IOC Report
RFQ 1307.scr.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RFQ 1307.scr.exe
"C:\Users\user\Desktop\RFQ 1307.scr.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious

URLs

Name
IP
Malicious
http://checkip.dyndns.org/
193.122.130.0
malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://api.telegram.org
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://www.office.com/lB
unknown
https://github.com/mgravell/protobuf-net
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
https://reallyfreegeoip.org/xml/155.94.241.186$
unknown
http://varders.kozow.com:8081
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:536720%0D%0ADate%20a
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:536720%0D%0ADate%20and%20Time:%2022/10/2024%20/%2001:16:48%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20536720%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://anotherarmy.dns.army:8081
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://playstoremeta.com/wp-includes/Lwkmydbthhy.dat
103.159.36.18
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
https://playstoremeta.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://reallyfreegeoip.org/xml/155.94.241.186
188.114.96.3
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 28 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.com
193.122.130.0
malicious
checkip.dyndns.org
unknown
malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45
playstoremeta.com
103.159.36.18
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
193.122.130.0
checkip.dyndns.com
United States
malicious
103.159.36.18
playstoremeta.com
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ 1307_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ 1307_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ 1307_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ 1307_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ 1307_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ 1307_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ 1307_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ 1307_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ 1307_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ 1307_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ 1307_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ 1307_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ 1307_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ 1307_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2F51000
trusted library allocation
page read and write
malicious
4468000
trusted library allocation
page read and write
malicious
3506000
trusted library allocation
page read and write
malicious
4509000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
7050000
trusted library section
page read and write
malicious
377A000
trusted library allocation
page read and write
63D0000
trusted library allocation
page execute and read and write
616E000
stack
page read and write
4034000
trusted library allocation
page read and write
30E8000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
60E2000
heap
page read and write
11E2000
trusted library allocation
page read and write
3B0A000
trusted library allocation
page read and write
3A02000
trusted library allocation
page read and write
3ADB000
trusted library allocation
page read and write
3626000
trusted library allocation
page read and write
169A000
heap
page read and write
370A000
trusted library allocation
page read and write
504E000
stack
page read and write
3AF3000
trusted library allocation
page read and write
F50000
unkown
page readonly
382B000
trusted library allocation
page read and write
FED000
heap
page read and write
54CD000
stack
page read and write
40AC000
trusted library allocation
page read and write
69A0000
heap
page read and write
376C000
trusted library allocation
page read and write
39EB000
trusted library allocation
page read and write
3A44000
trusted library allocation
page read and write
375D000
trusted library allocation
page read and write
4226000
trusted library allocation
page read and write
403C000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
5B2E000
stack
page read and write
4648000
trusted library allocation
page read and write
3B02000
trusted library allocation
page read and write
39CC000
trusted library allocation
page read and write
38B8000
trusted library allocation
page read and write
40BF000
trusted library allocation
page read and write
61DE000
stack
page read and write
2F30000
trusted library allocation
page read and write
656E000
stack
page read and write
35E5000
trusted library allocation
page read and write
30F1000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
361D000
trusted library allocation
page read and write
393F000
trusted library allocation
page read and write
3034000
trusted library allocation
page read and write
3B44000
trusted library allocation
page read and write
3B0C000
trusted library allocation
page read and write
F45000
heap
page read and write
15A7000
heap
page read and write
1787000
heap
page read and write
3A12000
trusted library allocation
page read and write
35D2000
trusted library allocation
page read and write
41F1000
trusted library allocation
page read and write
36A2000
trusted library allocation
page read and write
66AE000
stack
page read and write
5A1D000
stack
page read and write
3FB6000
trusted library allocation
page read and write
39BE000
trusted library allocation
page read and write
337E000
stack
page read and write
1AD9000
heap
page read and write
60DE000
stack
page read and write
3729000
trusted library allocation
page read and write
5F6D000
stack
page read and write
3636000
trusted library allocation
page read and write
365B000
trusted library allocation
page read and write
14B5000
heap
page read and write
3AA6000
trusted library allocation
page read and write
3B2B000
trusted library allocation
page read and write
35D0000
trusted library allocation
page read and write
3983000
trusted library allocation
page read and write
125E000
stack
page read and write
38EA000
trusted library allocation
page read and write
1350000
heap
page read and write
35E3000
trusted library allocation
page read and write
3B06000
trusted library allocation
page read and write
402E000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
6917000
trusted library allocation
page read and write
30C6000
trusted library allocation
page read and write
11CD000
trusted library allocation
page execute and read and write
4234000
trusted library allocation
page read and write
368F000
trusted library allocation
page read and write
3002000
trusted library allocation
page read and write
2FC9000
trusted library allocation
page read and write
38CF000
trusted library allocation
page read and write
3A8F000
trusted library allocation
page read and write
3A0A000
trusted library allocation
page read and write
3901000
trusted library allocation
page read and write
423A000
trusted library allocation
page read and write
FCE000
heap
page read and write
7130000
trusted library allocation
page read and write
35B9000
trusted library allocation
page read and write
30ED000
trusted library allocation
page read and write
42B4000
trusted library allocation
page read and write
3A8D000
trusted library allocation
page read and write
3674000
trusted library allocation
page read and write
172B000
heap
page read and write
3AD7000
trusted library allocation
page read and write
6DB0000
trusted library allocation
page read and write
370E000
trusted library allocation
page read and write
3B11000
trusted library allocation
page read and write
363C000
trusted library allocation
page read and write
59DE000
stack
page read and write
FBE000
heap
page read and write
3AFA000
trusted library allocation
page read and write
3A76000
trusted library allocation
page read and write
3694000
trusted library allocation
page read and write
FE0000
heap
page read and write
38FD000
trusted library allocation
page read and write
2D58000
trusted library allocation
page read and write
652E000
stack
page read and write
70C0000
trusted library allocation
page read and write
608B000
heap
page read and write
4039000
trusted library allocation
page read and write
3259000
trusted library allocation
page read and write
300A000
trusted library allocation
page read and write
3A2B000
trusted library allocation
page read and write
163C000
stack
page read and write
2FFA000
trusted library allocation
page read and write
15B0000
trusted library allocation
page read and write
3672000
trusted library allocation
page read and write
423F000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1580000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
391A000
trusted library allocation
page read and write
3AB6000
trusted library allocation
page read and write
390B000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
F90000
heap
page read and write
6880000
trusted library allocation
page execute and read and write
6370000
trusted library allocation
page read and write
3A78000
trusted library allocation
page read and write
39E7000
trusted library allocation
page read and write
395C000
trusted library allocation
page read and write
12F7000
stack
page read and write
5B6F000
stack
page read and write
35C6000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
39A0000
trusted library allocation
page read and write
401A000
trusted library allocation
page read and write
3734000
trusted library allocation
page read and write
11F5000
trusted library allocation
page execute and read and write
39D2000
trusted library allocation
page read and write
378F000
trusted library allocation
page read and write
375F000
trusted library allocation
page read and write
372F000
trusted library allocation
page read and write
3058000
trusted library allocation
page read and write
366C000
trusted library allocation
page read and write
FA8000
heap
page read and write
3783000
trusted library allocation
page read and write
3A6E000
trusted library allocation
page read and write
3AAA000
trusted library allocation
page read and write
379B000
trusted library allocation
page read and write
3717000
trusted library allocation
page read and write
324F000
trusted library allocation
page read and write
36E0000
trusted library allocation
page read and write
3B40000
trusted library allocation
page read and write
3928000
trusted library allocation
page read and write
38D5000
trusted library allocation
page read and write
3FE9000
trusted library allocation
page read and write
36F7000
trusted library allocation
page read and write
5390000
heap
page read and write
3A46000
trusted library allocation
page read and write
2FEE000
trusted library allocation
page read and write
5510000
trusted library allocation
page execute and read and write
636C000
stack
page read and write
3239000
trusted library allocation
page read and write
35C8000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
36C8000
trusted library allocation
page read and write
626E000
stack
page read and write
36F3000
trusted library allocation
page read and write
1650000
heap
page read and write
36BF000
trusted library allocation
page read and write
1582000
trusted library allocation
page read and write
4200000
trusted library allocation
page read and write
1572000
trusted library allocation
page read and write
393B000
trusted library allocation
page read and write
176C000
heap
page read and write
3FE5000
trusted library allocation
page read and write
3605000
trusted library allocation
page read and write
6DDC000
trusted library allocation
page read and write
1540000
trusted library allocation
page read and write
3937000
trusted library allocation
page read and write
3676000
trusted library allocation
page read and write
372B000
trusted library allocation
page read and write
3624000
trusted library allocation
page read and write
5F2D000
stack
page read and write
188E000
stack
page read and write
3A72000
trusted library allocation
page read and write
3006000
trusted library allocation
page read and write
3A60000
trusted library allocation
page read and write
6C11000
heap
page read and write
11D0000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
36CC000
trusted library allocation
page read and write
11C3000
trusted library allocation
page execute and read and write
38B4000
trusted library allocation
page read and write
39D9000
trusted library allocation
page read and write
3600000
trusted library allocation
page read and write
39CE000
trusted library allocation
page read and write
3B3E000
trusted library allocation
page read and write
3AB9000
trusted library allocation
page read and write
3956000
trusted library allocation
page read and write
444000
remote allocation
page execute and read and write
3AE4000
trusted library allocation
page read and write
6980000
heap
page read and write
6080000
trusted library allocation
page read and write
3A7C000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
4216000
trusted library allocation
page read and write
6E40000
trusted library allocation
page read and write
3744000
trusted library allocation
page read and write
3ADF000
trusted library allocation
page read and write
397F000
trusted library allocation
page read and write
3958000
trusted library allocation
page read and write
3A85000
trusted library allocation
page read and write
3A59000
trusted library allocation
page read and write
39D4000
trusted library allocation
page read and write
6C71000
heap
page read and write
2F2A000
trusted library allocation
page read and write
36DA000
trusted library allocation
page read and write
31CC000
trusted library allocation
page read and write
EF7000
stack
page read and write
3390000
trusted library allocation
page read and write
3613000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
31CA000
trusted library allocation
page read and write
31C2000
trusted library allocation
page read and write
1560000
trusted library allocation
page read and write
3740000
trusted library allocation
page read and write
6E20000
trusted library allocation
page read and write
39A2000
trusted library allocation
page read and write
38BC000
trusted library allocation
page read and write
395E000
trusted library allocation
page read and write
2EC0000
heap
page execute and read and write
1570000
trusted library allocation
page read and write
F52000
unkown
page readonly
3954000
trusted library allocation
page read and write
41FB000
trusted library allocation
page read and write
3FBA000
trusted library allocation
page read and write
35FA000
trusted library allocation
page read and write
3761000
trusted library allocation
page read and write
3742000
trusted library allocation
page read and write
590E000
stack
page read and write
1069000
heap
page read and write
3A49000
trusted library allocation
page read and write
11F7000
trusted library allocation
page execute and read and write
3B08000
trusted library allocation
page read and write
FEC000
stack
page read and write
16FC000
heap
page read and write
3987000
trusted library allocation
page read and write
3BB6000
trusted library allocation
page read and write
11E6000
trusted library allocation
page execute and read and write
368D000
trusted library allocation
page read and write
60D8000
heap
page read and write
3A42000
trusted library allocation
page read and write
3998000
trusted library allocation
page read and write
36A6000
trusted library allocation
page read and write
6C43000
heap
page read and write
3746000
trusted library allocation
page read and write
717E000
stack
page read and write
3621000
trusted library allocation
page read and write
36B9000
trusted library allocation
page read and write
666E000
stack
page read and write
422F000
trusted library allocation
page read and write
39B9000
trusted library allocation
page read and write
2F00000
heap
page execute and read and write
38CD000
trusted library allocation
page read and write
36C3000
trusted library allocation
page read and write
3A08000
trusted library allocation
page read and write
2F9F000
trusted library allocation
page read and write
3679000
trusted library allocation
page read and write
36ED000
trusted library allocation
page read and write
31A2000
trusted library allocation
page read and write
1755000
heap
page read and write
39E9000
trusted library allocation
page read and write
417E000
trusted library allocation
page read and write
3B23000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
41F3000
trusted library allocation
page read and write
3253000
trusted library allocation
page read and write
3710000
trusted library allocation
page read and write
5E2E000
stack
page read and write
31D1000
trusted library allocation
page read and write
3AF6000
trusted library allocation
page read and write
370C000
trusted library allocation
page read and write
3B3C000
trusted library allocation
page read and write
5F2E000
stack
page read and write
3A3E000
trusted library allocation
page read and write
3935000
trusted library allocation
page read and write
3A5E000
trusted library allocation
page read and write
3A97000
trusted library allocation
page read and write
3909000
trusted library allocation
page read and write
108E000
heap
page read and write
3727000
trusted library allocation
page read and write
3920000
trusted library allocation
page read and write
3255000
trusted library allocation
page read and write
BF0000
heap
page read and write
2FF6000
trusted library allocation
page read and write
39F5000
trusted library allocation
page read and write
1AD0000
heap
page read and write
3440000
heap
page execute and read and write
1771000
heap
page read and write
38F4000
trusted library allocation
page read and write
3450000
heap
page read and write
1AD7000
heap
page read and write
686E000
stack
page read and write
2E93000
heap
page read and write
30B8000
trusted library allocation
page read and write
300E000
trusted library allocation
page read and write
2F26000
trusted library allocation
page read and write
1A8E000
stack
page read and write
4042000
trusted library allocation
page read and write
3A2E000
trusted library allocation
page read and write
36A9000
trusted library allocation
page read and write
364F000
trusted library allocation
page read and write
30BE000
trusted library allocation
page read and write
2FAB000
trusted library allocation
page read and write
153E000
stack
page read and write
40EC000
trusted library allocation
page read and write
1670000
trusted library allocation
page read and write
1554000
trusted library allocation
page read and write
3795000
trusted library allocation
page read and write
5930000
trusted library allocation
page execute and read and write
39E1000
trusted library allocation
page read and write
39ED000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
602F000
stack
page read and write
3B1F000
trusted library allocation
page read and write
147E000
stack
page read and write
6B90000
heap
page read and write
6940000
trusted library allocation
page read and write
1580000
trusted library allocation
page read and write
3757000
trusted library allocation
page read and write
3247000
trusted library allocation
page read and write
656E000
stack
page read and write
4122000
trusted library allocation
page read and write
39E3000
trusted library allocation
page read and write
361B000
trusted library allocation
page read and write
36DC000
trusted library allocation
page read and write
2FC5000
trusted library allocation
page read and write
2E62000
trusted library allocation
page read and write
555E000
stack
page read and write
402A000
trusted library allocation
page read and write
6C33000
heap
page read and write
11F0000
trusted library allocation
page read and write
6910000
heap
page read and write
31D6000
trusted library allocation
page read and write
676E000
stack
page read and write
6E15000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6E80000
trusted library allocation
page read and write
11DD000
trusted library allocation
page execute and read and write
3687000
trusted library allocation
page read and write
3778000
trusted library allocation
page read and write
1640000
trusted library allocation
page execute and read and write
15A0000
heap
page read and write
3793000
trusted library allocation
page read and write
377E000
trusted library allocation
page read and write
3F79000
trusted library allocation
page read and write
3780000
trusted library allocation
page read and write
1072000
heap
page read and write
3B27000
trusted library allocation
page read and write
35CC000
trusted library allocation
page read and write
3755000
trusted library allocation
page read and write
F54000
unkown
page readonly
3B04000
trusted library allocation
page read and write
3926000
trusted library allocation
page read and write
38AB000
trusted library allocation
page read and write
366E000
trusted library allocation
page read and write
3B2F000
trusted library allocation
page read and write
6CC0000
trusted library section
page read and write
2E3E000
trusted library allocation
page read and write
4461000
trusted library allocation
page read and write
3A74000
trusted library allocation
page read and write
3985000
trusted library allocation
page read and write
14B0000
heap
page read and write
3A8B000
trusted library allocation
page read and write
38D7000
trusted library allocation
page read and write
2F3D000
trusted library allocation
page read and write
3AD9000
trusted library allocation
page read and write
606E000
stack
page read and write
3A70000
trusted library allocation
page read and write
79C0000
trusted library allocation
page execute and read and write
3490000
trusted library allocation
page read and write
1ACE000
stack
page read and write
3388000
trusted library allocation
page read and write
60AE000
heap
page read and write
7120000
trusted library allocation
page execute and read and write
14FE000
stack
page read and write
35E7000
trusted library allocation
page read and write
410B000
trusted library allocation
page read and write
6034000
heap
page read and write
3973000
trusted library allocation
page read and write
39CA000
trusted library allocation
page read and write
3763000
trusted library allocation
page read and write
39BB000
trusted library allocation
page read and write
156D000
trusted library allocation
page execute and read and write
324A000
trusted library allocation
page read and write
6CA0000
heap
page read and write
2E2C000
stack
page read and write
1590000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page execute and read and write
399C000
trusted library allocation
page read and write
2FB6000
trusted library allocation
page read and write
672E000
stack
page read and write
6B8F000
stack
page read and write
4350000
trusted library allocation
page read and write
39DF000
trusted library allocation
page read and write
38DB000
trusted library allocation
page read and write
35F0000
trusted library allocation
page read and write
3B21000
trusted library allocation
page read and write
376A000
trusted library allocation
page read and write
3B46000
trusted library allocation
page read and write
11EA000
trusted library allocation
page execute and read and write
4004000
trusted library allocation
page read and write
2E90000
heap
page read and write
3A0C000
trusted library allocation
page read and write
3933000
trusted library allocation
page read and write
7180000
trusted library allocation
page execute and read and write
6910000
trusted library allocation
page read and write
429F000
trusted library allocation
page read and write
3A25000
trusted library allocation
page read and write
6A8E000
stack
page read and write
3759000
trusted library allocation
page read and write
3B29000
trusted library allocation
page read and write
3943000
trusted library allocation
page read and write
36CE000
trusted library allocation
page read and write
3AE1000
trusted library allocation
page read and write
FDA000
heap
page read and write
41D5000
trusted library allocation
page read and write
11FB000
trusted library allocation
page execute and read and write
3B0E000
trusted library allocation
page read and write
44CB000
trusted library allocation
page read and write
30BC000
trusted library allocation
page read and write
16B9000
heap
page read and write
3615000
trusted library allocation
page read and write
1430000
heap
page read and write
6072000
heap
page read and write
363A000
trusted library allocation
page read and write
3776000
trusted library allocation
page read and write
70B0000
trusted library allocation
page read and write
3AAE000
trusted library allocation
page read and write
1260000
heap
page read and write
4194000
trusted library allocation
page read and write
3A23000
trusted library allocation
page read and write
3A15000
trusted library allocation
page read and write
3905000
trusted library allocation
page read and write
368B000
trusted library allocation
page read and write
FE2000
heap
page read and write
4096000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
156F000
stack
page read and write
3619000
trusted library allocation
page read and write
35D5000
trusted library allocation
page read and write
39B7000
trusted library allocation
page read and write
11B0000
trusted library allocation
page read and write
30FC000
trusted library allocation
page read and write
38BA000
trusted library allocation
page read and write
6F80000
trusted library section
page read and write
390D000
trusted library allocation
page read and write
66EE000
stack
page read and write
3617000
trusted library allocation
page read and write
4232000
trusted library allocation
page read and write
3A95000
trusted library allocation
page read and write
B8A000
stack
page read and write
6870000
trusted library allocation
page execute and read and write
70F0000
trusted library allocation
page execute and read and write
3A83000
trusted library allocation
page read and write
36BD000
trusted library allocation
page read and write
422C000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
3924000
trusted library allocation
page read and write
3ADD000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
6950000
trusted library allocation
page execute and read and write
4327000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
39F3000
trusted library allocation
page read and write
3B25000
trusted library allocation
page read and write
FA0000
heap
page read and write
6EC0000
trusted library allocation
page read and write
3946000
trusted library allocation
page read and write
36BB000
trusted library allocation
page read and write
62AE000
stack
page read and write
3706000
trusted library allocation
page read and write
158B000
trusted library allocation
page execute and read and write
3A91000
trusted library allocation
page read and write
2FC1000
trusted library allocation
page read and write
1576000
trusted library allocation
page execute and read and write
60D5000
heap
page read and write
728E000
stack
page read and write
3A93000
trusted library allocation
page read and write
41D1000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
642E000
stack
page read and write
30F7000
trusted library allocation
page read and write
365E000
trusted library allocation
page read and write
35E9000
trusted library allocation
page read and write
3461000
trusted library allocation
page read and write
3765000
trusted library allocation
page read and write
36F5000
trusted library allocation
page read and write
2E51000
trusted library allocation
page read and write
3691000
trusted library allocation
page read and write
6890000
trusted library allocation
page execute and read and write
4037000
trusted library allocation
page read and write
433D000
trusted library allocation
page read and write
550D000
stack
page read and write
38B2000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page execute and read and write
2E80000
trusted library allocation
page read and write
6C90000
heap
page read and write
36E2000
trusted library allocation
page read and write
377C000
trusted library allocation
page read and write
5CEE000
stack
page read and write
393D000
trusted library allocation
page read and write
6920000
trusted library allocation
page execute and read and write
4196000
trusted library allocation
page read and write
3670000
trusted library allocation
page read and write
38F2000
trusted library allocation
page read and write
107C000
heap
page read and write
6930000
trusted library allocation
page read and write
34A7000
trusted library allocation
page read and write
2E5D000
trusted library allocation
page read and write
15FE000
stack
page read and write
16D7000
heap
page read and write
1587000
trusted library allocation
page execute and read and write
3602000
trusted library allocation
page read and write
3989000
trusted library allocation
page read and write
1096000
heap
page read and write
38EE000
trusted library allocation
page read and write
680E000
stack
page read and write
36DE000
trusted library allocation
page read and write
5DEE000
stack
page read and write
6EA0000
trusted library allocation
page execute and read and write
39D6000
trusted library allocation
page read and write
391C000
trusted library allocation
page read and write
34AB000
trusted library allocation
page read and write
580E000
stack
page read and write
391E000
trusted library allocation
page read and write
361F000
trusted library allocation
page read and write
6380000
trusted library section
page read and write
652D000
stack
page read and write
39A6000
trusted library allocation
page read and write
39F1000
trusted library allocation
page read and write
6C17000
heap
page read and write
690D000
stack
page read and write
1553000
trusted library allocation
page execute and read and write
2E56000
trusted library allocation
page read and write
11C0000
trusted library allocation
page read and write
66CC000
stack
page read and write
36C1000
trusted library allocation
page read and write
3202000
trusted library allocation
page read and write
63AE000
stack
page read and write
35FC000
trusted library allocation
page read and write
38D3000
trusted library allocation
page read and write
3774000
trusted library allocation
page read and write
1570000
trusted library allocation
page execute and read and write
2FFE000
trusted library allocation
page read and write
198E000
stack
page read and write
39A4000
trusted library allocation
page read and write
11C4000
trusted library allocation
page read and write
36C5000
trusted library allocation
page read and write
3960000
trusted library allocation
page read and write
3A29000
trusted library allocation
page read and write
38D9000
trusted library allocation
page read and write
3A55000
trusted library allocation
page read and write
3714000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
349A000
trusted library allocation
page read and write
3738000
trusted library allocation
page read and write
3939000
trusted library allocation
page read and write
3797000
trusted library allocation
page read and write
39EF000
trusted library allocation
page read and write
67CC000
stack
page read and write
155D000
trusted library allocation
page execute and read and write
38EC000
trusted library allocation
page read and write
1705000
heap
page read and write
30C0000
trusted library allocation
page read and write
3AAC000
trusted library allocation
page read and write
36CA000
trusted library allocation
page read and write
4223000
trusted library allocation
page read and write
38D1000
trusted library allocation
page read and write
64EF000
stack
page read and write
2E4A000
trusted library allocation
page read and write
397D000
trusted library allocation
page read and write
1690000
heap
page read and write
3725000
trusted library allocation
page read and write
392D000
trusted library allocation
page read and write
65AE000
stack
page read and write
2F24000
trusted library allocation
page read and write
3B3A000
trusted library allocation
page read and write
36A4000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
38F6000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
38F0000
trusted library allocation
page read and write
1210000
trusted library allocation
page read and write
169E000
heap
page read and write
375B000
trusted library allocation
page read and write
437C000
trusted library allocation
page read and write
6E30000
trusted library allocation
page read and write
38E8000
trusted library allocation
page read and write
157A000
trusted library allocation
page execute and read and write
3A27000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
35CA000
trusted library allocation
page read and write
F40000
heap
page read and write
15A0000
heap
page read and write
46C0000
trusted library allocation
page read and write
1180000
heap
page read and write
364D000
trusted library allocation
page read and write
3A5B000
trusted library allocation
page read and write
30A5000
trusted library allocation
page read and write
3922000
trusted library allocation
page read and write
3632000
trusted library allocation
page read and write
2E3B000
trusted library allocation
page read and write
35ED000
trusted library allocation
page read and write
5A20000
heap
page execute and read and write
599E000
stack
page read and write
3791000
trusted library allocation
page read and write
421C000
trusted library allocation
page read and write
35FE000
trusted library allocation
page read and write
5910000
trusted library allocation
page execute and read and write
2E36000
trusted library allocation
page read and write
11F2000
trusted library allocation
page read and write
2FF2000
trusted library allocation
page read and write
3712000
trusted library allocation
page read and write
3B2D000
trusted library allocation
page read and write
3941000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
398B000
trusted library allocation
page read and write
395A000
trusted library allocation
page read and write
63EE000
stack
page read and write
2F40000
heap
page read and write
36D8000
trusted library allocation
page read and write
3A7A000
trusted library allocation
page read and write
3751000
trusted library allocation
page read and write
31C8000
trusted library allocation
page read and write
626E000
stack
page read and write
4207000
trusted library allocation
page read and write
36D6000
trusted library allocation
page read and write
6030000
heap
page read and write
3F51000
trusted library allocation
page read and write
3634000
trusted library allocation
page read and write
3907000
trusted library allocation
page read and write
420D000
trusted library allocation
page read and write
There are 644 hidden memdumps, click here to show them.