IOC Report
Urgent inquiry for quotation .exe

loading gif

Files

File Path
Type
Category
Malicious
Urgent inquiry for quotation .exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\directory\name.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\unprickly
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Urgent inquiry for quotation .exe
"C:\Users\user\Desktop\Urgent inquiry for quotation .exe"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\Desktop\Urgent inquiry for quotation .exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\Urgent inquiry for quotation .exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://api.telegram.org
unknown
malicious
https://api.telegram.org/bot
unknown
malicious
https://www.office.com/
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:632922%0D%0ADate%20and%20Time:%2008/10/2024%20/%2013:28:15%0D%0ACountry%20Name:%20United%20States%0D%0A[%20632922%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20]
149.154.167.220
http://microsoft.co
unknown
https://api.telegram.org/bot7323823089:AAFBRsTW94zIpSoDS8yfGsotlQLqF2I6TU0/sendDocument?chat_id=5013
unknown
http://checkip.dyndns.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://mail.vvtrade.vnd
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://api.telegram.org/bot7323823089:AAFBRsTW94zIpSoDS8yfGsotlQLqF2I6TU0/sendDocument?chat_id=5013849544&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery
149.154.167.220
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.96.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
http://varders.kozow.com:8081
unknown
http://aborters.duckdns.org:8081
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:632922%0D%0ADate%20and%20Time:%2008/10/2024%20/%2013:18:36%0D%0ACountry%20Name:%20United%20States%0D%0A[%20632922%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20]
149.154.167.220
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:632922%0D%0ADate%20a
unknown
http://checkip.dyndns.org/
193.122.130.0
http://51.38.247.67:8081/_send_.php?L
unknown
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
http://mail.vvtrade.vn
unknown
http://anotherarmy.dns.army:8081
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
http://checkip.dyndns.org/q
unknown
https://reallyfreegeoip.org
unknown
https://www.office.com/h
unknown
http://api.telegram.orgd
unknown
https://www.office.com/lBkq
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
malicious
api.telegram.org
149.154.167.220
malicious
mail.vvtrade.vn
118.69.190.131
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
193.122.130.0

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
118.69.190.131
mail.vvtrade.vn
Viet Nam
malicious
193.122.130.0
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
31A1000
trusted library allocation
page read and write
malicious
2AE1000
trusted library allocation
page read and write
malicious
C30000
direct allocation
page read and write
malicious
3B40000
direct allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
3BD1000
trusted library allocation
page read and write
2FD3000
trusted library allocation
page read and write
64CE000
stack
page read and write
3637000
trusted library allocation
page read and write
6717000
trusted library allocation
page read and write
3D30000
heap
page read and write
2990000
heap
page read and write
472D000
direct allocation
page read and write
5174000
trusted library allocation
page read and write
400000
unkown
page readonly
1382000
trusted library allocation
page read and write
3F95000
heap
page read and write
47ED000
direct allocation
page read and write
4729000
direct allocation
page read and write
56DF000
stack
page read and write
33B3000
trusted library allocation
page read and write
2FA4000
trusted library allocation
page read and write
5050000
trusted library allocation
page read and write
3DF5000
heap
page read and write
33BC000
trusted library allocation
page read and write
3F80000
heap
page read and write
3C2F000
stack
page read and write
3F41000
heap
page read and write
1670000
heap
page read and write
3F85000
heap
page read and write
3F31000
heap
page read and write
1A5000
heap
page read and write
3E6D000
heap
page read and write
2F48000
trusted library allocation
page read and write
166C000
heap
page read and write
6CA0000
trusted library allocation
page execute and read and write
3E9D000
heap
page read and write
30FE000
stack
page read and write
3BB0000
trusted library allocation
page read and write
3385000
trusted library allocation
page read and write
5012000
trusted library allocation
page read and write
3BBF000
trusted library allocation
page read and write
3F65000
heap
page read and write
47E9000
direct allocation
page read and write
6851000
heap
page read and write
3DE3000
heap
page read and write
5800000
trusted library allocation
page read and write
43D4000
heap
page read and write
6C30000
trusted library allocation
page execute and read and write
59EE000
stack
page read and write
5176000
trusted library allocation
page read and write
4AB000
unkown
page readonly
6687000
trusted library allocation
page read and write
489AFFE000
stack
page read and write
C9E000
heap
page read and write
6610000
trusted library allocation
page execute and read and write
3F65000
heap
page read and write
6D20000
trusted library allocation
page read and write
4520000
direct allocation
page read and write
2EEC000
trusted library allocation
page read and write
3B9E000
trusted library allocation
page read and write
9D0000
heap
page read and write
2B97000
trusted library allocation
page read and write
485E000
direct allocation
page read and write
2E35000
trusted library allocation
page read and write
4A7000
unkown
page read and write
16FE000
stack
page read and write
2B30000
trusted library allocation
page read and write
FDE000
stack
page read and write
3D67000
trusted library allocation
page read and write
3665000
trusted library allocation
page read and write
324C000
trusted library allocation
page read and write
4460000
direct allocation
page read and write
158F000
stack
page read and write
2E63000
trusted library allocation
page read and write
3E61000
trusted library allocation
page read and write
A5B000
heap
page read and write
31F0000
trusted library allocation
page read and write
500E000
trusted library allocation
page read and write
110000
heap
page read and write
2912000
trusted library allocation
page read and write
1750000
trusted library allocation
page read and write
30E0000
heap
page read and write
3F85000
heap
page read and write
3E8B000
heap
page read and write
4AB000
unkown
page readonly
4391000
trusted library allocation
page read and write
33EC000
trusted library allocation
page read and write
43FE000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
400000
system
page execute and read and write
4316000
heap
page read and write
3DA1000
trusted library allocation
page read and write
14E5000
heap
page read and write
4473000
trusted library allocation
page read and write
2917000
trusted library allocation
page execute and read and write
3B03000
trusted library allocation
page read and write
3E6D000
heap
page read and write
640F000
stack
page read and write
6770000
heap
page read and write
6ACE000
stack
page read and write
4729000
direct allocation
page read and write
3F65000
heap
page read and write
99E000
heap
page read and write
490000
unkown
page read and write
3E9D000
heap
page read and write
4583000
direct allocation
page read and write
6834000
heap
page read and write
984000
heap
page read and write
4A7000
unkown
page read and write
6BF0000
trusted library allocation
page execute and read and write
6BD0000
trusted library allocation
page execute and read and write
690E000
stack
page read and write
3C0D000
trusted library allocation
page read and write
3106000
trusted library allocation
page read and write
3E77000
trusted library allocation
page read and write
6670000
trusted library allocation
page execute and read and write
3DA8000
heap
page read and write
46C0000
direct allocation
page read and write
14E1D209000
heap
page read and write
8AF000
stack
page read and write
14E1D263000
heap
page read and write
3240000
trusted library allocation
page read and write
4546000
trusted library allocation
page read and write
1740000
trusted library allocation
page read and write
5670000
trusted library allocation
page execute and read and write
4600000
direct allocation
page read and write
472D000
direct allocation
page read and write
6D22000
trusted library allocation
page read and write
8AF000
stack
page read and write
2910000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
489B4FD000
stack
page read and write
118E000
stack
page read and write
66F0000
trusted library allocation
page read and write
2B8B000
trusted library allocation
page read and write
3335000
trusted library allocation
page read and write
5A34000
trusted library allocation
page read and write
3FA2000
heap
page read and write
3E41000
trusted library allocation
page read and write
2B55000
trusted library allocation
page read and write
66A4000
trusted library allocation
page read and write
3E8B000
heap
page read and write
3344000
trusted library allocation
page read and write
42E6000
trusted library allocation
page read and write
3E9D000
heap
page read and write
47E9000
direct allocation
page read and write
4209000
trusted library allocation
page read and write
61EE000
heap
page read and write
3DD6000
trusted library allocation
page read and write
42CC000
trusted library allocation
page read and write
628D000
stack
page read and write
35AD000
trusted library allocation
page read and write
3E4D000
trusted library allocation
page read and write
3F11000
heap
page read and write
489AB0A000
stack
page read and write
15E000
stack
page read and write
28E3000
trusted library allocation
page execute and read and write
2DF8000
trusted library allocation
page read and write
4729000
direct allocation
page read and write
3DED000
heap
page read and write
3F65000
heap
page read and write
311A000
trusted library allocation
page read and write
3D75000
trusted library allocation
page read and write
3551000
trusted library allocation
page read and write
4584000
direct allocation
page read and write
668B000
trusted library allocation
page read and write
512D000
stack
page read and write
2ADE000
stack
page read and write
382E000
stack
page read and write
489B6FE000
stack
page read and write
47ED000
direct allocation
page read and write
D09000
heap
page read and write
9A000
stack
page read and write
990000
heap
page read and write
1385000
trusted library allocation
page execute and read and write
58B0000
heap
page read and write
5060000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
136D000
trusted library allocation
page execute and read and write
970000
heap
page read and write
4CBE000
stack
page read and write
2B9F000
trusted library allocation
page read and write
1370000
trusted library allocation
page read and write
46C0000
direct allocation
page read and write
3F82000
heap
page read and write
2980000
trusted library allocation
page read and write
4AB000
unkown
page readonly
2F46000
heap
page read and write
3DC1000
heap
page read and write
482000
unkown
page readonly
485E000
direct allocation
page read and write
47ED000
direct allocation
page read and write
3E19000
trusted library allocation
page read and write
2F76000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
3E9D000
heap
page read and write
9EE000
stack
page read and write
3216000
trusted library allocation
page read and write
3F31000
heap
page read and write
3F85000
heap
page read and write
44C4000
trusted library allocation
page read and write
442A000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
3D3F000
trusted library allocation
page read and write
290A000
trusted library allocation
page execute and read and write
1700000
heap
page read and write
4538000
trusted library allocation
page read and write
3F85000
heap
page read and write
2CC7000
trusted library allocation
page read and write
5230000
heap
page read and write
3F11000
heap
page read and write
3C10000
heap
page read and write
472D000
direct allocation
page read and write
3F82000
heap
page read and write
FE0000
heap
page read and write
44F7000
trusted library allocation
page read and write
1E0000
heap
page read and write
3E8B000
heap
page read and write
8B4000
stack
page read and write
3F99000
heap
page read and write
4643000
direct allocation
page read and write
3E8B000
heap
page read and write
6813000
heap
page read and write
448B000
trusted library allocation
page read and write
3F95000
heap
page read and write
3F89000
heap
page read and write
173C000
stack
page read and write
14E1D4B0000
heap
page read and write
13B0000
trusted library allocation
page read and write
89F000
stack
page read and write
D73000
heap
page read and write
6D80000
trusted library allocation
page execute and read and write
F10000
heap
page read and write
338F000
trusted library allocation
page read and write
3DC3000
heap
page read and write
A2A000
heap
page read and write
3E30000
heap
page read and write
3BCF000
trusted library allocation
page read and write
3F65000
heap
page read and write
3F04000
heap
page read and write
47ED000
direct allocation
page read and write
619B000
heap
page read and write
2DC8000
trusted library allocation
page read and write
8FE000
stack
page read and write
46C0000
direct allocation
page read and write
B30000
heap
page read and write
3E6D000
heap
page read and write
3BFD000
trusted library allocation
page read and write
3254000
trusted library allocation
page read and write
401000
unkown
page execute read
62CE000
stack
page read and write
3E8B000
heap
page read and write
8B4000
stack
page read and write
357F000
trusted library allocation
page read and write
3BCB000
trusted library allocation
page read and write
3F85000
heap
page read and write
2C73000
trusted library allocation
page read and write
427F000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
3E8B000
heap
page read and write
6CB0000
trusted library allocation
page read and write
3FA2000
heap
page read and write
46C0000
direct allocation
page read and write
36BE000
stack
page read and write
6150000
heap
page read and write
19E000
stack
page read and write
482000
unkown
page readonly
28E4000
trusted library allocation
page read and write
3E6D000
heap
page read and write
310B000
trusted library allocation
page read and write
100000
heap
page read and write
2B8F000
trusted library allocation
page read and write
6C10000
trusted library allocation
page execute and read and write
3E29000
trusted library allocation
page read and write
3F95000
heap
page read and write
441000
system
page execute and read and write
312D000
trusted library allocation
page read and write
2902000
trusted library allocation
page read and write
135D000
trusted library allocation
page execute and read and write
3F95000
heap
page read and write
2BC4000
trusted library allocation
page read and write
3F10000
heap
page read and write
3E40000
heap
page read and write
6690000
trusted library allocation
page read and write
28ED000
trusted library allocation
page execute and read and write
368E000
stack
page read and write
311E000
trusted library allocation
page read and write
2B51000
trusted library allocation
page read and write
2CA1000
trusted library allocation
page read and write
3DCC000
trusted library allocation
page read and write
4583000
direct allocation
page read and write
3F65000
heap
page read and write
2CBF000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
4437000
trusted library allocation
page read and write
4460000
direct allocation
page read and write
5021000
trusted library allocation
page read and write
4494000
trusted library allocation
page read and write
28FD000
trusted library allocation
page execute and read and write
3F95000
heap
page read and write
34F6000
trusted library allocation
page read and write
3DF8000
heap
page read and write
47ED000
direct allocation
page read and write
529E000
stack
page read and write
3C97000
trusted library allocation
page read and write
6720000
trusted library allocation
page read and write
2B7F000
trusted library allocation
page read and write
3E6D000
heap
page read and write
4460000
direct allocation
page read and write
479E000
direct allocation
page read and write
50E3000
heap
page read and write
65E0000
trusted library allocation
page execute and read and write
6C40000
trusted library allocation
page execute and read and write
6CC0000
trusted library allocation
page read and write
162E000
stack
page read and write
3609000
trusted library allocation
page read and write
489B1FF000
stack
page read and write
4643000
direct allocation
page read and write
89F000
stack
page read and write
6750000
trusted library allocation
page execute and read and write
3E8B000
heap
page read and write
A4E000
stack
page read and write
A63000
heap
page read and write
4583000
direct allocation
page read and write
4334000
heap
page read and write
187F000
stack
page read and write
3E7E000
trusted library allocation
page read and write
3E54000
heap
page read and write
980000
heap
page read and write
401000
unkown
page execute read
3F30000
heap
page read and write
3287000
trusted library allocation
page read and write
4583000
direct allocation
page read and write
4502000
trusted library allocation
page read and write
13F6000
heap
page read and write
3E65000
trusted library allocation
page read and write
489B7FB000
stack
page read and write
3E9D000
heap
page read and write
4355000
trusted library allocation
page read and write
138B000
trusted library allocation
page execute and read and write
4A7000
unkown
page read and write
3F84000
heap
page execute and read and write
485E000
direct allocation
page read and write
3E19000
heap
page read and write
3D93000
trusted library allocation
page read and write
2BE9000
trusted library allocation
page read and write
3E6D000
heap
page read and write
3F85000
heap
page read and write
451A000
trusted library allocation
page read and write
3248000
trusted library allocation
page read and write
EBE000
stack
page read and write
3D44000
trusted library allocation
page read and write
34BB000
trusted library allocation
page read and write
400000
unkown
page readonly
13C0000
heap
page read and write
3B49000
trusted library allocation
page read and write
6C20000
trusted library allocation
page execute and read and write
99A000
heap
page read and write
3DEC000
heap
page read and write
3E6D000
heap
page read and write
A55000
heap
page read and write
3E9D000
heap
page read and write
4520000
direct allocation
page read and write
C80000
heap
page read and write
5032000
trusted library allocation
page read and write
3363000
trusted library allocation
page read and write
2CF1000
trusted library allocation
page read and write
3E9D000
heap
page read and write
6BE0000
trusted library allocation
page read and write
65F0000
trusted library allocation
page execute and read and write
3F6B000
heap
page read and write
325C000
trusted library allocation
page read and write
3E6D000
heap
page read and write
14D0000
trusted library allocation
page read and write
3E15000
heap
page read and write
6204000
heap
page read and write
3F64000
heap
page execute and read and write
50E0000
heap
page read and write
3E6D000
heap
page read and write
6D47000
trusted library allocation
page read and write
14E1D1D0000
heap
page read and write
401000
unkown
page execute read
5A50000
heap
page execute and read and write
2970000
heap
page execute and read and write
100000
heap
page read and write
479E000
direct allocation
page read and write
3E36000
trusted library allocation
page read and write
32AB000
trusted library allocation
page read and write
600E000
stack
page read and write
400000
unkown
page readonly
9CE000
stack
page read and write
4AE0000
trusted library allocation
page read and write
2B83000
trusted library allocation
page read and write
4643000
direct allocation
page read and write
3E6D000
heap
page read and write
341D000
trusted library allocation
page read and write
3DF5000
heap
page read and write
3381000
trusted library allocation
page read and write
3FA2000
heap
page read and write
13EA000
heap
page read and write
9A000
stack
page read and write
485E000
direct allocation
page read and write
CAA000
heap
page read and write
2EBE000
trusted library allocation
page read and write
2FB0000
heap
page read and write
8B4000
stack
page read and write
441B000
trusted library allocation
page read and write
940000
heap
page read and write
5D1F000
stack
page read and write
5186000
trusted library allocation
page read and write
443000
system
page execute and read and write
3C8D000
trusted library allocation
page read and write
17A0000
heap
page read and write
3F65000
heap
page read and write
5A2E000
stack
page read and write
3B41000
heap
page read and write
3D40000
heap
page read and write
4729000
direct allocation
page read and write
35DB000
trusted library allocation
page read and write
3E6D000
heap
page read and write
2E21000
heap
page read and write
2950000
heap
page read and write
5000000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
490000
unkown
page write copy
3E0F000
heap
page read and write
4AB000
unkown
page readonly
4643000
direct allocation
page read and write
125000
heap
page read and write
3E39000
trusted library allocation
page read and write
3E9D000
heap
page read and write
3E8B000
heap
page read and write
CB1000
heap
page read and write
3E8B000
heap
page read and write
3F69000
heap
page read and write
5690000
trusted library allocation
page execute and read and write
3E05000
trusted library allocation
page read and write
5F0E000
stack
page read and write
4460000
direct allocation
page read and write
CBC000
heap
page read and write
614E000
stack
page read and write
3E86000
trusted library allocation
page read and write
3360000
trusted library allocation
page read and write
3DE3000
heap
page read and write
61D7000
heap
page read and write
41C9000
trusted library allocation
page read and write
3B09000
trusted library allocation
page read and write
482000
unkown
page readonly
F90000
heap
page read and write
4470000
trusted library allocation
page read and write
3F93000
heap
page read and write
E7E000
stack
page read and write
479E000
direct allocation
page read and write
490000
unkown
page write copy
14E1EBE0000
heap
page read and write
950000
heap
page read and write
3F94000
heap
page execute and read and write
121E000
stack
page read and write
3D6F000
trusted library allocation
page read and write
1C0000
heap
page read and write
42D5000
trusted library allocation
page read and write
47E9000
direct allocation
page read and write
14C0000
trusted library allocation
page execute and read and write
2F18000
trusted library allocation
page read and write
490000
unkown
page read and write
1380000
trusted library allocation
page read and write
6CF6000
trusted library allocation
page read and write
C88000
heap
page read and write
3F65000
heap
page read and write
2C60000
trusted library allocation
page read and write
3E19000
heap
page read and write
3F85000
heap
page read and write
3DE8000
heap
page read and write
3E6F000
heap
page read and write
5080000
heap
page execute and read and write
5763000
heap
page read and write
401000
unkown
page execute read
6CE0000
trusted library allocation
page execute and read and write
3ABF000
stack
page read and write
4643000
direct allocation
page read and write
3E9D000
heap
page read and write
3EE6000
heap
page read and write
A95000
heap
page read and write
47E9000
direct allocation
page read and write
3DE6000
heap
page read and write
3A8F000
stack
page read and write
3F95000
heap
page read and write
3FC3000
heap
page read and write
5A3A000
trusted library allocation
page read and write
46C0000
direct allocation
page read and write
490000
unkown
page read and write
500B000
trusted library allocation
page read and write
147E000
stack
page read and write
501A000
trusted library allocation
page read and write
2B9B000
trusted library allocation
page read and write
5C9E000
stack
page read and write
1353000
trusted library allocation
page execute and read and write
400000
unkown
page readonly
1372000
trusted library allocation
page read and write
3CEA000
trusted library allocation
page read and write
2CD2000
trusted library allocation
page read and write
69D0000
heap
page read and write
3E6D000
heap
page read and write
1750000
heap
page read and write
2CFA000
trusted library allocation
page read and write
518D000
trusted library allocation
page read and write
6D25000
trusted library allocation
page read and write
3C34000
trusted library allocation
page read and write
B20000
heap
page read and write
3BC5000
trusted library allocation
page read and write
3F65000
heap
page read and write
1350000
trusted library allocation
page read and write
3BB7000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
4600000
direct allocation
page read and write
4522000
trusted library allocation
page read and write
6F80000
heap
page read and write
3394000
trusted library allocation
page read and write
3B9A000
trusted library allocation
page read and write
1354000
trusted library allocation
page read and write
6A0E000
stack
page read and write
A2E000
heap
page read and write
3DE1000
heap
page read and write
2F70000
heap
page read and write
2C82000
trusted library allocation
page read and write
110000
heap
page read and write
42CF000
trusted library allocation
page read and write
14E1D300000
heap
page read and write
348A000
trusted library allocation
page read and write
310E000
trusted library allocation
page read and write
482000
unkown
page readonly
3BD3000
trusted library allocation
page read and write
4454000
trusted library allocation
page read and write
2D2A000
trusted library allocation
page read and write
14E1D29C000
heap
page read and write
3F95000
heap
page read and write
4520000
direct allocation
page read and write
3F8C000
heap
page read and write
C88000
heap
page read and write
14E1D0F0000
heap
page read and write
28E0000
trusted library allocation
page read and write
44FA000
trusted library allocation
page read and write
434B000
heap
page read and write
1482000
heap
page read and write
3F40000
heap
page read and write
1376000
trusted library allocation
page execute and read and write
14B0000
heap
page read and write
3CC6000
trusted library allocation
page read and write
5760000
heap
page read and write
137A000
trusted library allocation
page execute and read and write
50D0000
trusted library allocation
page read and write
2B87000
trusted library allocation
page read and write
485E000
direct allocation
page read and write
321B000
trusted library allocation
page read and write
14E1D4B5000
heap
page read and write
490000
unkown
page write copy
444000
system
page execute and read and write
3F85000
heap
page read and write
2B3C000
trusted library allocation
page read and write
2CC5000
trusted library allocation
page read and write
47E9000
direct allocation
page read and write
3E8B000
heap
page read and write
482000
unkown
page readonly
3C13000
trusted library allocation
page read and write
6A8F000
stack
page read and write
3D55000
trusted library allocation
page read and write
3E8B000
heap
page read and write
3250000
trusted library allocation
page read and write
6A4E000
stack
page read and write
4729000
direct allocation
page read and write
4460000
direct allocation
page read and write
30E4000
heap
page read and write
3E9D000
heap
page read and write
6CD4000
trusted library allocation
page read and write
AF7000
stack
page read and write
3190000
heap
page execute and read and write
8AF000
stack
page read and write
4423000
trusted library allocation
page read and write
3E46000
heap
page read and write
12F7000
stack
page read and write
472D000
direct allocation
page read and write
3BA0000
trusted library allocation
page read and write
3DBB000
heap
page read and write
489B2FE000
stack
page read and write
9A000
stack
page read and write
43A9000
trusted library allocation
page read and write
6840000
heap
page read and write
4520000
direct allocation
page read and write
5A40000
trusted library allocation
page read and write
3AE1000
trusted library allocation
page read and write
F2A000
stack
page read and write
2BE7000
trusted library allocation
page read and write
3F95000
heap
page read and write
3F95000
heap
page read and write
A00000
heap
page read and write
16BE000
stack
page read and write
5044000
trusted library allocation
page read and write
3FB2000
heap
page read and write
3F85000
heap
page read and write
3F95000
heap
page read and write
400000
unkown
page readonly
100000
heap
page read and write
161F000
stack
page read and write
93E000
stack
page read and write
D75000
heap
page read and write
C6E000
stack
page read and write
648F000
stack
page read and write
3AC5000
heap
page read and write
472D000
direct allocation
page read and write
2B47000
trusted library allocation
page read and write
3E8B000
heap
page read and write
44D8000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
B40000
heap
page read and write
4600000
direct allocation
page read and write
2F30000
direct allocation
page read and write
3121000
trusted library allocation
page read and write
2B93000
trusted library allocation
page read and write
604E000
stack
page read and write
571E000
stack
page read and write
3100000
trusted library allocation
page read and write
3E6D000
heap
page read and write
3D69000
trusted library allocation
page read and write
4AE8000
trusted library allocation
page read and write
3CD2000
trusted library allocation
page read and write
4AB000
unkown
page readonly
31FD000
trusted library allocation
page read and write
502D000
trusted library allocation
page read and write
8FE000
stack
page read and write
89F000
stack
page read and write
440000
system
page execute and read and write
4600000
direct allocation
page read and write
3DC5000
heap
page read and write
3E62000
heap
page read and write
5188000
trusted library allocation
page read and write
101E000
stack
page read and write
6DA0000
heap
page read and write
485E000
direct allocation
page read and write
2F20000
heap
page read and write
6600000
trusted library allocation
page execute and read and write
630E000
stack
page read and write
3E9D000
heap
page read and write
A90000
heap
page read and write
66F5000
trusted library allocation
page read and write
3C25000
trusted library allocation
page read and write
3F16000
heap
page read and write
2E9F000
heap
page read and write
3E9D000
heap
page read and write
3524000
trusted library allocation
page read and write
2915000
trusted library allocation
page execute and read and write
14E1D200000
heap
page read and write
3322000
trusted library allocation
page read and write
5046000
trusted library allocation
page read and write
5A36000
trusted library allocation
page read and write
61A8000
heap
page read and write
5026000
trusted library allocation
page read and write
3258000
trusted library allocation
page read and write
3244000
trusted library allocation
page read and write
3DFF000
heap
page read and write
47E9000
direct allocation
page read and write
1340000
trusted library allocation
page read and write
3F65000
heap
page read and write
7B9000
stack
page read and write
44F0000
direct allocation
page read and write
5006000
trusted library allocation
page read and write
556E000
stack
page read and write
2940000
trusted library allocation
page execute and read and write
3F85000
heap
page read and write
1390000
heap
page read and write
3389000
trusted library allocation
page read and write
1387000
trusted library allocation
page execute and read and write
120000
heap
page read and write
472D000
direct allocation
page read and write
165E000
stack
page read and write
3260000
trusted library allocation
page read and write
3126000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
3F90000
heap
page read and write
15EE000
stack
page read and write
2F75000
heap
page read and write
30BE000
stack
page read and write
3F85000
heap
page read and write
2F10000
trusted library allocation
page read and write
1755000
heap
page read and write
93E000
stack
page read and write
29DE000
stack
page read and write
1300000
heap
page read and write
14E0000
heap
page read and write
6BCF000
stack
page read and write
65D0000
trusted library allocation
page read and write
42F4000
trusted library allocation
page read and write
3B80000
direct allocation
page read and write
6710000
trusted library allocation
page read and write
5180000
trusted library allocation
page read and write
3F65000
heap
page read and write
3C30000
heap
page read and write
3F60000
heap
page read and write
1760000
heap
page read and write
4402000
trusted library allocation
page read and write
D4E000
heap
page read and write
A70000
heap
page read and write
517A000
trusted library allocation
page read and write
3E8B000
heap
page read and write
4460000
direct allocation
page read and write
3E6D000
heap
page read and write
479E000
direct allocation
page read and write
3DB1000
trusted library allocation
page read and write
5A4D000
trusted library allocation
page read and write
3F95000
heap
page read and write
489B5FE000
stack
page read and write
14E1D4BD000
heap
page read and write
4583000
direct allocation
page read and write
401000
unkown
page execute read
5040000
trusted library allocation
page read and write
3E8B000
heap
page read and write
482000
unkown
page readonly
291B000
trusted library allocation
page execute and read and write
2F30000
heap
page read and write
67D0000
heap
page read and write
4527000
trusted library allocation
page read and write
3E29000
heap
page read and write
66CE000
stack
page read and write
6C00000
trusted library allocation
page read and write
2D5B000
trusted library allocation
page read and write
43FE000
heap
page read and write
1590000
heap
page read and write
C80000
heap
page read and write
3F82000
heap
page read and write
47ED000
direct allocation
page read and write
3D63000
trusted library allocation
page read and write
4BBC000
stack
page read and write
3E9D000
heap
page read and write
4385000
trusted library allocation
page read and write
67CF000
stack
page read and write
6D50000
trusted library allocation
page read and write
400000
unkown
page readonly
4583000
direct allocation
page read and write
3E27000
heap
page read and write
3C40000
heap
page read and write
3E9D000
heap
page read and write
2CC3000
trusted library allocation
page read and write
3E8B000
heap
page read and write
3DFD000
heap
page read and write
501E000
trusted library allocation
page read and write
3FB3000
heap
page read and write
1A0000
heap
page read and write
3FB2000
heap
page read and write
4334000
trusted library allocation
page read and write
4520000
direct allocation
page read and write
3F85000
heap
page read and write
14E1EFB0000
heap
page read and write
434C000
trusted library allocation
page read and write
3AEB000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
2F35000
heap
page read and write
46C0000
direct allocation
page read and write
4520000
direct allocation
page read and write
3F95000
heap
page read and write
489AEFE000
stack
page read and write
44F3000
trusted library allocation
page read and write
4600000
direct allocation
page read and write
3BC3000
trusted library allocation
page read and write
2C9E000
trusted library allocation
page read and write
3C2C000
trusted library allocation
page read and write
4433000
trusted library allocation
page read and write
2CCD000
trusted library allocation
page read and write
65CE000
stack
page read and write
4643000
direct allocation
page read and write
13C8000
heap
page read and write
A20000
heap
page read and write
3E25000
trusted library allocation
page read and write
1360000
trusted library allocation
page read and write
479E000
direct allocation
page read and write
3F95000
heap
page read and write
3E8A000
heap
page read and write
3E9D000
heap
page read and write
3F41000
heap
page read and write
66B0000
trusted library allocation
page execute and read and write
3387000
trusted library allocation
page read and write
2F1A000
trusted library allocation
page read and write
3A90000
heap
page read and write
1660000
heap
page read and write
B50000
heap
page read and write
4600000
direct allocation
page read and write
644E000
stack
page read and write
4729000
direct allocation
page read and write
3FB2000
heap
page read and write
3212000
trusted library allocation
page read and write
990000
heap
page read and write
3FA2000
heap
page read and write
3694000
trusted library allocation
page read and write
2B59000
trusted library allocation
page read and write
14E1D235000
heap
page read and write
3BEF000
trusted library allocation
page read and write
3D10000
heap
page read and write
28D0000
trusted library allocation
page read and write
2900000
trusted library allocation
page read and write
4AB000
unkown
page readonly
2906000
trusted library allocation
page execute and read and write
5CDE000
stack
page read and write
A59000
heap
page read and write
479E000
direct allocation
page read and write
401000
unkown
page execute read
3208000
trusted library allocation
page read and write
3E6D000
heap
page read and write
3E3D000
heap
page read and write
3F65000
heap
page read and write
B55000
heap
page read and write
4414000
trusted library allocation
page read and write
1664000
heap
page read and write
44DE000
trusted library allocation
page read and write
442000
system
page execute and read and write
There are 803 hidden memdumps, click here to show them.