IOC Report
Request for Tender Quotation.exe

loading gif

Files

File Path
Type
Category
Malicious
Request for Tender Quotation.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Request for Tender Quotation.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp8B7B.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\BtsoqoHwldFQNw.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\BtsoqoHwldFQNw.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BtsoqoHwldFQNw.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4wpe3p5c.nkd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_doq50bcq.qhe.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_es335ijd.otl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ese31vn4.ytu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f5fysk5q.abc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gd0l4fbm.xdw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ryqcx2zw.ofm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_upurp5e5.r03.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA29D.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Request for Tender Quotation.exe
"C:\Users\user\Desktop\Request for Tender Quotation.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Request for Tender Quotation.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\BtsoqoHwldFQNw.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BtsoqoHwldFQNw" /XML "C:\Users\user\AppData\Local\Temp\tmp8B7B.tmp"
malicious
C:\Users\user\Desktop\Request for Tender Quotation.exe
"C:\Users\user\Desktop\Request for Tender Quotation.exe"
malicious
C:\Users\user\Desktop\Request for Tender Quotation.exe
"C:\Users\user\Desktop\Request for Tender Quotation.exe"
malicious
C:\Users\user\AppData\Roaming\BtsoqoHwldFQNw.exe
C:\Users\user\AppData\Roaming\BtsoqoHwldFQNw.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BtsoqoHwldFQNw" /XML "C:\Users\user\AppData\Local\Temp\tmpA29D.tmp"
malicious
C:\Users\user\AppData\Roaming\BtsoqoHwldFQNw.exe
"C:\Users\user\AppData\Roaming\BtsoqoHwldFQNw.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
198.12.90.244:49780
malicious
http://tempuri.org/Entity/Id10Response
unknown
http://tempuri.org/Entity/Id24LR
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://tempuri.org/Entity/Id22LR
unknown
http://tempuri.org/Entity/Id20LR
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://tempuri.org/Entity/Id9
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id19LR
unknown
http://tempuri.org/Entity/Id5
unknown
http://tempuri.org/Entity/Id23Response
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id17LR
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://tempuri.org/Entity/Id15LR
unknown
http://tempuri.org/Entity/Id9LR
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://tempuri.org/Entity/Id13LR
unknown
http://tempuri.org/Entity/Id7LR
unknown
http://tempuri.org/Entity/Id11LR
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
unknown
http://tempuri.org/Entity/Id17Response
unknown
http://tempuri.org/Entity/Id1LR
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id5LR
unknown
http://tempuri.org/Entity/Id20Response
unknown
http://tempuri.org/Ent
unknown
http://tempuri.org/Entity/Id3LR
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id13Response
unknown
http://tempuri.org/Entity/Id4Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://tempuri.org/Entity/Id6Response
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://tempuri.org/Entity/Id23LR
unknown
http://tempuri.org/Entity/Id7Response
unknown
http://tempuri.org/Entity/Id21LR
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Entity/Id11Response
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id22Response
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://tempuri.org/Entity/Id23
unknown
http://tempuri.org/Entity/Id24
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://tempuri.org/Entity/Id18LR
unknown
http://tempuri.org/Entity/Id1
unknown
http://tempuri.org/Entity/Id16LR
unknown
http://tempuri.org/Entity/Id8LR
unknown
http://tempuri.org/Entity/Id3
unknown
http://tempuri.org/Entity/Id14LR
unknown
http://tempuri.org/Entity/Id2
unknown
http://tempuri.org/Entity/Id6LR
unknown
http://tempuri.org/Entity/Id18Response
unknown
http://tempuri.org/Entity/
unknown
http://tempuri.org/Entity/Id12LR
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Entity/Id10LR
unknown
http://tempuri.org/Entity/Id4LR
unknown
http://tempuri.org/Entity/Id2LR
unknown
http://schemas.xmlsoap.org/ws/2005/02/rmX
unknown
http://tempuri.org/Entity/Id3Response
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id14Response
unknown
There are 82 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
198.12.90.244
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
43A2000
trusted library allocation
page read and write
malicious
42D9000
trusted library allocation
page read and write
malicious
425000
remote allocation
page execute and read and write
malicious
43ED000
trusted library allocation
page read and write
malicious
165F000
stack
page read and write
3324000
trusted library allocation
page read and write
1700000
heap
page read and write
158B000
heap
page read and write
587A000
trusted library allocation
page read and write
2EFE000
stack
page read and write
801F000
stack
page read and write
6700000
trusted library allocation
page read and write
6490000
trusted library allocation
page execute and read and write
1860000
trusted library allocation
page read and write
1836000
trusted library allocation
page execute and read and write
7786000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
5F1F000
stack
page read and write
141B000
trusted library allocation
page execute and read and write
1483000
heap
page read and write
3653000
trusted library allocation
page read and write
4367000
trusted library allocation
page read and write
56D4000
trusted library allocation
page read and write
5F2B000
trusted library allocation
page read and write
18CE000
stack
page read and write
5DB1000
trusted library allocation
page read and write
8411000
trusted library allocation
page read and write
114E000
heap
page read and write
64C0000
trusted library allocation
page execute and read and write
540000
heap
page read and write
1579000
heap
page read and write
1663000
trusted library allocation
page read and write
138B000
trusted library allocation
page execute and read and write
3110000
trusted library allocation
page read and write
785E000
stack
page read and write
1113000
trusted library allocation
page execute and read and write
A6AE000
stack
page read and write
1840000
trusted library allocation
page read and write
5780000
heap
page read and write
1901000
heap
page read and write
106E000
stack
page read and write
32E2000
trusted library allocation
page read and write
33D3000
trusted library allocation
page read and write
5CF000
unkown
page read and write
5BDE000
heap
page read and write
1720000
trusted library allocation
page read and write
3AF2000
trusted library allocation
page read and write
1180000
heap
page read and write
56D0000
trusted library allocation
page read and write
339E000
trusted library allocation
page read and write
34D2000
trusted library allocation
page read and write
1845000
trusted library allocation
page execute and read and write
5ACE000
stack
page read and write
706E000
heap
page read and write
3020000
heap
page read and write
142C000
stack
page read and write
5F31000
trusted library allocation
page read and write
37DC000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
5702000
trusted library allocation
page read and write
32A0000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
1181000
heap
page read and write
1340000
heap
page read and write
110A000
stack
page read and write
387A000
trusted library allocation
page read and write
12AE000
stack
page read and write
41E000
remote allocation
page execute and read and write
3706000
trusted library allocation
page read and write
64E0000
trusted library allocation
page read and write
120E000
heap
page read and write
1823000
trusted library allocation
page read and write
1360000
trusted library allocation
page read and write
FDA000
stack
page read and write
56FD000
trusted library allocation
page read and write
138E000
stack
page read and write
1820000
trusted library allocation
page read and write
1730000
trusted library allocation
page read and write
422000
remote allocation
page execute and read and write
3360000
heap
page execute and read and write
1813000
trusted library allocation
page execute and read and write
1A2E000
stack
page read and write
5610000
trusted library section
page readonly
5F4E000
trusted library allocation
page read and write
152B000
trusted library allocation
page read and write
32EE000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
AECD000
stack
page read and write
7630000
trusted library allocation
page execute and read and write
182C000
stack
page read and write
1710000
trusted library allocation
page read and write
5760000
trusted library section
page readonly
75F0000
trusted library section
page read and write
1137000
stack
page read and write
1107000
heap
page read and write
5728000
trusted library allocation
page read and write
78C2000
trusted library allocation
page read and write
137A000
trusted library allocation
page execute and read and write
430000
heap
page read and write
3140000
heap
page read and write
1866000
heap
page read and write
1039000
stack
page read and write
135D000
trusted library allocation
page execute and read and write
ABAE000
stack
page read and write
3054000
trusted library allocation
page read and write
10F0000
trusted library allocation
page read and write
1758000
trusted library allocation
page read and write
315E000
unkown
page read and write
1020000
heap
page read and write
5DD1000
trusted library allocation
page read and write
56DE000
trusted library allocation
page read and write
30FB000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
3353000
heap
page read and write
3302000
trusted library allocation
page read and write
58A3000
heap
page read and write
31E0000
heap
page read and write
1C9000
stack
page read and write
54F3000
heap
page read and write
1148000
heap
page read and write
3130000
trusted library allocation
page read and write
1830000
trusted library allocation
page read and write
57A0000
heap
page read and write
4291000
trusted library allocation
page read and write
34A0000
heap
page read and write
13B0000
heap
page read and write
14DE000
stack
page read and write
1387000
trusted library allocation
page execute and read and write
7F6E0000
trusted library allocation
page execute and read and write
50FC000
stack
page read and write
57F0000
trusted library allocation
page read and write
18F0000
heap
page read and write
3755000
trusted library allocation
page read and write
5490000
heap
page read and write
14F7000
stack
page read and write
3B41000
trusted library allocation
page read and write
40E9000
trusted library allocation
page read and write
7DDE000
stack
page read and write
799E000
stack
page read and write
72B7000
heap
page read and write
1353000
trusted library allocation
page execute and read and write
32D1000
trusted library allocation
page read and write
880000
heap
page read and write
35FE000
trusted library allocation
page read and write
136D000
trusted library allocation
page execute and read and write
2FA6000
trusted library allocation
page read and write
18E0000
trusted library allocation
page read and write
1412000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
331F000
stack
page read and write
5C00000
trusted library allocation
page read and write
373F000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
423000
remote allocation
page execute and read and write
3370000
trusted library allocation
page read and write
5E50000
trusted library allocation
page read and write
33B0000
heap
page read and write
6720000
trusted library allocation
page read and write
7626000
heap
page read and write
A46D000
stack
page read and write
A92B000
stack
page read and write
538E000
stack
page read and write
32FD000
trusted library allocation
page read and write
32F1000
trusted library allocation
page read and write
165D000
trusted library allocation
page execute and read and write
183E000
stack
page read and write
56F1000
trusted library allocation
page read and write
4009000
trusted library allocation
page read and write
3110000
heap
page read and write
449000
remote allocation
page execute and read and write
1734000
trusted library allocation
page read and write
151C000
stack
page read and write
5870000
trusted library allocation
page read and write
5E20000
trusted library allocation
page execute and read and write
5753000
heap
page read and write
433000
remote allocation
page execute and read and write
1830000
heap
page read and write
10CE000
stack
page read and write
5F20000
trusted library allocation
page read and write
762C000
heap
page read and write
16EE000
stack
page read and write
38E1000
trusted library allocation
page read and write
151A000
heap
page read and write
2D7D000
stack
page read and write
54F0000
heap
page read and write
33F3000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
1170000
heap
page read and write
1660000
trusted library allocation
page read and write
18CB000
heap
page read and write
30C0000
trusted library allocation
page read and write
181D000
trusted library allocation
page execute and read and write
1650000
trusted library allocation
page read and write
1682000
trusted library allocation
page read and write
6440000
trusted library allocation
page execute and read and write
424D000
trusted library allocation
page read and write
5878000
trusted library allocation
page read and write
5A3E000
stack
page read and write
CAA000
stack
page read and write
5C20000
heap
page read and write
5950000
heap
page read and write
5875000
trusted library allocation
page read and write
453D000
trusted library allocation
page read and write
5AE0000
heap
page read and write
113A000
trusted library allocation
page execute and read and write
5E00000
trusted library allocation
page read and write
1390000
heap
page read and write
1440000
heap
page read and write
42C3000
trusted library allocation
page read and write
5B5E000
stack
page read and write
1376000
trusted library allocation
page execute and read and write
324C000
stack
page read and write
5A9E000
stack
page read and write
1814000
trusted library allocation
page read and write
5DAB000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
3120000
trusted library allocation
page read and write
B090000
heap
page read and write
1653000
trusted library allocation
page execute and read and write
1870000
trusted library allocation
page execute and read and write
14DA000
heap
page read and write
1860000
heap
page read and write
60E000
stack
page read and write
5680000
heap
page execute and read and write
185A000
heap
page read and write
AA6D000
stack
page read and write
1549000
heap
page read and write
5750000
heap
page read and write
1440000
heap
page read and write
1110000
trusted library allocation
page read and write
1183000
heap
page read and write
319F000
unkown
page read and write
31A8000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
44F1000
trusted library allocation
page read and write
5D0E000
stack
page read and write
54E0000
trusted library allocation
page read and write
3442000
trusted library allocation
page read and write
B08D000
stack
page read and write
5640000
trusted library allocation
page execute and read and write
5F42000
trusted library allocation
page read and write
42B1000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
7510000
trusted library allocation
page read and write
1832000
trusted library allocation
page read and write
1354000
trusted library allocation
page read and write
7EF00000
trusted library allocation
page execute and read and write
54C0000
heap
page read and write
1654000
trusted library allocation
page read and write
1640000
heap
page read and write
750E000
stack
page read and write
5440000
trusted library allocation
page read and write
2FF0000
heap
page execute and read and write
5AF8000
heap
page read and write
2FC0000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
B79E000
stack
page read and write
1880000
heap
page read and write
1552000
trusted library allocation
page read and write
88DE000
stack
page read and write
13C5000
heap
page read and write
1515000
heap
page read and write
18D0000
trusted library allocation
page read and write
5DC2000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
840E000
stack
page read and write
B75C000
stack
page read and write
5930000
trusted library allocation
page read and write
1460000
heap
page read and write
3001000
trusted library allocation
page read and write
1842000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
30ED000
trusted library allocation
page read and write
5DB6000
trusted library allocation
page read and write
56DB000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page read and write
154D000
trusted library allocation
page read and write
378E000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
190E000
heap
page read and write
59C0000
heap
page read and write
1840000
heap
page read and write
14B8000
heap
page read and write
5A40000
trusted library allocation
page read and write
426D000
trusted library allocation
page read and write
7600000
heap
page read and write
66D0000
trusted library allocation
page execute and read and write
5941000
trusted library allocation
page read and write
312A000
trusted library allocation
page read and write
56AB000
stack
page read and write
30E6000
trusted library allocation
page read and write
5BFE000
trusted library allocation
page read and write
1382000
trusted library allocation
page read and write
1800000
trusted library allocation
page read and write
57C0000
trusted library allocation
page execute and read and write
166D000
trusted library allocation
page execute and read and write
16F0000
trusted library allocation
page execute and read and write
5BAE000
stack
page read and write
1120000
trusted library allocation
page read and write
11E0000
heap
page read and write
5A45000
trusted library allocation
page read and write
153E000
trusted library allocation
page read and write
A26D000
stack
page read and write
7D9E000
stack
page read and write
13EE000
stack
page read and write
5E10000
trusted library allocation
page read and write
815F000
stack
page read and write
1687000
trusted library allocation
page execute and read and write
4001000
trusted library allocation
page read and write
44FF000
trusted library allocation
page read and write
58EE000
stack
page read and write
3350000
heap
page read and write
7C2E000
stack
page read and write
1136000
trusted library allocation
page execute and read and write
112D000
trusted library allocation
page execute and read and write
5600000
heap
page read and write
327C000
stack
page read and write
71E0000
trusted library allocation
page read and write
37F5000
trusted library allocation
page read and write
510000
heap
page read and write
58A0000
heap
page read and write
42AF000
trusted library allocation
page read and write
67B000
heap
page read and write
163F000
stack
page read and write
432000
remote allocation
page execute and read and write
1372000
trusted library allocation
page read and write
39B5000
trusted library allocation
page read and write
5620000
heap
page read and write
12C5000
heap
page read and write
5800000
trusted library allocation
page read and write
1838000
heap
page read and write
1685000
trusted library allocation
page execute and read and write
773E000
stack
page read and write
11BE000
stack
page read and write
1481000
heap
page read and write
34F1000
trusted library allocation
page read and write
55FB000
stack
page read and write
64B0000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
30FF000
trusted library allocation
page read and write
AA2C000
stack
page read and write
409E000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
5BF5000
trusted library allocation
page read and write
A470000
heap
page read and write
6410000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
5A90000
trusted library allocation
page read and write
A2AE000
stack
page read and write
56EE000
trusted library allocation
page read and write
1645000
heap
page read and write
1114000
trusted library allocation
page read and write
B40D000
stack
page read and write
7646000
trusted library allocation
page read and write
140E000
stack
page read and write
36B7000
trusted library allocation
page read and write
36F0000
trusted library allocation
page read and write
3330000
trusted library allocation
page read and write
5B3B000
heap
page read and write
5BEE000
stack
page read and write
3917000
trusted library allocation
page read and write
3291000
trusted library allocation
page read and write
4511000
trusted library allocation
page read and write
7060000
heap
page read and write
740E000
stack
page read and write
7F1E000
stack
page read and write
7D2E000
stack
page read and write
1586000
heap
page read and write
30C4000
trusted library allocation
page read and write
57C0000
heap
page read and write
5810000
heap
page execute and read and write
3AA3000
trusted library allocation
page read and write
1490000
heap
page read and write
592E000
stack
page read and write
5D9E000
stack
page read and write
5AC1000
trusted library allocation
page read and write
3A03000
trusted library allocation
page read and write
5C5E000
stack
page read and write
33C0000
heap
page read and write
42DA000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
CD0000
unkown
page readonly
5480000
trusted library allocation
page read and write
B2CD000
stack
page read and write
5DDA000
trusted library allocation
page read and write
5A50000
heap
page execute and read and write
32D6000
trusted library allocation
page read and write
357C000
trusted library allocation
page read and write
424000
remote allocation
page execute and read and write
5FD0000
trusted library allocation
page read and write
7EE40000
trusted library allocation
page execute and read and write
1080000
heap
page read and write
5E1E000
stack
page read and write
36A2000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
319E000
stack
page read and write
5A30000
trusted library allocation
page execute and read and write
352E000
trusted library allocation
page read and write
64D0000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
32D4000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
1100000
heap
page read and write
1430000
trusted library allocation
page execute and read and write
56F6000
trusted library allocation
page read and write
2FCA000
trusted library allocation
page read and write
5A48000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
66E0000
trusted library allocation
page execute and read and write
382B000
trusted library allocation
page read and write
CD2000
unkown
page readonly
2FA0000
trusted library allocation
page read and write
435000
remote allocation
page execute and read and write
5DE5000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
2DBA000
stack
page read and write
314B000
trusted library allocation
page read and write
72A0000
heap
page read and write
16A0000
trusted library allocation
page read and write
1340000
heap
page read and write
32F6000
trusted library allocation
page read and write
5AD0000
heap
page read and write
1847000
trusted library allocation
page execute and read and write
5880000
heap
page read and write
32C0000
heap
page execute and read and write
30F2000
trusted library allocation
page read and write
6710000
trusted library allocation
page execute and read and write
7650000
trusted library allocation
page read and write
64A0000
trusted library allocation
page read and write
668F000
stack
page read and write
1480000
trusted library allocation
page read and write
57B2000
trusted library allocation
page read and write
11E7000
heap
page read and write
5C9E000
stack
page read and write
57C5000
heap
page read and write
5DEB000
trusted library allocation
page read and write
41C0000
trusted library allocation
page read and write
2FA4000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
B50E000
stack
page read and write
2F08000
trusted library allocation
page read and write
434000
remote allocation
page execute and read and write
3100000
trusted library allocation
page read and write
1630000
trusted library allocation
page read and write
670000
heap
page read and write
5620000
heap
page read and write
32DE000
trusted library allocation
page read and write
64F0000
heap
page read and write
762F000
heap
page read and write
1086000
heap
page read and write
775E000
stack
page read and write
587E000
stack
page read and write
5735000
trusted library allocation
page read and write
1917000
heap
page read and write
184E000
heap
page read and write
6730000
trusted library allocation
page read and write
5946000
trusted library allocation
page read and write
5DEE000
trusted library allocation
page read and write
5F60000
trusted library allocation
page read and write
34DF000
trusted library allocation
page read and write
1160000
heap
page read and write
429F000
trusted library allocation
page read and write
1524000
trusted library allocation
page read and write
1740000
heap
page read and write
34E0000
heap
page execute and read and write
420000
remote allocation
page execute and read and write
5710000
trusted library allocation
page read and write
ACAF000
stack
page read and write
30B0000
trusted library allocation
page read and write
457E000
trusted library allocation
page read and write
447000
remote allocation
page execute and read and write
31DE000
stack
page read and write
1132000
trusted library allocation
page read and write
B89E000
stack
page read and write
38C9000
trusted library allocation
page read and write
64F000
stack
page read and write
1140000
heap
page read and write
8710000
trusted library section
page read and write
3280000
heap
page execute and read and write
448000
remote allocation
page execute and read and write
30CB000
trusted library allocation
page read and write
5F51000
trusted library allocation
page read and write
5770000
heap
page read and write
AE8D000
stack
page read and write
5630000
heap
page read and write
5A4A000
trusted library allocation
page read and write
184B000
trusted library allocation
page execute and read and write
30E1000
trusted library allocation
page read and write
1260000
heap
page read and write
1470000
trusted library allocation
page execute and read and write
3668000
trusted library allocation
page read and write
B3CE000
stack
page read and write
A7AF000
stack
page read and write
168B000
trusted library allocation
page execute and read and write
42D1000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
31EA000
heap
page read and write
12F7000
stack
page read and write
13C0000
heap
page read and write
3A55000
trusted library allocation
page read and write
3318000
trusted library allocation
page read and write
DA7000
stack
page read and write
5930000
heap
page read and write
5C10000
trusted library allocation
page read and write
1810000
trusted library allocation
page read and write
58E000
unkown
page read and write
789E000
stack
page read and write
7EF60000
trusted library allocation
page execute and read and write
421000
remote allocation
page execute and read and write
18D000
stack
page read and write
1546000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
37A3000
trusted library allocation
page read and write
14B0000
heap
page read and write
5B03000
heap
page read and write
B65C000
stack
page read and write
1370000
trusted library allocation
page read and write
87DE000
stack
page read and write
1010000
heap
page read and write
5714000
trusted library allocation
page read and write
183A000
trusted library allocation
page execute and read and write
34D0000
trusted library allocation
page read and write
5F70000
trusted library allocation
page execute and read and write
1867000
heap
page read and write
16AE000
stack
page read and write
56E2000
trusted library allocation
page read and write
11B7000
heap
page read and write
AB6E000
stack
page read and write
3325000
trusted library allocation
page read and write
3100000
heap
page read and write
3892000
trusted library allocation
page read and write
6430000
trusted library allocation
page read and write
41F000
remote allocation
page execute and read and write
4162000
trusted library allocation
page read and write
361A000
trusted library allocation
page read and write
3843000
trusted library allocation
page read and write
35CB000
trusted library allocation
page read and write
A66E000
stack
page read and write
173E000
stack
page read and write
5890000
heap
page read and write
13A0000
trusted library allocation
page read and write
5DCE000
trusted library allocation
page read and write
6420000
trusted library allocation
page read and write
42B4000
trusted library allocation
page read and write
1176000
heap
page read and write
805D000
stack
page read and write
760A000
heap
page read and write
34CE000
stack
page read and write
1672000
trusted library allocation
page read and write
111D000
trusted library allocation
page execute and read and write
1594000
heap
page read and write
5605000
heap
page read and write
3018000
trusted library allocation
page read and write
144E000
heap
page read and write
5640000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
30DE000
trusted library allocation
page read and write
7EDE000
stack
page read and write
11C0000
heap
page read and write
14E8000
heap
page read and write
5FA0000
trusted library allocation
page read and write
32DB000
trusted library allocation
page read and write
1676000
trusted library allocation
page execute and read and write
182D000
trusted library allocation
page execute and read and write
54D0000
trusted library allocation
page execute and read and write
5DE2000
trusted library allocation
page read and write
56D6000
trusted library allocation
page read and write
B28F000
stack
page read and write
5630000
trusted library allocation
page execute and read and write
5F36000
trusted library allocation
page read and write
4134000
trusted library allocation
page read and write
1520000
trusted library allocation
page read and write
32D0000
trusted library allocation
page read and write
5F5A000
trusted library allocation
page read and write
5BF0000
trusted library allocation
page read and write
1476000
heap
page read and write
12C0000
heap
page read and write
5790000
trusted library allocation
page execute and read and write
5A7E000
stack
page read and write
5FC0000
trusted library allocation
page read and write
1670000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
130E000
stack
page read and write
5BD0000
heap
page read and write
55EE000
stack
page read and write
1417000
trusted library allocation
page execute and read and write
1541000
trusted library allocation
page read and write
7770000
trusted library allocation
page execute and read and write
167A000
trusted library allocation
page execute and read and write
3966000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
There are 587 hidden memdumps, click here to show them.