IOC Report
Zapytanie ofertowe (7427-23 ROCKFIN).exe

loading gif

Files

File Path
Type
Category
Malicious
Zapytanie ofertowe (7427-23 ROCKFIN).exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Zapytanie ofertowe (7427-23 ROCKFIN).exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Zapytanie ofertowe (7427-23 ROCKFIN).exe
"C:\Users\user\Desktop\Zapytanie ofertowe (7427-23 ROCKFIN).exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://account.dyn.com/
unknown
http://www.fontbureau.com/designers?
unknown
https://csp.withgoogle.com/csp/gws/other-hp
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://smtp.ionos.es
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.google.com
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
http://www.google.com/
74.125.136.99
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
smtp.ionos.es
213.165.67.118
malicious
www.google.com
74.125.136.99

IPs

IP
Domain
Country
Malicious
213.165.67.118
smtp.ionos.es
Germany
malicious
74.125.136.99
www.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Zapytanie ofertowe (7427-23 ROCKFIN)_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Zapytanie ofertowe (7427-23 ROCKFIN)_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Zapytanie ofertowe (7427-23 ROCKFIN)_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Zapytanie ofertowe (7427-23 ROCKFIN)_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Zapytanie ofertowe (7427-23 ROCKFIN)_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Zapytanie ofertowe (7427-23 ROCKFIN)_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Zapytanie ofertowe (7427-23 ROCKFIN)_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Zapytanie ofertowe (7427-23 ROCKFIN)_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Zapytanie ofertowe (7427-23 ROCKFIN)_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Zapytanie ofertowe (7427-23 ROCKFIN)_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Zapytanie ofertowe (7427-23 ROCKFIN)_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Zapytanie ofertowe (7427-23 ROCKFIN)_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Zapytanie ofertowe (7427-23 ROCKFIN)_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Zapytanie ofertowe (7427-23 ROCKFIN)_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
442B000
trusted library allocation
page read and write
malicious
3361000
trusted library allocation
page read and write
malicious
32EF000
trusted library allocation
page read and write
malicious
33AE000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
6C20000
trusted library section
page read and write
malicious
33D8000
trusted library allocation
page read and write
malicious
4305000
trusted library allocation
page read and write
malicious
450F000
trusted library allocation
page read and write
malicious
6A89000
heap
page read and write
25A000
unkown
page readonly
34F8000
trusted library allocation
page read and write
5B9E000
stack
page read and write
36C4000
trusted library allocation
page read and write
16FE000
stack
page read and write
3500000
trusted library allocation
page read and write
34C8000
trusted library allocation
page read and write
3632000
trusted library allocation
page read and write
370D000
trusted library allocation
page read and write
3558000
trusted library allocation
page read and write
367E000
trusted library allocation
page read and write
34AF000
trusted library allocation
page read and write
8713000
heap
page read and write
1799000
heap
page read and write
368D000
trusted library allocation
page read and write
38A9000
trusted library allocation
page read and write
6FF0000
heap
page read and write
3594000
trusted library allocation
page read and write
1440000
heap
page read and write
35DD000
trusted library allocation
page read and write
38D0000
trusted library allocation
page read and write
3374000
trusted library allocation
page read and write
37DD000
trusted library allocation
page read and write
37FC000
trusted library allocation
page read and write
8800000
trusted library section
page read and write
3785000
trusted library allocation
page read and write
685E000
stack
page read and write
339C000
trusted library allocation
page read and write
1920000
heap
page execute and read and write
6DE0000
trusted library allocation
page read and write
38E4000
trusted library allocation
page read and write
5ABE000
stack
page read and write
8716000
heap
page read and write
1795000
trusted library allocation
page execute and read and write
3824000
trusted library allocation
page read and write
3350000
heap
page read and write
159E000
heap
page read and write
E87D000
stack
page read and write
36DF000
trusted library allocation
page read and write
3457000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
19AE000
stack
page read and write
5780000
trusted library allocation
page read and write
355C000
trusted library allocation
page read and write
86D4000
heap
page read and write
346A000
trusted library allocation
page read and write
3665000
trusted library allocation
page read and write
36C0000
trusted library allocation
page read and write
1500000
heap
page read and write
6DC0000
heap
page read and write
45B4000
trusted library allocation
page read and write
36F6000
trusted library allocation
page read and write
3562000
trusted library allocation
page read and write
867F000
heap
page read and write
333E000
stack
page read and write
1490000
trusted library allocation
page read and write
F4A000
stack
page read and write
57F3000
heap
page read and write
3711000
trusted library allocation
page read and write
52FB000
stack
page read and write
38CD000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
38E0000
trusted library allocation
page read and write
37E5000
trusted library allocation
page read and write
37EB000
trusted library allocation
page read and write
37C6000
trusted library allocation
page read and write
35AD000
trusted library allocation
page read and write
6560000
trusted library allocation
page read and write
37B7000
trusted library allocation
page read and write
3600000
trusted library allocation
page read and write
6A7B000
heap
page read and write
34CE000
trusted library allocation
page read and write
56B2000
trusted library allocation
page read and write
33D4000
trusted library allocation
page read and write
35C8000
trusted library allocation
page read and write
1A16000
heap
page read and write
3818000
trusted library allocation
page read and write
33A2000
trusted library allocation
page read and write
31A8000
trusted library allocation
page read and write
13FD000
stack
page read and write
56A0000
trusted library allocation
page read and write
38A5000
trusted library allocation
page read and write
140E000
stack
page read and write
5761000
trusted library allocation
page read and write
3835000
trusted library allocation
page read and write
38FD000
trusted library allocation
page read and write
373F000
trusted library allocation
page read and write
14C2000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
389F000
trusted library allocation
page read and write
3724000
trusted library allocation
page read and write
3783000
trusted library allocation
page read and write
37CC000
trusted library allocation
page read and write
3800000
trusted library allocation
page read and write
3506000
trusted library allocation
page read and write
1536000
heap
page read and write
3837000
trusted library allocation
page read and write
5789000
trusted library allocation
page read and write
3661000
trusted library allocation
page read and write
7122000
heap
page read and write
365B000
trusted library allocation
page read and write
8C50000
trusted library allocation
page execute and read and write
5780000
trusted library allocation
page read and write
1797000
trusted library allocation
page execute and read and write
E70D000
stack
page read and write
655E000
stack
page read and write
381E000
trusted library allocation
page read and write
1640000
heap
page execute and read and write
37AF000
trusted library allocation
page read and write
FFE000
stack
page read and write
37B3000
trusted library allocation
page read and write
B226000
trusted library allocation
page read and write
56AB000
trusted library allocation
page read and write
33C0000
trusted library allocation
page read and write
386B000
trusted library allocation
page read and write
34CA000
trusted library allocation
page read and write
366A000
trusted library allocation
page read and write
34E5000
trusted library allocation
page read and write
18C0000
trusted library allocation
page read and write
69F8000
heap
page read and write
1543000
heap
page read and write
6B1E000
stack
page read and write
6AB9000
heap
page read and write
8840000
heap
page read and write
57D0000
trusted library allocation
page read and write
56A4000
trusted library allocation
page read and write
38DE000
trusted library allocation
page read and write
336F000
trusted library allocation
page read and write
5D4E000
stack
page read and write
35A3000
trusted library allocation
page read and write
17AB000
heap
page read and write
56C6000
trusted library allocation
page read and write
6B9E000
stack
page read and write
1750000
trusted library allocation
page read and write
19C4000
trusted library allocation
page read and write
3777000
trusted library allocation
page read and write
8820000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page execute and read and write
5D8E000
stack
page read and write
362F000
trusted library allocation
page read and write
634D000
stack
page read and write
370F000
trusted library allocation
page read and write
675E000
stack
page read and write
866E000
heap
page read and write
3687000
trusted library allocation
page read and write
1690000
trusted library allocation
page execute and read and write
3695000
trusted library allocation
page read and write
16EC000
heap
page read and write
6E20000
trusted library allocation
page execute and read and write
714C000
heap
page read and write
3494000
trusted library allocation
page read and write
4389000
trusted library allocation
page read and write
34FE000
trusted library allocation
page read and write
3468000
trusted library allocation
page read and write
38A7000
trusted library allocation
page read and write
34FA000
trusted library allocation
page read and write
17A7000
heap
page read and write
35D3000
trusted library allocation
page read and write
3814000
trusted library allocation
page read and write
180000
unkown
page readonly
3713000
trusted library allocation
page read and write
23E000
unkown
page execute read
1A10000
heap
page read and write
58B0000
heap
page execute and read and write
FB0000
heap
page read and write
E710000
heap
page read and write
645E000
stack
page read and write
216000
unkown
page execute read
182000
unkown
page execute read
1940000
heap
page read and write
3693000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
3720000
trusted library allocation
page read and write
6DD0000
heap
page read and write
365D000
trusted library allocation
page read and write
3875000
trusted library allocation
page read and write
37D5000
trusted library allocation
page read and write
34E7000
trusted library allocation
page read and write
7140000
heap
page read and write
65BD000
stack
page read and write
5BA0000
trusted library allocation
page read and write
19D0000
trusted library allocation
page read and write
7163000
heap
page read and write
6550000
trusted library allocation
page read and write
6EDC000
trusted library allocation
page read and write
3869000
trusted library allocation
page read and write
65C0000
trusted library allocation
page execute and read and write
6566000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
3886000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page execute and read and write
16A0000
trusted library allocation
page read and write
163E000
stack
page read and write
3678000
trusted library allocation
page read and write
157E000
heap
page read and write
3918000
trusted library allocation
page read and write
86DC000
heap
page read and write
7090000
heap
page read and write
37FA000
trusted library allocation
page read and write
343A000
trusted library allocation
page read and write
3916000
trusted library allocation
page read and write
36F4000
trusted library allocation
page read and write
3369000
trusted library allocation
page read and write
8230000
trusted library allocation
page execute and read and write
3443000
trusted library allocation
page read and write
1763000
trusted library allocation
page execute and read and write
19F0000
heap
page read and write
8A7D000
stack
page read and write
1493000
trusted library allocation
page execute and read and write
56C1000
trusted library allocation
page read and write
372E000
trusted library allocation
page read and write
1EE000
unkown
page execute read
388C000
trusted library allocation
page read and write
8220000
heap
page read and write
360C000
trusted library allocation
page read and write
1930000
trusted library allocation
page read and write
1782000
heap
page read and write
5744000
trusted library allocation
page read and write
3867000
trusted library allocation
page read and write
35AF000
trusted library allocation
page read and write
37E9000
trusted library allocation
page read and write
8728000
heap
page read and write
5B5D000
stack
page read and write
3492000
trusted library allocation
page read and write
3577000
trusted library allocation
page read and write
3432000
trusted library allocation
page read and write
37B1000
trusted library allocation
page read and write
3504000
trusted library allocation
page read and write
8845000
heap
page read and write
177D000
trusted library allocation
page execute and read and write
38A3000
trusted library allocation
page read and write
3743000
trusted library allocation
page read and write
3689000
trusted library allocation
page read and write
1410000
heap
page read and write
194C000
heap
page read and write
379C000
trusted library allocation
page read and write
190E000
stack
page read and write
360A000
trusted library allocation
page read and write
6D80000
heap
page read and write
3517000
trusted library allocation
page read and write
3794000
trusted library allocation
page read and write
222000
unkown
page execute read
344B000
trusted library allocation
page read and write
32BE000
stack
page read and write
3749000
trusted library allocation
page read and write
362D000
trusted library allocation
page read and write
168C000
stack
page read and write
34EA000
trusted library allocation
page read and write
689E000
stack
page read and write
16CE000
heap
page read and write
6DA0000
trusted library allocation
page read and write
3438000
trusted library allocation
page read and write
346E000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
3842000
trusted library allocation
page read and write
36D7000
trusted library allocation
page read and write
3434000
trusted library allocation
page read and write
389D000
trusted library allocation
page read and write
64A2000
heap
page read and write
19B0000
trusted library allocation
page read and write
53FD000
stack
page read and write
3625000
trusted library allocation
page read and write
34D0000
trusted library allocation
page read and write
22D000
unkown
page execute read
3519000
trusted library allocation
page read and write
7145000
heap
page read and write
1770000
trusted library allocation
page read and write
3647000
trusted library allocation
page read and write
38E6000
trusted library allocation
page read and write
3781000
trusted library allocation
page read and write
345B000
trusted library allocation
page read and write
14B6000
trusted library allocation
page execute and read and write
3608000
trusted library allocation
page read and write
56D2000
trusted library allocation
page read and write
37CA000
trusted library allocation
page read and write
5BFE000
stack
page read and write
34C6000
trusted library allocation
page read and write
16DA000
heap
page read and write
3627000
trusted library allocation
page read and write
34D7000
trusted library allocation
page read and write
8210000
trusted library allocation
page execute and read and write
3903000
trusted library allocation
page read and write
35B3000
trusted library allocation
page read and write
14AD000
trusted library allocation
page execute and read and write
388E000
trusted library allocation
page read and write
381A000
trusted library allocation
page read and write
3741000
trusted library allocation
page read and write
3657000
trusted library allocation
page read and write
715B000
heap
page read and write
368F000
trusted library allocation
page read and write
6D90000
trusted library allocation
page execute and read and write
5D3E000
stack
page read and write
6498000
heap
page read and write
34DF000
trusted library allocation
page read and write
3581000
trusted library allocation
page read and write
150A000
heap
page read and write
16B8000
heap
page read and write
5D90000
trusted library allocation
page read and write
36FD000
trusted library allocation
page read and write
36B6000
trusted library allocation
page read and write
3888000
trusted library allocation
page read and write
6570000
trusted library allocation
page execute and read and write
3655000
trusted library allocation
page read and write
33AE000
trusted library allocation
page read and write
3747000
trusted library allocation
page read and write
33AC000
trusted library allocation
page read and write
3873000
trusted library allocation
page read and write
E77E000
stack
page read and write
5CCE000
stack
page read and write
3779000
trusted library allocation
page read and write
3391000
trusted library allocation
page read and write
3852000
trusted library allocation
page read and write
36D9000
trusted library allocation
page read and write
5BC0000
heap
page execute and read and write
1792000
trusted library allocation
page read and write
364B000
trusted library allocation
page read and write
571C000
stack
page read and write
386D000
trusted library allocation
page read and write
68DE000
stack
page read and write
E720000
trusted library allocation
page execute and read and write
37D2000
trusted library allocation
page read and write
34A9000
trusted library allocation
page read and write
377F000
trusted library allocation
page read and write
3839000
trusted library allocation
page read and write
665E000
stack
page read and write
337A000
trusted library allocation
page read and write
36F0000
trusted library allocation
page read and write
383B000
trusted library allocation
page read and write
3451000
trusted library allocation
page read and write
355A000
trusted library allocation
page read and write
35B1000
trusted library allocation
page read and write
3676000
trusted library allocation
page read and write
14CB000
trusted library allocation
page execute and read and write
57B0000
trusted library allocation
page read and write
69E0000
heap
page read and write
6ED0000
trusted library allocation
page read and write
3884000
trusted library allocation
page read and write
6F50000
trusted library section
page readonly
43C2000
trusted library allocation
page read and write
36BC000
trusted library allocation
page read and write
3680000
trusted library allocation
page read and write
57DE000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
38FB000
trusted library allocation
page read and write
32C1000
trusted library allocation
page read and write
357B000
trusted library allocation
page read and write
8282000
trusted library allocation
page read and write
3502000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
57A0000
heap
page read and write
3730000
trusted library allocation
page read and write
34B3000
trusted library allocation
page read and write
37E3000
trusted library allocation
page read and write
579C000
trusted library allocation
page read and write
8856000
heap
page read and write
3726000
trusted library allocation
page read and write
3610000
trusted library allocation
page read and write
15F0000
trusted library allocation
page read and write
1760000
trusted library allocation
page read and write
36DB000
trusted library allocation
page read and write
1410000
heap
page read and write
182000
unkown
page execute read
69DF000
stack
page read and write
15EF000
stack
page read and write
3822000
trusted library allocation
page read and write
38FF000
trusted library allocation
page read and write
6450000
heap
page read and write
38E8000
trusted library allocation
page read and write
18AF000
stack
page read and write
576E000
stack
page read and write
12F8000
stack
page read and write
212000
unkown
page execute read
388A000
trusted library allocation
page read and write
4573000
trusted library allocation
page read and write
57B0000
heap
page read and write
338B000
trusted library allocation
page read and write
36C2000
trusted library allocation
page read and write
3596000
trusted library allocation
page read and write
3745000
trusted library allocation
page read and write
176D000
trusted library allocation
page execute and read and write
3733000
trusted library allocation
page read and write
1910000
trusted library allocation
page execute and read and write
6FF5000
heap
page read and write
3707000
trusted library allocation
page read and write
8C40000
trusted library section
page read and write
356B000
trusted library allocation
page read and write
3850000
trusted library allocation
page read and write
35CC000
trusted library allocation
page read and write
1790000
trusted library allocation
page read and write
34B7000
trusted library allocation
page read and write
233000
unkown
page execute read
3629000
trusted library allocation
page read and write
14E5000
heap
page read and write
365F000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
714F000
heap
page read and write
3459000
trusted library allocation
page read and write
5D0D000
stack
page read and write
357F000
trusted library allocation
page read and write
36D5000
trusted library allocation
page read and write
3858000
trusted library allocation
page read and write
5C3D000
stack
page read and write
35A7000
trusted library allocation
page read and write
8240000
trusted library allocation
page read and write
34B5000
trusted library allocation
page read and write
349B000
trusted library allocation
page read and write
3440000
trusted library allocation
page read and write
16E9000
heap
page read and write
E60E000
stack
page read and write
14C5000
trusted library allocation
page execute and read and write
372A000
trusted library allocation
page read and write
3892000
trusted library allocation
page read and write
33B3000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
15D5000
heap
page read and write
37C8000
trusted library allocation
page read and write
3498000
trusted library allocation
page read and write
13A0000
heap
page read and write
3496000
trusted library allocation
page read and write
5AFE000
stack
page read and write
5766000
trusted library allocation
page read and write
3621000
trusted library allocation
page read and write
125A000
stack
page read and write
358E000
trusted library allocation
page read and write
13B0000
heap
page read and write
15DD000
heap
page read and write
14C7000
trusted library allocation
page execute and read and write
19C0000
trusted library allocation
page read and write
6F40000
heap
page read and write
3644000
trusted library allocation
page read and write
3615000
trusted library allocation
page read and write
3674000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
14B0000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
343C000
trusted library allocation
page read and write
351B000
trusted library allocation
page read and write
6C1E000
stack
page read and write
69F4000
heap
page read and write
21C000
unkown
page execute read
37ED000
trusted library allocation
page read and write
3590000
trusted library allocation
page read and write
38EA000
trusted library allocation
page read and write
34E3000
trusted library allocation
page read and write
3564000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
70FE000
stack
page read and write
6C9E000
stack
page read and write
3728000
trusted library allocation
page read and write
644C000
stack
page read and write
386F000
trusted library allocation
page read and write
3386000
trusted library allocation
page read and write
1FF000
unkown
page execute read
3691000
trusted library allocation
page read and write
376B000
trusted library allocation
page read and write
3436000
trusted library allocation
page read and write
3798000
trusted library allocation
page read and write
178F000
heap
page read and write
14BA000
trusted library allocation
page execute and read and write
1764000
trusted library allocation
page read and write
150E000
heap
page read and write
363E000
trusted library allocation
page read and write
576D000
trusted library allocation
page read and write
354A000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
34AD000
trusted library allocation
page read and write
370B000
trusted library allocation
page read and write
179B000
trusted library allocation
page execute and read and write
1786000
trusted library allocation
page execute and read and write
6E10000
heap
page read and write
36E4000
trusted library allocation
page read and write
1780000
trusted library allocation
page read and write
3612000
trusted library allocation
page read and write
34DD000
trusted library allocation
page read and write
7100000
heap
page read and write
3715000
trusted library allocation
page read and write
360E000
trusted library allocation
page read and write
7110000
heap
page read and write
346C000
trusted library allocation
page read and write
56A6000
trusted library allocation
page read and write
1E8000
unkown
page execute read
377D000
trusted library allocation
page read and write
15D2000
heap
page read and write
6ED6000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
679E000
stack
page read and write
3540000
trusted library allocation
page read and write
34FC000
trusted library allocation
page read and write
3566000
trusted library allocation
page read and write
36F2000
trusted library allocation
page read and write
34E1000
trusted library allocation
page read and write
36BA000
trusted library allocation
page read and write
37D0000
trusted library allocation
page read and write
3826000
trusted library allocation
page read and write
14B2000
trusted library allocation
page read and write
227000
unkown
page execute read
1710000
trusted library allocation
page read and write
35A9000
trusted library allocation
page read and write
37FE000
trusted library allocation
page read and write
381C000
trusted library allocation
page read and write
56BE000
trusted library allocation
page read and write
575E000
trusted library allocation
page read and write
3912000
trusted library allocation
page read and write
3623000
trusted library allocation
page read and write
66A7000
trusted library allocation
page read and write
1357000
stack
page read and write
8660000
heap
page read and write
87A0000
trusted library allocation
page execute and read and write
34CC000
trusted library allocation
page read and write
35DF000
trusted library allocation
page read and write
1599000
heap
page read and write
3397000
trusted library allocation
page read and write
15D9000
heap
page read and write
34AB000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
3663000
trusted library allocation
page read and write
16B0000
heap
page read and write
57A3000
heap
page read and write
14E0000
heap
page read and write
17A0000
heap
page read and write
6AD6000
heap
page read and write
33B6000
trusted library allocation
page read and write
37CE000
trusted library allocation
page read and write
713C000
heap
page read and write
205000
unkown
page execute read
36BE000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
20B000
unkown
page execute read
3709000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
38A1000
trusted library allocation
page read and write
373D000
trusted library allocation
page read and write
1480000
trusted library allocation
page read and write
57A5000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
149D000
trusted library allocation
page execute and read and write
38EC000
trusted library allocation
page read and write
367A000
trusted library allocation
page read and write
36C6000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
37B5000
trusted library allocation
page read and write
8260000
trusted library allocation
page read and write
669E000
stack
page read and write
3515000
trusted library allocation
page read and write
19F0000
heap
page read and write
3508000
trusted library allocation
page read and write
1F4000
unkown
page execute read
343E000
trusted library allocation
page read and write
3910000
trusted library allocation
page read and write
3579000
trusted library allocation
page read and write
3820000
trusted library allocation
page read and write
1782000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
1415000
heap
page read and write
1494000
trusted library allocation
page read and write
8ABF000
stack
page read and write
372C000
trusted library allocation
page read and write
379E000
trusted library allocation
page read and write
36E2000
trusted library allocation
page read and write
42C1000
trusted library allocation
page read and write
6F3B000
stack
page read and write
357D000
trusted library allocation
page read and write
35B6000
trusted library allocation
page read and write
359F000
trusted library allocation
page read and write
33A8000
trusted library allocation
page read and write
34C4000
trusted library allocation
page read and write
35DB000
trusted library allocation
page read and write
1748000
heap
page read and write
33C7000
trusted library allocation
page read and write
38CB000
trusted library allocation
page read and write
379A000
trusted library allocation
page read and write
56AE000
trusted library allocation
page read and write
3659000
trusted library allocation
page read and write
665E000
stack
page read and write
178A000
trusted library allocation
page execute and read and write
59BC000
stack
page read and write
57F0000
heap
page read and write
3453000
trusted library allocation
page read and write
3598000
trusted library allocation
page read and write
6FE0000
heap
page read and write
3718000
trusted library allocation
page read and write
33B9000
trusted library allocation
page read and write
355E000
trusted library allocation
page read and write
36DD000
trusted library allocation
page read and write
3905000
trusted library allocation
page read and write
36B8000
trusted library allocation
page read and write
7F840000
trusted library allocation
page execute and read and write
35CA000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
34B1000
trusted library allocation
page read and write
3907000
trusted library allocation
page read and write
6A22000
heap
page read and write
1460000
heap
page read and write
3701000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
34DB000
trusted library allocation
page read and write
4361000
trusted library allocation
page read and write
35AB000
trusted library allocation
page read and write
1521000
heap
page read and write
3560000
trusted library allocation
page read and write
There are 602 hidden memdumps, click here to show them.