IOC Report
Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe

loading gif

Files

File Path
Type
Category
Malicious
Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp2F66.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\jnqeRRexnD.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\jnqeRRexnD.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1e5lt4vg.dcb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_asb4y0ad.4e0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hs1dmcae.dz1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nscw2rby.mia.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sbbdcaxc.lnv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uh5zlmxw.zdt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vdac2bg5.3eo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ywn404b5.fgj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp42C0.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
"C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jnqeRRexnD.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp2F66.tmp"
malicious
C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
"C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe"
malicious
C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp42C0.tmp"
malicious
C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
"C:\Users\user\AppData\Roaming\jnqeRRexnD.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://chrome.google.com/webstore?hl=enlBsq
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
https://reallyfreegeoip.org/xml/8.46.123.75
188.114.96.3
http://varders.kozow.com:8081
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.office.com/x
unknown
http://checkip.dyndns.org/
158.101.44.242
http://anotherarmy.dns.army:8081
unknown
https://reallyfreegeoip.org/xml/8.46.123.75$
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:045012%0D%0ADate%20a
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://www.office.com/lBsq
unknown
https://reallyfreegeoip.org
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:045012%0D%0ADate%20and%20Time:%2020/11/2024%20/%2014:58:41%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20045012%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:045012%0D%0ADate%20and%20Time:%2020/11/2024%20/%2015:28:21%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20045012%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
api.telegram.org
149.154.167.220
checkip.dyndns.com
158.101.44.242
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
188.114.96.3
reallyfreegeoip.org
European Union
158.101.44.242
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Request for Quotation MK FMHS_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jnqeRRexnD_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
435000
remote allocation
page execute and read and write
malicious
2DB1000
trusted library allocation
page read and write
malicious
3091000
trusted library allocation
page read and write
malicious
3A59000
trusted library allocation
page read and write
malicious
C20000
heap
page read and write
15F2000
trusted library allocation
page read and write
55DD000
trusted library allocation
page read and write
A03E000
stack
page read and write
BA2000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
4176000
trusted library allocation
page read and write
34D0000
trusted library allocation
page read and write
1250000
trusted library allocation
page execute and read and write
1690000
heap
page read and write
B96000
trusted library allocation
page execute and read and write
5040000
heap
page read and write
2FEF000
unkown
page read and write
1316000
trusted library allocation
page execute and read and write
409F000
trusted library allocation
page read and write
42C000
remote allocation
page execute and read and write
40F6000
trusted library allocation
page read and write
502B000
stack
page read and write
426000
remote allocation
page execute and read and write
13D3000
heap
page read and write
B9A000
trusted library allocation
page execute and read and write
696F000
stack
page read and write
6E00000
heap
page read and write
3549000
trusted library allocation
page read and write
15F5000
trusted library allocation
page execute and read and write
3272000
trusted library allocation
page read and write
2E52000
trusted library allocation
page read and write
584E000
stack
page read and write
2A4F000
stack
page read and write
2E66000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
110A000
trusted library allocation
page execute and read and write
3314000
trusted library allocation
page read and write
449A000
trusted library allocation
page read and write
985E000
stack
page read and write
4273000
trusted library allocation
page read and write
6FFE000
stack
page read and write
9A9D000
stack
page read and write
C61000
heap
page read and write
1280000
heap
page read and write
5070000
heap
page read and write
540E000
stack
page read and write
1318000
heap
page read and write
4113000
trusted library allocation
page read and write
69B0000
trusted library allocation
page read and write
F00000
heap
page read and write
2420000
heap
page execute and read and write
4CB0000
heap
page read and write
6574000
heap
page read and write
4B13000
heap
page read and write
6CAE000
stack
page read and write
3E34000
trusted library allocation
page read and write
2E6F000
trusted library allocation
page read and write
3349000
trusted library allocation
page read and write
240E000
stack
page read and write
B90000
trusted library allocation
page read and write
50C0000
trusted library allocation
page execute and read and write
6F7000
stack
page read and write
26A0000
heap
page read and write
6D94000
trusted library allocation
page read and write
5450000
heap
page execute and read and write
3395000
trusted library allocation
page read and write
6DAD000
trusted library allocation
page read and write
444E000
trusted library allocation
page read and write
890000
heap
page read and write
53B0000
heap
page read and write
43B000
remote allocation
page execute and read and write
2920000
trusted library allocation
page read and write
4DB8000
trusted library allocation
page read and write
4FC0000
heap
page read and write
6E19000
heap
page read and write
995D000
stack
page read and write
2F9E000
trusted library allocation
page read and write
3061000
trusted library allocation
page read and write
3F22000
trusted library allocation
page read and write
107E000
stack
page read and write
69FE000
stack
page read and write
348E000
stack
page read and write
13C1000
heap
page read and write
5D0000
unkown
page readonly
6576000
heap
page read and write
80E000
stack
page read and write
4161000
trusted library allocation
page read and write
4563000
trusted library allocation
page read and write
2FF0000
heap
page read and write
4F00000
trusted library allocation
page execute and read and write
C96000
heap
page read and write
5610000
heap
page execute and read and write
4B70000
trusted library allocation
page read and write
6C4E000
stack
page read and write
6A2E000
stack
page read and write
873000
trusted library allocation
page read and write
9E7000
heap
page read and write
2E56000
trusted library allocation
page read and write
526E000
stack
page read and write
40A4000
trusted library allocation
page read and write
6E11000
heap
page read and write
6C60000
trusted library allocation
page read and write
2F60000
heap
page read and write
2C22000
trusted library allocation
page read and write
42B1000
trusted library allocation
page read and write
2E21000
trusted library allocation
page read and write
25FF000
stack
page read and write
1110000
trusted library allocation
page read and write
6F40000
trusted library allocation
page execute and read and write
2BF0000
trusted library allocation
page read and write
132E000
heap
page read and write
53E0000
heap
page read and write
4007000
trusted library allocation
page read and write
438C000
trusted library allocation
page read and write
30B2000
trusted library allocation
page read and write
302D000
trusted library allocation
page read and write
55B0000
trusted library allocation
page execute and read and write
35DB000
trusted library allocation
page read and write
3132000
trusted library allocation
page read and write
424000
remote allocation
page execute and read and write
6C37000
trusted library allocation
page read and write
1230000
heap
page read and write
18E000
unkown
page read and write
425000
remote allocation
page execute and read and write
10B0000
heap
page read and write
41BB000
trusted library allocation
page read and write
5770000
heap
page read and write
693E000
stack
page read and write
705E000
stack
page read and write
6CA0000
heap
page read and write
2E16000
trusted library allocation
page read and write
AAD1000
trusted library allocation
page read and write
40B9000
trusted library allocation
page read and write
165E000
stack
page read and write
67AF000
stack
page read and write
3281000
trusted library allocation
page read and write
190000
heap
page read and write
53B4000
trusted library allocation
page read and write
9F6C000
stack
page read and write
40B1000
trusted library allocation
page read and write
11F0000
heap
page read and write
3E43000
trusted library allocation
page read and write
6C30000
trusted library allocation
page read and write
6F7E000
stack
page read and write
55D1000
trusted library allocation
page read and write
6E00000
trusted library allocation
page execute and read and write
3343000
trusted library allocation
page read and write
9CA000
heap
page read and write
4A81000
trusted library allocation
page read and write
4A8D000
trusted library allocation
page read and write
AABE000
stack
page read and write
2541000
trusted library allocation
page read and write
30B8000
trusted library allocation
page read and write
4D00000
heap
page execute and read and write
55BE000
trusted library allocation
page read and write
2F2E000
trusted library allocation
page read and write
2F72000
trusted library allocation
page read and write
32E1000
trusted library allocation
page read and write
139E000
heap
page read and write
4440000
trusted library allocation
page read and write
3F7F000
trusted library allocation
page read and write
1080000
heap
page read and write
F60000
heap
page read and write
323B000
heap
page read and write
790000
heap
page read and write
5030000
trusted library section
page readonly
4B60000
trusted library allocation
page execute and read and write
407B000
trusted library allocation
page read and write
6C8E000
stack
page read and write
1349000
heap
page read and write
BBE000
stack
page read and write
B74000
trusted library allocation
page read and write
6950000
trusted library allocation
page read and write
2D40000
trusted library allocation
page read and write
6D96000
trusted library allocation
page read and write
388E000
trusted library allocation
page read and write
2BFB000
trusted library allocation
page read and write
1C0000
heap
page read and write
55CA000
trusted library allocation
page read and write
EF7000
stack
page read and write
684F000
heap
page read and write
34A000
stack
page read and write
9A7000
trusted library allocation
page execute and read and write
1610000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page execute and read and write
3B0000
heap
page read and write
9E3E000
stack
page read and write
864000
trusted library allocation
page read and write
1265000
heap
page read and write
4B90000
trusted library allocation
page read and write
6D9A000
trusted library allocation
page read and write
2BFE000
trusted library allocation
page read and write
263E000
trusted library allocation
page read and write
10D3000
trusted library allocation
page execute and read and write
690E000
stack
page read and write
2EB8000
trusted library allocation
page read and write
1660000
trusted library allocation
page execute and read and write
6F3E000
stack
page read and write
6DE0000
trusted library allocation
page read and write
3FD5000
trusted library allocation
page read and write
6A0E000
stack
page read and write
54B0000
heap
page read and write
2FAE000
unkown
page read and write
5510000
heap
page read and write
28FE000
trusted library allocation
page read and write
34E0000
heap
page read and write
435A000
trusted library allocation
page read and write
54BE000
heap
page read and write
65FF000
heap
page read and write
3387000
trusted library allocation
page read and write
2925000
trusted library allocation
page read and write
4119000
trusted library allocation
page read and write
6CDE000
stack
page read and write
3066000
trusted library allocation
page read and write
30B5000
trusted library allocation
page read and write
30EB000
trusted library allocation
page read and write
3307000
trusted library allocation
page read and write
65B7000
heap
page read and write
10F0000
heap
page read and write
12F4000
trusted library allocation
page read and write
2D3F000
stack
page read and write
A02000
heap
page read and write
1274000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
5AAF000
stack
page read and write
36F6000
trusted library allocation
page read and write
330B000
trusted library allocation
page read and write
111B000
trusted library allocation
page execute and read and write
4151000
trusted library allocation
page read and write
5D2000
unkown
page readonly
6E20000
trusted library allocation
page execute and read and write
B7D000
trusted library allocation
page execute and read and write
15F7000
trusted library allocation
page execute and read and write
40AB000
trusted library allocation
page read and write
42B4000
trusted library allocation
page read and write
53C0000
heap
page read and write
6C50000
trusted library allocation
page execute and read and write
4435000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page read and write
3309000
trusted library allocation
page read and write
3F0C000
trusted library allocation
page read and write
314E000
trusted library allocation
page read and write
686E000
stack
page read and write
2EBD000
stack
page read and write
BD0000
trusted library allocation
page execute and read and write
EEF000
stack
page read and write
2E18000
trusted library allocation
page read and write
A76000
heap
page read and write
4AE0000
trusted library allocation
page read and write
4121000
trusted library allocation
page read and write
3541000
trusted library allocation
page read and write
471B000
stack
page read and write
1240000
trusted library allocation
page read and write
3EC0000
trusted library allocation
page read and write
2FA3000
trusted library allocation
page read and write
338F000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
2E62000
trusted library allocation
page read and write
C56000
heap
page read and write
28DB000
stack
page read and write
28EB000
trusted library allocation
page read and write
133A000
heap
page read and write
5960000
trusted library allocation
page read and write
6A4D000
stack
page read and write
2E96000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
A00000
heap
page read and write
305F000
trusted library allocation
page read and write
434000
remote allocation
page execute and read and write
9F3E000
stack
page read and write
421000
remote allocation
page execute and read and write
43D000
remote allocation
page execute and read and write
3E3D000
trusted library allocation
page read and write
410A000
trusted library allocation
page read and write
2C0E000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
1187000
stack
page read and write
4EE0000
heap
page read and write
3CEA000
trusted library allocation
page read and write
9F4000
heap
page read and write
3338000
trusted library allocation
page read and write
6B50000
trusted library allocation
page execute and read and write
26AA000
heap
page read and write
55BB000
trusted library allocation
page read and write
6E10000
trusted library allocation
page execute and read and write
72E0000
heap
page read and write
A5BE000
stack
page read and write
9E6C000
stack
page read and write
53AD000
stack
page read and write
6ACE000
stack
page read and write
6EF0000
trusted library allocation
page execute and read and write
1346000
heap
page read and write
3399000
trusted library allocation
page read and write
3E97000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
3EAD000
trusted library allocation
page read and write
9CE000
heap
page read and write
10C0000
trusted library allocation
page read and write
6B2E000
stack
page read and write
B92000
trusted library allocation
page read and write
425E000
trusted library allocation
page read and write
5200000
heap
page read and write
422000
remote allocation
page execute and read and write
6E87000
trusted library allocation
page read and write
3175000
trusted library allocation
page read and write
A5C000
heap
page read and write
3E25000
trusted library allocation
page read and write
4369000
trusted library allocation
page read and write
4B10000
heap
page read and write
A1EE000
stack
page read and write
9AB000
trusted library allocation
page execute and read and write
100E000
stack
page read and write
1120000
heap
page read and write
1312000
trusted library allocation
page read and write
30F6000
trusted library allocation
page read and write
53C0000
heap
page read and write
A24D000
heap
page read and write
99F000
stack
page read and write
A97C000
stack
page read and write
1115000
trusted library allocation
page execute and read and write
6E2B000
heap
page read and write
69A0000
trusted library allocation
page execute and read and write
6DA8000
trusted library allocation
page read and write
6A8E000
stack
page read and write
3EEC000
trusted library allocation
page read and write
108A000
stack
page read and write
4B30000
heap
page read and write
2E5E000
trusted library allocation
page read and write
122E000
stack
page read and write
BD0000
trusted library allocation
page read and write
6570000
heap
page read and write
1391000
heap
page read and write
414C000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
6BCF000
stack
page read and write
442B000
trusted library allocation
page read and write
3003000
trusted library allocation
page read and write
2F64000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
2DFF000
trusted library allocation
page read and write
3393000
trusted library allocation
page read and write
10D0000
trusted library allocation
page read and write
2EBA000
trusted library allocation
page read and write
C9A000
heap
page read and write
4DB0000
trusted library allocation
page read and write
37DB000
trusted library allocation
page read and write
323D000
trusted library allocation
page read and write
B80000
trusted library allocation
page read and write
10C0000
trusted library allocation
page read and write
4344000
trusted library allocation
page read and write
568E000
stack
page read and write
3274000
trusted library allocation
page read and write
306B000
trusted library allocation
page read and write
10E0000
trusted library allocation
page read and write
4A64000
trusted library allocation
page read and write
5970000
trusted library allocation
page execute and read and write
3CAE000
trusted library allocation
page read and write
408A000
trusted library allocation
page read and write
546D000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
6B70000
trusted library allocation
page execute and read and write
BE0000
heap
page read and write
96DE000
stack
page read and write
4419000
trusted library allocation
page read and write
3FD2000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
9960000
heap
page read and write
3036000
trusted library allocation
page read and write
C2A000
heap
page read and write
130D000
trusted library allocation
page execute and read and write
4CA0000
heap
page read and write
461C000
stack
page read and write
1680000
heap
page read and write
863000
trusted library allocation
page execute and read and write
2BF6000
trusted library allocation
page read and write
43EC000
trusted library allocation
page read and write
1395000
heap
page read and write
4A86000
trusted library allocation
page read and write
12AE000
stack
page read and write
10F7000
heap
page read and write
6DC0000
trusted library allocation
page read and write
B70000
trusted library allocation
page read and write
324B000
trusted library allocation
page read and write
C48000
heap
page read and write
1250000
trusted library allocation
page read and write
2C11000
trusted library allocation
page read and write
2E6B000
trusted library allocation
page read and write
6E8B000
trusted library allocation
page read and write
4126000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page execute and read and write
4065000
trusted library allocation
page read and write
EF0000
trusted library allocation
page execute and read and write
2B98000
trusted library allocation
page read and write
312E000
trusted library allocation
page read and write
3059000
trusted library allocation
page read and write
3064000
trusted library allocation
page read and write
72A000
stack
page read and write
3E38000
trusted library allocation
page read and write
3245000
trusted library allocation
page read and write
5060000
heap
page execute and read and write
3080000
heap
page execute and read and write
4AB0000
trusted library allocation
page read and write
6DA6000
trusted library allocation
page read and write
2901000
trusted library allocation
page read and write
DB7000
heap
page read and write
C1E000
stack
page read and write
5050000
heap
page read and write
4133000
trusted library allocation
page read and write
4B40000
heap
page read and write
3028000
trusted library allocation
page read and write
7130000
heap
page read and write
6C9E000
stack
page read and write
400000
remote allocation
page execute and read and write
6C60000
trusted library allocation
page read and write
6940000
trusted library allocation
page read and write
4F4E000
stack
page read and write
43F8000
trusted library allocation
page read and write
895000
heap
page read and write
361F000
trusted library allocation
page read and write
B3E000
stack
page read and write
440000
remote allocation
page execute and read and write
2F6D000
trusted library allocation
page read and write
A33000
heap
page read and write
9C0000
heap
page read and write
4AB5000
trusted library allocation
page read and write
43A1000
trusted library allocation
page read and write
410E000
trusted library allocation
page read and write
4256000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
30BC000
trusted library allocation
page read and write
4A92000
trusted library allocation
page read and write
416F000
trusted library allocation
page read and write
4C9B000
stack
page read and write
2930000
trusted library allocation
page read and write
3806000
trusted library allocation
page read and write
40C2000
trusted library allocation
page read and write
7EE000
stack
page read and write
3198000
trusted library allocation
page read and write
3662000
trusted library allocation
page read and write
6DF0000
trusted library allocation
page execute and read and write
A43E000
stack
page read and write
5620000
heap
page read and write
A0EE000
stack
page read and write
6E80000
trusted library allocation
page read and write
6DB0000
trusted library allocation
page execute and read and write
3379000
trusted library allocation
page read and write
6C90000
trusted library allocation
page execute and read and write
55B6000
trusted library allocation
page read and write
419B000
trusted library allocation
page read and write
6F90000
trusted library section
page read and write
BC0000
trusted library allocation
page read and write
4412000
trusted library allocation
page read and write
4286000
trusted library allocation
page read and write
44B0000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
86D000
trusted library allocation
page execute and read and write
783E000
stack
page read and write
50F000
unkown
page read and write
3230000
heap
page read and write
5460000
trusted library allocation
page read and write
259B000
trusted library allocation
page read and write
4424000
trusted library allocation
page read and write
2F8F000
trusted library allocation
page read and write
55E2000
trusted library allocation
page read and write
87D000
trusted library allocation
page execute and read and write
1106000
trusted library allocation
page execute and read and write
4104000
trusted library allocation
page read and write
A87C000
stack
page read and write
2950000
heap
page read and write
84E000
stack
page read and write
882000
trusted library allocation
page read and write
3FA7000
trusted library allocation
page read and write
67ED000
stack
page read and write
6F00000
trusted library allocation
page read and write
DB0000
heap
page read and write
A6C0000
heap
page read and write
4B4C000
stack
page read and write
BFA000
stack
page read and write
1018000
trusted library allocation
page read and write
10E0000
heap
page read and write
2912000
trusted library allocation
page read and write
6F50000
heap
page read and write
1310000
heap
page read and write
850000
trusted library allocation
page read and write
13FC000
heap
page read and write
2410000
trusted library allocation
page read and write
327C000
trusted library allocation
page read and write
40FD000
trusted library allocation
page read and write
2C0A000
trusted library allocation
page read and write
3FF1000
trusted library allocation
page read and write
67D0000
heap
page read and write
A57E000
stack
page read and write
5073000
heap
page read and write
53C3000
heap
page read and write
6ED0000
trusted library allocation
page read and write
2E0B000
trusted library allocation
page read and write
40AD000
trusted library allocation
page read and write
419F000
trusted library allocation
page read and write
42D000
remote allocation
page execute and read and write
447A000
trusted library allocation
page read and write
3F95000
trusted library allocation
page read and write
15EF000
stack
page read and write
A240000
heap
page read and write
3DD9000
trusted library allocation
page read and write
BA7000
trusted library allocation
page execute and read and write
4243000
trusted library allocation
page read and write
53BA000
trusted library allocation
page read and write
A1F1000
trusted library allocation
page read and write
4156000
trusted library allocation
page read and write
6B40000
trusted library allocation
page execute and read and write
69AE000
stack
page read and write
AF7000
stack
page read and write
4FB5000
heap
page read and write
4BB0000
trusted library section
page readonly
4FD0000
heap
page read and write
6960000
trusted library allocation
page read and write
A30000
heap
page read and write
313A000
trusted library allocation
page read and write
6C10000
trusted library allocation
page read and write
860000
trusted library allocation
page read and write
2E25000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
436000
remote allocation
page execute and read and write
9B9E000
stack
page read and write
6D8E000
stack
page read and write
562E000
stack
page read and write
B73000
trusted library allocation
page execute and read and write
6700000
heap
page read and write
338A000
trusted library allocation
page read and write
683E000
stack
page read and write
709D000
stack
page read and write
3250000
trusted library allocation
page read and write
4B52000
trusted library allocation
page read and write
3136000
trusted library allocation
page read and write
3104000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
2906000
trusted library allocation
page read and write
1112000
trusted library allocation
page read and write
95DF000
stack
page read and write
305F000
stack
page read and write
377E000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
A47D000
stack
page read and write
10DD000
trusted library allocation
page execute and read and write
31F3000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
5205000
heap
page read and write
10F0000
trusted library allocation
page read and write
4280000
trusted library allocation
page read and write
12CE000
stack
page read and write
13F1000
heap
page read and write
413A000
trusted library allocation
page read and write
42E5000
trusted library allocation
page read and write
422E000
trusted library allocation
page read and write
886000
trusted library allocation
page execute and read and write
6BF0000
trusted library allocation
page read and write
130C000
stack
page read and write
88A000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
4548000
trusted library allocation
page read and write
6C40000
trusted library allocation
page execute and read and write
379E000
trusted library allocation
page read and write
3DD3000
trusted library allocation
page read and write
1355000
heap
page read and write
2414000
trusted library allocation
page read and write
BC0000
heap
page read and write
4117000
trusted library allocation
page read and write
A13D000
stack
page read and write
66AE000
stack
page read and write
1200000
heap
page read and write
3C0000
heap
page read and write
10D4000
trusted library allocation
page read and write
B83000
trusted library allocation
page read and write
71E2000
trusted library allocation
page read and write
314A000
trusted library allocation
page read and write
4405000
trusted library allocation
page read and write
981E000
stack
page read and write
2F94000
trusted library allocation
page read and write
6952000
trusted library allocation
page read and write
15FB000
trusted library allocation
page execute and read and write
4284000
trusted library allocation
page read and write
A141000
heap
page read and write
2E5A000
trusted library allocation
page read and write
55CE000
trusted library allocation
page read and write
3065000
trusted library allocation
page read and write
5950000
trusted library allocation
page execute and read and write
516C000
stack
page read and write
2940000
heap
page execute and read and write
A6BE000
stack
page read and write
6C0E000
stack
page read and write
772E000
stack
page read and write
450D000
trusted library allocation
page read and write
302B000
trusted library allocation
page read and write
3276000
trusted library allocation
page read and write
69EF000
stack
page read and write
131A000
trusted library allocation
page execute and read and write
15F0000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
B8D000
trusted library allocation
page execute and read and write
140000
heap
page read and write
402000
remote allocation
page execute and read and write
2C30000
heap
page execute and read and write
C64000
heap
page read and write
43C000
remote allocation
page execute and read and write
4FB0000
heap
page read and write
A0AE000
stack
page read and write
3E1E000
trusted library allocation
page read and write
3241000
trusted library allocation
page read and write
54E000
stack
page read and write
253E000
stack
page read and write
309C000
trusted library allocation
page read and write
971E000
stack
page read and write
5090000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
7A0000
heap
page read and write
682E000
stack
page read and write
4A6B000
trusted library allocation
page read and write
141A000
heap
page read and write
290D000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
51F0000
heap
page read and write
6B60000
trusted library allocation
page execute and read and write
30DE000
trusted library allocation
page read and write
3DB1000
trusted library allocation
page read and write
692000
unkown
page readonly
2C16000
trusted library allocation
page read and write
2B96000
trusted library allocation
page read and write
3142000
trusted library allocation
page read and write
3E3A000
trusted library allocation
page read and write
55D6000
trusted library allocation
page read and write
36A4000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
70DE000
stack
page read and write
3A51000
trusted library allocation
page read and write
A9BE000
stack
page read and write
423000
remote allocation
page execute and read and write
41EB000
trusted library allocation
page read and write
42D0000
trusted library allocation
page read and write
41CB000
trusted library allocation
page read and write
6BD0000
trusted library allocation
page read and write
9A2000
trusted library allocation
page read and write
660D000
heap
page read and write
2F5E000
trusted library allocation
page read and write
41D1000
trusted library allocation
page read and write
4119000
trusted library allocation
page read and write
65D3000
heap
page read and write
455F000
trusted library allocation
page read and write
4EF2000
trusted library allocation
page read and write
1102000
trusted library allocation
page read and write
6EE7000
trusted library allocation
page read and write
418C000
trusted library allocation
page read and write
3023000
trusted library allocation
page read and write
538F000
stack
page read and write
1117000
trusted library allocation
page execute and read and write
313E000
trusted library allocation
page read and write
9CDE000
stack
page read and write
9D000
stack
page read and write
3E2B000
trusted library allocation
page read and write
4F9D000
stack
page read and write
2AAB000
trusted library allocation
page read and write
333E000
trusted library allocation
page read and write
4201000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page execute and read and write
4091000
trusted library allocation
page read and write
344E000
stack
page read and write
5623000
heap
page read and write
3301000
trusted library allocation
page read and write
3146000
trusted library allocation
page read and write
4AC0000
trusted library allocation
page read and write
16B0000
heap
page read and write
2430000
heap
page read and write
4A7E000
trusted library allocation
page read and write
3243000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
6C20000
trusted library allocation
page read and write
4522000
trusted library allocation
page read and write
2DA0000
heap
page read and write
4A60000
trusted library allocation
page read and write
2A51000
trusted library allocation
page read and write
BAB000
trusted library allocation
page execute and read and write
6615000
heap
page read and write
2BEE000
stack
page read and write
D80000
heap
page read and write
2C20000
trusted library allocation
page read and write
6C50000
trusted library allocation
page read and write
12F3000
trusted library allocation
page execute and read and write
2EF9000
stack
page read and write
DA000
stack
page read and write
1100000
trusted library allocation
page read and write
4B7B000
trusted library allocation
page read and write
C2E000
heap
page read and write
3330000
heap
page read and write
695A000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
10D0000
trusted library allocation
page read and write
3E17000
trusted library allocation
page read and write
870000
trusted library allocation
page read and write
10FD000
trusted library allocation
page execute and read and write
2C1D000
trusted library allocation
page read and write
4535000
trusted library allocation
page read and write
3060000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
53B6000
trusted library allocation
page read and write
1670000
trusted library allocation
page read and write
4430000
trusted library allocation
page read and write
411C000
trusted library allocation
page read and write
7730000
trusted library section
page read and write
42B000
remote allocation
page execute and read and write
3E2F000
trusted library allocation
page read and write
30A9000
trusted library allocation
page read and write
5098000
trusted library allocation
page read and write
441000
remote allocation
page execute and read and write
2416000
trusted library allocation
page read and write
3032000
trusted library allocation
page read and write
410D000
trusted library allocation
page read and write
1260000
heap
page read and write
12FD000
trusted library allocation
page execute and read and write
3070000
trusted library allocation
page read and write
3108000
trusted library allocation
page read and write
9FAE000
stack
page read and write
4145000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
1320000
heap
page read and write
9BDE000
stack
page read and write
2E29000
trusted library allocation
page read and write
There are 717 hidden memdumps, click here to show them.