and write
83AE000
stack
page read and write
7FFAAC52A000
trusted library allocation
page read and write
54E8000
stack
page read and write
6537000
heap
page read and write
7930000
trusted library allocation
page read and write
1129000
heap
page read and write
2423D01D000
trusted library allocation
page read and write
5651000
trusted library allocation
page read and write
2422B49A000
heap
page read and write
614E000
stack
page read and write
7BC2000
heap
page read and write
13E6000
heap
page read and write
2FC2000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
8060000
heap
page read and write
2422B3A0000
trusted library allocation
page read and write
7F15000
trusted library allocation
page read and write
7FD0000
trusted library allocation
page read and write
6EDF0000
unkown
page readonly
6504000
heap
page read and write
2423D484000
trusted library allocation
page read and write
564E000
trusted library allocation
page read and write
7C2F000
heap
page read and write
58EE000
stack
page read and write
CCC34F3000
stack
page read and write
8EC9000
heap
page read and write
2422B4C7000
heap
page read and write
7FB0000
trusted library allocation
page read and write
7FFB07391000
unkown
page execute read
2422B6A5000
heap
page read and write
78C6000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page execute and read and write
7FFAAC37D000
trusted library allocation
page execute and read and write
319D000
trusted library allocation
page read and write
7FFAAC370000
trusted library allocation
page read and write
7E75000
trusted library allocation
page read and write
6380000
heap
page read and write
7A20000
trusted library allocation
page execute and read and write
7FFAAC570000
trusted library allocation
page read and write
2422B6A0000
heap
page read and write
2E50000
heap
page read and write
690E000
stack
page read and write
2E4E000
stack
page read and write
7DE0000
trusted library allocation
page read and write
7FFB073B0000
unkown
page read and write
7EB0000
trusted library allocation
page read and write
65A1000
heap
page read and write
CCC35FF000
stack
page read and write
2422B411000
heap
page read and write
3467000
trusted library allocation
page read and write
7C12000
heap
page read and write
6B8D000
stack
page read and write
75FE000
stack
page read and write
24245740000
heap
page read and write
5A90000
trusted library allocation
page execute and read and write
13EE000
heap
page read and write
3ECA000
trusted library allocation
page read and write
3350000
trusted library allocation
page read and write
7FFAAC420000
trusted library allocation
page execute and read and write
78DE000
trusted library allocation
page read and write
105E000
heap
page read and write
680D000
stack
page read and write
7FFAAC364000
trusted library allocation
page read and write
66B0000
trusted library allocation
page execute and read and write
5335000
trusted library allocation
page read and write
7DAB000
trusted library allocation
page read and write
33BD000
trusted library allocation
page read and write
5320000
heap
page execute and read and write
13D0000
trusted library allocation
page execute and read and write
5630000
trusted library allocation
page read and write
24245040000
trusted library allocation
page read and write
1322000
trusted library allocation
page read and write
2422B3DC000
heap
page read and write
1033000
trusted library allocation
page read and write
8040000
trusted library allocation
page execute and read and write
328A000
trusted library allocation
page read and write
7F12000
trusted library allocation
page read and write
6360000
trusted library allocation
page execute and read and write
40C8000
trusted library allocation
page read and write
F50000
heap
page read and write
CCC3BFF000
stack
page read and write
7B91000
heap
page read and write
329B000
trusted library allocation
page read and write
694D000
stack
page read and write
2422B5A0000
trusted library allocation
page read and write
3373000
trusted library allocation
page read and write
3E61000
trusted library allocation
page read and write
6EE06000
unkown
page readonly
7D60000
trusted library allocation
page read and write
5662000
trusted library allocation
page read and write
FA0000
heap
page read and write
410F000
trusted library allocation
page read and write
7FFAAC410000
trusted library allocation
page read and write
624E000
stack
page read and write
2FBA000
trusted library allocation
page read and write
7BD2000
heap
page read and write
78D2000
trusted library allocation
page read and write
7940000
trusted library allocation
page execute and read and write
3431000
trusted library allocation
page read and write
2422B40F000
heap
page read and write
F97000
heap
page read and write
7E78000
trusted library allocation
page read and write
106A000
heap
page read and write
3296000
trusted library allocation
page read and write
6EDF1000
unkown
page execute read
337E000
trusted library allocation
page read and write
CCC39FC000
stack
page read and write
EF8000
stack
page read and write
7FFAAC3BC000
trusted library allocation
page execute and read and write
78F0000
trusted library allocation
page read and write
A50E000
stack
page read and write
7F2A000
trusted library allocation
page read and write
3479000
trusted library allocation
page read and write
13CB000
stack
page read and write
40C000
remote allocation
page execute and read and write
1327000
trusted library allocation
page execute and read and write
347F000
trusted library allocation
page read and write
3EC0000
trusted library allocation
page read and write
68CE000
stack
page read and write
2423D021000
trusted library allocation
page read and write
70B0000
trusted library allocation
page read and write
4006000
trusted library allocation
page read and write
3369000
trusted library allocation
page read and write
7F4B0000
trusted library allocation
page execute and read and write
310F000
trusted library allocation
page read and write
7BCB000
heap
page read and write
40AD000
trusted library allocation
page read and write
7B8F000
heap
page read and write
8030000
trusted library allocation
page execute and read and write
101E000
stack
page read and write
2F9F000
trusted library allocation
page read and write
5634000
trusted library allocation
page read and write
4106000
trusted library allocation
page read and write
7FFAAC500000
trusted library allocation
page read and write
75BE000
stack
page read and write
4023000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
348F000
trusted library allocation
page read and write
7F3A000
trusted library allocation
page read and write
792E000
trusted library allocation
page read and write
CCC3CFE000
stack
page read and write
2422D000000
heap
page execute and read and write
7E0A000
trusted library allocation
page read and write
7F50000
trusted library allocation
page read and write
2423D011000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
3ED5000
trusted library allocation
page read and write
2C90000
trusted library allocation
page read and write
792B000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
4015000
trusted library allocation
page read and write
2422B5D0000
heap
page execute and read and write
6600000
trusted library allocation
page read and write
7FFAAC480000
trusted library allocation
page execute and read and write
31A9000
trusted library allocation
page read and write
7FFAAC510000
trusted library allocation
page read and write
40FC000
trusted library allocation
page read and write
3453000
trusted library allocation
page read and write
7925000
trusted library allocation
page read and write
8EC1000
heap
page read and write
3317000
trusted library allocation
page read and write
6F50000
heap
page read and write
24245860000
heap
page read and write
CCC37FF000
stack
page read and write
6F9A000
stack
page read and write
2422B272000
unkown
page readonly
7905000
trusted library allocation
page read and write
1077000
heap
page read and write
7FFAAC524000
trusted library allocation
page read and write
7BB9000
heap
page read and write
79D0000
trusted library allocation
page read and write
2422B6C8000
trusted library section
page read and write
7FFAAC379000
trusted library allocation
page read and write
70FE000
stack
page read and write
5323000
heap
page execute and read and write
3484000
trusted library allocation
page read and write
CCC38FE000
stack
page read and write
1325000
trusted library allocation
page execute and read and write
3E98000
trusted library allocation
page read and write
3EB4000
trusted library allocation
page read and write
4095000
trusted library allocation
page read and write
7C4A000
heap
page read and write
338A000
trusted library allocation
page read and write
309D000
trusted library allocation
page read and write
7FFAAC554000
trusted library allocation
page read and write
53E3000
heap
page read and write
7D80000
heap
page execute and read and write
3035000
trusted library allocation
page read and write
80D0000
trusted library allocation
page read and write
7FFB073B5000
unkown
page readonly
562D000
stack
page read and write
FD0000
heap
page read and write
7F40000
trusted library allocation
page read and write
5700000
heap
page read and write
3F02000
trusted library allocation
page read and write
410B000
trusted library allocation
page read and write
7D50000
trusted library allocation
page read and write
1316000
trusted library allocation
page execute and read and write
52EA000
stack
page read and write
6680000
trusted library allocation
page read and write
CCC41FE000
stack
page read and write
130E000
stack
page read and write
2423D36B000
trusted library allocation
page read and write
7EA0000
trusted library allocation
page execute and read and write
1024000
trusted library allocation
page read and write
7099000
stack
page read and write
3336000
trusted library allocation
page read and write
6A8C000
stack
page read and write
7FFB073A6000
unkown
page readonly
2423D018000
trusted library allocation
page read and write
7E10000
trusted library allocation
page execute and read and write
56CC000
stack
page read and write
6500000
heap
page read and write
7FFAAC363000
trusted library allocation
page execute and read and write
CCC36FE000
stack
page read and write
2422B300000
heap
page read and write
70B7000
trusted library allocation
page read and write
2422B43B000
heap
page read and write
2422D053000
trusted library allocation
page read and write
10FF000
heap
page read and write
565D000
trusted library allocation
page read and write
7B88000
heap
page read and write
6555000
heap
page read and write
7E20000
trusted library allocation
page execute and read and write
349A000
trusted library allocation
page read and write
2422B6B0000
trusted library section
page read and write
7900000
trusted library allocation
page read and write
7A30000
trusted library allocation
page execute and read and write
7FFAAC560000
trusted library allocation
page execute and read and write
74BD000
stack
page read and write
2422B350000
heap
page read and write
2C98000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
5300000
trusted library allocation
page read and write
332A000
trusted library allocation
page read and write
306B000
trusted library allocation
page read and write
7FFAAC38B000
trusted library allocation
page execute and read and write
401B000
trusted library allocation
page read and write
2422B5F0000
heap
page read and write
2423D13A000
trusted library allocation
page read and write
7BF4000
heap
page read and write
4126000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
2422B330000
heap
page read and write
7FF481D40000
trusted library allocation
page execute and read and write
33CC000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
4010000
trusted library allocation
page read and write
30C1000
trusted library allocation
page read and write
4111000
trusted library allocation
page read and write
4102000
trusted library allocation
page read and write
8AB0000
heap
page read and write
6514000
heap
page read and write
43E4000
trusted library allocation
page read and write
659F000
heap
page read and write
14EE000
stack
page read and write
F00000
heap
page read and write
53E0000
heap
page read and write
6510000
heap
page read and write
6A4C000
stack
page read and write
2422B715000
heap
page read and write
3320000
trusted library allocation
page read and write
7FFAAC380000
trusted library allocation
page read and write
2D40000
heap
page execute and read and write
3277000
trusted library allocation
page read and write
7950000
trusted library allocation
page read and write
7BDB000
heap
page read and write
1340000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
3E77000
trusted library allocation
page read and write
7E00000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
3460000
trusted library allocation
page read and write
688E000
stack
page read and write
103D000
trusted library allocation
page execute and read and write
52F9000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
2EAB000
trusted library allocation
page read and write
7F10000
trusted library allocation
page read and write
2422B3FA000
heap
page read and write
7FFAAC36D000
trusted library allocation
page execute and read and write
1048000
heap
page read and write
7907000
trusted library allocation
page read and write
7FFAAC384000
trusted library allocation
page read and write
7BDE000
heap
page read and write
8EB0000
heap
page read and write
78C1000
trusted library allocation
page read and write
3E84000
trusted library allocation
page read and write
78F8000
trusted library allocation
page read and write
7FFAAC520000
trusted library allocation
page read and write
102D000
trusted library allocation
page execute and read and write
7F60000
trusted library allocation
page read and write
80AE000
stack
page read and write
3E6B000
trusted library allocation
page read and write
2FB5000
trusted library allocation
page read and write
7F28000
trusted library allocation
page read and write
2422D01A000
trusted library allocation
page read and write
2422B5A3000
trusted library allocation
page read and write
423B000
trusted library allocation
page read and write
670E000
stack
page read and write
3291000
trusted library allocation
page read and write
327F000
trusted library allocation
page read and write
34C9000
trusted library allocation
page read and write
7FFAAC550000
trusted library allocation
page read and write
3362000
trusted library allocation
page read and write
7909000
trusted library allocation
page read and write
401E000
trusted library allocation
page read and write
3446000
trusted library allocation
page read and write
2422B270000
unkown
page readonly
33C6000
trusted library allocation
page read and write
2F23000
trusted library allocation
page read and write
4028000
trusted library allocation
page read and write
2422B442000
heap
page read and write
5656000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
78BB000
trusted library allocation
page read and write
7F35000
trusted library allocation
page read and write
6542000
heap
page read and write
59EF000
stack
page read and write
64E0000
trusted library allocation
page read and write
2422B3C0000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
7910000
trusted library allocation
page read and write
2422B48E000
heap
page read and write
5310000
trusted library allocation
page read and write
6E4E000
stack
page read and write
552E000
stack
page read and write
7B99000
heap
page read and write
7B93000
heap
page read and write
5A2D000
stack
page read and write
7E30000
trusted library allocation
page execute and read and write
3121000
trusted library allocation
page read and write
7F44000
trusted library allocation
page read and write
7240000
heap
page read and write
7FFAAC540000
trusted library allocation
page read and write
7C50000
heap
page read and write
801B000
stack
page read and write
2FBE000
trusted library allocation
page read and write
7FFAAC416000
trusted library allocation
page read and write
7B50000
heap
page read and write
6BCE000
stack
page read and write
F90000
heap
page read and write
310D000
trusted library allocation
page read and write
7FFAAC362000
trusted library allocation
page read and write
775A000
stack
page read and write
3EAA000
trusted library allocation
page read and write
32E0000
trusted library allocation
page read and write
4114000
trusted library allocation
page read and write
5670000
trusted library allocation
page read and write
7C35000
heap
page read and write
4019000
trusted library allocation
page read and write
There are 469 hidden memdumps, click here to show them.