IOC Report
QUOTATION_JULQTRA071244#U00b7PDF.scr.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QUOTATION_JULQTRA071244#U00b7PDF.scr.exe
"C:\Users\user\Desktop\QUOTATION_JULQTRA071244#U00b7PDF.scr.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout 10
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\timeout.exe
timeout 10
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout 10
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\timeout.exe
timeout 10

URLs

Name
IP
Malicious
http://checkip.dyndns.org/
132.226.8.169
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:367706%0D%0ADate%20a
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://investms.vadavo.cloud
unknown
https://api.telegram.org/bot
unknown
https://s22.filetransfer.io/storage/download/iiz1WoiTc5zb
188.114.97.3
https://filetransfer.io/data-package/v4mecse6/download
188.114.96.3
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://chrome.google.com/webstore?hl=en
unknown
http://varders.kozow.com:8081
unknown
https://github.com/mgravell/protobuf-neti
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://s22.filetransfer.io
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://filetransfer.io
unknown
http://filetransfer.io
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/
unknown
https://www.office.com/
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/mgravell/protobuf-net
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://filetransfer.io/data-package/v4mecse6/download
188.114.96.3
http://r10.o.lencr.org0#
unknown
http://checkip.dyndns.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://www.ecosia.org/newtab/
unknown
https://chrome.google.com/webstore?hl=en8
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:367706%0D%0ADate%20and%20Time:%2028/07/2024%20/%2001:17:10%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20367706%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.office.com/8
unknown
http://51.38.247.67:8081/_send_.php?L
unknown
http://anotherarmy.dns.army:8081
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://reallyfreegeoip.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://r10.i.lencr.org/0
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
investms.vadavo.cloud
185.123.204.162
malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.com
132.226.8.169
malicious
checkip.dyndns.org
unknown
malicious
bg.microsoft.map.fastly.net
199.232.210.172
filetransfer.io
188.114.96.3
s22.filetransfer.io
188.114.97.3
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
132.226.8.169
checkip.dyndns.com
United States
malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
185.123.204.162
investms.vadavo.cloud
Spain
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
188.114.96.3
filetransfer.io
European Union

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_JULQTRA071244#U00b7PDF_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
FileDirectory
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
140002000
remote allocation
page execute and read and write
malicious
1375067E000
heap
page read and write
malicious
250E20E1000
trusted library allocation
page read and write
malicious
13750CE0000
trusted library section
page read and write
malicious
13747D81000
trusted library allocation
page read and write
malicious
13737C7F000
trusted library allocation
page read and write
malicious
13747B81000
trusted library allocation
page read and write
malicious
B9E66FE000
stack
page read and write
13737EF1000
trusted library allocation
page read and write
13737F8B000
trusted library allocation
page read and write
250F21C8000
trusted library allocation
page read and write
1373826B000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
13736110000
trusted library allocation
page read and write
250E2670000
trusted library allocation
page read and write
1373801B000
trusted library allocation
page read and write
137380A3000
trusted library allocation
page read and write
13737EB7000
trusted library allocation
page read and write
13738269000
trusted library allocation
page read and write
250E0507000
heap
page read and write
13737F7F000
trusted library allocation
page read and write
137383DB000
trusted library allocation
page read and write
250E0640000
heap
page read and write
13737F6B000
trusted library allocation
page read and write
1373837D000
trusted library allocation
page read and write
137382CF000
trusted library allocation
page read and write
7FFD9BD50000
trusted library allocation
page read and write
1373804D000
trusted library allocation
page read and write
137380C4000
trusted library allocation
page read and write
250FA110000
trusted library allocation
page read and write
250F2450000
trusted library allocation
page read and write
250F2212000
trusted library allocation
page read and write
13737B71000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
13738324000
trusted library allocation
page read and write
13737F22000
trusted library allocation
page read and write
13738357000
trusted library allocation
page read and write
7FFD9BDB7000
trusted library allocation
page read and write
250FA0E0000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
250E254F000
trusted library allocation
page read and write
250E232C000
trusted library allocation
page read and write
7FFD9BA38000
trusted library allocation
page read and write
250F2378000
trusted library allocation
page read and write
250E0785000
heap
page read and write
137380C8000
trusted library allocation
page read and write
7FFD9BD40000
trusted library allocation
page read and write
137360B0000
heap
page read and write
13737ECA000
trusted library allocation
page read and write
7FFD9BA3F000
trusted library allocation
page read and write
13737F19000
trusted library allocation
page read and write
7FFD9BDB3000
trusted library allocation
page read and write
7FFD9BA17000
trusted library allocation
page read and write
CC93FFE000
stack
page read and write
137380B6000
trusted library allocation
page read and write
13737FD2000
trusted library allocation
page read and write
137383C1000
trusted library allocation
page read and write
250E243A000
trusted library allocation
page read and write
7FFD9B948000
trusted library allocation
page execute and read and write
137382B1000
trusted library allocation
page read and write
250F2218000
trusted library allocation
page read and write
13737F67000
trusted library allocation
page read and write
137383FE000
trusted library allocation
page read and write
13737F1F000
trusted library allocation
page read and write
250F228F000
trusted library allocation
page read and write
CC92FFE000
stack
page read and write
7FFD9B933000
trusted library allocation
page read and write
137381DB000
trusted library allocation
page read and write
250F22EC000
trusted library allocation
page read and write
13737F65000
trusted library allocation
page read and write
13737F56000
trusted library allocation
page read and write
13738072000
trusted library allocation
page read and write
250E0435000
heap
page read and write
137382CD000
trusted library allocation
page read and write
137383A1000
trusted library allocation
page read and write
13735F35000
heap
page read and write
137383E7000
trusted library allocation
page read and write
250F2481000
trusted library allocation
page read and write
13750B00000
unkown
page readonly
250E2440000
trusted library allocation
page read and write
9E697FE000
stack
page read and write
7FFD9BA0C000
trusted library allocation
page read and write
250E0410000
heap
page read and write
13747D33000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
20D17FE000
stack
page read and write
250F2216000
trusted library allocation
page read and write
CC933FF000
stack
page read and write
250F247A000
trusted library allocation
page read and write
250E21A6000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
13750520000
heap
page execute and read and write
13750870000
direct allocation
page execute read
13737F5A000
trusted library allocation
page read and write
1373830B000
trusted library allocation
page read and write
13735EEC000
heap
page read and write
13735DFD000
unkown
page readonly
CC92BF2000
stack
page read and write
7FFD9BB20000
trusted library allocation
page read and write
13738245000
trusted library allocation
page read and write
250E2520000
trusted library allocation
page read and write
250F22C8000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page execute and read and write
137382D5000
trusted library allocation
page read and write
7FFD9BD46000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
13737FC4000
trusted library allocation
page read and write
7FF424350000
trusted library allocation
page execute and read and write
7FFD9B763000
trusted library allocation
page execute and read and write
13735E80000
heap
page read and write
250F2396000
trusted library allocation
page read and write
2711EA70000
heap
page read and write
7FFD9BA2F000
trusted library allocation
page read and write
13737E97000
trusted library allocation
page read and write
250E22F1000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1373805C000
trusted library allocation
page read and write
13737FF3000
trusted library allocation
page read and write
250F21CE000
trusted library allocation
page read and write
250F21D4000
trusted library allocation
page read and write
250F219D000
trusted library allocation
page read and write
250E21BE000
trusted library allocation
page read and write
13737BCE000
trusted library allocation
page read and write
137383A3000
trusted library allocation
page read and write
13737ED9000
trusted library allocation
page read and write
13738203000
trusted library allocation
page read and write
20D09EE000
stack
page read and write
7FFD9B939000
trusted library allocation
page read and write
13737FE2000
trusted library allocation
page read and write
250E044B000
heap
page read and write
7FFD9B753000
trusted library allocation
page execute and read and write
13738289000
trusted library allocation
page read and write
13737FAD000
trusted library allocation
page read and write
1373833F000
trusted library allocation
page read and write
13737A70000
heap
page read and write
20D11FA000
stack
page read and write
13750340000
heap
page read and write
1373831B000
trusted library allocation
page read and write
250FA978000
heap
page read and write
250E216C000
trusted library allocation
page read and write
137383F4000
trusted library allocation
page read and write
250E06C3000
trusted library allocation
page read and write
27120430000
heap
page read and write
13738029000
trusted library allocation
page read and write
9E6977C000
stack
page read and write
7FFD9B77B000
trusted library allocation
page execute and read and write
250F2298000
trusted library allocation
page read and write
250F229A000
trusted library allocation
page read and write
7FFD9B752000
trusted library allocation
page read and write
250F214C000
trusted library allocation
page read and write
13737F9A000
trusted library allocation
page read and write
7FFD9BBDF000
trusted library allocation
page read and write
137361E0000
heap
page read and write
7FFD9B8F7000
trusted library allocation
page read and write
250E0745000
heap
page read and write
7FFD9BA02000
trusted library allocation
page read and write
7FFD9BBA2000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page execute and read and write
13738355000
trusted library allocation
page read and write
13750950000
direct allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
137381F0000
trusted library allocation
page read and write
250F2372000
trusted library allocation
page read and write
250F245D000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
250FA462000
heap
page read and write
23FEDC50000
heap
page read and write
7FFD9BD90000
trusted library allocation
page read and write
13738084000
trusted library allocation
page read and write
250F220F000
trusted library allocation
page read and write
137507BC000
heap
page read and write
1373803E000
trusted library allocation
page read and write
2711EAB0000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
250F23CE000
trusted library allocation
page read and write
13750A20000
direct allocation
page read and write
13737F78000
trusted library allocation
page read and write
13738302000
trusted library allocation
page read and write
23FEDE40000
heap
page read and write
250F2104000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
13737EDE000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
13737EE8000
trusted library allocation
page read and write
250F22D4000
trusted library allocation
page read and write
13737E99000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
250E215F000
trusted library allocation
page read and write
250E249D000
trusted library allocation
page read and write
13738442000
trusted library allocation
page read and write
13738429000
trusted library allocation
page read and write
1373835D000
trusted library allocation
page read and write
137381D9000
trusted library allocation
page read and write
1373808F000
trusted library allocation
page read and write
13735EE1000
heap
page read and write
1373828E000
trusted library allocation
page read and write
13738337000
trusted library allocation
page read and write
250F21A3000
trusted library allocation
page read and write
250F23A4000
trusted library allocation
page read and write
13737F35000
trusted library allocation
page read and write
7FFD9BA48000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
250FB0B0000
heap
page read and write
13737F32000
trusted library allocation
page read and write
13738249000
trusted library allocation
page read and write
7FF4A98F0000
trusted library allocation
page execute and read and write
13750786000
heap
page read and write
137381C6000
trusted library allocation
page read and write
250E22F7000
trusted library allocation
page read and write
137380C2000
trusted library allocation
page read and write
250F20E1000
trusted library allocation
page read and write
7FFD9BB8C000
trusted library allocation
page read and write
250E21BA000
trusted library allocation
page read and write
13738270000
trusted library allocation
page read and write
1374FBA0000
trusted library allocation
page read and write
7FFD9B902000
trusted library allocation
page read and write
250F2200000
trusted library allocation
page read and write
23FEC2C8000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
250E22FC000
trusted library allocation
page read and write
7FFD9BA56000
trusted library allocation
page read and write
137503E0000
heap
page read and write
250F2376000
trusted library allocation
page read and write
23FEC2C0000
heap
page read and write
250E06B0000
trusted library allocation
page read and write
13737EB3000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page read and write
1373807C000
trusted library allocation
page read and write
137383C7000
trusted library allocation
page read and write
250F23D7000
trusted library allocation
page read and write
27120505000
heap
page read and write
250E221F000
trusted library allocation
page read and write
CC93BFD000
stack
page read and write
1373842F000
trusted library allocation
page read and write
250F2489000
trusted library allocation
page read and write
7FFD9BBA7000
trusted library allocation
page read and write
2711EA80000
heap
page read and write
137503F9000
heap
page read and write
CC937FF000
stack
page read and write
7FFD9B810000
trusted library allocation
page execute and read and write
250E2150000
trusted library allocation
page read and write
27120500000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
250F235E000
trusted library allocation
page read and write
7FFD9B8F4000
trusted library allocation
page read and write
137382D1000
trusted library allocation
page read and write
250E0478000
heap
page read and write
13737C60000
trusted library allocation
page read and write
13750670000
heap
page read and write
13737EB5000
trusted library allocation
page read and write
CC9248E000
stack
page read and write
13738315000
trusted library allocation
page read and write
7FFD9BC80000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
13738282000
trusted library allocation
page read and write
250E2322000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
137380AD000
trusted library allocation
page read and write
13737F98000
trusted library allocation
page read and write
13736123000
trusted library allocation
page read and write
250E26A1000
trusted library allocation
page read and write
13735F9D000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
1373809E000
trusted library allocation
page read and write
7FFD9BA3D000
trusted library allocation
page read and write
250E21C2000
trusted library allocation
page read and write
13735DCB000
unkown
page readonly
250E20D0000
heap
page read and write
137361E5000
heap
page read and write
7FFD9BB3C000
trusted library allocation
page read and write
CC94FFD000
stack
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
20D14FD000
stack
page read and write
137507A8000
heap
page read and write
13737EAA000
trusted library allocation
page read and write
13738025000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page execute and read and write
7FFD9B806000
trusted library allocation
page read and write
250F236A000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page execute and read and write
250E22C8000
trusted library allocation
page read and write
13750B90000
trusted library section
page read and write
250E21B6000
trusted library allocation
page read and write
137380A0000
trusted library allocation
page read and write
137383A5000
trusted library allocation
page read and write
250E2488000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
13737F2C000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
9E69A7E000
stack
page read and write
13738247000
trusted library allocation
page read and write
13737F06000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
CC953FE000
stack
page read and write
137382AF000
trusted library allocation
page read and write
1373827A000
trusted library allocation
page read and write
250E0760000
heap
page read and write
137383B4000
trusted library allocation
page read and write
13737F4A000
trusted library allocation
page read and write
137382AB000
trusted library allocation
page read and write
13737B20000
trusted library allocation
page read and write
13738451000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
13738368000
trusted library allocation
page read and write
13737F1D000
trusted library allocation
page read and write
23FEC290000
heap
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
1373837B000
trusted library allocation
page read and write
250E2176000
trusted library allocation
page read and write
7FFD9BA69000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
13737F08000
trusted library allocation
page read and write
137383EB000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
B9E677E000
stack
page read and write
13735D70000
unkown
page readonly
250F2407000
trusted library allocation
page read and write
137382F5000
trusted library allocation
page read and write
250F23B3000
trusted library allocation
page read and write
13737EC4000
trusted library allocation
page read and write
13737F9C000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page execute and read and write
250F2436000
trusted library allocation
page read and write
13738425000
trusted library allocation
page read and write
13736120000
trusted library allocation
page read and write
13738201000
trusted library allocation
page read and write
250E0780000
heap
page read and write
13737A20000
trusted library allocation
page read and write
20D207E000
unkown
page read and write
7FFD9B780000
trusted library allocation
page read and write
13738339000
trusted library allocation
page read and write
13737F69000
trusted library allocation
page read and write
137380B1000
trusted library allocation
page read and write
250F2444000
trusted library allocation
page read and write
250E2380000
trusted library allocation
page read and write
137383CA000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
13737F0F000
trusted library allocation
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
250E23B2000
trusted library allocation
page read and write
1373809C000
trusted library allocation
page read and write
250E25DF000
trusted library allocation
page read and write
250FA8F4000
heap
page read and write
250E2446000
trusted library allocation
page read and write
13737F6E000
trusted library allocation
page read and write
7FFD9B946000
trusted library allocation
page execute and read and write
13738014000
trusted library allocation
page read and write
250F21B3000
trusted library allocation
page read and write
13747B71000
trusted library allocation
page read and write
13737EEC000
trusted library allocation
page read and write
13738438000
trusted library allocation
page read and write
137503CA000
heap
page read and write
13737F01000
trusted library allocation
page read and write
7FFD9BD60000
trusted library allocation
page read and write
250F2109000
trusted library allocation
page read and write
13750D40000
trusted library section
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
250E2000000
heap
page execute and read and write
250F23B6000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
13735F39000
heap
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
20D1EFA000
stack
page read and write
1373840B000
trusted library allocation
page read and write
7FFD9BDC0000
trusted library allocation
page read and write
13737EDB000
trusted library allocation
page read and write
13737EA4000
trusted library allocation
page read and write
1373806D000
trusted library allocation
page read and write
13738267000
trusted library allocation
page read and write
250F21BA000
trusted library allocation
page read and write
250F237A000
trusted library allocation
page read and write
13735D72000
unkown
page readonly
13738313000
trusted library allocation
page read and write
250E21AA000
trusted library allocation
page read and write
250E26D3000
trusted library allocation
page read and write
13737FC2000
trusted library allocation
page read and write
137360F0000
trusted library allocation
page read and write
250F246A000
trusted library allocation
page read and write
250F2439000
trusted library allocation
page read and write
13737E87000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
13738383000
trusted library allocation
page read and write
7FFD9B754000
trusted library allocation
page read and write
13737EB9000
trusted library allocation
page read and write
137381C2000
trusted library allocation
page read and write
13735F04000
heap
page read and write
250F21C6000
trusted library allocation
page read and write
250F2413000
trusted library allocation
page read and write
137504E0000
heap
page read and write
13737E84000
trusted library allocation
page read and write
250E2493000
trusted library allocation
page read and write
13738319000
trusted library allocation
page read and write
7FFD9BDBD000
trusted library allocation
page read and write
13738038000
trusted library allocation
page read and write
13738036000
trusted library allocation
page read and write
1373804B000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
13737EBB000
trusted library allocation
page read and write
CC957FE000
stack
page read and write
7FFD9BD35000
trusted library allocation
page read and write
13736090000
heap
page read and write
13736140000
heap
page read and write
13737FDC000
trusted library allocation
page read and write
13737F54000
trusted library allocation
page read and write
7FFD9BCF1000
trusted library allocation
page read and write
7FFD9BA1D000
trusted library allocation
page read and write
13738004000
trusted library allocation
page read and write
7FFD9BABE000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
20D16FE000
stack
page read and write
7FFD9BBCC000
trusted library allocation
page read and write
1373828B000
trusted library allocation
page read and write
250E2324000
trusted library allocation
page read and write
7FFD9B905000
trusted library allocation
page read and write
140000000
remote allocation
page execute read
7FFD9BDD0000
trusted library allocation
page read and write
23FEC2A0000
heap
page read and write
20D10FE000
stack
page read and write
250FA9E0000
heap
page read and write
250E0418000
heap
page read and write
7FFD9BDB0000
trusted library allocation
page read and write
250E06C0000
trusted library allocation
page read and write
13735E90000
heap
page read and write
250F21F2000
trusted library allocation
page read and write
7FF424360000
trusted library allocation
page execute and read and write
7FFD9BA4A000
trusted library allocation
page read and write
1373806F000
trusted library allocation
page read and write
137382A1000
trusted library allocation
page read and write
13736145000
heap
page read and write
250E044E000
heap
page read and write
13738236000
trusted library allocation
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
137381B5000
trusted library allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
13738254000
trusted library allocation
page read and write
13737FE5000
trusted library allocation
page read and write
7FFD9BBC5000
trusted library allocation
page read and write
1373804F000
trusted library allocation
page read and write
137380B3000
trusted library allocation
page read and write
7FFD9BD3A000
trusted library allocation
page read and write
13737F8F000
trusted library allocation
page read and write
1373824B000
trusted library allocation
page read and write
13738359000
trusted library allocation
page read and write
13738409000
trusted library allocation
page read and write
137507E2000
heap
page read and write
1373842D000
trusted library allocation
page read and write
137383A7000
trusted library allocation
page read and write
1374FEFA000
heap
page read and write
250F21C2000
trusted library allocation
page read and write
13738205000
trusted library allocation
page read and write
13738381000
trusted library allocation
page read and write
13738058000
trusted library allocation
page read and write
13750490000
trusted library section
page read and write
250F23D9000
trusted library allocation
page read and write
1373822A000
trusted library allocation
page read and write
250E231E000
trusted library allocation
page read and write
7FF424340000
trusted library allocation
page execute and read and write
7FFD9BAB0000
trusted library allocation
page read and write
250F243C000
trusted library allocation
page read and write
13737FB1000
trusted library allocation
page read and write
250FA8F6000
heap
page read and write
7FFD9BCB3000
trusted library allocation
page read and write
7FFD9BA32000
trusted library allocation
page read and write
250F242B000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
250E22D9000
trusted library allocation
page read and write
250E2326000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B93D000
trusted library allocation
page execute and read and write
9E69AFF000
stack
page read and write
13738221000
trusted library allocation
page read and write
CC94BFE000
stack
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9BD80000
trusted library allocation
page read and write
250F2347000
trusted library allocation
page read and write
13735EC0000
heap
page read and write
13737E7E000
trusted library allocation
page read and write
250F21A1000
trusted library allocation
page read and write
7FFD9BA19000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
2711EAB8000
heap
page read and write
13738455000
trusted library allocation
page read and write
250F222F000
trusted library allocation
page read and write
250E248C000
trusted library allocation
page read and write
250E2640000
trusted library allocation
page read and write
250F21D6000
trusted library allocation
page read and write
13747D7E000
trusted library allocation
page read and write
20D0DFD000
stack
page read and write
137382E8000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
250E21AE000
trusted library allocation
page read and write
13736160000
trusted library section
page read and write
7FFD9BB50000
trusted library allocation
page read and write
13737BFE000
trusted library allocation
page read and write
137380AF000
trusted library allocation
page read and write
250F2345000
trusted library allocation
page read and write
CC95BFE000
stack
page read and write
13737BF2000
trusted library allocation
page read and write
250E21C6000
trusted library allocation
page read and write
13737E80000
trusted library allocation
page read and write
20D18FE000
stack
page read and write
250FA9E3000
heap
page read and write
1373832E000
trusted library allocation
page read and write
13737BFA000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
250F2357000
trusted library allocation
page read and write
20D1FFF000
stack
page read and write
20D1AFE000
stack
page read and write
137382B4000
trusted library allocation
page read and write
7FFD9B80C000
trusted library allocation
page execute and read and write
13738049000
trusted library allocation
page read and write
13735F2F000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
250E2331000
trusted library allocation
page read and write
13738407000
trusted library allocation
page read and write
13737F2E000
trusted library allocation
page read and write
250F2464000
trusted library allocation
page read and write
1373807E000
trusted library allocation
page read and write
1373833D000
trusted library allocation
page read and write
13738218000
trusted library allocation
page read and write
250F2237000
trusted library allocation
page read and write
7FFD9BA39000
trusted library allocation
page read and write
250E0438000
heap
page read and write
1373842B000
trusted library allocation
page read and write
13737F8D000
trusted library allocation
page read and write
13737FAF000
trusted library allocation
page read and write
CC924CF000
stack
page read and write
13737FC6000
trusted library allocation
page read and write
137381E8000
trusted library allocation
page read and write
250E06F0000
heap
page execute and read and write
250E0520000
heap
page read and write
20D12FE000
stack
page read and write
250E244C000
trusted library allocation
page read and write
13735F02000
heap
page read and write
13738016000
trusted library allocation
page read and write
250E0740000
heap
page read and write
7FFD9BCF9000
trusted library allocation
page read and write
7FFD9BA2B000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page read and write
13737EC2000
trusted library allocation
page read and write
7FFD9B7AC000
trusted library allocation
page execute and read and write
250E217A000
trusted library allocation
page read and write
1375074D000
heap
page read and write
CC943FE000
stack
page read and write
7FFD9BDA0000
trusted library allocation
page read and write
250E2484000
trusted library allocation
page read and write
13737EA2000
trusted library allocation
page read and write
1373802D000
trusted library allocation
page read and write
250FA8B0000
heap
page read and write
13735ECC000
heap
page read and write
1373826D000
trusted library allocation
page read and write
137381D5000
trusted library allocation
page read and write
250E24F0000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
250E25AF000
trusted library allocation
page read and write
7FFD9B96B000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
7FFD9B93D000
trusted library allocation
page read and write
13737C02000
trusted library allocation
page read and write
13737E95000
trusted library allocation
page read and write
1373827C000
trusted library allocation
page read and write
250E2610000
trusted library allocation
page read and write
250F2468000
trusted library allocation
page read and write
1373844B000
trusted library allocation
page read and write
250F2366000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
20D0CEB000
stack
page read and write
7FFD9BBBF000
trusted library allocation
page read and write
250F2341000
trusted library allocation
page read and write
13737BE8000
trusted library allocation
page read and write
13737FDE000
trusted library allocation
page read and write
137383B9000
trusted library allocation
page read and write
250E248E000
trusted library allocation
page read and write
250E2427000
trusted library allocation
page read and write
250E21F5000
trusted library allocation
page read and write
13738002000
trusted library allocation
page read and write
7FFD9B9DD000
trusted library allocation
page read and write
13737F5C000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page execute and read and write
7FFD9BA24000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
7FFD9B944000
trusted library allocation
page read and write
7FFD9BB93000
trusted library allocation
page read and write
13737FF8000
trusted library allocation
page read and write
137381D7000
trusted library allocation
page read and write
13738223000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
13738047000
trusted library allocation
page read and write
250F236C000
trusted library allocation
page read and write
20D15FE000
stack
page read and write
137382FA000
trusted library allocation
page read and write
250E0600000
heap
page read and write
1373817B000
trusted library allocation
page read and write
250F2277000
trusted library allocation
page read and write
13735F2D000
heap
page read and write
1375067C000
heap
page read and write
CC947FE000
stack
page read and write
23FEDE45000
heap
page read and write
137381EA000
trusted library allocation
page read and write
20D13FA000
stack
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
13737B60000
heap
page execute and read and write
7FFD9BD70000
trusted library allocation
page read and write
13737FB4000
trusted library allocation
page read and write
137383E5000
trusted library allocation
page read and write
250E0690000
trusted library allocation
page read and write
250E217E000
trusted library allocation
page read and write
20D09AF000
stack
page read and write
250F2228000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
250E21B2000
trusted library allocation
page read and write
250E257F000
trusted library allocation
page read and write
20D1BFD000
stack
page read and write
7FFD9B944000
trusted library allocation
page execute and read and write
7FFD9BA60000
trusted library allocation
page read and write
250E0620000
heap
page read and write
7FFD9B942000
trusted library allocation
page read and write
13737BEF000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
B9E667C000
stack
page read and write
250F21D2000
trusted library allocation
page read and write
There are 617 hidden memdumps, click here to show them.