IOC Report
RFQ- 7075-T6.exe

loading gif

Files

File Path
Type
Category
Malicious
RFQ- 7075-T6.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RFQ- 7075-T6.exe_556ec1e08761a72764f19ea896e990ee5ce7d04d_f7717559_1730b38f\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RFQ- 7075-T6.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER277B.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Aug 8 20:21:13 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2941.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2A6B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RFQ- 7075-T6.exe
"C:\Users\user\Desktop\RFQ- 7075-T6.exe"
malicious
C:\Users\user\Desktop\RFQ- 7075-T6.exe
C:\Users\user\Desktop\RFQ- 7075-T6.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5432 -s 172

URLs

Name
IP
Malicious
http://109.206.241.81/htdocs/qWDXb.exe
109.206.241.81
malicious
www.lafuriaroja.team/jn86/
malicious
https://cdn.discordapp.com/attachments/1005703293437235255/1005705055426588785/RealProxyFlagsBadSignature.dll
162.159.135.233
https://cdn.discordapp.com/attachments/1005703293437235255/1005705055426588785/RealProxyFlagsBadSign
unknown
http://109.206.241.814
unknown
https://cdn.discordapp.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
cdn.discordapp.com
162.159.135.233

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown
109.206.241.81
unknown
Germany
162.159.135.233
cdn.discordapp.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
ProgramId
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
FileId
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
LowerCaseLongPath
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
LongPathHash
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
Name
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
Publisher
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
Version
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
BinFileVersion
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
BinaryType
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
ProductName
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
ProductVersion
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
LinkDate
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
BinProductVersion
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
Size
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
Language
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
IsPeFile
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00184006417502B9
There are 29 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3C1000
remote allocation
page execute and read and write
malicious
3619000
trusted library allocation
page read and write
malicious
35F9000
trusted library allocation
page read and write
malicious
1D84EF9C000
heap
page read and write
1EC687F0000
trusted library allocation
page read and write
2862000
trusted library allocation
page read and write
26178447000
heap
page read and write
E7EB1FF000
stack
page read and write
4B8E000
stack
page read and write
2586000
trusted library allocation
page read and write
13AEFE000
stack
page read and write
1D84EF99000
heap
page read and write
2634000
trusted library allocation
page read and write
1EC69A50000
trusted library section
page readonly
1D84EFAA000
heap
page read and write
178174A0000
heap
page read and write
E7EA6FA000
stack
page read and write
2B09000
trusted library allocation
page read and write
E7EAD7F000
stack
page read and write
28F2000
trusted library allocation
page read and write
503E000
stack
page read and write
1A975C48000
heap
page read and write
1D84EF93000
heap
page read and write
2AF6000
trusted library allocation
page read and write
27FF000
trusted library allocation
page read and write
26DCE500000
heap
page read and write
16EF8088000
heap
page read and write
2B0B000
trusted library allocation
page read and write
1D84E6C7000
heap
page read and write
1EC69860000
trusted library allocation
page read and write
17819200000
trusted library allocation
page read and write
22E68C28000
heap
page read and write
1A975C45000
heap
page read and write
16EF8002000
heap
page read and write
2919000
trusted library allocation
page read and write
680000
heap
page read and write
1D84E613000
heap
page read and write
1D84EF74000
heap
page read and write
2819000
trusted library allocation
page read and write
1D84E6A3000
heap
page read and write
1EC6E24B000
heap
page read and write
2617847C000
heap
page read and write
16EF7F80000
heap
page read and write
22E68C7C000
heap
page read and write
35F1000
trusted library allocation
page read and write
13AFFB000
stack
page read and write
1EC69DF0000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
2B88000
trusted library allocation
page read and write
2A9F000
trusted library allocation
page read and write
58AF000
stack
page read and write
26178459000
heap
page read and write
1D84E64E000
heap
page read and write
281D000
trusted library allocation
page read and write
143CA666000
heap
page read and write
1CBB7A52000
heap
page read and write
16EF8069000
heap
page read and write
2847000
trusted library allocation
page read and write
16EF8113000
heap
page read and write
7A2B8FA000
stack
page read and write
1EC6889D000
heap
page read and write
1D84F41A000
heap
page read and write
1CBB7A50000
heap
page read and write
1CBB7A29000
heap
page read and write
16EF8108000
heap
page read and write
16EF8065000
heap
page read and write
1D84EF91000
heap
page read and write
2617847E000
heap
page read and write
2934000
trusted library allocation
page read and write
4AD0000
trusted library allocation
page read and write
1D84E658000
heap
page read and write
1D84E6EB000
heap
page read and write
660000
heap
page read and write
D193D7B000
stack
page read and write
CFDB87F000
stack
page read and write
1D84E5D0000
remote allocation
page read and write
17817440000
heap
page read and write
730000
heap
page read and write
4498FFE000
stack
page read and write
1D84E5D0000
remote allocation
page read and write
2AD9000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
F4D8FFB000
stack
page read and write
1D84E3A0000
heap
page read and write
22B2000
trusted library allocation
page read and write
143CA713000
heap
page read and write
56AE000
stack
page read and write
2580000
trusted library allocation
page read and write
25E0000
heap
page execute and read and write
E7EA7FB000
stack
page read and write
23E5000
trusted library allocation
page read and write
1EC68891000
heap
page read and write
2964000
trusted library allocation
page read and write
2983000
trusted library allocation
page read and write
1CBB7A62000
heap
page read and write
2949000
trusted library allocation
page read and write
26178448000
heap
page read and write
1EC69A60000
trusted library section
page readonly
17814FF000
stack
page read and write
25D0000
remote allocation
page read and write
D1940FE000
stack
page read and write
26DCE508000
heap
page read and write
2915000
trusted library allocation
page read and write
1EC6E21E000
heap
page read and write
2ABE000
trusted library allocation
page read and write
4AD0000
trusted library allocation
page read and write
1D84EF97000
heap
page read and write
2966000
trusted library allocation
page read and write
5C6E000
stack
page read and write
61D647C000
stack
page read and write
242B33B0000
remote allocation
page read and write
1C87C740000
heap
page read and write
26DCE47B000
heap
page read and write
2AC0000
trusted library allocation
page read and write
1A975C52000
heap
page read and write
261782D0000
heap
page read and write
D193C7B000
stack
page read and write
2945000
trusted library allocation
page read and write
1D84E600000
heap
page read and write
2AD5000
trusted library allocation
page read and write
2AF4860D000
heap
page read and write
242B2C2A000
heap
page read and write
25D0000
trusted library allocation
page read and write
2289BFF000
stack
page read and write
1D84F421000
heap
page read and write
296E000
trusted library allocation
page read and write
1781764B000
heap
page read and write
CFDB67A000
stack
page read and write
16EF8880000
trusted library allocation
page read and write
2B11000
trusted library allocation
page read and write
28F4000
trusted library allocation
page read and write
22E68D13000
heap
page read and write
D193B7E000
stack
page read and write
910000
heap
page read and write
D193A7C000
stack
page read and write
27F6000
trusted library allocation
page read and write
98E000
stack
page read and write
E7EA9FB000
stack
page read and write
1EC6DF81000
trusted library allocation
page read and write
56C0BDB000
stack
page read and write
1A976602000
trusted library allocation
page read and write
1EC6E2F1000
heap
page read and write
22897FF000
stack
page read and write
143CA666000
heap
page read and write
2AF48607000
heap
page read and write
1EC6E304000
heap
page read and write
2ADB000
trusted library allocation
page read and write
16EF8102000
heap
page read and write
1CBB7A3C000
heap
page read and write
1EC6E030000
trusted library allocation
page read and write
1D84EF6E000
heap
page read and write
1EC6887A000
heap
page read and write
1CBB7A5A000
heap
page read and write
2864000
trusted library allocation
page read and write
61D69FF000
stack
page read and write
1A975C23000
heap
page read and write
1EC69170000
trusted library section
page read and write
1D84EFB2000
heap
page read and write
E7EAFFB000
stack
page read and write
1C87D313000
heap
page read and write
22E68C56000
heap
page read and write
1EC6E2FD000
heap
page read and write
1EC6DE50000
trusted library allocation
page read and write
1D84F402000
heap
page read and write
22E68C63000
heap
page read and write
4498BDB000
stack
page read and write
1EC6DFA4000
trusted library allocation
page read and write
320000
unkown
page read and write
212000
unkown
page readonly
242B2C13000
heap
page read and write
2328000
trusted library allocation
page read and write
242B2BE0000
trusted library allocation
page read and write
17817430000
heap
page read and write
26178464000
heap
page read and write
5090000
trusted library allocation
page read and write
E7EAAFF000
stack
page read and write
17817729000
heap
page read and write
1D84EFA6000
heap
page read and write
17813FD000
stack
page read and write
1CBB7A02000
heap
page read and write
2AF4861E000
heap
page read and write
1D84EF97000
heap
page read and write
1D84EF8A000
heap
page read and write
2941000
trusted library allocation
page read and write
1CBB7A82000
heap
page read and write
2AA1000
trusted library allocation
page read and write
13AC7B000
stack
page read and write
25D0000
trusted library allocation
page read and write
1D84E702000
heap
page read and write
1EC69215000
heap
page read and write
2289CFF000
stack
page read and write
4CA0000
trusted library allocation
page read and write
2B0F000
trusted library allocation
page read and write
17817659000
heap
page read and write
6BC000
heap
page read and write
261D000
trusted library allocation
page read and write
1D84F400000
heap
page read and write
E7EAB7F000
stack
page read and write
2AF485F6000
heap
page read and write
26178442000
heap
page read and write
25D0000
trusted library allocation
page read and write
2AF48604000
heap
page read and write
1EC68913000
heap
page read and write
1D84F402000
heap
page read and write
26178400000
heap
page read and write
1C87C83D000
heap
page read and write
17817700000
heap
page read and write
143CA678000
heap
page read and write
1D84EFA4000
heap
page read and write
1A975C00000
heap
page read and write
1EC6E2F5000
heap
page read and write
1C87C800000
heap
page read and write
1D84F402000
heap
page read and write
26DCE320000
heap
page read and write
22E68C00000
heap
page read and write
25D0000
trusted library allocation
page read and write
4B0D000
stack
page read and write
4CA0000
trusted library allocation
page read and write
2A9B000
trusted library allocation
page read and write
270A000
trusted library allocation
page read and write
1EC69AA0000
trusted library section
page readonly
5A2E000
stack
page read and write
4EBF000
stack
page read and write
920000
remote allocation
page read and write
1EC691F0000
trusted library allocation
page read and write
1EC68829000
heap
page read and write
1D84EF13000
heap
page read and write
1A975BF0000
trusted library allocation
page read and write
1EC6DF60000
trusted library allocation
page read and write
449977C000
stack
page read and write
13B2FE000
stack
page read and write
22BB000
trusted library allocation
page execute and read and write
1EC687C0000
heap
page read and write
2AF48626000
heap
page read and write
56C12FC000
stack
page read and write
1D84EF00000
heap
page read and write
56C127F000
stack
page read and write
1D84E64B000
heap
page read and write
2F1170B000
stack
page read and write
1D84F402000
heap
page read and write
CFDB7F9000
stack
page read and write
1C87C8C1000
heap
page read and write
26178465000
heap
page read and write
26178443000
heap
page read and write
27F0000
trusted library allocation
page read and write
1EC6DF6E000
trusted library allocation
page read and write
22E69402000
trusted library allocation
page read and write
143CA5D0000
trusted library allocation
page read and write
17811F7000
stack
page read and write
1D84EFAB000
heap
page read and write
26178469000
heap
page read and write
61D667F000
stack
page read and write
469F37F000
stack
page read and write
449947C000
stack
page read and write
143CB002000
trusted library allocation
page read and write
3A9000
stack
page read and write
1A975C13000
heap
page read and write
1CBB7B08000
heap
page read and write
4CA0000
trusted library allocation
page read and write
1EC6E300000
heap
page read and write
22894FB000
stack
page read and write
1D84EF95000
heap
page read and write
143CA613000
heap
page read and write
38E000
stack
page read and write
294E000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
61D68FE000
stack
page read and write
1780F7B000
stack
page read and write
E7EA8FE000
stack
page read and write
1EC69A80000
trusted library section
page readonly
1CBB8202000
trusted library allocation
page read and write
1A975B60000
heap
page read and write
13AE7C000
stack
page read and write
1C87C8CC000
heap
page read and write
2845000
trusted library allocation
page read and write
143CA66F000
heap
page read and write
449927E000
stack
page read and write
1D84EF99000
heap
page read and write
26DCE3C0000
trusted library allocation
page read and write
22A6000
trusted library allocation
page execute and read and write
ACF000
stack
page read and write
2AEA000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
1EC68856000
heap
page read and write
2817000
trusted library allocation
page read and write
46EE000
stack
page read and write
1C87C913000
heap
page read and write
1D84E708000
heap
page read and write
26178435000
heap
page read and write
16EF8000000
heap
page read and write
178175F0000
remote allocation
page read and write
1A975B70000
heap
page read and write
22896FE000
stack
page read and write
2AD7000
trusted library allocation
page read and write
1EC6E287000
heap
page read and write
88E000
stack
page read and write
26DCE502000
heap
page read and write
26DCE513000
heap
page read and write
1EC6DE40000
trusted library allocation
page read and write
1D84E657000
heap
page read and write
1EC6E302000
heap
page read and write
1C87C887000
heap
page read and write
2843000
trusted library allocation
page read and write
2928000
trusted library allocation
page read and write
2617845B000
heap
page read and write
1EC6889F000
heap
page read and write
469F2FE000
stack
page read and write
143CA672000
heap
page read and write
143CA654000
heap
page read and write
1EC6DF80000
trusted library allocation
page read and write
1EC6E070000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
1EC68750000
heap
page read and write
26DCE44F000
heap
page read and write
1D84EFAA000
heap
page read and write
C73000
trusted library allocation
page read and write
449917E000
stack
page read and write
143CA664000
heap
page read and write
143CA602000
heap
page read and write
4BA0000
heap
page read and write
2AB6000
trusted library allocation
page read and write
D193FFE000
stack
page read and write
1D84E653000
heap
page read and write
1D84EF91000
heap
page read and write
26178445000
heap
page read and write
2F11A7E000
stack
page read and write
242B2D02000
heap
page read and write
26178458000
heap
page read and write
1EC6DF90000
trusted library allocation
page read and write
27F2000
trusted library allocation
page read and write
2AF4000
trusted library allocation
page read and write
1EC69401000
trusted library allocation
page read and write
2815000
trusted library allocation
page read and write
16EF803C000
heap
page read and write
2AF8000
trusted library allocation
page read and write
1D84F421000
heap
page read and write
2AC000
stack
page read and write
4FBE000
stack
page read and write
22E68C68000
heap
page read and write
2B13000
trusted library allocation
page read and write
16EF8013000
heap
page read and write
1EC688B1000
heap
page read and write
CFDB77F000
stack
page read and write
2617842A000
heap
page read and write
1EC69A70000
trusted library section
page readonly
9CE000
stack
page read and write
710000
heap
page read and write
1781765B000
heap
page read and write
4DBE000
stack
page read and write
1D84E6AA000
heap
page read and write
1EC68875000
heap
page read and write
2981000
trusted library allocation
page read and write
1EC6E302000
heap
page read and write
1C87D339000
heap
page read and write
1EC68800000
heap
page read and write
178175F0000
remote allocation
page read and write
1CBB79C0000
trusted library allocation
page read and write
2288F4B000
stack
page read and write
7A2B3EB000
stack
page read and write
26DCE43C000
heap
page read and write
17819002000
trusted library allocation
page read and write
2979000
trusted library allocation
page read and write
17817602000
heap
page read and write
E7EA11B000
stack
page read and write
26178446000
heap
page read and write
25D0000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page read and write
1D84F444000
heap
page read and write
16EF8081000
heap
page read and write
2B8A000
trusted library allocation
page read and write
282C000
trusted library allocation
page read and write
2617845D000
heap
page read and write
2617846B000
heap
page read and write
26178270000
heap
page read and write
1D84E64A000
heap
page read and write
1EC6E2FC000
heap
page read and write
1D84F402000
heap
page read and write
25D0000
remote allocation
page read and write
6FD000
stack
page read and write
28F8000
trusted library allocation
page read and write
26DCE390000
heap
page read and write
449937E000
stack
page read and write
2A9D000
trusted library allocation
page read and write
282E000
trusted library allocation
page read and write
1EC6E2B0000
heap
page read and write
22B0000
trusted library allocation
page read and write
35F7000
trusted library allocation
page read and write
16EF8062000
heap
page read and write
1D84E6EE000
heap
page read and write
57AF000
stack
page read and write
290D000
trusted library allocation
page read and write
26178461000
heap
page read and write
23F0000
heap
page read and write
2AC4000
trusted library allocation
page read and write
1D84F402000
heap
page read and write
4CA0000
trusted library allocation
page read and write
284F000
trusted library allocation
page read and write
242B33B0000
remote allocation
page read and write
2544000
trusted library allocation
page read and write
1D84EF4F000
heap
page read and write
26DCE413000
heap
page read and write
1781768C000
heap
page read and write
22E68C02000
heap
page read and write
27FC000
trusted library allocation
page read and write
C64000
trusted library allocation
page read and write
1EC691F3000
trusted library allocation
page read and write
2F11D77000
stack
page read and write
E7EACFE000
stack
page read and write
26178466000
heap
page read and write
2574000
trusted library allocation
page read and write
2870000
trusted library allocation
page read and write
22E68C3C000
heap
page read and write
1D84E650000
heap
page read and write
2AF485F1000
heap
page read and write
1D84E6EE000
heap
page read and write
2AF48610000
heap
page read and write
2913000
trusted library allocation
page read and write
1CBB7860000
heap
page read and write
13B47F000
unkown
page read and write
25D0000
trusted library allocation
page read and write
1781763F000
heap
page read and write
178175F0000
remote allocation
page read and write
38D000
stack
page read and write
70A000
heap
page read and write
CFDB6FF000
stack
page read and write
1A975C29000
heap
page read and write
1D84E670000
heap
page read and write
1CBB7B13000
heap
page read and write
2617844E000
heap
page read and write
76D000
heap
page read and write
17817649000
heap
page read and write
25D0000
trusted library allocation
page read and write
242B2A70000
heap
page read and write
1C87C902000
heap
page read and write
2617843E000
heap
page read and write
143CA540000
heap
page read and write
4CA0000
trusted library allocation
page read and write
56C147B000
stack
page read and write
1D84EF9B000
heap
page read and write
1EC69313000
heap
page read and write
26178485000
heap
page read and write
1EC68877000
heap
page read and write
1EC6DF60000
trusted library allocation
page read and write
4AD0000
trusted library allocation
page read and write
1D84EF74000
heap
page read and write
27F8000
trusted library allocation
page read and write
E7EABFF000
stack
page read and write
16EF7F70000
heap
page read and write
1D84E6F6000
heap
page read and write
3F0000
trusted library allocation
page read and write
2AF488D0000
heap
page read and write
469F07E000
stack
page read and write
178175C0000
trusted library allocation
page read and write
26DCE455000
heap
page read and write
143CA600000
heap
page read and write
2813000
trusted library allocation
page read and write
290B000
trusted library allocation
page read and write
25D0000
remote allocation
page read and write
2AB8000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page read and write
1A975C2E000
heap
page read and write
26178502000
heap
page read and write
1EC688FC000
heap
page read and write
26178413000
heap
page read and write
2866000
trusted library allocation
page read and write
13AD7E000
stack
page read and write
178107B000
stack
page read and write
CFDB8FF000
stack
page read and write
F4D90FE000
stack
page read and write
287D000
trusted library allocation
page read and write
61D67FE000
stack
page read and write
2617845A000
heap
page read and write
2AF4860D000
heap
page read and write
297F000
trusted library allocation
page read and write
56C13FD000
stack
page read and write
1EC6DF68000
trusted library allocation
page read and write
1EC6DF84000
trusted library allocation
page read and write
22E68A30000
heap
page read and write
1D84F402000
heap
page read and write
1D84EF97000
heap
page read and write
26178432000
heap
page read and write
296C000
trusted library allocation
page read and write
3B0000
remote allocation
page read and write
22E689C0000
heap
page read and write
26178463000
heap
page read and write
1D84F402000
heap
page read and write
D193AFE000
stack
page read and write
17817613000
heap
page read and write
2F1178E000
stack
page read and write
4B90000
trusted library section
page read and write
1EC6F000000
heap
page read and write
23D0000
trusted library allocation
page read and write
242B2C24000
heap
page read and write
16EF805D000
heap
page read and write
178175A0000
trusted library allocation
page read and write
1EC68870000
heap
page read and write
1C87C8C9000
heap
page read and write
296A000
trusted library allocation
page read and write
22898FD000
stack
page read and write
1D84EF91000
heap
page read and write
143CA62A000
heap
page read and write
297B000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
2AF485A0000
heap
page read and write
1EC69970000
trusted library allocation
page read and write
16EF8A02000
trusted library allocation
page read and write
507E000
stack
page read and write
1EC69200000
heap
page read and write
1EC6DF90000
trusted library allocation
page read and write
242B2AE0000
heap
page read and write
2868000
trusted library allocation
page read and write
1D84EE02000
heap
page read and write
292A000
trusted library allocation
page read and write
26178470000
heap
page read and write
2AF4861D000
heap
page read and write
284D000
trusted library allocation
page read and write
28FC000
trusted library allocation
page read and write
2617843B000
heap
page read and write
1EC6E254000
heap
page read and write
17818FA0000
trusted library allocation
page read and write
2AF4860D000
heap
page read and write
1A975C02000
heap
page read and write
22A2000
trusted library allocation
page read and write
2F11B7B000
stack
page read and write
59EE000
stack
page read and write
2ABA000
trusted library allocation
page read and write
28F6000
trusted library allocation
page read and write
2A99000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
231E000
stack
page read and write
2AF48610000
heap
page read and write
1EC6E22C000
heap
page read and write
1D84EF74000
heap
page read and write
1D84EF99000
heap
page read and write
2811000
trusted library allocation
page read and write
1D84EF93000
heap
page read and write
449957C000
stack
page read and write
1D84EFDA000
heap
page read and write
26178460000
heap
page read and write
242B33B0000
remote allocation
page read and write
1D84E6DA000
heap
page read and write
1EC691D1000
trusted library allocation
page read and write
242B2A80000
heap
page read and write
1EC68841000
heap
page read and write
2911000
trusted library allocation
page read and write
210000
unkown
page readonly
2932000
trusted library allocation
page read and write
1CBB7A66000
heap
page read and write
1D84EF87000
heap
page read and write
290F000
trusted library allocation
page read and write
293F000
trusted library allocation
page read and write
1D84EFAF000
heap
page read and write
1EC69300000
heap
page read and write
22895FF000
stack
page read and write
16EF8045000
heap
page read and write
C70000
trusted library allocation
page read and write
469F47D000
stack
page read and write
2852000
trusted library allocation
page read and write
4AD0000
trusted library allocation
page read and write
2AEE000
trusted library allocation
page read and write
280F000
trusted library allocation
page read and write
1EC69A90000
trusted library section
page readonly
13B0F8000
stack
page read and write
1D84E6B4000
heap
page read and write
2AA3000
trusted library allocation
page read and write
1D84E6C0000
heap
page read and write
4B4E000
stack
page read and write
1EC6E2B2000
heap
page read and write
D193DFE000
stack
page read and write
292C000
trusted library allocation
page read and write
1D84E716000
heap
page read and write
1CBB7A57000
heap
page read and write
22AA000
trusted library allocation
page execute and read and write
1CBB78C0000
heap
page read and write
1C87D300000
heap
page read and write
25F1000
trusted library allocation
page read and write
22B7000
trusted library allocation
page execute and read and write
1CBB7A13000
heap
page read and write
16EF8029000
heap
page read and write
26178C02000
trusted library allocation
page read and write
1D84EF74000
heap
page read and write
1D84E5D0000
remote allocation
page read and write
2917000
trusted library allocation
page read and write
2617846C000
heap
page read and write
1EC6E23E000
heap
page read and write
1D84EF99000
heap
page read and write
1D84F418000
heap
page read and write
26178441000
heap
page read and write
1781764B000
heap
page read and write
2985000
trusted library allocation
page read and write
242B3402000
trusted library allocation
page read and write
287F000
trusted library allocation
page read and write
7A2BAFE000
stack
page read and write
1C87C750000
heap
page read and write
26178475000
heap
page read and write
26DCE400000
heap
page read and write
F4D89EC000
stack
page read and write
1D84EF95000
heap
page read and write
1D84EFB6000
heap
page read and write
1EC69302000
heap
page read and write
4FFE000
stack
page read and write
1EC6888C000
heap
page read and write
22D0000
trusted library allocation
page read and write
6FD000
stack
page read and write
4CA0000
trusted library allocation
page read and write
17817667000
heap
page read and write
4CA0000
trusted library allocation
page read and write
469F1FE000
stack
page read and write
16EF805F000
heap
page read and write
F4D8EFB000
stack
page read and write
143CA5A0000
heap
page read and write
242B2C02000
heap
page read and write
16EF805C000
heap
page read and write
27F4000
trusted library allocation
page read and write
23C0000
trusted library allocation
page execute and read and write
292E000
trusted library allocation
page read and write
CFDB978000
stack
page read and write
143CA530000
heap
page read and write
2962000
trusted library allocation
page read and write
26DCE330000
heap
page read and write
22E68C13000
heap
page read and write
1D84E64D000
heap
page read and write
E7EA578000
stack
page read and write
25D0000
trusted library allocation
page read and write
2AF48627000
heap
page read and write
469F0FF000
stack
page read and write
56C177C000
stack
page read and write
1EC6E2F9000
heap
page read and write
5080000
trusted library allocation
page read and write
2565000
trusted library allocation
page read and write
26DCE429000
heap
page read and write
1EC69318000
heap
page read and write
469EBCB000
stack
page read and write
2AEC000
trusted library allocation
page read and write
1EC6E090000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
1D84EFAA000
heap
page read and write
2F11F7E000
stack
page read and write
56C187F000
stack
page read and write
1D84E713000
heap
page read and write
2AF4861C000
heap
page read and write
1D84EF99000
heap
page read and write
1D84E649000
heap
page read and write
17817600000
heap
page read and write
61D66FE000
stack
page read and write
143CA702000
heap
page read and write
E7EADFF000
stack
page read and write
1C87C7E0000
trusted library allocation
page read and write
5B6E000
stack
page read and write
22E68D02000
heap
page read and write
1EC6E080000
trusted library allocation
page read and write
1EC6E261000
heap
page read and write
5B2E000
stack
page read and write
2F11E7F000
stack
page read and write
2AF48602000
heap
page read and write
2AF2000
trusted library allocation
page read and write
1D84EF99000
heap
page read and write
26DCEE02000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
284B000
trusted library allocation
page read and write
1EC69318000
heap
page read and write
D193EF7000
stack
page read and write
28FA000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
1D84EF74000
heap
page read and write
1A975BC0000
heap
page read and write
1D84E655000
heap
page read and write
22899FE000
stack
page read and write
1781762A000
heap
page read and write
26178476000
heap
page read and write
1D84EF74000
heap
page read and write
1EC6E200000
heap
page read and write
2AF488D5000
heap
page read and write
2849000
trusted library allocation
page read and write
1D84E629000
heap
page read and write
2AF485C0000
heap
page read and write
295E000
trusted library allocation
page read and write
1D84F41A000
heap
page read and write
1C87C86F000
heap
page read and write
2AF48620000
heap
page read and write
920000
remote allocation
page read and write
286E000
trusted library allocation
page read and write
1D84EF99000
heap
page read and write
6B1000
heap
page read and write
58EE000
stack
page read and write
1CBB7A00000
heap
page read and write
1D84EFD9000
heap
page read and write
5090000
trusted library allocation
page read and write
1C87C7B0000
heap
page read and write
1C87C8BB000
heap
page read and write
143CA65B000
heap
page read and write
1D84EF70000
heap
page read and write
1CBB7A8C000
heap
page read and write
13ACFE000
stack
page read and write
56C117F000
stack
page read and write
4CB0000
heap
page execute and read and write
22E68B30000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
1EC68925000
heap
page read and write
1EC6E0A0000
trusted library allocation
page read and write
1EC68902000
heap
page read and write
469EF7E000
stack
page read and write
56C0FFC000
stack
page read and write
2568000
trusted library allocation
page read and write
242B2C00000
heap
page read and write
2AF48470000
heap
page read and write
7A2B9FF000
stack
page read and write
709000
heap
page read and write
61D657E000
stack
page read and write
26DCE471000
heap
page read and write
22E68D00000
heap
page read and write
297D000
trusted library allocation
page read and write
2637000
trusted library allocation
page read and write
294B000
trusted library allocation
page read and write
16EF7FE0000
heap
page read and write
2617846E000
heap
page read and write
1EC6E0C0000
remote allocation
page read and write
261783D0000
trusted library allocation
page read and write
630000
heap
page read and write
1A975D02000
heap
page read and write
2960000
trusted library allocation
page read and write
670000
trusted library allocation
page read and write
253E000
stack
page read and write
1780B1B000
stack
page read and write
3C0000
remote allocation
page execute and read and write
1780B9E000
stack
page read and write
13B3F9000
stack
page read and write
1EC6E0C0000
trusted library allocation
page read and write
2B0D000
trusted library allocation
page read and write
2289AFE000
stack
page read and write
17812FE000
stack
page read and write
6BF000
heap
page read and write
2289DFE000
stack
page read and write
1CBB7850000
heap
page read and write
228937B000
stack
page read and write
2947000
trusted library allocation
page read and write
17817702000
heap
page read and write
1EC6E215000
heap
page read and write
1D84E6E2000
heap
page read and write
2AA7000
trusted library allocation
page read and write
1D84E67E000
heap
page read and write
C63000
trusted library allocation
page execute and read and write
2968000
trusted library allocation
page read and write
17817713000
heap
page read and write
242B2C58000
heap
page read and write
1CBB7B00000
heap
page read and write
61D64FE000
stack
page read and write
13B1F7000
stack
page read and write
1C87C82A000
heap
page read and write
2F11C7B000
stack
page read and write
1EC68760000
heap
page read and write
469F57D000
stack
page read and write
2590000
trusted library allocation
page read and write
C6D000
trusted library allocation
page execute and read and write
1D84EF89000
heap
page read and write
24FE000
stack
page read and write
1CBB7B02000
heap
page read and write
242B2C3D000
heap
page read and write
56C157D000
stack
page read and write
4CA1000
trusted library allocation
page read and write
2B15000
trusted library allocation
page read and write
16EF8072000
heap
page read and write
286C000
trusted library allocation
page read and write
1D84EFB6000
heap
page read and write
143CA641000
heap
page read and write
7A2B7FE000
stack
page read and write
1A975C3C000
heap
page read and write
27FA000
trusted library allocation
page read and write
26DCE487000
heap
page read and write
1EC69870000
trusted library allocation
page read and write
1D84E63C000
heap
page read and write
1D84EF97000
heap
page read and write
2AF48610000
heap
page read and write
1781765B000
heap
page read and write
1D84E510000
trusted library allocation
page read and write
240000
heap
page read and write
1EC6E0C0000
remote allocation
page read and write
1C87C813000
heap
page read and write
2834000
trusted library allocation
page read and write
16EF8057000
heap
page read and write
2AF0000
trusted library allocation
page read and write
16EF8100000
heap
page read and write
1780E7E000
stack
page read and write
17817676000
heap
page read and write
2626000
trusted library allocation
page read and write
22A0000
trusted library allocation
page read and write
2554000
trusted library allocation
page read and write
22E689D0000
heap
page read and write
2AF48606000
heap
page read and write
26178260000
heap
page read and write
26178462000
heap
page read and write
1D84EF76000
heap
page read and write
1EC6E2E9000
heap
page read and write
2617847F000
heap
page read and write
E7EAEF9000
stack
page read and write
1EC6E0C0000
remote allocation
page read and write
1EC69202000
heap
page read and write
449967E000
stack
page read and write
1D84E410000
heap
page read and write
1D84EF99000
heap
page read and write
1CBB7A5E000
heap
page read and write
2AF485E0000
heap
page read and write
1C87D202000
heap
page read and write
1D84EFB5000
heap
page read and write
56C167E000
stack
page read and write
1D84E6B0000
heap
page read and write
286A000
trusted library allocation
page read and write
1D84EFA5000
heap
page read and write
1EC6E0B0000
trusted library allocation
page read and write
1EC68813000
heap
page read and write
1D84EF8F000
heap
page read and write
2AFA000
trusted library allocation
page read and write
1EC6DFA0000
trusted library allocation
page read and write
16EF8054000
heap
page read and write
1D84EF10000
heap
page read and write
1D84EF91000
heap
page read and write
1D84E686000
heap
page read and write
1D84E3B0000
heap
page read and write
2AF485F6000
heap
page read and write
17810FF000
stack
page read and write
1A975C1F000
heap
page read and write
C80000
heap
page read and write
E7EAA7E000
stack
page read and write
There are 813 hidden memdumps, click here to show them.