IOC Report
REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe

loading gif

Files

File Path
Type
Category
Malicious
REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\overfertility\bankrupture.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bankrupture.vbs
data
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Lymnaeidae
data
dropped
C:\Users\user\AppData\Local\Temp\places.raw
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp920.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp930.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp960.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tmp980.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp9B0.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA5D.tmp.dat
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA6E.tmp.dat
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpB1B.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpB2B.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpB3C.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpB4C.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
modified
C:\Users\user\AppData\Roaming\MyData\DataLogs.conf
ASCII text
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe
"C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe"
malicious
C:\Users\user\AppData\Local\overfertility\bankrupture.exe
"C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bankrupture.vbs"
malicious
C:\Users\user\AppData\Local\overfertility\bankrupture.exe
"C:\Users\user\AppData\Local\overfertility\bankrupture.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\overfertility\bankrupture.exe"
malicious

URLs

Name
IP
Malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://github.com/LimerBoy/StormKitty0&eq
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/LimerBoy/StormKitty
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.nuget.org/packages/Newtonsoft.Json.Bson
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.mozilla.org
unknown
https://urn.to/r/sds_see
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://james.newtonking.com/projects/json
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
84.201.210.34

IPs

IP
Domain
Country
Malicious
72.11.142.133
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum
Version
HKEY_CURRENT_USER\SOFTWARE\265E40EC64F931A846A9
BEA19E2DECE602CED1D3DF8C825A993F3D412C2A4D4D87EAA39F44BA4FB39E82

Memdumps

Base Address
Regiontype
Protect
Malicious
3640000
direct allocation
page read and write
malicious
2CE8000
trusted library allocation
page read and write
malicious
1E2000
system
page execute and read and write
malicious
2AE3000
trusted library allocation
page read and write
malicious
7190000
trusted library section
page read and write
malicious
3F40000
direct allocation
page read and write
malicious
3D4B000
heap
page read and write
8EE000
stack
page read and write
673E000
stack
page read and write
4FDD000
trusted library allocation
page read and write
3C64000
heap
page read and write
3D4B000
heap
page read and write
3BC4000
heap
page read and write
17CF000
stack
page read and write
70F0000
trusted library allocation
page read and write
3DA1000
heap
page read and write
2EC5000
heap
page read and write
8EE000
stack
page read and write
42A9000
direct allocation
page read and write
4FBE000
trusted library allocation
page read and write
25F5000
trusted library allocation
page read and write
9A000
stack
page read and write
258E000
trusted library allocation
page read and write
3CAC000
heap
page read and write
3DE9000
heap
page read and write
65E000
stack
page read and write
2B75000
trusted library allocation
page read and write
4120000
direct allocation
page read and write
2CDF000
trusted library allocation
page read and write
2B94000
trusted library allocation
page read and write
3DA1000
heap
page read and write
3DA0000
heap
page read and write
2ED0000
heap
page read and write
8ED000
stack
page read and write
3DA1000
heap
page read and write
A12000
heap
page read and write
50B9000
heap
page read and write
3B5A000
trusted library allocation
page read and write
8A4000
stack
page read and write
3D03000
heap
page read and write
A30000
heap
page read and write
401000
unkown
page execute read
3DE9000
heap
page read and write
482000
unkown
page readonly
3DE9000
heap
page read and write
3720000
heap
page read and write
C22000
heap
page read and write
3C9F000
heap
page read and write
3FE0000
direct allocation
page read and write
3C64000
heap
page read and write
3DA0000
heap
page read and write
3C02000
heap
page read and write
3DA0000
heap
page read and write
5138000
heap
page read and write
429E000
direct allocation
page read and write
3DA1000
heap
page read and write
3CD6000
heap
page read and write
88F000
stack
page read and write
3DE9000
heap
page read and write
42AD000
direct allocation
page read and write
431E000
direct allocation
page read and write
3D03000
heap
page read and write
2FB9000
trusted library allocation
page read and write
9AE000
stack
page read and write
25E9000
trusted library allocation
page read and write
16E596B5000
heap
page read and write
4B1E000
stack
page read and write
40A3000
direct allocation
page read and write
3DA1000
heap
page read and write
3F80000
direct allocation
page read and write
2340000
heap
page read and write
4FB4000
trusted library allocation
page read and write
3AB1000
trusted library allocation
page read and write
BDE000
stack
page read and write
9A8000
heap
page read and write
3DA1000
heap
page read and write
83B000
trusted library allocation
page execute and read and write
2536000
trusted library allocation
page read and write
65DE000
stack
page read and write
3DE9000
heap
page read and write
735000
heap
page read and write
1E0000
heap
page read and write
4A7000
unkown
page read and write
3CAC000
heap
page read and write
4120000
direct allocation
page read and write
3AC8000
trusted library allocation
page read and write
62EA000
heap
page read and write
16E59376000
heap
page read and write
3DA1000
heap
page read and write
541E000
stack
page read and write
7094000
trusted library allocation
page read and write
C10000
heap
page read and write
400000
unkown
page readonly
9A0000
heap
page read and write
4FD1000
trusted library allocation
page read and write
2564000
trusted library allocation
page read and write
3BEB000
heap
page read and write
3C00000
heap
page read and write
9E8000
heap
page read and write
10FD000
stack
page read and write
422D000
direct allocation
page read and write
2598000
trusted library allocation
page read and write
3B8D000
heap
page read and write
55BE000
stack
page read and write
16E596BC000
heap
page read and write
255E000
trusted library allocation
page read and write
940000
heap
page read and write
69FE000
stack
page read and write
3C63000
heap
page read and write
7040000
trusted library allocation
page read and write
3C64000
heap
page read and write
25D0000
trusted library allocation
page read and write
24E9000
trusted library allocation
page read and write
4905000
trusted library allocation
page read and write
25B1000
trusted library allocation
page read and write
520000
heap
page read and write
110000
heap
page read and write
24FA000
trusted library allocation
page read and write
42AD000
direct allocation
page read and write
4910000
trusted library allocation
page read and write
D5000
heap
page read and write
70D0000
trusted library allocation
page execute and read and write
4990000
heap
page read and write
C70000
heap
page read and write
3B2F000
trusted library allocation
page read and write
975000
heap
page read and write
431E000
direct allocation
page read and write
3DC5000
heap
page read and write
429E000
direct allocation
page read and write
C9F000
heap
page read and write
3D03000
heap
page read and write
2581000
trusted library allocation
page read and write
3F60000
direct allocation
page read and write
3D02000
heap
page read and write
1F0000
heap
page read and write
3CAC000
heap
page read and write
3638000
heap
page read and write
822000
trusted library allocation
page read and write
4FBB000
trusted library allocation
page read and write
BFE000
heap
page read and write
3D3F000
heap
page read and write
677E000
stack
page read and write
3DE9000
heap
page read and write
3DE9000
heap
page read and write
2604000
trusted library allocation
page read and write
4083000
direct allocation
page read and write
3D4B000
heap
page read and write
3CAC000
heap
page read and write
257B000
trusted library allocation
page read and write
9D0000
heap
page read and write
2594000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
2504000
trusted library allocation
page read and write
3C90000
heap
page read and write
22A8000
trusted library allocation
page read and write
374E000
stack
page read and write
3DA1000
heap
page read and write
525000
heap
page read and write
930000
heap
page read and write
9F7000
heap
page read and write
3000000
heap
page read and write
1392BFE000
stack
page read and write
3E90000
heap
page read and write
3C28000
heap
page read and write
3DE9000
heap
page read and write
482000
unkown
page readonly
3ADC000
trusted library allocation
page read and write
89F000
stack
page read and write
4916000
trusted library allocation
page read and write
246E000
stack
page read and write
6A7C000
stack
page read and write
401000
unkown
page execute read
82A000
trusted library allocation
page execute and read and write
252E000
trusted library allocation
page read and write
4120000
direct allocation
page read and write
3DE9000
heap
page read and write
253C000
trusted library allocation
page read and write
3B99000
heap
page read and write
9A000
stack
page read and write
626A000
heap
page read and write
2FF0000
direct allocation
page read and write
6DFE000
stack
page read and write
3BF0000
heap
page read and write
FF7000
heap
page read and write
3B27000
trusted library allocation
page read and write
431E000
direct allocation
page read and write
C88000
heap
page read and write
9E5000
heap
page read and write
3B7D000
trusted library allocation
page read and write
16E59310000
heap
page read and write
3C8A000
heap
page read and write
5DC0000
heap
page read and write
400000
unkown
page readonly
5053000
heap
page read and write
490000
unkown
page write copy
7000000
trusted library allocation
page execute and read and write
2C15000
trusted library allocation
page read and write
3D02000
heap
page read and write
2E08000
heap
page read and write
3D4B000
heap
page read and write
3C63000
heap
page read and write
3C38000
heap
page read and write
25CE000
trusted library allocation
page read and write
3D03000
heap
page read and write
9A9000
stack
page read and write
482000
unkown
page readonly
5156000
heap
page read and write
3DE9000
heap
page read and write
4249000
direct allocation
page read and write
424D000
direct allocation
page read and write
529E000
stack
page read and write
2F00000
heap
page read and write
4AB000
unkown
page readonly
4FB0000
trusted library allocation
page read and write
3104000
direct allocation
page read and write
3DA1000
heap
page read and write
17EF000
stack
page read and write
388E000
stack
page read and write
960000
heap
page read and write
C6E000
stack
page read and write
3DA1000
heap
page read and write
400000
unkown
page readonly
40A3000
direct allocation
page read and write
3C8E000
heap
page execute and read and write
401000
unkown
page execute read
3D4B000
heap
page read and write
3DE9000
heap
page read and write
3DE9000
heap
page read and write
42BE000
direct allocation
page read and write
255A000
trusted library allocation
page read and write
24EB000
trusted library allocation
page read and write
70B0000
trusted library allocation
page read and write
42A9000
direct allocation
page read and write
3DA1000
heap
page read and write
62CF000
heap
page read and write
FF0000
heap
page read and write
7080000
heap
page read and write
9FF000
stack
page read and write
3C64000
heap
page read and write
25BB000
trusted library allocation
page read and write
3DA1000
heap
page read and write
5570000
trusted library allocation
page read and write
3C62000
heap
page read and write
28B0000
trusted library allocation
page read and write
3D02000
heap
page read and write
3FE0000
direct allocation
page read and write
1295000
heap
page read and write
3BF4000
heap
page read and write
3D4B000
heap
page read and write
6590000
trusted library allocation
page execute and read and write
3CAC000
heap
page read and write
8A4000
stack
page read and write
3D28000
heap
page read and write
72E0000
trusted library allocation
page execute and read and write
5050000
heap
page read and write
2B7A000
trusted library allocation
page read and write
3C64000
heap
page read and write
13923FE000
stack
page read and write
C16000
heap
page read and write
25EB000
trusted library allocation
page read and write
3DA0000
heap
page read and write
71E000
heap
page read and write
970000
heap
page read and write
4103000
direct allocation
page read and write
3C64000
heap
page read and write
413000
system
page execute and read and write
2500000
trusted library allocation
page read and write
3B3C000
trusted library allocation
page read and write
456E000
stack
page read and write
7100000
trusted library allocation
page execute and read and write
C80000
heap
page read and write
3C8A000
heap
page read and write
3C64000
heap
page read and write
3C63000
heap
page read and write
3D03000
heap
page read and write
A12000
heap
page read and write
3C64000
heap
page read and write
2B8C000
trusted library allocation
page read and write
660000
heap
page read and write
25B5000
trusted library allocation
page read and write
53DE000
stack
page read and write
A10000
heap
page read and write
2508000
trusted library allocation
page read and write
860000
heap
page execute and read and write
3B4F000
stack
page read and write
2EC0000
heap
page read and write
61EF000
stack
page read and write
827000
trusted library allocation
page execute and read and write
25B3000
trusted library allocation
page read and write
2CE1000
trusted library allocation
page read and write
623A000
heap
page read and write
3CAC000
heap
page read and write
2970000
trusted library allocation
page execute and read and write
88F000
stack
page read and write
A66000
heap
page read and write
4103000
direct allocation
page read and write
3CCC000
heap
page read and write
25D4000
trusted library allocation
page read and write
25BD000
trusted library allocation
page read and write
3C38000
heap
page read and write
3D03000
heap
page read and write
A00000
heap
page read and write
5ED0000
heap
page read and write
3D03000
heap
page read and write
3ACE000
trusted library allocation
page read and write
5577000
trusted library allocation
page read and write
16E596B0000
heap
page read and write
3FE0000
direct allocation
page read and write
4249000
direct allocation
page read and write
551E000
stack
page read and write
3DA1000
heap
page read and write
4FCE000
trusted library allocation
page read and write
3CA2000
heap
page read and write
3C93000
heap
page read and write
3B4B000
trusted library allocation
page read and write
42AD000
direct allocation
page read and write
482000
unkown
page readonly
3DE9000
heap
page read and write
70AE000
trusted library allocation
page read and write
13924FE000
stack
page read and write
42AD000
direct allocation
page read and write
400000
unkown
page readonly
540000
heap
page read and write
61F5000
heap
page read and write
6FC0000
trusted library allocation
page execute and read and write
803000
trusted library allocation
page execute and read and write
6266000
heap
page read and write
24EF000
trusted library allocation
page read and write
3DA1000
heap
page read and write
296C000
stack
page read and write
2B86000
trusted library allocation
page read and write
3DA1000
heap
page read and write
260C000
trusted library allocation
page read and write
4C2E000
stack
page read and write
1E0000
system
page execute and read and write
2AE1000
trusted library allocation
page read and write
3DE9000
heap
page read and write
2602000
trusted library allocation
page read and write
B40000
heap
page read and write
431E000
direct allocation
page read and write
3DE9000
heap
page read and write
708000
heap
page read and write
3D4B000
heap
page read and write
42BE000
direct allocation
page read and write
3DE9000
heap
page read and write
2A8E000
stack
page read and write
490000
unkown
page read and write
6E0000
trusted library allocation
page read and write
FED000
trusted library allocation
page execute and read and write
3DE9000
heap
page read and write
2B8E000
trusted library allocation
page read and write
4A78000
heap
page read and write
C13000
heap
page read and write
3D03000
heap
page read and write
28C0000
trusted library allocation
page read and write
3DA1000
heap
page read and write
2B92000
trusted library allocation
page read and write
2F84000
heap
page read and write
3C8F000
stack
page read and write
72D0000
trusted library allocation
page read and write
48B0000
trusted library allocation
page execute and read and write
3DE9000
heap
page read and write
424D000
direct allocation
page read and write
3D50000
heap
page read and write
3FE0000
direct allocation
page read and write
4AB000
unkown
page readonly
123E000
stack
page read and write
3C74000
heap
page read and write
3AB8000
trusted library allocation
page read and write
3B68000
trusted library allocation
page read and write
100000
heap
page read and write
BFA000
heap
page read and write
260F000
trusted library allocation
page read and write
400000
unkown
page readonly
3037000
heap
page read and write
292E000
stack
page read and write
2A90000
heap
page read and write
2C1C000
trusted library allocation
page read and write
3DA1000
heap
page read and write
257D000
trusted library allocation
page read and write
3C02000
heap
page read and write
2360000
heap
page read and write
3B65000
trusted library allocation
page read and write
401000
unkown
page execute read
3CAC000
heap
page read and write
250C000
trusted library allocation
page read and write
3B53000
trusted library allocation
page read and write
4FD6000
trusted library allocation
page read and write
6CBE000
stack
page read and write
3F60000
direct allocation
page read and write
3D13000
heap
page read and write
89F000
stack
page read and write
16E59300000
heap
page read and write
28A0000
trusted library allocation
page read and write
13926FF000
stack
page read and write
4AB000
unkown
page readonly
3DA1000
heap
page read and write
2B90000
trusted library allocation
page read and write
3C63000
heap
page read and write
FE4000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
3B4D000
trusted library allocation
page read and write
3D13000
heap
page read and write
3DE9000
heap
page read and write
3DE9000
heap
page read and write
11E0000
heap
page read and write
3DE9000
heap
page read and write
3DA1000
heap
page read and write
4180000
direct allocation
page read and write
401000
unkown
page execute read
100000
heap
page read and write
C59000
heap
page read and write
4FE2000
trusted library allocation
page read and write
810000
trusted library allocation
page read and write
3D4B000
heap
page read and write
6FB0000
trusted library allocation
page read and write
42A9000
direct allocation
page read and write
3DE9000
heap
page read and write
3D4B000
heap
page read and write
3DE9000
heap
page read and write
429E000
direct allocation
page read and write
BF0000
heap
page read and write
3CAC000
heap
page read and write
3B3F000
trusted library allocation
page read and write
3144000
heap
page read and write
49A0000
heap
page read and write
8AA000
stack
page read and write
48C0000
trusted library allocation
page read and write
3D35000
heap
page read and write
2521000
trusted library allocation
page read and write
9F8000
heap
page read and write
2527000
trusted library allocation
page read and write
92E000
stack
page read and write
25AB000
trusted library allocation
page read and write
3D03000
heap
page read and write
3DA1000
heap
page read and write
1392AFE000
stack
page read and write
738000
heap
page read and write
3DE9000
heap
page read and write
3DE9000
heap
page read and write
9C0000
heap
page read and write
25D6000
trusted library allocation
page read and write
401000
unkown
page execute read
5EC0000
trusted library allocation
page execute and read and write
3DA1000
heap
page read and write
13EE000
stack
page read and write
4F6F000
stack
page read and write
4180000
direct allocation
page read and write
2502000
trusted library allocation
page read and write
3B35000
trusted library allocation
page read and write
25ED000
trusted library allocation
page read and write
42A9000
direct allocation
page read and write
3DE9000
heap
page read and write
257F000
trusted library allocation
page read and write
490000
unkown
page read and write
BDA000
heap
page read and write
2506000
trusted library allocation
page read and write
2B89000
trusted library allocation
page read and write
3D28000
heap
page read and write
3477000
trusted library allocation
page read and write
25DA000
trusted library allocation
page read and write
42A9000
direct allocation
page read and write
431E000
direct allocation
page read and write
3DA1000
heap
page read and write
9E0000
heap
page read and write
422D000
direct allocation
page read and write
92E000
stack
page read and write
490000
unkown
page read and write
C1B000
heap
page read and write
55C0000
trusted library allocation
page read and write
4103000
direct allocation
page read and write
3FE0000
direct allocation
page read and write
3070000
direct allocation
page read and write
3BC3000
heap
page read and write
2B82000
trusted library allocation
page read and write
4180000
direct allocation
page read and write
2562000
trusted library allocation
page read and write
2608000
trusted library allocation
page read and write
C2B000
heap
page read and write
F8E000
stack
page read and write
4FB6000
trusted library allocation
page read and write
4229000
direct allocation
page read and write
40A3000
direct allocation
page read and write
3CB1000
heap
page read and write
C29000
heap
page read and write
C0B000
heap
page read and write
194F000
stack
page read and write
3C8A000
heap
page read and write
258C000
trusted library allocation
page read and write
28C5000
trusted library allocation
page execute and read and write
4F9000
stack
page read and write
25E1000
trusted library allocation
page read and write
3DE9000
heap
page read and write
4A7000
unkown
page read and write
3C64000
heap
page read and write
980000
heap
page read and write
3BEF000
stack
page read and write
7090000
trusted library allocation
page read and write
72F0000
trusted library allocation
page execute and read and write
3DA1000
heap
page read and write
3D02000
heap
page read and write
4A7000
unkown
page read and write
6B7E000
stack
page read and write
1392CFB000
stack
page read and write
13929FE000
stack
page read and write
700000
heap
page read and write
42A9000
direct allocation
page read and write
5004000
trusted library allocation
page read and write
61F8000
heap
page read and write
9A000
stack
page read and write
490000
unkown
page write copy
25F3000
trusted library allocation
page read and write
3F80000
direct allocation
page read and write
F4E000
stack
page read and write
3BF0000
heap
page read and write
6FF0000
trusted library allocation
page execute and read and write
2FB5000
trusted library allocation
page read and write
3C14000
heap
page read and write
3BEF000
heap
page execute and read and write
4FF0000
heap
page execute and read and write
4100000
direct allocation
page read and write
5000000
trusted library allocation
page read and write
2592000
trusted library allocation
page read and write
3774000
heap
page read and write
16E59650000
heap
page read and write
69BD000
stack
page read and write
4083000
direct allocation
page read and write
482000
unkown
page readonly
C29000
heap
page read and write
3D30000
heap
page execute and read and write
2566000
trusted library allocation
page read and write
253E000
trusted library allocation
page read and write
5010000
trusted library allocation
page read and write
3D03000
heap
page read and write
3DE9000
heap
page read and write
3DA1000
heap
page read and write
28CB000
trusted library allocation
page execute and read and write
6BBC000
stack
page read and write
2AA3000
trusted library allocation
page read and write
89F000
stack
page read and write
D0000
heap
page read and write
4AB000
unkown
page readonly
A2E000
stack
page read and write
3DE9000
heap
page read and write
687E000
stack
page read and write
4FF3000
heap
page execute and read and write
3CAC000
heap
page read and write
68BC000
stack
page read and write
16E59340000
heap
page read and write
6580000
heap
page execute and read and write
3FE0000
direct allocation
page read and write
28C7000
trusted library allocation
page execute and read and write
FD0000
trusted library allocation
page read and write
A05000
heap
page read and write
28AD000
trusted library allocation
page execute and read and write
3DA1000
heap
page read and write
3C64000
heap
page read and write
4FC2000
trusted library allocation
page read and write
250A000
trusted library allocation
page read and write
3C63000
heap
page read and write
4B20000
heap
page execute and read and write
13CE000
stack
page read and write
3D03000
heap
page read and write
1E0000
heap
page read and write
3DA1000
heap
page read and write
3AD1000
trusted library allocation
page read and write
3DE9000
heap
page read and write
5DBD000
stack
page read and write
3B48000
trusted library allocation
page read and write
6540000
trusted library allocation
page read and write
28B2000
trusted library allocation
page read and write
3CA1000
heap
page read and write
4180000
direct allocation
page read and write
4180000
direct allocation
page read and write
AFF000
stack
page read and write
3C63000
heap
page read and write
8EE000
stack
page read and write
4083000
direct allocation
page read and write
52DC000
stack
page read and write
422D000
direct allocation
page read and write
6FD0000
trusted library allocation
page read and write
2B77000
trusted library allocation
page read and write
1340000
heap
page read and write
9C4000
heap
page read and write
2579000
trusted library allocation
page read and write
2CE3000
trusted library allocation
page read and write
48D4000
trusted library allocation
page read and write
3CAC000
heap
page read and write
3DA1000
heap
page read and write
2B7F000
trusted library allocation
page read and write
3471000
trusted library allocation
page read and write
37BB000
heap
page read and write
11DF000
stack
page read and write
2471000
trusted library allocation
page read and write
C11000
heap
page read and write
8A4000
stack
page read and write
25B9000
trusted library allocation
page read and write
13928F7000
stack
page read and write
A0C000
heap
page read and write
25BF000
trusted library allocation
page read and write
252A000
trusted library allocation
page read and write
9F0000
heap
page read and write
25A7000
trusted library allocation
page read and write
3DE9000
heap
page read and write
6AE000
stack
page read and write
6FE0000
trusted library allocation
page read and write
251B000
trusted library allocation
page read and write
3F80000
direct allocation
page read and write
2538000
trusted library allocation
page read and write
16E596BE000
heap
page read and write
28BA000
trusted library allocation
page execute and read and write
4E6E000
stack
page read and write
42AD000
direct allocation
page read and write
C29000
heap
page read and write
1290000
heap
page read and write
4AB000
unkown
page readonly
2F70000
heap
page read and write
4103000
direct allocation
page read and write
3ABE000
trusted library allocation
page read and write
804000
trusted library allocation
page read and write
28B6000
trusted library allocation
page execute and read and write
3B75000
heap
page read and write
930000
heap
page read and write
4F80000
heap
page read and write
3B99000
heap
page read and write
8F0000
heap
page read and write
6A3E000
stack
page read and write
2B84000
trusted library allocation
page read and write
3AA1000
trusted library allocation
page read and write
832000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
7EF90000
trusted library allocation
page execute and read and write
2606000
trusted library allocation
page read and write
25D2000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
9D0000
heap
page read and write
BD0000
heap
page read and write
3C8F000
heap
page read and write
3DA1000
heap
page read and write
4229000
direct allocation
page read and write
4103000
direct allocation
page read and write
3AC5000
trusted library allocation
page read and write
3D03000
heap
page read and write
FE3000
trusted library allocation
page execute and read and write
A79000
heap
page read and write
C22000
heap
page read and write
3BEB000
heap
page read and write
3DE9000
heap
page read and write
3AD6000
trusted library allocation
page read and write
4920000
trusted library allocation
page read and write
3FE0000
direct allocation
page read and write
1348000
heap
page read and write
2540000
trusted library allocation
page read and write
5060000
heap
page read and write
3630000
heap
page read and write
25DC000
trusted library allocation
page read and write
42A9000
direct allocation
page read and write
16E593A6000
heap
page read and write
D40000
heap
page read and write
2560000
trusted library allocation
page read and write
4C3E000
stack
page read and write
4100000
direct allocation
page read and write
5560000
trusted library allocation
page read and write
253A000
trusted library allocation
page read and write
4ADE000
stack
page read and write
4249000
direct allocation
page read and write
2558000
trusted library allocation
page read and write
3DA1000
heap
page read and write
2FA0000
heap
page read and write
2FE0000
heap
page read and write
3004000
heap
page read and write
3D03000
heap
page read and write
CB9000
heap
page read and write
6274000
heap
page read and write
4D2E000
stack
page read and write
4180000
direct allocation
page read and write
5CB9000
stack
page read and write
2FC4000
trusted library allocation
page read and write
3AD4000
trusted library allocation
page read and write
55EF000
trusted library allocation
page read and write
25A9000
trusted library allocation
page read and write
431E000
direct allocation
page read and write
4103000
direct allocation
page read and write
3140000
heap
page read and write
850000
trusted library allocation
page read and write
8AE000
stack
page read and write
2AA1000
trusted library allocation
page read and write
3C64000
heap
page read and write
255C000
trusted library allocation
page read and write
555C000
stack
page read and write
3DA1000
heap
page read and write
3D3F000
heap
page read and write
A09000
heap
page read and write
400000
unkown
page readonly
24F2000
trusted library allocation
page read and write
9BE000
stack
page read and write
13927FE000
stack
page read and write
70A0000
trusted library allocation
page read and write
621E000
heap
page read and write
3DA1000
heap
page read and write
3F60000
direct allocation
page read and write
260A000
trusted library allocation
page read and write
FE0000
trusted library allocation
page read and write
72A000
heap
page read and write
837000
trusted library allocation
page execute and read and write
2600000
trusted library allocation
page read and write
3D02000
heap
page read and write
498E000
stack
page read and write
6210000
heap
page read and write
254B000
trusted library allocation
page read and write
431E000
direct allocation
page read and write
D16000
heap
page read and write
42AD000
direct allocation
page read and write
A60000
heap
page read and write
16E593F9000
heap
page read and write
16E59510000
heap
page read and write
5F10000
heap
page read and write
362E000
stack
page read and write
3AE9000
trusted library allocation
page read and write
4E2E000
stack
page read and write
3B45000
trusted library allocation
page read and write
254E000
trusted library allocation
page read and write
36F0000
heap
page read and write
3DA1000
heap
page read and write
3DE9000
heap
page read and write
FC0000
heap
page read and write
3C64000
heap
page read and write
3D4B000
heap
page read and write
4FA0000
trusted library allocation
page read and write
C08000
heap
page read and write
3B50000
heap
page read and write
4AB000
unkown
page readonly
6570000
heap
page read and write
80D000
trusted library allocation
page execute and read and write
28C2000
trusted library allocation
page read and write
4100000
direct allocation
page read and write
482000
unkown
page readonly
3D3F000
heap
page read and write
CB7000
heap
page read and write
3D4B000
heap
page read and write
1AB000
stack
page read and write
519E000
stack
page read and write
B50000
direct allocation
page read and write
3CA1000
heap
page read and write
3C64000
heap
page read and write
42AD000
direct allocation
page read and write
6CFE000
stack
page read and write
24ED000
trusted library allocation
page read and write
FC6000
heap
page read and write
3DF0000
heap
page read and write
70E0000
trusted library allocation
page read and write
88F000
stack
page read and write
6F0000
heap
page read and write
5F5E000
stack
page read and write
490000
unkown
page write copy
2525000
trusted library allocation
page read and write
4AA8000
trusted library allocation
page read and write
25EF000
trusted library allocation
page read and write
9EE000
stack
page read and write
6FA0000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
C20000
heap
page read and write
4103000
direct allocation
page read and write
93E000
stack
page read and write
2980000
heap
page execute and read and write
424D000
direct allocation
page read and write
3CAC000
heap
page read and write
25B7000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
3DA1000
heap
page read and write
13922FA000
stack
page read and write
42BE000
direct allocation
page read and write
61F0000
heap
page read and write
4229000
direct allocation
page read and write
2523000
trusted library allocation
page read and write
BDE000
heap
page read and write
4180000
direct allocation
page read and write
9E0000
heap
page read and write
3C74000
heap
page read and write
251D000
trusted library allocation
page read and write
37A0000
heap
page read and write
3DA1000
heap
page read and write
There are 772 hidden memdumps, click here to show them.