IOC Report
RFQ.exe

loading gif

Files

File Path
Type
Category
Malicious
RFQ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RFQ.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2sxwhesn.ytw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_adwa53ok.joc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h20e2bjt.bts.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lyrwqexs.umm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\dvvZj3l0
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RFQ.exe
"C:\Users\user\Desktop\RFQ.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RFQ.exe"
malicious
C:\Users\user\Desktop\RFQ.exe
"C:\Users\user\Desktop\RFQ.exe"
malicious
C:\Program Files (x86)\RVvmUvPEqDlYrrweVNYYJuvQHghwCDqplNswxbXNeTxKBBugQnGCMhEbIeudCHnXDjdBoYZ\KdNqCjDpwdLOuI.exe
"C:\Program Files (x86)\RVvmUvPEqDlYrrweVNYYJuvQHghwCDqplNswxbXNeTxKBBugQnGCMhEbIeudCHnXDjdBoYZ\KdNqCjDpwdLOuI.exe"
malicious
C:\Windows\SysWOW64\icacls.exe
"C:\Windows\SysWOW64\icacls.exe"
malicious
C:\Program Files (x86)\RVvmUvPEqDlYrrweVNYYJuvQHghwCDqplNswxbXNeTxKBBugQnGCMhEbIeudCHnXDjdBoYZ\KdNqCjDpwdLOuI.exe
"C:\Program Files (x86)\RVvmUvPEqDlYrrweVNYYJuvQHghwCDqplNswxbXNeTxKBBugQnGCMhEbIeudCHnXDjdBoYZ\KdNqCjDpwdLOuI.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
https://htmlcodex.com
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://cdn.jsdelivr.net/npm/bootstrap
unknown
http://www.seatheskydesign.online/bnz5/
66.96.162.136
https://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.10.0/css/all.min.css
unknown
http://www.wedgetechflash.co.ke/bnz5/?gr=1jaEnVPJQbBr8WwKNEfMHYGZjhye5aSOWdurwFccCTE0UU1/+EdJo2t+tokAsIL/Mwf8dbmtfOzyBKuFYSi0CvpWL7by1S5GZC5tkYq+xKghYmLhmWFfGXtgNdAY2BZgRg==&kFGTX=Q6OxIXo8tXD
37.61.232.138
http://www.mytemplotech.com/bnz5/?kFGTX=Q6OxIXo8tXD&gr=23UPPxRjGSNUJTgmtj2qEyLz/ntkvqKRRFHtLj5W9bo9CLdZgto2DYnNUhYakwcl0jYhNZjG9CPBZRuAkcQvlwifYrEIa7IdBg/GlOURZYl7vwvnI0pSC8vNdE3Ml+j1JA==
91.195.240.117
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.fusionndustries.xyz/bnz5/?gr=xJEpvmsSZWMn08k0fswZUF3i8FJV6XmZDE9zwebvcwnWaSyOd7ieKTZxqd8LfY736VbykJAs8QtIZUIve9rpP7hx1kot6ym/I/JMbr2a3NM5FLBwcSvbdBi7Xsx3rbBzJg==&kFGTX=Q6OxIXo8tXD
203.161.50.128
http://www.myspinpods.com/bnz5/
91.195.240.117
http://www.blueberry-breeze.com/bnz5/
91.195.240.117
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://code.jquery.com/jquery-3.4.1.min.js
unknown
https://www.ecosia.org/newtab/
unknown
http://www.elysiangame.online/bnz5/?kFGTX=Q6OxIXo8tXD&gr=4BEdEKurUNEFwkFRegiDBzC7pj7sTtT0kB0gdoDHo+aBzggPclQDQJqF4ehpSB3lBDvuZzIzoYk2h0Zy/GWQSTC2T/c7HqqgmNNGpbvCRxrYpdpNw0fXnMi51aRJIBirrQ==
174.138.177.173
http://www.naglissere.ru/bnz5/?kFGTX=Q6OxIXo8tXD&gr=UMNiUc6XIv/d2uC7IlFmdfXYbiB/0cGyF5nVzLNzjfRVEsK0zJlkeP+z5Z1MT37PYueGSacB+keqYnFu3S8ymlT8yqaJ/dNBtni0ghgK1oHFbUR/jwcWs7rz0kpYku2gKQ==
185.215.4.13
https://cdn.jsdelivr.net/npm/bootstrap-icons
unknown
https://answers.netlify.com/t/support-guide-i-ve-deployed-my-site-but-i-still-see-page-not-found/125
unknown
http://www.fusionndustries.xyz/bnz5/
203.161.50.128
https://ac.ecosia.org/autocomplete?q=
unknown
http://wedgetechflash.co.ke/bnz5/?gr=1jaEnVPJQbBr8WwKNEfMHYGZjhye5aSOWdurwFccCTE0UU1/
unknown
http://www.blueberry-breeze.com/bnz5/?gr=Z7N7hXY/vxItmyrXNQB4LENYEQnuSZ4/X1tSw0B7uFqoJtXe6IwXeXQiXEM/Xr4/ado0xvKOz5lKhVT9TZmVC0ntJKIXA1qlQqDuwiNLRNgNzKASDET1ivmJ23BpeRNTPw==&kFGTX=Q6OxIXo8tXD
91.195.240.117
http://www.naglissere.ru
unknown
http://www.collegeclubapparel.com/bnz5/?kFGTX=Q6OxIXo8tXD&gr=k/xiXeKkElN9lmj7tVr8idaf/wpGLS/XfVixYgRWGr55oYC/zYvRgJVTIR6Icyf7C+fnrNLi6yuD3OJtT3FnzryZpasAqgaz10+v5QpHvKqHjO9njldZ1cZrBWCORkcOsw==
91.195.240.117
http://www.seatheskydesign.online/bnz5/?gr=6OoDw3xNyuUxCb7SO8/wQWyB7gJcoYv4ZTaI1h51IYF+sVRVSOMOuR9r6Rx19mFv7TRZYpTQN5hhg3dhUB7GRpmcej2viG1w8/6TMbbBsdyRJnmf1CwT9GI+x7zG1LG56Q==&kFGTX=Q6OxIXo8tXD
66.96.162.136
http://www.searchvity.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.wedgetechflash.co.ke/bnz5/
37.61.232.138
http://www.ojyphyi.website/bnz5/
103.66.94.182
http://www.vvbgsekbo.store/bnz5/?gr=J5sdn6UHwrTFsLl7PSE+273sNdFQMS+e/Eepb66AdUMKjr/OxnnLPWtAHrBNDsqMNKwlUYW9tPjJnamC/Yv4erSiZvDT3TM3BG/s9HlMNwb39HB/smoNNYSAbH35aGk1gA==&kFGTX=Q6OxIXo8tXD
43.132.191.179
http://www.othlastore.com/bnz5/
91.195.240.117
http://www.ojyphyi.website/bnz5/?kFGTX=Q6OxIXo8tXD&gr=N6yreUGrEwmnZyuRuhm7fu2pjjSQdKU6BgmK3dVc5hhl4QdzezeViDhR5sAjVdDUmsLMRcLdrvPdYjLD7b1ZIx3A1Z1l9931wLtzigwrLlFKueBnJaM0qh412Fe43461Qw==
103.66.94.182
http://www.book-of-degen.xyz/bnz5/?kFGTX=Q6OxIXo8tXD&gr=90cL6Q+hnzVn1nW1iqhU1H7cWV3fvz6SaIERCijRkAMfp+TQya0GlzYPpQzULEJqUDrLh9Kv8LQV8OdLSWJ6ERPfs+zhKb8B6PZEz280PNZ5UlofhaQwyuwHrpNW2TXV5g==
75.2.60.5
http://www.searchvity.com/?dn=
unknown
http://www.naglissere.ru/bnz5/
185.215.4.13
http://www.book-of-degen.xyz/bnz5/
75.2.60.5
http://www.vvbgsekbo.store/bnz5/
43.132.191.179
http://www.66bm99.shop/bnz5/
134.122.178.172
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://htmlcodex.com/credit-removal
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.collegeclubapparel.com/bnz5/
91.195.240.117
http://www.othlastore.com/bnz5/?gr=zdwoT+oWWlgyDxCB5HfbKl0ceeCoMM1WsfXRj0lrAfPT+1DsmzcZqVZ0gwFwp9Re8dyKn5b7kYDBw8FcuEN9m4nkKjfCAjjkfqKhmamnNO4NqnkVPKDFVPgTCNPXruJSGA==&kFGTX=Q6OxIXo8tXD
91.195.240.117
http://www.mytemplotech.com/bnz5/
91.195.240.117
There are 35 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.fusionndustries.xyz
203.161.50.128
malicious
www.book-of-degen.xyz
75.2.60.5
malicious
www.aretikokkoris.com
unknown
malicious
www.drjoserizal.com
unknown
malicious
www.wedgetechflash.co.ke
unknown
malicious
www.66bm99.shop
unknown
malicious
www.seatheskydesign.online
66.96.162.136
wedgetechflash.co.ke
37.61.232.138
www.myspinpods.com
91.195.240.117
ccxx.cat-dragon-diiojsofso.com
134.122.178.172
www.blueberry-breeze.com
91.195.240.117
www.vvbgsekbo.store
43.132.191.179
www.elysiangame.online
174.138.177.173
www.ojyphyi.website
103.66.94.182
www.collegeclubapparel.com
91.195.240.117
www.othlastore.com
91.195.240.117
www.mytemplotech.com
91.195.240.117
www.naglissere.ru
185.215.4.13
There are 8 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
203.161.50.128
www.fusionndustries.xyz
Malaysia
malicious
75.2.60.5
www.book-of-degen.xyz
United States
malicious
91.195.240.117
www.myspinpods.com
Germany
66.96.162.136
www.seatheskydesign.online
United States
185.215.4.13
www.naglissere.ru
Denmark
174.138.177.173
www.elysiangame.online
United States
103.66.94.182
www.ojyphyi.website
China
134.122.178.172
ccxx.cat-dragon-diiojsofso.com
United States
43.132.191.179
www.vvbgsekbo.store
Japan
37.61.232.138
wedgetechflash.co.ke
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
2750000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
1920000
unclassified section
page execute and read and write
malicious
3690000
trusted library allocation
page read and write
malicious
3650000
trusted library allocation
page read and write
malicious
5010000
system
page execute and read and write
malicious
30C0000
system
page execute and read and write
malicious
30D0000
unkown
page execute and read and write
malicious
32A4000
heap
page read and write
905000
unkown
page read and write
18E0000
direct allocation
page read and write
4A9E000
unclassified section
page read and write
3551000
heap
page read and write
306D000
trusted library allocation
page read and write
18536450000
heap
page read and write
3551000
heap
page read and write
8367000
heap
page read and write
916D000
stack
page read and write
5820000
trusted library allocation
page read and write
1853652C000
heap
page read and write
3316000
heap
page read and write
7C79000
heap
page read and write
3B7D000
direct allocation
page execute and read and write
520000
unkown
page readonly
8FE000
unkown
page readonly
B61000
unkown
page readonly
333A000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
53B0000
heap
page read and write
3551000
heap
page read and write
50CE000
trusted library allocation
page read and write
3551000
heap
page read and write
249E000
stack
page read and write
8F1000
unkown
page execute read
C2AE000
stack
page read and write
3551000
heap
page read and write
32F5000
heap
page read and write
3304000
heap
page read and write
1220000
trusted library allocation
page execute and read and write
3551000
heap
page read and write
520000
unkown
page readonly
347A000
unkown
page read and write
329E000
heap
page read and write
8319000
heap
page read and write
32B0000
heap
page read and write
18537F16000
trusted library allocation
page read and write
89AF000
stack
page read and write
82EB000
heap
page read and write
7C34000
heap
page read and write
8F0000
unkown
page readonly
3551000
heap
page read and write
5520000
heap
page read and write
17DE000
stack
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
B80000
heap
page read and write
5278000
unclassified section
page read and write
907000
unkown
page readonly
24D0000
heap
page read and write
394F000
unkown
page execute and read and write
32DA000
heap
page read and write
3551000
heap
page read and write
1237000
heap
page read and write
18536530000
heap
page read and write
3551000
heap
page read and write
2E30000
trusted library allocation
page read and write
11D2000
trusted library allocation
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
EDD000
trusted library allocation
page execute and read and write
2CEF000
trusted library allocation
page read and write
3551000
heap
page read and write
32A1000
heap
page read and write
8F1000
unkown
page execute read
92FE000
stack
page read and write
2E01000
trusted library allocation
page read and write
185362DF000
system
page execute and read and write
D50000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
EF0000
heap
page read and write
2430000
unkown
page readonly
9BE000
stack
page read and write
3551000
heap
page read and write
39CF000
unclassified section
page execute and read and write
3087000
trusted library allocation
page read and write
3551000
heap
page read and write
3CC4000
trusted library allocation
page read and write
3551000
heap
page read and write
8304000
heap
page read and write
337E000
heap
page read and write
2BDC000
unkown
page read and write
CF0000
unkown
page read and write
FDC000
stack
page read and write
3551000
heap
page read and write
32E8000
unkown
page read and write
CF0000
unkown
page read and write
4C5D000
stack
page read and write
18DF000
stack
page read and write
9C0000
unkown
page read and write
3551000
heap
page read and write
32FF000
heap
page read and write
8FE000
unkown
page readonly
E3C000
heap
page read and write
18537F03000
trusted library allocation
page read and write
A0D000
unkown
page read and write
3551000
heap
page read and write
58A000
stack
page read and write
38E2000
unkown
page execute and read and write
750000
unkown
page readonly
3551000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
36242000
system
page read and write
D9E000
stack
page read and write
7DA000
stack
page read and write
3079000
trusted library allocation
page read and write
3551000
heap
page read and write
11D7000
trusted library allocation
page execute and read and write
572E000
unclassified section
page read and write
EF5000
heap
page read and write
DF3000
heap
page read and write
93A0000
trusted library section
page read and write
27F0000
heap
page read and write
25DF000
stack
page read and write
3551000
heap
page read and write
3C02000
unclassified section
page read and write
3551000
heap
page read and write
7C46000
heap
page read and write
3551000
heap
page read and write
50AF000
system
page execute and read and write
18537DF0000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
3930000
unkown
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
31F4000
heap
page read and write
2800000
heap
page read and write
5260000
heap
page read and write
2430000
unkown
page readonly
7BC4000
heap
page read and write
E18000
heap
page read and write
EEA000
trusted library allocation
page execute and read and write
3551000
heap
page read and write
2A00000
trusted library allocation
page read and write
3551000
heap
page read and write
960000
unkown
page readonly
185362E1000
system
page execute and read and write
3551000
heap
page read and write
3551000
heap
page read and write
C80000
unkown
page readonly
24A0000
unkown
page read and write
50DD000
trusted library allocation
page read and write
306B000
trusted library allocation
page read and write
57FE000
stack
page read and write
434F000
unkown
page execute and read and write
2AAB000
trusted library allocation
page read and write
10CF000
stack
page read and write
346F000
heap
page read and write
3551000
heap
page read and write
18537F18000
trusted library allocation
page read and write
54E0000
trusted library allocation
page execute and read and write
3551000
heap
page read and write
1B2D000
direct allocation
page execute and read and write
3309000
heap
page read and write
5800000
trusted library allocation
page read and write
50E6000
unclassified section
page read and write
3551000
heap
page read and write
7C39000
heap
page read and write
E0F000
stack
page read and write
760000
unkown
page readonly
2E44000
trusted library allocation
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
3BF2000
direct allocation
page execute and read and write
3551000
heap
page read and write
3321000
heap
page read and write
39DD000
direct allocation
page execute and read and write
BDCE000
stack
page read and write
72F0000
trusted library allocation
page execute and read and write
77B0000
trusted library allocation
page execute and read and write
4D4F000
unkown
page execute and read and write
32A4000
heap
page read and write
1A00000
direct allocation
page execute and read and write
3551000
heap
page read and write
4C10000
trusted library allocation
page read and write
8F1000
unkown
page execute read
EE2000
trusted library allocation
page read and write
835E000
heap
page read and write
2CA4000
trusted library allocation
page read and write
3551000
heap
page read and write
92AE000
stack
page read and write
2450000
heap
page read and write
3551000
heap
page read and write
1440000
heap
page read and write
82F5000
heap
page read and write
3551000
heap
page read and write
51BC000
unkown
page read and write
D00000
heap
page read and write
A74E000
stack
page read and write
3551000
heap
page read and write
25E0000
unkown
page readonly
2CF3000
trusted library allocation
page read and write
18536370000
heap
page read and write
3551000
heap
page read and write
A1C000
stack
page read and write
A5E000
stack
page read and write
5100000
trusted library allocation
page read and write
53AB000
stack
page read and write
29E0000
trusted library allocation
page read and write
8366000
heap
page read and write
3551000
heap
page read and write
3089000
trusted library allocation
page read and write
2E13000
trusted library allocation
page read and write
3810000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
3551000
heap
page read and write
52BC000
unkown
page read and write
3551000
heap
page read and write
18537E00000
trusted library allocation
page read and write
32AA000
heap
page read and write
82D0000
trusted library allocation
page read and write
4456000
unclassified section
page read and write
2A1C000
unkown
page read and write
39D9000
direct allocation
page execute and read and write
7A3E000
stack
page read and write
3553000
heap
page read and write
31F4000
heap
page read and write
3130000
heap
page read and write
822F000
heap
page read and write
329E000
heap
page read and write
3551000
heap
page read and write
9D1000
unkown
page readonly
2F62000
unclassified section
page execute and read and write
3551000
heap
page read and write
3551000
heap
page read and write
5180000
trusted library allocation
page execute and read and write
306F000
trusted library allocation
page read and write
3551000
heap
page read and write
EC0000
trusted library allocation
page read and write
58A000
stack
page read and write
8E0000
unkown
page read and write
3709000
heap
page read and write
388E000
stack
page read and write
3551000
heap
page read and write
DD8000
heap
page read and write
5500000
heap
page read and write
32AA000
heap
page read and write
6790000
trusted library allocation
page read and write
3551000
heap
page read and write
7BD8000
heap
page read and write
18537F11000
trusted library allocation
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
835E000
heap
page read and write
3302000
heap
page read and write
2FCF000
unclassified section
page execute and read and write
3551000
heap
page read and write
3551000
heap
page read and write
1853651D000
heap
page read and write
3551000
heap
page read and write
DB0000
heap
page read and write
800000
heap
page read and write
27EF000
stack
page read and write
9D1000
unkown
page readonly
8DC000
stack
page read and write
335F000
heap
page read and write
26D0000
unkown
page execute and read and write
3F78000
unkown
page read and write
DB8000
heap
page read and write
3551000
heap
page read and write
B5F000
stack
page read and write
3551000
heap
page read and write
3309000
heap
page read and write
DBE000
heap
page read and write
31D0000
heap
page read and write
12A1000
unkown
page readonly
3337000
heap
page read and write
940000
unkown
page readonly
3551000
heap
page read and write
38A7000
heap
page read and write
50D6000
trusted library allocation
page read and write
1011000
unkown
page readonly
3304000
heap
page read and write
4C30000
unclassified section
page read and write
3551000
heap
page read and write
50CD000
system
page execute and read and write
3551000
heap
page read and write
DF1000
heap
page read and write
3551000
heap
page read and write
A1C000
stack
page read and write
55F0000
trusted library allocation
page read and write
3810000
trusted library allocation
page read and write
510000
unkown
page readonly
24D0000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
18536500000
heap
page read and write
3551000
heap
page read and write
8F1000
unkown
page execute read
EC3000
trusted library allocation
page execute and read and write
3551000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
A44E000
trusted library allocation
page read and write
3359000
heap
page read and write
3551000
heap
page read and write
2AB0000
trusted library allocation
page read and write
3369000
heap
page read and write
3083000
trusted library allocation
page read and write
32E4000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
2D3D000
trusted library allocation
page read and write
5240000
trusted library section
page readonly
3551000
heap
page read and write
1430000
heap
page read and write
3551000
heap
page read and write
2810000
unkown
page readonly
ED0000
trusted library allocation
page read and write
CF7000
stack
page read and write
36904000
system
page read and write
8E0000
unkown
page read and write
8329000
heap
page read and write
3073000
trusted library allocation
page read and write
9E0000
unkown
page read and write
970000
heap
page read and write
5635000
heap
page read and write
E2F000
heap
page read and write
3551000
heap
page read and write
1CCD000
direct allocation
page execute and read and write
3551000
heap
page read and write
30D0000
trusted library allocation
page read and write
3551000
heap
page read and write
3081000
trusted library allocation
page read and write
3770000
trusted library allocation
page execute and read and write
332D000
heap
page read and write
85E0000
heap
page read and write
7DA000
stack
page read and write
5140000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
905000
unkown
page read and write
836D000
heap
page read and write
185380A5000
trusted library allocation
page read and write
50BF000
system
page execute and read and write
8364000
heap
page read and write
3BD1000
trusted library allocation
page read and write
3551000
heap
page read and write
7B3F000
stack
page read and write
3551000
heap
page read and write
B61000
unkown
page readonly
11F0000
trusted library allocation
page read and write
D3D000
stack
page read and write
3290000
heap
page read and write
3551000
heap
page read and write
574F000
unkown
page execute and read and write
1200000
heap
page read and write
5E0000
heap
page read and write
3551000
heap
page read and write
8F0000
unkown
page readonly
EE6000
trusted library allocation
page execute and read and write
3551000
heap
page read and write
C16C000
stack
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
8220000
trusted library allocation
page read and write
8359000
heap
page read and write
8F0000
unkown
page readonly
3E9B000
trusted library allocation
page read and write
31C0000
heap
page read and write
3551000
heap
page read and write
32AA000
heap
page read and write
6A4E000
stack
page read and write
73C0000
trusted library section
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
50CB000
system
page execute and read and write
29C2000
unkown
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
8342000
heap
page read and write
18536533000
heap
page read and write
3D1C000
unclassified section
page read and write
2BD1000
trusted library allocation
page read and write
3A4E000
direct allocation
page execute and read and write
907000
unkown
page readonly
7400000
trusted library allocation
page execute and read and write
3551000
heap
page read and write
3332000
heap
page read and write
3551000
heap
page read and write
54D0000
trusted library allocation
page read and write
3551000
heap
page read and write
B88000
heap
page read and write
970000
heap
page read and write
950000
unkown
page readonly
185362DD000
system
page execute and read and write
3EDC000
unclassified section
page read and write
32B0000
heap
page read and write
54CD000
stack
page read and write
379E000
unkown
page read and write
2454000
heap
page read and write
72C0000
trusted library allocation
page read and write
3551000
heap
page read and write
43CF000
unclassified section
page execute and read and write
3316000
heap
page read and write
31F4000
heap
page read and write
1D48000
direct allocation
page execute and read and write
3551000
heap
page read and write
32FF000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
15A0000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
907000
unkown
page readonly
2A10000
heap
page read and write
3551000
heap
page read and write
25E0000
unkown
page readonly
27F0000
heap
page read and write
2810000
unkown
page readonly
3551000
heap
page read and write
3327000
heap
page read and write
3635C000
system
page read and write
3551000
heap
page read and write
307D000
trusted library allocation
page read and write
950000
unkown
page readonly
DE5000
heap
page read and write
3551000
heap
page read and write
78BF000
stack
page read and write
308F000
trusted library allocation
page read and write
56C0000
heap
page read and write
3551000
heap
page read and write
2AA0000
trusted library allocation
page read and write
3551000
heap
page read and write
E10000
heap
page read and write
3551000
heap
page read and write
18537CE0000
trusted library allocation
page read and write
8FE000
unkown
page readonly
4DCF000
unclassified section
page execute and read and write
7510000
trusted library section
page read and write
55FF000
trusted library allocation
page read and write
3551000
heap
page read and write
969000
stack
page read and write
5610000
trusted library allocation
page execute and read and write
800000
heap
page read and write
32A6000
heap
page read and write
3551000
heap
page read and write
9170000
heap
page read and write
5804000
trusted library allocation
page read and write
36302000
system
page read and write
3098000
stack
page read and write
ECD000
trusted library allocation
page execute and read and write
9C0000
unkown
page read and write
770000
unkown
page readonly
CD0000
unkown
page readonly
406A7FE000
stack
page read and write
5C0000
unkown
page readonly
7C02000
heap
page read and write
960000
unkown
page readonly
3551000
heap
page read and write
5150000
trusted library allocation
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
2BDC000
unkown
page read and write
8FE000
unkown
page readonly
3156000
unkown
page read and write
307F000
trusted library allocation
page read and write
18537F00000
trusted library allocation
page read and write
82F8000
heap
page read and write
3676000
heap
page read and write
3810000
trusted library allocation
page read and write
2FC4000
unkown
page read and write
3551000
heap
page read and write
78FE000
stack
page read and write
4F54000
unclassified section
page read and write
9066000
trusted library allocation
page read and write
5250000
heap
page read and write
1230000
heap
page read and write
29F0000
trusted library allocation
page read and write
3551000
heap
page read and write
12A1000
unkown
page readonly
18536490000
heap
page read and write
2AC0000
heap
page execute and read and write
3651C000
system
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
E10000
heap
page read and write
3551000
heap
page read and write
1CC6000
direct allocation
page execute and read and write
3364000
heap
page read and write
2BCF000
stack
page read and write
750E000
stack
page read and write
2A9B000
stack
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
DF7000
heap
page read and write
308D000
trusted library allocation
page read and write
C2B1000
trusted library allocation
page read and write
3551000
heap
page read and write
3E5D000
trusted library allocation
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
330C000
heap
page read and write
BFCE000
stack
page read and write
5810000
trusted library allocation
page execute and read and write
18537CE0000
trusted library allocation
page read and write
3CC2000
unclassified section
page read and write
442E000
unkown
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
82E0000
heap
page read and write
3551000
heap
page read and write
45E8000
unclassified section
page read and write
24A0000
unkown
page read and write
9060000
trusted library allocation
page read and write
3551000
heap
page read and write
32AA000
heap
page read and write
7FB60000
trusted library allocation
page execute and read and write
3460000
trusted library allocation
page read and write
3330000
heap
page read and write
179E000
stack
page read and write
5F0000
unkown
page readonly
5122000
system
page execute and read and write
760000
unkown
page readonly
4069FFE000
stack
page read and write
185380BE000
trusted library allocation
page read and write
3551000
heap
page read and write
BECE000
stack
page read and write
3551000
heap
page read and write
27F4000
heap
page read and write
3551000
heap
page read and write
3B81000
direct allocation
page execute and read and write
2A5E000
stack
page read and write
3551000
heap
page read and write
18537F0F000
trusted library allocation
page read and write
8359000
heap
page read and write
5630000
heap
page read and write
833E000
heap
page read and write
3551000
heap
page read and write
5E0000
heap
page read and write
C1AE000
stack
page read and write
EC4000
trusted library allocation
page read and write
B70000
unkown
page read and write
3551000
heap
page read and write
D06000
heap
page read and write
C80000
unkown
page readonly
8348000
heap
page read and write
8F0000
unkown
page readonly
1D50000
unclassified section
page execute and read and write
3551000
heap
page read and write
3071000
trusted library allocation
page read and write
5270000
heap
page read and write
8355000
heap
page read and write
834F000
heap
page read and write
26EE000
stack
page read and write
D00000
heap
page read and write
3091000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
3302000
heap
page read and write
8362000
heap
page read and write
3551000
heap
page read and write
5620000
trusted library allocation
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
6EE2000
trusted library allocation
page read and write
8DC000
stack
page read and write
32F0000
heap
page read and write
510000
unkown
page readonly
3551000
heap
page read and write
3551000
heap
page read and write
1011000
unkown
page readonly
5160000
unkown
page read and write
330C000
heap
page read and write
3085000
trusted library allocation
page read and write
7780000
trusted library section
page read and write
3551000
heap
page read and write
3C54000
unkown
page read and write
905000
unkown
page read and write
3551000
heap
page read and write
4D6C000
stack
page read and write
E72000
heap
page read and write
3551000
heap
page read and write
2902000
unkown
page read and write
7C62000
heap
page read and write
305B000
stack
page read and write
77A0000
trusted library allocation
page execute and read and write
3AC2000
unkown
page read and write
11D0000
trusted library allocation
page read and write
559C000
unclassified section
page read and write
40697FE000
stack
page read and write
185380C4000
trusted library allocation
page read and write
3550000
heap
page read and write
810000
unkown
page readonly
11DB000
trusted library allocation
page execute and read and write
82F0000
heap
page read and write
3551000
heap
page read and write
50B0000
trusted library allocation
page read and write
3551000
heap
page read and write
9D0000
heap
page read and write
32AB000
heap
page read and write
1B9E000
direct allocation
page execute and read and write
F10000
unkown
page readonly
8239000
heap
page read and write
7BE0000
heap
page read and write
3551000
heap
page read and write
B70000
unkown
page read and write
54F0000
heap
page read and write
5C0000
unkown
page readonly
32B0000
heap
page read and write
12FB000
stack
page read and write
3551000
heap
page read and write
BBCE000
stack
page read and write
3551000
heap
page read and write
50D1000
trusted library allocation
page read and write
B88000
heap
page read and write
3551000
heap
page read and write
82E6000
heap
page read and write
15A8000
heap
page read and write
307B000
trusted library allocation
page read and write
185380CE000
trusted library allocation
page read and write
3832000
heap
page read and write
5160000
trusted library allocation
page read and write
3C76000
trusted library allocation
page read and write
79FE000
stack
page read and write
3836000
heap
page read and write
42C4000
unclassified section
page read and write
3077000
trusted library allocation
page read and write
7C51000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
27F4000
heap
page read and write
3551000
heap
page read and write
500000
unkown
page readonly
18536507000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
F10000
unkown
page readonly
3298000
heap
page read and write
907000
unkown
page readonly
31F0000
heap
page read and write
18537F21000
trusted library allocation
page read and write
2454000
heap
page read and write
32AA000
heap
page read and write
429C000
unkown
page read and write
8239000
heap
page read and write
5150000
unkown
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
477A000
unclassified section
page read and write
7790000
trusted library section
page read and write
1420000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
3DAE000
trusted library allocation
page read and write
55FD000
trusted library allocation
page read and write
8324000
heap
page read and write
3075000
trusted library allocation
page read and write
3551000
heap
page read and write
2800000
heap
page read and write
3551000
heap
page read and write
750000
unkown
page readonly
E18000
heap
page read and write
5D0000
unkown
page readonly
32A1000
heap
page read and write
777E000
stack
page read and write
3343000
heap
page read and write
3551000
heap
page read and write
5D0000
unkown
page readonly
BC2B000
stack
page read and write
3DE6000
unkown
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
770000
unkown
page readonly
3540000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
185362B0000
system
page execute and read and write
3C28000
trusted library allocation
page read and write
7BC0000
heap
page read and write
18537CE0000
trusted library allocation
page read and write
18538001000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
3551000
heap
page read and write
4068FFC000
stack
page read and write
9E0000
unkown
page read and write
36D0000
trusted library allocation
page read and write
3551000
heap
page read and write
308B000
trusted library allocation
page read and write
3551000
heap
page read and write
CD0000
unkown
page readonly
38B0000
direct allocation
page execute and read and write
EE0000
trusted library allocation
page read and write
4DC2000
unclassified section
page read and write
2450000
heap
page read and write
902F000
stack
page read and write
11CE000
stack
page read and write
1990000
heap
page read and write
5273000
heap
page read and write
73E0000
trusted library allocation
page read and write
3551000
heap
page read and write
8354000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
5F0000
unkown
page readonly
3551000
heap
page read and write
812000
unkown
page readonly
3551000
heap
page read and write
8F20000
trusted library allocation
page execute and read and write
32AA000
heap
page read and write
3551000
heap
page read and write
406AFFE000
stack
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
18536533000
heap
page read and write
940000
unkown
page readonly
896E000
stack
page read and write
3551000
heap
page read and write
53C0000
heap
page execute and read and write
157E000
stack
page read and write
360C000
unkown
page read and write
1340000
heap
page read and write
3551000
heap
page read and write
5600000
trusted library allocation
page read and write
9E0000
heap
page read and write
500000
unkown
page readonly
1B29000
direct allocation
page execute and read and write
831F000
heap
page read and write
905000
unkown
page read and write
1CB1000
direct allocation
page execute and read and write
3551000
heap
page read and write
B80000
heap
page read and write
3551000
heap
page read and write
4C0E000
stack
page read and write
72E0000
trusted library allocation
page execute and read and write
490C000
unclassified section
page read and write
73BE000
stack
page read and write
2902000
unkown
page read and write
3551000
heap
page read and write
3551000
heap
page read and write
There are 747 hidden memdumps, click here to show them.