IOC Report
Contract Quotation Details - Rotational Suppl.exe

loading gif

Files

File Path
Type
Category
Malicious
Contract Quotation Details - Rotational Suppl.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\alarmingness
data
dropped
C:\Users\user\AppData\Local\Temp\atule
ASCII text, with very long lines (28756), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\aut4F24.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut4F53.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\tmp1B84.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp1B95.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp22F4.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp2305.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp2325.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp2336.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3C1A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp3C2B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp3C4B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp3C6C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp4A9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp4BA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp4CA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp4DB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp4E2F.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4E30.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4E41.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4E42.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4EB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp50C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp5C0A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp5C1A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp5C3B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp5C4B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp72FD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp730E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp733E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp94A2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp94B3.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp94E3.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9503.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA981.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpA9B1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpA9E1.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpCCFC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpCD2C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpCD3C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpDFA8.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpE960.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpE961.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpE991.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpE9A1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpE9B2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpE9C3.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
There are 40 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Contract Quotation Details - Rotational Suppl.exe
"C:\Users\user\Desktop\Contract Quotation Details - Rotational Suppl.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\Contract Quotation Details - Rotational Suppl.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://ipinfo.io/ip%appdata%
unknown
malicious
91.92.243.245:47477
malicious
https://api.ipify.orgcookies//settinString.Removeg
unknown
malicious
http://91.92.243.245:47477/
91.92.243.245
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://91.92.243.245:47477
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb
unknown
malicious

IPs

IP
Domain
Country
Malicious
91.92.243.245
unknown
Bulgaria
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
772000
system
page execute and read and write
malicious
E10000
direct allocation
page read and write
malicious
2780000
trusted library allocation
page read and write
malicious
6517000
heap
page read and write
529E000
trusted library allocation
page read and write
BB0000
trusted library allocation
page read and write
E74000
heap
page read and write
DE0000
heap
page read and write
5D30000
heap
page read and write
5540000
trusted library allocation
page execute and read and write
1171000
heap
page read and write
E80000
unkown
page readonly
37E0000
direct allocation
page read and write
5F05000
trusted library allocation
page read and write
123B000
heap
page read and write
BA0000
trusted library allocation
page read and write
1169000
heap
page read and write
BD2000
trusted library allocation
page read and write
5CD2000
heap
page read and write
D8C000
stack
page read and write
7F3E0000
trusted library allocation
page execute and read and write
11CB000
heap
page read and write
5530000
trusted library allocation
page read and write
4F4E000
stack
page read and write
5D41000
heap
page read and write
2731000
trusted library allocation
page read and write
3980000
direct allocation
page read and write
3AAD000
direct allocation
page read and write
126A000
heap
page read and write
116A000
heap
page read and write
5D7C000
heap
page read and write
5EFE000
stack
page read and write
3AAD000
direct allocation
page read and write
F5A000
unkown
page readonly
3980000
direct allocation
page read and write
64EB000
heap
page read and write
5FE0000
trusted library allocation
page execute and read and write
E81000
unkown
page execute read
BFD000
stack
page read and write
5D11000
heap
page read and write
5DE000
stack
page read and write
3AAD000
direct allocation
page read and write
27A0000
trusted library allocation
page read and write
373E000
trusted library allocation
page read and write
5050000
trusted library allocation
page execute and read and write
2BA3000
trusted library allocation
page read and write
6533000
heap
page read and write
3980000
direct allocation
page read and write
6DFE000
stack
page read and write
5CA0000
heap
page read and write
7100000
trusted library allocation
page read and write
BC0000
trusted library allocation
page read and write
5D34000
heap
page read and write
677E000
stack
page read and write
2713000
heap
page execute and read and write
5F18000
trusted library allocation
page read and write
6706000
trusted library allocation
page read and write
26CE000
stack
page read and write
1171000
heap
page read and write
3903000
direct allocation
page read and write
37E0000
direct allocation
page read and write
F48000
unkown
page readonly
5030000
trusted library allocation
page read and write
6786000
trusted library allocation
page read and write
1108000
heap
page read and write
529B000
trusted library allocation
page read and write
BAD000
trusted library allocation
page execute and read and write
5D67000
heap
page read and write
1132000
heap
page read and write
3B1E000
direct allocation
page read and write
1CFE000
stack
page read and write
50CA000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
66E4000
trusted library allocation
page read and write
1191000
heap
page read and write
7120000
trusted library allocation
page execute and read and write
5532000
trusted library allocation
page read and write
64E0000
heap
page read and write
4F50000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
5FCE000
stack
page read and write
5FF0000
trusted library allocation
page read and write
BC2000
trusted library allocation
page read and write
66F8000
trusted library allocation
page read and write
7130000
trusted library allocation
page execute and read and write
5E0000
heap
page read and write
62B0000
heap
page read and write
79BF000
stack
page read and write
125A000
heap
page read and write
3AA9000
direct allocation
page read and write
3AA9000
direct allocation
page read and write
F3F000
unkown
page read and write
8776000
heap
page read and write
4E4D000
stack
page read and write
2B92000
trusted library allocation
page read and write
63B000
stack
page read and write
C90000
heap
page read and write
50CD000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
BA3000
trusted library allocation
page execute and read and write
7296000
trusted library allocation
page read and write
8EE000
stack
page read and write
3980000
direct allocation
page read and write
7290000
trusted library allocation
page read and write
4738000
trusted library allocation
page read and write
7170000
trusted library allocation
page execute and read and write
37E0000
direct allocation
page read and write
270E000
stack
page read and write
6020000
heap
page read and write
29B2000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
5D7E000
heap
page read and write
BD0000
trusted library allocation
page read and write
F5A000
unkown
page readonly
7B0000
heap
page read and write
4FE0000
trusted library allocation
page read and write
6715000
trusted library allocation
page read and write
37E0000
direct allocation
page read and write
27A8000
trusted library allocation
page read and write
5020000
trusted library allocation
page execute and read and write
4F90000
trusted library allocation
page read and write
513D000
stack
page read and write
3A9B000
trusted library allocation
page read and write
5F2F000
trusted library allocation
page read and write
BBD000
trusted library allocation
page execute and read and write
5510000
trusted library allocation
page read and write
3AA9000
direct allocation
page read and write
F55000
unkown
page readonly
1171000
heap
page read and write
66FE000
trusted library allocation
page read and write
114A000
heap
page read and write
3AAD000
direct allocation
page read and write
F0F000
unkown
page readonly
BDC000
stack
page read and write
5F1A000
trusted library allocation
page read and write
3B1E000
direct allocation
page read and write
6E70000
trusted library allocation
page read and write
3B1E000
direct allocation
page read and write
2720000
heap
page read and write
92E000
stack
page read and write
3AA9000
direct allocation
page read and write
650B000
heap
page read and write
3903000
direct allocation
page read and write
6701000
trusted library allocation
page read and write
9D1000
heap
page read and write
50F0000
trusted library allocation
page execute and read and write
5F1F000
trusted library allocation
page read and write
7B5000
heap
page read and write
37A2000
trusted library allocation
page read and write
BBF000
stack
page read and write
6E60000
trusted library allocation
page read and write
6524000
heap
page read and write
123B000
heap
page read and write
66E2000
trusted library allocation
page read and write
1172000
heap
page read and write
5FFD000
trusted library allocation
page read and write
A1A000
heap
page read and write
125A000
heap
page read and write
64FE000
heap
page read and write
37E0000
direct allocation
page read and write
3AA9000
direct allocation
page read and write
BD7000
trusted library allocation
page execute and read and write
1100000
heap
page read and write
CFF000
stack
page read and write
590000
heap
page read and write
3762000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
3B1E000
direct allocation
page read and write
517E000
stack
page read and write
5D73000
heap
page read and write
79E0000
trusted library allocation
page read and write
F35000
unkown
page readonly
3B1E000
direct allocation
page read and write
BC6000
trusted library allocation
page execute and read and write
2710000
heap
page execute and read and write
2C56000
trusted library allocation
page read and write
4FB1000
trusted library allocation
page read and write
37E0000
direct allocation
page read and write
F48000
unkown
page readonly
528F000
stack
page read and write
66EC000
trusted library allocation
page read and write
E00000
direct allocation
page execute and read and write
649F000
stack
page read and write
5180000
trusted library allocation
page execute and read and write
50D0000
trusted library allocation
page read and write
A24000
heap
page read and write
DE6000
heap
page read and write
DC0000
heap
page execute and read and write
4E0E000
stack
page read and write
A18000
heap
page read and write
DD0000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
3980000
direct allocation
page read and write
3903000
direct allocation
page read and write
279B000
trusted library allocation
page read and write
606E000
stack
page read and write
5DA0000
heap
page execute and read and write
4D0E000
stack
page read and write
4F61000
trusted library allocation
page read and write
6E40000
trusted library allocation
page execute and read and write
3903000
direct allocation
page read and write
3AAD000
direct allocation
page read and write
BF0000
heap
page read and write
3AA9000
direct allocation
page read and write
1159000
heap
page read and write
3AAD000
direct allocation
page read and write
3980000
direct allocation
page read and write
BA4000
trusted library allocation
page read and write
29AD000
trusted library allocation
page read and write
E80000
unkown
page readonly
50A0000
trusted library allocation
page read and write
5D90000
trusted library allocation
page read and write
E81000
unkown
page execute read
3731000
trusted library allocation
page read and write
1171000
heap
page read and write
F35000
unkown
page readonly
F0F000
unkown
page readonly
670D000
trusted library allocation
page read and write
BCF000
stack
page read and write
3B9B000
trusted library allocation
page read and write
392C000
trusted library allocation
page read and write
CA0000
heap
page read and write
1123000
heap
page read and write
1171000
heap
page read and write
5554000
trusted library allocation
page read and write
79C0000
trusted library allocation
page execute and read and write
50E0000
trusted library allocation
page read and write
7110000
trusted library allocation
page execute and read and write
3B1E000
direct allocation
page read and write
7160000
trusted library allocation
page read and write
3903000
direct allocation
page read and write
D4E000
stack
page read and write
F43000
unkown
page write copy
7D0000
heap
page read and write
5F00000
trusted library allocation
page read and write
BDB000
trusted library allocation
page execute and read and write
127A000
heap
page read and write
1169000
heap
page read and write
5D5A000
heap
page read and write
3980000
direct allocation
page read and write
4F5B000
trusted library allocation
page read and write
113B000
heap
page read and write
5D8E000
heap
page read and write
78BE000
stack
page read and write
64DF000
stack
page read and write
5560000
trusted library allocation
page read and write
DEE000
heap
page read and write
52A000
stack
page read and write
5F2A000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
1167000
heap
page read and write
DB0000
trusted library allocation
page read and write
B6F000
stack
page read and write
66EF000
trusted library allocation
page read and write
70BD000
stack
page read and write
BD5000
trusted library allocation
page execute and read and write
6712000
trusted library allocation
page read and write
3AA9000
direct allocation
page read and write
50B0000
trusted library allocation
page read and write
5D51000
heap
page read and write
66E6000
trusted library allocation
page read and write
770000
system
page execute and read and write
125A000
heap
page read and write
5562000
trusted library allocation
page read and write
2CB5000
trusted library allocation
page read and write
1171000
heap
page read and write
113B000
heap
page read and write
4FF0000
trusted library allocation
page read and write
114A000
heap
page read and write
60AE000
stack
page read and write
10B0000
heap
page read and write
B90000
trusted library allocation
page read and write
978000
heap
page read and write
DDA000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
8760000
heap
page read and write
6790000
trusted library allocation
page read and write
3AAD000
direct allocation
page read and write
3903000
direct allocation
page read and write
4F66000
trusted library allocation
page read and write
D90000
trusted library allocation
page execute and read and write
5F09000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page execute and read and write
1132000
heap
page read and write
5C8E000
stack
page read and write
D00000
trusted library allocation
page read and write
E70000
heap
page read and write
950000
heap
page read and write
5040000
trusted library allocation
page read and write
37E0000
direct allocation
page read and write
6E3B000
stack
page read and write
930000
heap
page read and write
66F4000
trusted library allocation
page read and write
4F7E000
trusted library allocation
page read and write
48CD000
stack
page read and write
F3F000
unkown
page write copy
67A0000
trusted library allocation
page read and write
99A000
heap
page read and write
4FA0000
trusted library allocation
page read and write
970000
heap
page read and write
123B000
heap
page read and write
4F72000
trusted library allocation
page read and write
6708000
trusted library allocation
page read and write
6E80000
heap
page read and write
62A0000
heap
page read and write
5F25000
trusted library allocation
page read and write
125A000
heap
page read and write
737000
stack
page read and write
126A000
heap
page read and write
18FE000
stack
page read and write
4F81000
trusted library allocation
page read and write
1169000
heap
page read and write
3B1E000
direct allocation
page read and write
5F02000
trusted library allocation
page read and write
C3E000
stack
page read and write
DA0000
trusted library allocation
page read and write
5F8E000
stack
page read and write
268F000
stack
page read and write
F55000
unkown
page readonly
9A7000
heap
page read and write
7180000
heap
page read and write
6504000
heap
page read and write
3742000
trusted library allocation
page read and write
3903000
direct allocation
page read and write
60C0000
trusted library allocation
page read and write
5DFE000
stack
page read and write
5C9C000
heap
page read and write
652D000
heap
page read and write
DD4000
trusted library allocation
page read and write
There are 320 hidden memdumps, click here to show them.