IOC Report
QUOTATION#006565.exe

loading gif

Files

File Path
Type
Category
Malicious
QUOTATION#006565.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Halitherses
data
dropped
C:\Users\user\AppData\Local\Temp\tmp100F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp1010.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp2599.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 5, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp25B9.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 5, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp25BA.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 5, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp25FD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp4F11.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp4FAE.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp503C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp508B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp514F.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 5, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp5160.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 5, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp5841.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5870.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5881.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp7887.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp78C6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp7CC6.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 5, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp7CC7.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 5, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp7CE7.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 5, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp7CF8.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 5, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp7D28.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 5, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp7D38.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 5, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp8B3A.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp8B4B.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp8B7B.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp8B9B.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9F0C.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp9F80.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpBDD8.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpC1ED.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC512.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpC552.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpCC18.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpCC77.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpEA9E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpEAAE.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpEABF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpEAD0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpEAE0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpEAF1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpF8E7.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpF8F8.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpF908.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpF919.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 5, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmpFC0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
There are 39 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QUOTATION#006565.exe
"C:\Users\user\Desktop\QUOTATION#006565.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\QUOTATION#006565.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://209.38.151.4:55123/
209.38.151.4
malicious
https://api.ipify.orgcookies//settinString.Removeg
unknown
malicious
209.38.151.4:55123
malicious
https://ipinfo.io/ip%appdata%
unknown
http://209.38.151.4:55123
unknown
https://duckduckgo.com/ac/?q=
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://www.ecosia.org/newtab/v20Y&
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
https://api.ip.sb/geoip
104.26.13.31
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ac.ecosia.org?q=
unknown
http://tempuri.org/
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
https://duckduckgo.com/chrome_newtabv20
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://209.38.151.4:55123t-Ar
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb.cdn.cloudflare.net
104.26.13.31
api.ip.sb
unknown

IPs

IP
Domain
Country
Malicious
209.38.151.4
unknown
United States
malicious
104.26.13.31
api.ip.sb.cdn.cloudflare.net
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
512000
system
page execute and read and write
malicious
15D0000
direct allocation
page read and write
malicious
6246000
trusted library allocation
page read and write
4458000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
4A73000
heap
page execute and read and write
2A80000
trusted library allocation
page read and write
2324000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
171C000
heap
page read and write
52E0000
trusted library allocation
page execute and read and write
4D40000
trusted library allocation
page read and write
6BE6000
heap
page read and write
41DE000
direct allocation
page read and write
4F20000
trusted library allocation
page execute and read and write
6550000
trusted library allocation
page read and write
178000
unkown
page readonly
3FC3000
direct allocation
page read and write
773E000
stack
page read and write
3EA0000
direct allocation
page read and write
4D90000
trusted library allocation
page read and write
5FE000
heap
page read and write
16B8000
heap
page read and write
52F5000
trusted library allocation
page read and write
24BB000
trusted library allocation
page read and write
615000
heap
page read and write
6241000
trusted library allocation
page read and write
160A000
heap
page read and write
26CD000
trusted library allocation
page read and write
41DE000
direct allocation
page read and write
6540000
trusted library allocation
page execute and read and write
B0000
unkown
page readonly
A82000
trusted library allocation
page read and write
13F000
unkown
page readonly
61DE000
stack
page read and write
617000
heap
page read and write
5CC0000
heap
page execute and read and write
244E000
stack
page read and write
52F9000
trusted library allocation
page read and write
3598000
trusted library allocation
page read and write
6CF0000
heap
page read and write
DCE000
stack
page read and write
3559000
trusted library allocation
page read and write
388A000
trusted library allocation
page read and write
3FC3000
direct allocation
page read and write
5E0000
heap
page read and write
52F2000
trusted library allocation
page read and write
4D22000
trusted library allocation
page read and write
358C000
trusted library allocation
page read and write
4E90000
trusted library allocation
page execute and read and write
416D000
direct allocation
page read and write
5BE000
stack
page read and write
13F000
unkown
page readonly
B3B000
heap
page read and write
3462000
trusted library allocation
page read and write
4D31000
trusted library allocation
page read and write
6380000
heap
page read and write
2330000
trusted library allocation
page read and write
15C0000
direct allocation
page execute and read and write
5A82000
heap
page read and write
4EDD000
stack
page read and write
38A3000
trusted library allocation
page read and write
389E000
trusted library allocation
page read and write
5ACF000
heap
page read and write
416D000
direct allocation
page read and write
4E70000
trusted library allocation
page read and write
4D16000
trusted library allocation
page read and write
15A0000
heap
page read and write
B20000
trusted library allocation
page read and write
28FC000
trusted library allocation
page read and write
502E000
stack
page read and write
940000
trusted library allocation
page read and write
6DF5000
heap
page read and write
1820000
heap
page read and write
6FE0000
trusted library allocation
page execute and read and write
6224000
trusted library allocation
page read and write
8AE000
stack
page read and write
570000
heap
page read and write
B1000
unkown
page execute read
52B0000
trusted library allocation
page read and write
2556000
trusted library allocation
page read and write
503B000
trusted library allocation
page read and write
4169000
direct allocation
page read and write
4A70000
heap
page execute and read and write
5C9E000
stack
page read and write
16F000
unkown
page write copy
13BE000
stack
page read and write
4D70000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
6248000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page execute and read and write
3FC3000
direct allocation
page read and write
4E40000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
29F4000
trusted library allocation
page read and write
AF0000
heap
page read and write
B00000
trusted library allocation
page execute and read and write
5ADA000
heap
page read and write
6C6000
heap
page read and write
5A3E000
stack
page read and write
7770000
trusted library allocation
page execute and read and write
4169000
direct allocation
page read and write
29FD000
trusted library allocation
page read and write
5D2D000
stack
page read and write
6DE0000
heap
page read and write
4F8000
stack
page read and write
A76000
trusted library allocation
page execute and read and write
496E000
stack
page read and write
178000
unkown
page readonly
A6D000
trusted library allocation
page execute and read and write
165000
unkown
page readonly
41DE000
direct allocation
page read and write
D40000
heap
page read and write
4169000
direct allocation
page read and write
4169000
direct allocation
page read and write
4D2E000
trusted library allocation
page read and write
6260000
trusted library allocation
page read and write
45ED000
stack
page read and write
623E000
trusted library allocation
page read and write
5B22000
heap
page read and write
1755000
heap
page read and write
663000
heap
page read and write
AEE000
stack
page read and write
1924000
heap
page read and write
5E5E000
stack
page read and write
2A77000
trusted library allocation
page read and write
4169000
direct allocation
page read and write
5A50000
heap
page read and write
359A000
trusted library allocation
page read and write
2636000
trusted library allocation
page read and write
5B02000
heap
page read and write
94D000
trusted library allocation
page execute and read and write
173000
unkown
page write copy
4F1E000
stack
page read and write
A8B000
trusted library allocation
page execute and read and write
5DD0000
trusted library allocation
page read and write
6DF9000
heap
page read and write
A87000
trusted library allocation
page execute and read and write
A60000
trusted library allocation
page read and write
16B0000
heap
page read and write
24DD000
trusted library allocation
page read and write
3896000
trusted library allocation
page read and write
622C000
trusted library allocation
page read and write
1808000
heap
page read and write
7760000
trusted library allocation
page read and write
16E3000
heap
page read and write
39BE000
trusted library allocation
page read and write
B0000
unkown
page readonly
5B39000
heap
page read and write
763E000
stack
page read and write
B1000
unkown
page execute read
171C000
heap
page read and write
52F0000
trusted library allocation
page read and write
416D000
direct allocation
page read and write
5D80000
trusted library allocation
page execute and read and write
6252000
trusted library allocation
page read and write
7FA10000
trusted library allocation
page execute and read and write
52D0000
trusted library allocation
page read and write
13FC000
stack
page read and write
345E000
trusted library allocation
page read and write
1856000
heap
page read and write
28E7000
trusted library allocation
page read and write
41DE000
direct allocation
page read and write
171C000
heap
page read and write
4A6E000
stack
page read and write
5CA5000
trusted library allocation
page read and write
4450000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
3EA0000
direct allocation
page read and write
6372000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
622F000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
4E6D000
trusted library allocation
page read and write
6222000
trusted library allocation
page read and write
3EA0000
direct allocation
page read and write
530F000
trusted library allocation
page read and write
6255000
trusted library allocation
page read and write
416D000
direct allocation
page read and write
3EA0000
direct allocation
page read and write
192A000
heap
page read and write
24C9000
trusted library allocation
page read and write
25A6000
trusted library allocation
page read and write
3EA0000
direct allocation
page read and write
A80000
trusted library allocation
page read and write
27E5000
trusted library allocation
page read and write
3752000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
24E1000
trusted library allocation
page read and write
6234000
trusted library allocation
page read and write
80FE000
stack
page read and write
621F000
stack
page read and write
6E0D000
heap
page read and write
4ABE000
stack
page read and write
8EE000
stack
page read and write
6560000
heap
page read and write
387A000
trusted library allocation
page read and write
1925000
heap
page read and write
17EA000
heap
page read and write
4040000
direct allocation
page read and write
2902000
trusted library allocation
page read and write
4040000
direct allocation
page read and write
648E000
stack
page read and write
5B0B000
heap
page read and write
CDA000
stack
page read and write
165000
unkown
page readonly
B30000
heap
page read and write
5E8000
heap
page read and write
13CE000
stack
page read and write
181B000
heap
page read and write
A85000
trusted library allocation
page execute and read and write
2988000
trusted library allocation
page read and write
5B44000
trusted library allocation
page read and write
4D11000
trusted library allocation
page read and write
A5E000
stack
page read and write
3FC3000
direct allocation
page read and write
16FF000
heap
page read and write
5D90000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
416D000
direct allocation
page read and write
15F0000
heap
page read and write
3FC3000
direct allocation
page read and write
3589000
trusted library allocation
page read and write
4E6A000
trusted library allocation
page read and write
944000
trusted library allocation
page read and write
503E000
trusted library allocation
page read and write
D8E000
stack
page read and write
357C000
trusted library allocation
page read and write
4BBF000
stack
page read and write
2560000
trusted library allocation
page read and write
6360000
trusted library allocation
page read and write
1774000
heap
page read and write
6BD0000
heap
page read and write
16F000
unkown
page read and write
41DE000
direct allocation
page read and write
4DE0000
trusted library allocation
page read and write
22AE000
stack
page read and write
3B54000
heap
page read and write
4CFF000
stack
page read and write
1820000
heap
page read and write
13DB000
stack
page read and write
5CA0000
trusted library allocation
page read and write
530A000
trusted library allocation
page read and write
37D2000
trusted library allocation
page read and write
2451000
trusted library allocation
page read and write
231C000
stack
page read and write
5B40000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page execute and read and write
28F0000
trusted library allocation
page read and write
3EA0000
direct allocation
page read and write
3890000
trusted library allocation
page read and write
4D0B000
trusted library allocation
page read and write
1580000
heap
page read and write
510000
system
page execute and read and write
3FC3000
direct allocation
page read and write
6500000
trusted library allocation
page execute and read and write
635C000
stack
page read and write
41DE000
direct allocation
page read and write
3643000
trusted library allocation
page read and write
950000
heap
page read and write
6226000
trusted library allocation
page read and write
3712000
trusted library allocation
page read and write
16EF000
heap
page read and write
6270000
trusted library allocation
page read and write
2876000
trusted library allocation
page read and write
A72000
trusted library allocation
page read and write
3451000
trusted library allocation
page read and write
5B50000
trusted library allocation
page execute and read and write
60A000
heap
page read and write
3EA0000
direct allocation
page read and write
64F0000
trusted library allocation
page read and write
4040000
direct allocation
page read and write
287C000
trusted library allocation
page read and write
41DE000
direct allocation
page read and write
2868000
trusted library allocation
page read and write
416D000
direct allocation
page read and write
6530000
trusted library allocation
page read and write
5308000
trusted library allocation
page read and write
6238000
trusted library allocation
page read and write
64D0000
trusted library allocation
page read and write
16FE000
heap
page read and write
531A000
trusted library allocation
page read and write
5315000
trusted library allocation
page read and write
64E0000
trusted library allocation
page execute and read and write
4D00000
trusted library allocation
page read and write
4BFD000
stack
page read and write
3880000
trusted library allocation
page read and write
624D000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
52D2000
trusted library allocation
page read and write
24A0000
trusted library allocation
page read and write
35BD000
trusted library allocation
page read and write
2976000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
16E2000
heap
page read and write
6E08000
heap
page read and write
4040000
direct allocation
page read and write
5CA2000
trusted library allocation
page read and write
171C000
heap
page read and write
18A8000
heap
page read and write
545000
heap
page read and write
232A000
trusted library allocation
page read and write
8F0000
heap
page read and write
531F000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
416D000
direct allocation
page read and write
4040000
direct allocation
page read and write
3592000
trusted library allocation
page read and write
6CE0000
heap
page read and write
1DB000
stack
page read and write
5E1E000
stack
page read and write
262C000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
5B31000
heap
page read and write
702E000
stack
page read and write
1EAE000
stack
page read and write
3FC3000
direct allocation
page read and write
3887000
trusted library allocation
page read and write
3893000
trusted library allocation
page read and write
296D000
trusted library allocation
page read and write
B36000
heap
page read and write
3582000
trusted library allocation
page read and write
35A0000
trusted library allocation
page read and write
5C0000
heap
page read and write
2982000
trusted library allocation
page read and write
3595000
trusted library allocation
page read and write
5B28000
heap
page read and write
6BC0000
trusted library allocation
page read and write
3898000
trusted library allocation
page read and write
943000
trusted library allocation
page execute and read and write
16EA000
heap
page read and write
6BA000
heap
page read and write
4040000
direct allocation
page read and write
35AD000
trusted library allocation
page read and write
5DC0000
heap
page read and write
6BA0000
trusted library allocation
page execute and read and write
540000
heap
page read and write
6E1B000
heap
page read and write
6370000
trusted library allocation
page read and write
DD0000
heap
page read and write
4169000
direct allocation
page read and write
5DD6000
trusted library allocation
page read and write
3B50000
heap
page read and write
6E15000
heap
page read and write
5D6E000
stack
page read and write
4169000
direct allocation
page read and write
AA0000
trusted library allocation
page read and write
5B9E000
stack
page read and write
4D51000
trusted library allocation
page read and write
4040000
direct allocation
page read and write
2340000
heap
page execute and read and write
There are 342 hidden memdumps, click here to show them.