IOC Report
rrequestforquotation.exe

loading gif

Files

File Path
Type
Category
Malicious
rrequestforquotation.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rrequestforquotation.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpC98D.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\oGnCNPiCwiAocn.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\oGnCNPiCwiAocn.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oGnCNPiCwiAocn.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4zx4jgfc.ryv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ewgtqzvh.5xd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kuzz3bkh.m3f.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_llvbzpdn.aqz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tha1q2k3.b4x.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wvobn35q.obr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xeflaksy.riu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zaohc415.w4a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpEF35.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rrequestforquotation.exe
"C:\Users\user\Desktop\rrequestforquotation.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rrequestforquotation.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\oGnCNPiCwiAocn.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\oGnCNPiCwiAocn" /XML "C:\Users\user\AppData\Local\Temp\tmpC98D.tmp"
malicious
C:\Users\user\Desktop\rrequestforquotation.exe
"C:\Users\user\Desktop\rrequestforquotation.exe"
malicious
C:\Users\user\AppData\Roaming\oGnCNPiCwiAocn.exe
C:\Users\user\AppData\Roaming\oGnCNPiCwiAocn.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\oGnCNPiCwiAocn" /XML "C:\Users\user\AppData\Local\Temp\tmpEF35.tmp"
malicious
C:\Users\user\AppData\Roaming\oGnCNPiCwiAocn.exe
"C:\Users\user\AppData\Roaming\oGnCNPiCwiAocn.exe"
malicious
C:\Users\user\AppData\Roaming\oGnCNPiCwiAocn.exe
"C:\Users\user\AppData\Roaming\oGnCNPiCwiAocn.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://checkip.dyndns.org
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://reallyfreegeoip.org/xml/8.46.123.75
172.67.177.134
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://checkip.dyndns.org/
193.122.6.168
https://reallyfreegeoip.org/xml/8.46.123.75$
unknown
http://checkip.dyndns.org/q
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://reallyfreegeoip.org
unknown
http://www.galapagosdesign.com/DPlease
unknown
https://reallyfreegeoip.org
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://checkip.dyndns.com
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
https://github.com/ppx17/Onkyo-Remote-Control
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
172.67.177.134
checkip.dyndns.com
193.122.6.168
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
193.122.6.168
checkip.dyndns.com
United States
172.67.177.134
reallyfreegeoip.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rrequestforquotation_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rrequestforquotation_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rrequestforquotation_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rrequestforquotation_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rrequestforquotation_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rrequestforquotation_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rrequestforquotation_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rrequestforquotation_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rrequestforquotation_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rrequestforquotation_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rrequestforquotation_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rrequestforquotation_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rrequestforquotation_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rrequestforquotation_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\oGnCNPiCwiAocn_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\oGnCNPiCwiAocn_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\oGnCNPiCwiAocn_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\oGnCNPiCwiAocn_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\oGnCNPiCwiAocn_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\oGnCNPiCwiAocn_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\oGnCNPiCwiAocn_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\oGnCNPiCwiAocn_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\oGnCNPiCwiAocn_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\oGnCNPiCwiAocn_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\oGnCNPiCwiAocn_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\oGnCNPiCwiAocn_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\oGnCNPiCwiAocn_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\oGnCNPiCwiAocn_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2EB1000
trusted library allocation
page read and write
malicious
415000
remote allocation
page execute and read and write
malicious
2B60000
trusted library allocation
page read and write
malicious
3CB1000
trusted library allocation
page read and write
malicious
2991000
trusted library allocation
page read and write
malicious
307F000
trusted library allocation
page read and write
malicious
8CE000
unkown
page read and write
1440000
trusted library allocation
page execute and read and write
5390000
heap
page read and write
6BE0000
trusted library allocation
page read and write
5CE3000
heap
page read and write
5150000
heap
page read and write
6830000
heap
page read and write
5160000
trusted library allocation
page read and write
2F65000
trusted library allocation
page read and write
5340000
heap
page read and write
4C50000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
11F2000
trusted library allocation
page read and write
E94000
heap
page read and write
860000
heap
page read and write
111E000
stack
page read and write
10D0000
heap
page read and write
2CA0000
heap
page execute and read and write
7470000
trusted library allocation
page read and write
13DB000
trusted library allocation
page execute and read and write
13C0000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
59E8000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
3ED000
stack
page read and write
B60000
heap
page read and write
A21E000
stack
page read and write
3A21000
trusted library allocation
page read and write
2444000
trusted library allocation
page read and write
300D000
trusted library allocation
page read and write
AE0000
heap
page read and write
2453000
trusted library allocation
page read and write
7B0F000
stack
page read and write
5180000
trusted library allocation
page read and write
3959000
trusted library allocation
page read and write
9C4E000
stack
page read and write
2EA000
stack
page read and write
7780000
trusted library allocation
page execute and read and write
12C0000
trusted library allocation
page read and write
2462000
trusted library allocation
page read and write
13CA000
trusted library allocation
page execute and read and write
6C9E000
stack
page read and write
2C76000
trusted library allocation
page read and write
6BAE000
stack
page read and write
13C6000
trusted library allocation
page execute and read and write
2F7A000
trusted library allocation
page read and write
2A96000
trusted library allocation
page read and write
6794000
heap
page read and write
14D4000
trusted library allocation
page read and write
5CDB000
heap
page read and write
143E000
stack
page read and write
38F4000
trusted library allocation
page read and write
3001000
trusted library allocation
page read and write
6B2A000
heap
page read and write
39E000
unkown
page read and write
11FB000
trusted library allocation
page execute and read and write
5130000
heap
page read and write
E1E000
stack
page read and write
674E000
stack
page read and write
5360000
trusted library section
page readonly
2BF4000
trusted library allocation
page read and write
5430000
heap
page execute and read and write
9B0E000
stack
page read and write
9A0E000
stack
page read and write
4BB0000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
3043000
trusted library allocation
page read and write
4E76000
trusted library allocation
page read and write
548D000
stack
page read and write
53E0000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
9D8C000
stack
page read and write
4EE3000
heap
page read and write
2C90000
heap
page read and write
4E71000
trusted library allocation
page read and write
2FFD000
trusted library allocation
page read and write
13C2000
trusted library allocation
page read and write
59EB000
trusted library allocation
page read and write
A46E000
stack
page read and write
13BD000
trusted library allocation
page execute and read and write
4CDB000
stack
page read and write
10C0000
heap
page read and write
9D90000
heap
page read and write
7B0000
heap
page read and write
11D3000
trusted library allocation
page read and write
3009000
trusted library allocation
page read and write
25A4000
trusted library allocation
page read and write
30FF000
trusted library allocation
page read and write
69A0000
heap
page read and write
648E000
stack
page read and write
5C92000
heap
page read and write
2BEB000
trusted library allocation
page read and write
51DE000
stack
page read and write
E6A000
stack
page read and write
5080000
trusted library allocation
page read and write
965E000
stack
page read and write
539E000
trusted library allocation
page read and write
4C40000
trusted library allocation
page execute and read and write
2F6B000
trusted library allocation
page read and write
9FCE000
stack
page read and write
2AD6000
trusted library allocation
page read and write
481C000
stack
page read and write
740000
heap
page read and write
2AD000
stack
page read and write
244D000
trusted library allocation
page execute and read and write
F78000
heap
page read and write
6790000
trusted library allocation
page read and write
3028000
trusted library allocation
page read and write
4B60000
trusted library allocation
page read and write
50F0000
trusted library allocation
page read and write
5070000
trusted library allocation
page execute and read and write
5390000
trusted library allocation
page read and write
D2D000
trusted library allocation
page execute and read and write
CF7000
stack
page read and write
676F000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
2FA9000
trusted library allocation
page read and write
2B52000
trusted library allocation
page read and write
5380000
heap
page read and write
4ED0000
heap
page read and write
2A3F000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
2477000
trusted library allocation
page execute and read and write
11D0000
trusted library allocation
page read and write
38D1000
trusted library allocation
page read and write
3071000
trusted library allocation
page read and write
6BD0000
trusted library allocation
page execute and read and write
C6E000
stack
page read and write
1180000
heap
page read and write
5EA0000
heap
page read and write
90F000
unkown
page read and write
2490000
trusted library allocation
page read and write
9FE0000
trusted library allocation
page read and write
13F0000
trusted library allocation
page read and write
2FA7000
trusted library allocation
page read and write
2AEA000
trusted library allocation
page read and write
11DD000
trusted library allocation
page execute and read and write
5130000
heap
page read and write
400000
remote allocation
page execute and read and write
A92C000
stack
page read and write
11E2000
trusted library allocation
page read and write
A31E000
stack
page read and write
D30000
heap
page read and write
6BC0000
trusted library allocation
page execute and read and write
55A0000
trusted library allocation
page execute and read and write
2FF5000
trusted library allocation
page read and write
246A000
trusted library allocation
page execute and read and write
99CF000
stack
page read and write
E67000
trusted library allocation
page execute and read and write
6C50000
trusted library allocation
page read and write
6BBF000
trusted library allocation
page read and write
2440000
trusted library allocation
page read and write
4E82000
trusted library allocation
page read and write
3F43000
trusted library allocation
page read and write
790D000
stack
page read and write
2FB1000
trusted library allocation
page read and write
7C0000
heap
page read and write
1300000
heap
page read and write
2FBD000
trusted library allocation
page read and write
2FF9000
trusted library allocation
page read and write
6ACF000
heap
page read and write
98A000
stack
page read and write
10B0000
trusted library allocation
page read and write
4C90000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
6325000
heap
page read and write
2C18000
trusted library allocation
page read and write
3142000
trusted library allocation
page read and write
11E6000
trusted library allocation
page execute and read and write
68AF000
stack
page read and write
3A24000
trusted library allocation
page read and write
76AD000
stack
page read and write
471B000
stack
page read and write
6770000
trusted library allocation
page execute and read and write
3F1C000
trusted library allocation
page read and write
4E56000
trusted library allocation
page read and write
26DF000
stack
page read and write
94C000
heap
page read and write
12F0000
trusted library allocation
page read and write
FA0000
trusted library allocation
page read and write
676A000
trusted library allocation
page read and write
5596000
trusted library allocation
page read and write
6AAE000
stack
page read and write
2450000
trusted library allocation
page read and write
6AC5000
heap
page read and write
6760000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page execute and read and write
4B90000
trusted library allocation
page read and write
67A4000
heap
page read and write
25B0000
heap
page execute and read and write
546F000
stack
page read and write
301A000
trusted library allocation
page read and write
84D000
stack
page read and write
2B40000
trusted library allocation
page read and write
5598000
trusted library allocation
page read and write
4C30000
heap
page read and write
6763000
trusted library allocation
page read and write
2EA0000
heap
page execute and read and write
2E9E000
stack
page read and write
13A3000
trusted library allocation
page execute and read and write
660E000
stack
page read and write
14F0000
heap
page read and write
3063000
trusted library allocation
page read and write
3E0000
heap
page read and write
3ED9000
trusted library allocation
page read and write
9FD0000
trusted library allocation
page read and write
2B24000
trusted library allocation
page read and write
794D000
stack
page read and write
B2F000
stack
page read and write
6730000
heap
page read and write
12D0000
trusted library allocation
page read and write
2A5C000
trusted library allocation
page read and write
3005000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
4E5B000
trusted library allocation
page read and write
2BF0000
trusted library allocation
page read and write
4C97000
trusted library allocation
page read and write
2ADE000
trusted library allocation
page read and write
9F0000
heap
page read and write
38B0000
trusted library allocation
page read and write
2C82000
trusted library allocation
page read and write
2A9A000
trusted library allocation
page read and write
A3A000
stack
page read and write
38F1000
trusted library allocation
page read and write
D24000
trusted library allocation
page read and write
13D5000
trusted library allocation
page execute and read and write
F07000
heap
page read and write
2443000
trusted library allocation
page execute and read and write
658E000
stack
page read and write
68EE000
stack
page read and write
546E000
stack
page read and write
59D4000
trusted library allocation
page read and write
30F6000
trusted library allocation
page read and write
3F40000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
559B000
trusted library allocation
page read and write
5590000
trusted library section
page read and write
58A0000
heap
page read and write
14A0000
heap
page read and write
1450000
heap
page read and write
4ED0000
heap
page execute and read and write
D23000
trusted library allocation
page execute and read and write
149D000
stack
page read and write
15FE000
stack
page read and write
2ADA000
trusted library allocation
page read and write
12A0000
trusted library allocation
page execute and read and write
95C000
heap
page read and write
10B3000
trusted library allocation
page execute and read and write
E98000
heap
page read and write
540B000
stack
page read and write
39FD000
trusted library allocation
page read and write
5E8E000
heap
page read and write
735E000
heap
page read and write
12BE000
stack
page read and write
504E000
stack
page read and write
53C0000
heap
page execute and read and write
1231000
heap
page read and write
2AD2000
trusted library allocation
page read and write
2C93000
heap
page read and write
12E0000
heap
page read and write
98F000
stack
page read and write
63A000
stack
page read and write
3DF000
unkown
page read and write
2AE6000
trusted library allocation
page read and write
2AE2000
trusted library allocation
page read and write
1307000
heap
page read and write
98CE000
stack
page read and write
11B8000
heap
page read and write
860000
unkown
page readonly
7750000
trusted library allocation
page read and write
24DE000
stack
page read and write
4E50000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
3112000
trusted library allocation
page read and write
F67000
stack
page read and write
FC0000
heap
page read and write
E5A000
trusted library allocation
page execute and read and write
F19000
heap
page read and write
3A2D000
trusted library allocation
page read and write
6AA0000
heap
page read and write
2F78000
trusted library allocation
page read and write
53EF000
trusted library allocation
page read and write
9ECE000
stack
page read and write
9C8C000
stack
page read and write
402000
remote allocation
page execute and read and write
54D0000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
850000
heap
page read and write
6780000
trusted library allocation
page execute and read and write
65CE000
stack
page read and write
11F0000
trusted library allocation
page read and write
2FB9000
trusted library allocation
page read and write
5440000
heap
page read and write
A5AE000
stack
page read and write
7450000
trusted library allocation
page execute and read and write
77CE000
stack
page read and write
7120000
heap
page read and write
2B44000
trusted library allocation
page read and write
25A0000
trusted library allocation
page read and write
53BD000
trusted library allocation
page read and write
88A000
heap
page read and write
25A6000
trusted library allocation
page read and write
7F0D0000
trusted library allocation
page execute and read and write
FB4000
trusted library allocation
page read and write
4DAC000
stack
page read and write
4B7E000
trusted library allocation
page read and write
11F7000
trusted library allocation
page execute and read and write
2BB8000
trusted library allocation
page read and write
86E000
heap
page read and write
6A0000
heap
page read and write
49CE000
stack
page read and write
E4D000
trusted library allocation
page execute and read and write
5443000
heap
page read and write
2BCD000
trusted library allocation
page read and write
50CE000
stack
page read and write
640D000
stack
page read and write
13B0000
trusted library allocation
page read and write
305F000
trusted library allocation
page read and write
EC6000
heap
page read and write
3F36000
trusted library allocation
page read and write
704E000
stack
page read and write
A941000
trusted library allocation
page read and write
EC9000
heap
page read and write
2B09000
trusted library allocation
page read and write
E65000
trusted library allocation
page execute and read and write
69EE000
stack
page read and write
EA2000
heap
page read and write
2CB1000
trusted library allocation
page read and write
EBA000
heap
page read and write
2C71000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
70E000
stack
page read and write
2BD8000
trusted library allocation
page read and write
2AEE000
trusted library allocation
page read and write
3136000
trusted library allocation
page read and write
E68000
heap
page read and write
6B0000
heap
page read and write
3109000
trusted library allocation
page read and write
4C33000
heap
page read and write
7A00000
trusted library allocation
page execute and read and write
4B81000
trusted library allocation
page read and write
5140000
trusted library allocation
page execute and read and write
2C2A000
trusted library allocation
page read and write
6F00000
trusted library allocation
page execute and read and write
A56E000
stack
page read and write
E40000
trusted library allocation
page read and write
3148000
trusted library allocation
page read and write
2472000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
2BD2000
trusted library allocation
page read and write
4B64000
trusted library allocation
page read and write
C90000
heap
page read and write
61CE000
stack
page read and write
5570000
trusted library allocation
page execute and read and write
DD0000
heap
page read and write
59F0000
trusted library allocation
page execute and read and write
6F50000
trusted library allocation
page read and write
2466000
trusted library allocation
page execute and read and write
662E000
stack
page read and write
5135000
heap
page read and write
2430000
trusted library allocation
page read and write
F3A000
heap
page read and write
E6E000
heap
page read and write
14E0000
trusted library allocation
page read and write
6F4E000
stack
page read and write
2F92000
trusted library allocation
page read and write
3757000
trusted library allocation
page read and write
2F04000
trusted library allocation
page read and write
FE0000
heap
page read and write
58CE000
stack
page read and write
2BE1000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
350000
heap
page read and write
126F000
heap
page read and write
6BB3000
trusted library allocation
page read and write
2470000
trusted library allocation
page read and write
2C7D000
trusted library allocation
page read and write
414000
remote allocation
page execute and read and write
14D6000
trusted library allocation
page read and write
857000
heap
page read and write
961E000
stack
page read and write
558E000
trusted library allocation
page read and write
589E000
stack
page read and write
8F6000
unkown
page readonly
2980000
heap
page execute and read and write
6B1B000
heap
page read and write
E6B000
trusted library allocation
page execute and read and write
6BF0000
trusted library allocation
page read and write
39B9000
trusted library allocation
page read and write
6750000
trusted library allocation
page execute and read and write
690000
heap
page read and write
85A000
heap
page read and write
4B86000
trusted library allocation
page read and write
6332000
heap
page read and write
67B8000
heap
page read and write
3991000
trusted library allocation
page read and write
5CA6000
heap
page read and write
686D000
stack
page read and write
644F000
stack
page read and write
4E6E000
trusted library allocation
page read and write
2BAF000
stack
page read and write
3F4C000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
2A89000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
11AA000
heap
page read and write
78F000
stack
page read and write
5110000
trusted library allocation
page read and write
5E50000
heap
page read and write
2934000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
862000
unkown
page readonly
37C4000
trusted library allocation
page read and write
A6EE000
stack
page read and write
53B6000
trusted library allocation
page read and write
A11E000
stack
page read and write
E90000
heap
page read and write
53AA000
trusted library allocation
page read and write
E20000
heap
page read and write
E25000
heap
page read and write
2C50000
trusted library allocation
page read and write
E62000
trusted library allocation
page read and write
E3F000
stack
page read and write
2B16000
trusted library allocation
page read and write
5590000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
62D0000
heap
page read and write
4E00000
heap
page read and write
11EA000
trusted library allocation
page execute and read and write
10C0000
heap
page read and write
2C5B000
trusted library allocation
page read and write
E87000
heap
page read and write
12F5000
trusted library allocation
page read and write
2C24000
trusted library allocation
page read and write
5590000
heap
page read and write
24E8000
trusted library allocation
page read and write
2FB5000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
5370000
heap
page read and write
2FF1000
trusted library allocation
page read and write
125E000
stack
page read and write
4C22000
trusted library allocation
page read and write
115E000
stack
page read and write
10A0000
trusted library allocation
page read and write
672F000
stack
page read and write
3035000
trusted library allocation
page read and write
5345000
heap
page read and write
388F000
trusted library allocation
page read and write
BA0000
heap
page read and write
9B4E000
stack
page read and write
94E000
stack
page read and write
E50000
trusted library allocation
page read and write
FD5000
heap
page read and write
5E69000
heap
page read and write
313D000
trusted library allocation
page read and write
2A92000
trusted library allocation
page read and write
E56000
trusted library allocation
page execute and read and write
6F72000
trusted library allocation
page read and write
10C0000
heap
page read and write
14C0000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
6BBA000
trusted library allocation
page read and write
6C80000
heap
page read and write
10B4000
trusted library allocation
page read and write
78CE000
stack
page read and write
2C54000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
62CE000
stack
page read and write
247B000
trusted library allocation
page execute and read and write
25D0000
heap
page read and write
245D000
trusted library allocation
page execute and read and write
13A0000
trusted library allocation
page read and write
4BD0000
trusted library allocation
page read and write
A82B000
stack
page read and write
11CE000
stack
page read and write
850000
heap
page read and write
4C20000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
4C10000
heap
page read and write
412000
remote allocation
page execute and read and write
109E000
stack
page read and write
100E000
stack
page read and write
7460000
trusted library allocation
page read and write
4B6B000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
C80000
heap
page read and write
5170000
trusted library allocation
page execute and read and write
13D2000
trusted library allocation
page read and write
4B8D000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
A6AE000
stack
page read and write
5110000
trusted library allocation
page read and write
F90000
trusted library allocation
page execute and read and write
2C6E000
trusted library allocation
page read and write
6C0000
heap
page read and write
4B92000
trusted library allocation
page read and write
53AE000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
5CF5000
heap
page read and write
770000
heap
page read and write
10BD000
trusted library allocation
page execute and read and write
6AF8000
heap
page read and write
B37000
stack
page read and write
CDE000
stack
page read and write
2580000
trusted library allocation
page execute and read and write
4E20000
heap
page execute and read and write
1210000
trusted library allocation
page read and write
2A74000
trusted library allocation
page read and write
7F270000
trusted library allocation
page execute and read and write
36E1000
trusted library allocation
page read and write
50F0000
trusted library allocation
page execute and read and write
13D7000
trusted library allocation
page execute and read and write
80D000
stack
page read and write
737000
stack
page read and write
4C84000
trusted library section
page readonly
898000
heap
page read and write
6CB000
heap
page read and write
4ACD000
stack
page read and write
13A4000
trusted library allocation
page read and write
4E5E000
trusted library allocation
page read and write
26E1000
trusted library allocation
page read and write
502D000
stack
page read and write
1188000
heap
page read and write
14D0000
trusted library allocation
page read and write
5E4E000
stack
page read and write
5E60000
heap
page read and write
639000
stack
page read and write
413000
remote allocation
page execute and read and write
975F000
stack
page read and write
59DA000
trusted library allocation
page read and write
A7EE000
stack
page read and write
FD0000
heap
page read and write
7350000
heap
page read and write
4BA5000
trusted library allocation
page read and write
59DE000
trusted library allocation
page read and write
E52000
trusted library allocation
page read and write
76E0000
trusted library section
page read and write
2C1F000
trusted library allocation
page read and write
3EB1000
trusted library allocation
page read and write
13AD000
trusted library allocation
page execute and read and write
5162000
trusted library allocation
page read and write
4E10000
heap
page read and write
8A5000
heap
page read and write
A950000
trusted library allocation
page read and write
7C0000
heap
page read and write
25C0000
trusted library allocation
page read and write
30EB000
trusted library allocation
page read and write
310E000
trusted library allocation
page read and write
58B0000
heap
page read and write
4E6A000
trusted library allocation
page read and write
6860000
heap
page read and write
6850000
trusted library allocation
page execute and read and write
775000
heap
page read and write
382A000
trusted library allocation
page read and write
7760000
heap
page read and write
105F000
stack
page read and write
664E000
stack
page read and write
2F5D000
trusted library allocation
page read and write
3A17000
trusted library allocation
page read and write
2460000
trusted library allocation
page read and write
54E0000
trusted library allocation
page execute and read and write
4EE0000
heap
page read and write
129B000
stack
page read and write
4E7D000
trusted library allocation
page read and write
4C80000
trusted library section
page readonly
868000
heap
page read and write
6786000
heap
page read and write
5C50000
heap
page read and write
B40000
heap
page read and write
E60000
heap
page read and write
53A0000
trusted library allocation
page read and write
296F000
stack
page read and write
There are 570 hidden memdumps, click here to show them.