IOC Report
Tender_QUOTATION__LH22000309AA2023.exe

loading gif

Files

File Path
Type
Category
Malicious
Tender_QUOTATION__LH22000309AA2023.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\rtvzitvzef.exe
PE32 executable (console) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\buvzkr.sej
data
dropped
C:\Users\user\AppData\Local\Temp\ggbdhaflcbm.cer
data
dropped
C:\Users\user\AppData\Local\Temp\nshC7D4.tmp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Tender_QUOTATION__LH22000309AA2023.exe
C:\Users\user\Desktop\Tender_QUOTATION__LH22000309AA2023.exe
malicious
C:\Users\user\AppData\Local\Temp\rtvzitvzef.exe
"C:\Users\user~1\AppData\Local\Temp\rtvzitvzef.exe" C:\Users\user~1\AppData\Local\Temp\ggbdhaflcbm.cer
malicious
C:\Users\user\AppData\Local\Temp\rtvzitvzef.exe
C:\Users\user~1\AppData\Local\Temp\rtvzitvzef.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://nsis.sf.net/NSIS_ErrorError
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
25E1000
trusted library allocation
page read and write
malicious
7A8000
heap
page read and write
5390000
trusted library allocation
page read and write
21B15E3D000
heap
page read and write
4F10000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
1F0000
heap
page read and write
1E0FE590000
remote allocation
page read and write
720ABFB000
stack
page read and write
212CBFD000
stack
page read and write
23C0000
trusted library allocation
page execute and read and write
1A28B000
direct allocation
page read and write
1E0FE652000
heap
page read and write
866000
heap
page read and write
21B17980000
remote allocation
page read and write
20A32BCB000
heap
page read and write
5928000
trusted library allocation
page read and write
9F0000
direct allocation
page execute and read and write
8F6A67F000
stack
page read and write
21B15E59000
heap
page read and write
5800000
trusted library allocation
page read and write
5DC000
heap
page read and write
21F43A29000
heap
page read and write
21B15F13000
heap
page read and write
1A170000
direct allocation
page read and write
40A000
unkown
page write copy
85E000
heap
page read and write
21F43870000
heap
page read and write
4FBE000
stack
page read and write
5540000
trusted library allocation
page read and write
1A57BC3C000
heap
page read and write
21B15E02000
heap
page read and write
20A31FC0000
heap
page read and write
AD0000
heap
page read and write
212C67F000
stack
page read and write
1A2D388B000
heap
page read and write
5510000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
20A323BA000
heap
page read and write
5510000
trusted library allocation
page read and write
5701000
heap
page read and write
21B17900000
trusted library allocation
page read and write
19FE0000
direct allocation
page read and write
5920000
trusted library allocation
page read and write
20A32B02000
heap
page read and write
1A57BC37000
heap
page read and write
9DF000
stack
page read and write
43B000
unkown
page readonly
58B0000
trusted library allocation
page read and write
1A2D382C000
heap
page read and write
58C0000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
21B17980000
remote allocation
page read and write
720AA7C000
stack
page read and write
5980000
trusted library allocation
page read and write
47E000
stack
page read and write
5930000
unkown
page read and write
1A28F000
direct allocation
page read and write
533F000
stack
page read and write
5380000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
5A8000
heap
page read and write
7DE000
stack
page read and write
5560000
trusted library allocation
page read and write
20A32313000
heap
page read and write
50EB0FF000
stack
page read and write
4952000
direct allocation
page execute and read and write
8F6A97E000
stack
page read and write
893000
heap
page read and write
AC99FF000
stack
page read and write
5560000
trusted library allocation
page read and write
7A0000
heap
page read and write
212C97F000
stack
page read and write
8F6A47F000
stack
page read and write
5960000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
51FF000
stack
page read and write
1D34B43D000
heap
page read and write
5380000
trusted library allocation
page read and write
57F2000
trusted library allocation
page read and write
19FE0000
direct allocation
page read and write
5350000
trusted library allocation
page read and write
2290000
heap
page execute and read and write
5B10000
heap
page read and write
1A28B000
direct allocation
page read and write
5BD000
heap
page read and write
58E0000
trusted library allocation
page read and write
56F3000
heap
page read and write
21F439D0000
trusted library allocation
page read and write
21B15D70000
heap
page read and write
4E84000
trusted library allocation
page read and write
20A32297000
heap
page read and write
1D34B46C000
heap
page read and write
59D0000
heap
page read and write
58E0000
trusted library allocation
page read and write
21B15E13000
heap
page read and write
5920000
unkown
page read and write
5930000
trusted library allocation
page read and write
733000
trusted library allocation
page execute and read and write
58B0000
trusted library allocation
page read and write
8F42EBC000
stack
page read and write
50FE000
stack
page read and write
5530000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
1A28F000
direct allocation
page read and write
1D34B447000
heap
page read and write
5380000
trusted library allocation
page read and write
877000
heap
page read and write
418000
unkown
page read and write
2522DB32000
heap
page read and write
2522CFD0000
heap
page read and write
56E5000
trusted library allocation
page read and write
19FE0000
direct allocation
page read and write
5530000
trusted library allocation
page read and write
21B15E58000
heap
page read and write
4ED0000
trusted library allocation
page read and write
20A3223D000
heap
page read and write
21F43A13000
heap
page read and write
56E0000
trusted library allocation
page read and write
1D34B433000
heap
page read and write
4EB4000
trusted library allocation
page read and write
AC9F7E000
stack
page read and write
1A0F6000
direct allocation
page read and write
212C18B000
stack
page read and write
1A57BC1F000
heap
page read and write
20A32C13000
heap
page read and write
1E0FE4D0000
heap
page read and write
199000
stack
page read and write
30000
heap
page read and write
8F4397E000
stack
page read and write
8F6AC7F000
stack
page read and write
25C0000
trusted library allocation
page read and write
5702000
heap
page read and write
400000
unkown
page readonly
5950000
trusted library allocation
page read and write
1A170000
direct allocation
page read and write
56E0000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
89A000
heap
page read and write
20A32243000
heap
page read and write
21B15E2A000
heap
page read and write
58C0000
trusted library allocation
page read and write
1E0FE590000
remote allocation
page read and write
21F43A58000
heap
page read and write
5B0000
trusted library section
page read and write
5540000
trusted library allocation
page execute and read and write
2522D140000
trusted library allocation
page read and write
480000
heap
page read and write
5970000
trusted library allocation
page read and write
1E0FE600000
heap
page read and write
1A2D3670000
heap
page read and write
1D34B449000
heap
page read and write
8F4377D000
stack
page read and write
5950000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
2522D313000
heap
page read and write
2522D2BF000
heap
page read and write
5520000
trusted library allocation
page read and write
5701000
heap
page read and write
20A3222F000
heap
page read and write
20A32B54000
heap
page read and write
19A000
stack
page read and write
780000
heap
page read and write
212CAFE000
stack
page read and write
21F44202000
trusted library allocation
page read and write
418000
unkown
page write copy
864000
heap
page read and write
1D34B44B000
heap
page read and write
5980000
trusted library allocation
page read and write
8F4367E000
stack
page read and write
1A170000
direct allocation
page read and write
5530000
trusted library allocation
page read and write
74D000
trusted library allocation
page execute and read and write
1A2D386F000
heap
page read and write
2522D229000
heap
page read and write
264A000
trusted library allocation
page read and write
5705000
heap
page read and write
1A28B000
direct allocation
page read and write
401000
unkown
page execute read
8DD000
stack
page read and write
58E0000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
19C000
stack
page read and write
212C8FE000
stack
page read and write
1D34B482000
heap
page read and write
6D7D47B000
stack
page read and write
5990000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
523E000
stack
page read and write
20A32C00000
heap
page read and write
5525000
trusted library allocation
page read and write
1A2D3875000
heap
page read and write
AC9AFB000
stack
page read and write
89A000
heap
page read and write
1D34B46B000
heap
page read and write
56E5000
trusted library allocation
page read and write
4EAC000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
21F43B00000
heap
page read and write
50EA98E000
stack
page read and write
5380000
trusted library allocation
page read and write
884000
heap
page read and write
5390000
trusted library allocation
page read and write
9D000
stack
page read and write
5530000
trusted library allocation
page read and write
2522DA02000
heap
page read and write
5540000
trusted library allocation
page read and write
5386000
trusted library allocation
page read and write
1A2D3660000
heap
page read and write
1A57BC00000
heap
page read and write
20A32B22000
heap
page read and write
1A57BBC0000
heap
page read and write
5920000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
401000
unkown
page execute read
4EC4000
trusted library allocation
page read and write
5700000
heap
page read and write
401000
unkown
page execute read
56FA000
heap
page read and write
886000
heap
page read and write
1D34B462000
heap
page read and write
400000
unkown
page readonly
57F0000
trusted library allocation
page read and write
1A57C602000
trusted library allocation
page read and write
20A32279000
heap
page read and write
21B15E66000
heap
page read and write
5520000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
20A32256000
heap
page read and write
1D34B446000
heap
page read and write
5520000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
4E94000
trusted library allocation
page read and write
1E0FE613000
heap
page read and write
58B0000
trusted library allocation
page read and write
50EAC7E000
stack
page read and write
4920000
trusted library section
page read and write
50EADFE000
stack
page read and write
5380000
trusted library allocation
page read and write
24BD000
stack
page read and write
59A0000
trusted library allocation
page execute and read and write
35E1000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
56FA000
heap
page read and write
5900000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
22A0000
heap
page read and write
2522D2E1000
heap
page read and write
720ACFC000
stack
page read and write
56E0000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
1A170000
direct allocation
page read and write
1A170000
direct allocation
page read and write
20A32B94000
heap
page read and write
50EA90C000
stack
page read and write
21B178C0000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
58B7000
trusted library allocation
page read and write
27D0000
heap
page read and write
21B15E5A000
heap
page read and write
8F6A87D000
stack
page read and write
58B0000
trusted library allocation
page read and write
5705000
heap
page read and write
886000
heap
page read and write
1D34B440000
heap
page read and write
8F6AA7F000
stack
page read and write
4EA8000
trusted library allocation
page read and write
89D000
heap
page read and write
408000
unkown
page readonly
756000
trusted library allocation
page execute and read and write
1A57BC02000
heap
page read and write
5EA000
heap
page read and write
5530000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
20A32213000
heap
page read and write
1A28F000
direct allocation
page read and write
886000
heap
page read and write
5E8000
heap
page read and write
9B000
stack
page read and write
6D7D7FC000
stack
page read and write
4F20000
trusted library allocation
page read and write
1D34B473000
heap
page read and write
8F69F6B000
stack
page read and write
411000
unkown
page readonly
58E0000
trusted library allocation
page read and write
5DC000
heap
page read and write
881000
heap
page read and write
20A32200000
heap
page read and write
1A0F6000
direct allocation
page read and write
27BF000
stack
page read and write
2522D040000
heap
page read and write
89C000
heap
page read and write
1D34B460000
heap
page read and write
5520000
trusted library allocation
page read and write
5533000
trusted library allocation
page read and write
1D34B502000
heap
page read and write
20A32B00000
heap
page read and write
19FE0000
direct allocation
page read and write
400000
unkown
page readonly
5520000
trusted library allocation
page read and write
20A32229000
heap
page read and write
1A0F6000
direct allocation
page read and write
1A2D3802000
heap
page read and write
20A3238F000
heap
page read and write
5702000
heap
page read and write
750000
trusted library allocation
page read and write
227E000
stack
page read and write
1E0FE702000
heap
page read and write
1D34B44E000
heap
page read and write
1A57BBF0000
trusted library allocation
page read and write
1A2D4002000
trusted library allocation
page read and write
20A32BB3000
heap
page read and write
470000
heap
page read and write
1D34BC90000
trusted library allocation
page read and write
1E0FE590000
remote allocation
page read and write
50EAFFF000
stack
page read and write
400000
unkown
page readonly
4A0000
heap
page read and write
58C0000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
25D0000
heap
page execute and read and write
2522D26D000
heap
page read and write
56E0000
trusted library allocation
page read and write
411000
unkown
page readonly
720000
trusted library allocation
page read and write
6D7D67E000
stack
page read and write
56E0000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
1D34B479000
heap
page read and write
ACE000
stack
page read and write
5560000
trusted library allocation
page read and write
58E000
stack
page read and write
1E0FE629000
heap
page read and write
5350000
trusted library allocation
page read and write
212C7FE000
stack
page read and write
5920000
trusted library allocation
page read and write
40C000
unkown
page read and write
1A57BB70000
heap
page read and write
AC9B79000
stack
page read and write
1A170000
direct allocation
page read and write
2270000
heap
page read and write
20A32C31000
heap
page read and write
1A28F000
direct allocation
page read and write
21B15E48000
heap
page read and write
5950000
trusted library allocation
page read and write
21B15E8B000
heap
page read and write
5891000
trusted library allocation
page read and write
1A2D3829000
heap
page read and write
5940000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
1D34B442000
heap
page read and write
AC9C7F000
stack
page read and write
89A000
heap
page read and write
8F4357E000
stack
page read and write
21F43A7B000
heap
page read and write
21B17870000
trusted library allocation
page read and write
5956000
trusted library allocation
page read and write
1A28F000
direct allocation
page read and write
23D0000
heap
page read and write
20A32120000
trusted library allocation
page read and write
1A2D3866000
heap
page read and write
762000
trusted library allocation
page read and write
212C6FE000
stack
page read and write
58EB000
trusted library allocation
page read and write
79F000
stack
page read and write
21F438D0000
heap
page read and write
4EA0000
trusted library allocation
page read and write
1A57BC46000
heap
page read and write
50BF000
stack
page read and write
21F43A65000
heap
page read and write
A10000
direct allocation
page read and write
1D34B390000
heap
page read and write
58B0000
trusted library allocation
page read and write
8F4387C000
stack
page read and write
5520000
trusted library allocation
page read and write
401000
unkown
page execute read
58F0000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
1A57BC24000
heap
page read and write
85D000
heap
page read and write
21B15DD0000
heap
page read and write
1D34B3F0000
heap
page read and write
58A0000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
21B15F02000
heap
page read and write
6D7DAFF000
stack
page read and write
5920000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
AC98FB000
stack
page read and write
5540000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
4EA5000
trusted library allocation
page read and write
730000
trusted library allocation
page read and write
20A32B22000
heap
page read and write
1D34B439000
heap
page read and write
1D34B450000
heap
page read and write
20A32C02000
heap
page read and write
AB0000
heap
page read and write
6D7D9FF000
stack
page read and write
A50000
heap
page read and write
87F000
heap
page read and write
1A2D3902000
heap
page read and write
57F0000
trusted library allocation
page read and write
2662000
trusted library allocation
page read and write
56F8000
heap
page read and write
AC9D7A000
stack
page read and write
21B15E5F000
heap
page read and write
AC94CB000
stack
page read and write
56E0000
trusted library allocation
page read and write
400000
unkown
page readonly
20A323E6000
heap
page read and write
5530000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
617000
heap
page read and write
5520000
trusted library allocation
page read and write
8F6A37B000
stack
page read and write
897000
heap
page read and write
734000
trusted library allocation
page read and write
265D000
trusted library allocation
page read and write
2522D302000
heap
page read and write
AC9E7E000
stack
page read and write
73D000
trusted library allocation
page execute and read and write
5910000
trusted library allocation
page read and write
1D34B413000
heap
page read and write
20A3226C000
heap
page read and write
5E5000
heap
page read and write
56F0000
heap
page read and write
20A3228A000
heap
page read and write
1A2D383C000
heap
page read and write
1A57BD02000
heap
page read and write
8F6AB7F000
stack
page read and write
21F43B02000
heap
page read and write
5520000
unkown
page read and write
4E97000
trusted library allocation
page read and write
20A3226F000
heap
page read and write
40A000
unkown
page read and write
1A57BC53000
heap
page read and write
21B17890000
trusted library allocation
page read and write
20A32277000
heap
page read and write
720AB7C000
stack
page read and write
1E0FE4C0000
heap
page read and write
7FE50000
trusted library allocation
page execute and read and write
2643000
trusted library allocation
page read and write
1A2D3800000
heap
page read and write
5530000
trusted library allocation
page read and write
21B15D60000
heap
page read and write
20A31FB0000
heap
page read and write
8F43A7C000
stack
page read and write
411000
unkown
page readonly
9B000
stack
page read and write
1A2D385A000
heap
page read and write
401000
unkown
page execute read
5D0000
heap
page read and write
1A28B000
direct allocation
page read and write
20A32259000
heap
page read and write
1A57BC13000
heap
page read and write
2522D243000
heap
page read and write
5530000
trusted library allocation
page read and write
56E0000
unkown
page read and write
21F43A3D000
heap
page read and write
19FE0000
direct allocation
page read and write
5340000
trusted library allocation
page read and write
1E0FF002000
trusted library allocation
page read and write
1A28B000
direct allocation
page read and write
5970000
trusted library allocation
page read and write
26BF000
stack
page read and write
21F43B13000
heap
page read and write
89D000
heap
page read and write
5E8000
heap
page read and write
76B000
trusted library allocation
page execute and read and write
3612000
trusted library allocation
page read and write
2522DB00000
heap
page read and write
8F6A57D000
stack
page read and write
56E0000
trusted library allocation
page read and write
877000
heap
page read and write
720A9FF000
stack
page read and write
56E0000
trusted library allocation
page read and write
4EB1000
trusted library allocation
page read and write
1D34B455000
heap
page read and write
5925000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
1D34B429000
heap
page read and write
4E92000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
5897000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
4EE0000
heap
page read and write
1D34B47D000
heap
page read and write
6D7D8F9000
stack
page read and write
1E0FE602000
heap
page read and write
2522D213000
heap
page read and write
5960000
trusted library allocation
page read and write
56E8000
unkown
page read and write
425000
unkown
page read and write
5520000
trusted library allocation
page read and write
1D34B47A000
heap
page read and write
30000
heap
page read and write
1E0FE560000
trusted library allocation
page read and write
720A32C000
stack
page read and write
2522D2B7000
heap
page read and write
400000
system
page execute and read and write
1A57BC30000
heap
page read and write
720ADFE000
stack
page read and write
1D34B474000
heap
page read and write
1A0F6000
direct allocation
page read and write
5380000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
497C000
direct allocation
page execute and read and write
418000
unkown
page write copy
7D8000
heap
page read and write
56E0000
trusted library allocation
page read and write
2522D200000
heap
page read and write
58A2000
trusted library allocation
page read and write
30000
heap
page read and write
5A0000
heap
page read and write
58E0000
trusted library allocation
page read and write
1A0F6000
direct allocation
page read and write
4E8B000
trusted library allocation
page read and write
1A57BC29000
heap
page read and write
21B15E49000
heap
page read and write
21B15F00000
heap
page read and write
5701000
heap
page read and write
212CA7D000
stack
page read and write
720AEFC000
stack
page read and write
1D34B467000
heap
page read and write
5380000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
21F43A02000
heap
page read and write
720A8FF000
stack
page read and write
1A28F000
direct allocation
page read and write
886000
heap
page read and write
21B15F18000
heap
page read and write
1D34B431000
heap
page read and write
1D34B400000
heap
page read and write
8F432FE000
stack
page read and write
1D34B430000
heap
page read and write
56F5000
heap
page read and write
58B0000
unkown
page read and write
AC9EFF000
stack
page read and write
8F4347F000
stack
page read and write
23AF000
stack
page read and write
58E5000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
45E000
stack
page read and write
1D34B380000
heap
page read and write
5930000
trusted library allocation
page read and write
1A28F000
direct allocation
page read and write
1A28B000
direct allocation
page read and write
56F1000
heap
page read and write
4E80000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
20A32020000
heap
page read and write
5530000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
50EAEFE000
stack
page read and write
5380000
trusted library allocation
page read and write
59D3000
heap
page read and write
1A0F6000
direct allocation
page read and write
5380000
trusted library allocation
page read and write
1A170000
direct allocation
page read and write
5E5000
heap
page read and write
56E0000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
20A32C23000
heap
page read and write
19FE0000
direct allocation
page read and write
7D5000
heap
page read and write
25BE000
stack
page read and write
1D34B464000
heap
page read and write
1D34B44D000
heap
page read and write
4950000
direct allocation
page execute and read and write
1D34B46E000
heap
page read and write
21F43A00000
heap
page read and write
56D0000
trusted library allocation
page execute and read and write
4E9A000
trusted library allocation
page read and write
740000
trusted library allocation
page read and write
720A77C000
stack
page read and write
617000
heap
page read and write
58B0000
trusted library allocation
page read and write
720AFFF000
stack
page read and write
5540000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
5E9000
heap
page read and write
A70000
heap
page read and write
4A5000
heap
page read and write
56E0000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
2522DB12000
heap
page read and write
23E8000
trusted library allocation
page read and write
20A32A02000
heap
page read and write
2190000
heap
page read and write
20A3225B000
heap
page read and write
5CE000
stack
page read and write
21B17980000
remote allocation
page read and write
1A2D36D0000
heap
page read and write
5530000
trusted library allocation
page read and write
8DF000
stack
page read and write
5390000
trusted library allocation
page read and write
75A000
trusted library allocation
page execute and read and write
23B0000
trusted library allocation
page read and write
5D5000
heap
page read and write
214E000
stack
page read and write
2280000
trusted library allocation
page read and write
1A2D3913000
heap
page read and write
7DE000
stack
page read and write
1A0F6000
direct allocation
page read and write
5520000
trusted library allocation
page read and write
21B15E4A000
heap
page read and write
2522D2C8000
heap
page read and write
1D34BE02000
trusted library allocation
page read and write
5990000
unkown
page read and write
56F1000
heap
page read and write
435000
unkown
page read and write
56E0000
unkown
page read and write
56E0000
trusted library allocation
page read and write
21B15E00000
heap
page read and write
2522CFE0000
heap
page read and write
58D0000
trusted library allocation
page read and write
1A2D37D0000
trusted library allocation
page read and write
19FE0000
direct allocation
page read and write
5530000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
6470DFB000
stack
page read and write
21F43A6A000
heap
page read and write
1D34B445000
heap
page read and write
1E0FE530000
heap
page read and write
58E5000
trusted library allocation
page read and write
1A28B000
direct allocation
page read and write
58B0000
trusted library allocation
page read and write
21F43860000
heap
page read and write
58B0000
trusted library allocation
page read and write
6470FFE000
stack
page read and write
5C0000
heap
page read and write
5C0000
trusted library section
page read and write
20A32B71000
heap
page read and write
6470EFF000
stack
page read and write
89A000
heap
page read and write
1F0000
heap
page read and write
1E0FE63F000
heap
page read and write
20A32C28000
heap
page read and write
4E9D000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
5538000
trusted library allocation
page read and write
43B000
unkown
page readonly
20A32BBF000
heap
page read and write
1A57BB60000
heap
page read and write
5E0000
heap
page read and write
20A32293000
heap
page read and write
20A32140000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
8F6A77D000
stack
page read and write
56E0000
unkown
page read and write
1D34B476000
heap
page read and write
1A2D3813000
heap
page read and write
408000
unkown
page readonly
20A32B43000
heap
page read and write
8F6AD7F000
stack
page read and write
5980000
trusted library allocation
page read and write
21B17A02000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
5910000
heap
page read and write
767000
trusted library allocation
page execute and read and write
886000
heap
page read and write
5701000
heap
page read and write
56E0000
trusted library allocation
page read and write
427000
unkown
page read and write
5950000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
6470A7B000
stack
page read and write
There are 673 hidden memdumps, click here to show them.