IOC Report
QUOTATION#09678.exe

loading gif

Files

File Path
Type
Category
Malicious
QUOTATION#09678.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_QUOTATION#09678._219e077cc2e4084a621b5a52d61711c854854a6_79443d72_8a6e0c61-5a37-44a8-8aed-c43c166b3102\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREC11.tmp.dmp
Mini DuMP crash report, 16 streams, Tue Nov 12 17:45:18 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF0D5.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF114.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\regsvcs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a5tkldmg.g5m.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oku3m0ak.wrk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tkshgdx2.132.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ukp3nqaj.daf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp10CF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp10DF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp115D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp11FA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp120B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp121C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp123C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4841.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4852.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4862.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4873.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4874.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4885.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp48A5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp48B5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp48B6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7D35.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7D36.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7D47.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7D57.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp7D68.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp7D78.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp7D79.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp7D8A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp7D9B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpA1EF.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA1FF.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA210.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA211.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA231.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpA242.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpA252.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpA253.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpB19C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpB1AD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpB1BD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpB1CE.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpB1DF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpB1EF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpD972.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpE574.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpE584.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 44 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QUOTATION#09678.exe
"C:\Users\user\Desktop\QUOTATION#09678.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\QUOTATION#09678.exe" -Force
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6704 -s 1332
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
193.70.111.186:13484
malicious
http://193.70.111.186:13484/
193.70.111.186
malicious
https://ipinfo.io/ip%appdata%
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://193.70.111.186:13484
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/
unknown
http://upx.sf.net
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://193.70.111.186:13484t-
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://api.ipify.orgcookies//settinString.Removeg
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb
unknown

IPs

IP
Domain
Country
Malicious
193.70.111.186
unknown
France
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
EnableLUA
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance
Enabled
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
FileDirectory
\REGISTRY\A\{1c3d6c6b-c09c-6a59-8374-fd24906ec161}\Root\InventoryApplicationFile\quotation#09678.|2934fda29c5b56ea
ProgramId
\REGISTRY\A\{1c3d6c6b-c09c-6a59-8374-fd24906ec161}\Root\InventoryApplicationFile\quotation#09678.|2934fda29c5b56ea
FileId
\REGISTRY\A\{1c3d6c6b-c09c-6a59-8374-fd24906ec161}\Root\InventoryApplicationFile\quotation#09678.|2934fda29c5b56ea
LowerCaseLongPath
\REGISTRY\A\{1c3d6c6b-c09c-6a59-8374-fd24906ec161}\Root\InventoryApplicationFile\quotation#09678.|2934fda29c5b56ea
LongPathHash
\REGISTRY\A\{1c3d6c6b-c09c-6a59-8374-fd24906ec161}\Root\InventoryApplicationFile\quotation#09678.|2934fda29c5b56ea
Name
\REGISTRY\A\{1c3d6c6b-c09c-6a59-8374-fd24906ec161}\Root\InventoryApplicationFile\quotation#09678.|2934fda29c5b56ea
OriginalFileName
\REGISTRY\A\{1c3d6c6b-c09c-6a59-8374-fd24906ec161}\Root\InventoryApplicationFile\quotation#09678.|2934fda29c5b56ea
Publisher
\REGISTRY\A\{1c3d6c6b-c09c-6a59-8374-fd24906ec161}\Root\InventoryApplicationFile\quotation#09678.|2934fda29c5b56ea
Version
\REGISTRY\A\{1c3d6c6b-c09c-6a59-8374-fd24906ec161}\Root\InventoryApplicationFile\quotation#09678.|2934fda29c5b56ea
BinFileVersion
\REGISTRY\A\{1c3d6c6b-c09c-6a59-8374-fd24906ec161}\Root\InventoryApplicationFile\quotation#09678.|2934fda29c5b56ea
BinaryType
\REGISTRY\A\{1c3d6c6b-c09c-6a59-8374-fd24906ec161}\Root\InventoryApplicationFile\quotation#09678.|2934fda29c5b56ea
ProductName
\REGISTRY\A\{1c3d6c6b-c09c-6a59-8374-fd24906ec161}\Root\InventoryApplicationFile\quotation#09678.|2934fda29c5b56ea
ProductVersion
\REGISTRY\A\{1c3d6c6b-c09c-6a59-8374-fd24906ec161}\Root\InventoryApplicationFile\quotation#09678.|2934fda29c5b56ea
LinkDate
\REGISTRY\A\{1c3d6c6b-c09c-6a59-8374-fd24906ec161}\Root\InventoryApplicationFile\quotation#09678.|2934fda29c5b56ea
BinProductVersion
\REGISTRY\A\{1c3d6c6b-c09c-6a59-8374-fd24906ec161}\Root\InventoryApplicationFile\quotation#09678.|2934fda29c5b56ea
AppxPackageFullName
\REGISTRY\A\{1c3d6c6b-c09c-6a59-8374-fd24906ec161}\Root\InventoryApplicationFile\quotation#09678.|2934fda29c5b56ea
AppxPackageRelativeId
\REGISTRY\A\{1c3d6c6b-c09c-6a59-8374-fd24906ec161}\Root\InventoryApplicationFile\quotation#09678.|2934fda29c5b56ea
Size
\REGISTRY\A\{1c3d6c6b-c09c-6a59-8374-fd24906ec161}\Root\InventoryApplicationFile\quotation#09678.|2934fda29c5b56ea
Language
\REGISTRY\A\{1c3d6c6b-c09c-6a59-8374-fd24906ec161}\Root\InventoryApplicationFile\quotation#09678.|2934fda29c5b56ea
Usn
There are 26 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1D8CBDE5000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
1D8B9585000
trusted library allocation
page read and write
malicious
1D8B9783000
trusted library allocation
page read and write
F13000
trusted library allocation
page execute and read and write
1D8B9694000
trusted library allocation
page read and write
63C4000
trusted library allocation
page read and write
1D8B96DE000
trusted library allocation
page read and write
1D8B962E000
trusted library allocation
page read and write
1D8B96D2000
trusted library allocation
page read and write
1D8C9B41000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
1D8B972C000
trusted library allocation
page read and write
286E000
stack
page read and write
1D8B963A000
trusted library allocation
page read and write
1D8B965F000
trusted library allocation
page read and write
2F5C000
trusted library allocation
page read and write
3A83000
trusted library allocation
page read and write
7381000
heap
page read and write
732A000
heap
page read and write
1D8B97B4000
trusted library allocation
page read and write
1D8B751D000
heap
page read and write
8A96000
heap
page read and write
F14000
trusted library allocation
page read and write
1D8B9630000
trusted library allocation
page read and write
68FE000
stack
page read and write
7FFAAC740000
trusted library allocation
page read and write
1D8C9B48000
trusted library allocation
page read and write
2911000
trusted library allocation
page read and write
6110000
trusted library allocation
page execute and read and write
3BFD000
trusted library allocation
page read and write
3BF8000
trusted library allocation
page read and write
63C8000
trusted library allocation
page read and write
3EB2000
trusted library allocation
page read and write
1D8B97DD000
trusted library allocation
page read and write
F70000
trusted library allocation
page execute and read and write
7210000
heap
page read and write
F00000
trusted library allocation
page read and write
632F000
stack
page read and write
400000
remote allocation
page execute and read and write
1D8B96FF000
trusted library allocation
page read and write
1D8B961D000
trusted library allocation
page read and write
1D8B7460000
heap
page read and write
1D8B9625000
trusted library allocation
page read and write
1D8B9793000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
1D8C9B55000
trusted library allocation
page read and write
D90000
heap
page read and write
7FFAAC8A6000
trusted library allocation
page read and write
F45000
trusted library allocation
page execute and read and write
1D8B9762000
trusted library allocation
page read and write
1D8B96CA000
trusted library allocation
page read and write
3E30000
trusted library allocation
page read and write
6245000
trusted library allocation
page read and write
1D8C9A41000
trusted library allocation
page read and write
DB0000
heap
page read and write
6222000
trusted library allocation
page read and write
C40000
heap
page read and write
28E0000
trusted library allocation
page read and write
1D8B9632000
trusted library allocation
page read and write
1D8B968C000
trusted library allocation
page read and write
542D000
trusted library allocation
page read and write
2940000
heap
page read and write
3ED0000
trusted library allocation
page read and write
7150000
trusted library allocation
page execute and read and write
2A51000
trusted library allocation
page read and write
7FFAAC74C000
trusted library allocation
page execute and read and write
6380000
trusted library allocation
page read and write
92E74FF000
stack
page read and write
2E04000
trusted library allocation
page read and write
1D8B9710000
trusted library allocation
page read and write
7FFAAC86F000
trusted library allocation
page read and write
1D8C98CD000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
1D8B74DB000
heap
page read and write
1D8B9714000
trusted library allocation
page read and write
704AF000
unkown
page readonly
1D8B97D1000
trusted library allocation
page read and write
1D8B97AC000
trusted library allocation
page read and write
63B2000
trusted library allocation
page read and write
71E0000
trusted library allocation
page execute and read and write
55FB000
trusted library allocation
page read and write
E88000
heap
page read and write
2BDF000
trusted library allocation
page read and write
1D8C91E1000
trusted library allocation
page read and write
7322000
heap
page read and write
1D8B7410000
heap
page read and write
28D4000
trusted library allocation
page read and write
1D8B97B8000
trusted library allocation
page read and write
54DE000
stack
page read and write
63BF000
trusted library allocation
page read and write
3BDE000
trusted library allocation
page read and write
6390000
trusted library allocation
page read and write
1D8B964A000
trusted library allocation
page read and write
605C000
heap
page read and write
2AD0000
trusted library allocation
page read and write
7FFB1E102000
unkown
page readonly
F87000
heap
page read and write
6660000
trusted library allocation
page execute and read and write
1D8B96A9000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
1D8B96B1000
trusted library allocation
page read and write
5450000
trusted library allocation
page execute and read and write
1D8B9673000
trusted library allocation
page read and write
7FFAAC860000
trusted library allocation
page read and write
7FFB1E0E0000
unkown
page readonly
753E000
stack
page read and write
1D8B9739000
trusted library allocation
page read and write
1D8C99C1000
trusted library allocation
page read and write
2FDC000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
7FFAAC85A000
trusted library allocation
page read and write
2BF6000
trusted library allocation
page read and write
731B000
heap
page read and write
2AC8000
trusted library allocation
page read and write
92E6BFE000
stack
page read and write
F4B000
trusted library allocation
page execute and read and write
2BC2000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
1D8B9636000
trusted library allocation
page read and write
1D8B9720000
trusted library allocation
page read and write
1D8CA579000
trusted library allocation
page read and write
7FFAAC8C0000
trusted library allocation
page read and write
3BEF000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
4A58000
trusted library allocation
page read and write
50E0000
heap
page execute and read and write
AF7000
stack
page read and write
1D8B9724000
trusted library allocation
page read and write
2A4E000
stack
page read and write
1D8B9629000
trusted library allocation
page read and write
606A000
heap
page read and write
3FF0000
trusted library allocation
page read and write
1D8D1200000
trusted library allocation
page read and write
1D8CA141000
trusted library allocation
page read and write
7FFAAC6BB000
trusted library allocation
page execute and read and write
1D8B76A0000
trusted library allocation
page read and write
1D8B978B000
trusted library allocation
page read and write
601B000
heap
page read and write
3062000
trusted library allocation
page read and write
604A000
heap
page read and write
7FFAAC8B0000
trusted library allocation
page execute and read and write
63DD000
trusted library allocation
page read and write
1D8B9802000
trusted library allocation
page read and write
7FFAAC692000
trusted library allocation
page read and write
1D8B96EB000
trusted library allocation
page read and write
1D8B7690000
trusted library allocation
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
2D81000
trusted library allocation
page read and write
1D8B977F000
trusted library allocation
page read and write
F36000
trusted library allocation
page execute and read and write
3E29000
trusted library allocation
page read and write
1D8D1A70000
heap
page read and write
7FFAAC6AD000
trusted library allocation
page execute and read and write
1D8B96B9000
trusted library allocation
page read and write
1D8B969D000
trusted library allocation
page read and write
1D8B96B5000
trusted library allocation
page read and write
92E77FE000
stack
page read and write
5346000
trusted library allocation
page read and write
E0B000
heap
page read and write
7333000
heap
page read and write
1D8B965B000
trusted library allocation
page read and write
623A000
trusted library allocation
page read and write
1D8B9619000
trusted library allocation
page read and write
3C1F000
trusted library allocation
page read and write
1D8B979B000
trusted library allocation
page read and write
F47000
trusted library allocation
page execute and read and write
7FFAAC840000
trusted library allocation
page execute and read and write
60C0000
trusted library allocation
page execute and read and write
50B0000
trusted library allocation
page read and write
6238000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
2AE1000
trusted library allocation
page read and write
3A62000
trusted library allocation
page read and write
1D8B751F000
heap
page read and write
2D8A000
trusted library allocation
page read and write
6A9E000
stack
page read and write
1D8B96AD000
trusted library allocation
page read and write
7302000
heap
page read and write
5430000
trusted library allocation
page read and write
1D8B967C000
trusted library allocation
page read and write
50D0000
trusted library allocation
page execute and read and write
54E0000
trusted library allocation
page execute and read and write
6280000
heap
page execute and read and write
92E6AF2000
stack
page read and write
28DA000
trusted library allocation
page read and write
7180000
trusted library allocation
page execute and read and write
1D8B97E5000
trusted library allocation
page read and write
733E000
heap
page read and write
639A000
trusted library allocation
page read and write
3BAC000
trusted library allocation
page read and write
63A0000
trusted library allocation
page execute and read and write
D50000
heap
page read and write
1D8B9205000
trusted library allocation
page read and write
66D0000
heap
page read and write
3CA5000
trusted library allocation
page read and write
2AA0000
trusted library allocation
page read and write
1D8B96A1000
trusted library allocation
page read and write
60B2000
trusted library allocation
page read and write
1D8B90D0000
trusted library section
page read and write
7FFAAC750000
trusted library allocation
page execute and read and write
1D8B975A000
trusted library allocation
page read and write
7FFAAC830000
trusted library allocation
page read and write
1D8B96F7000
trusted library allocation
page read and write
F8B000
heap
page read and write
3EAC000
trusted library allocation
page read and write
1D8B9663000
trusted library allocation
page read and write
1D8B96EF000
trusted library allocation
page read and write
1D8B96FB000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
1D8B74F0000
heap
page read and write
6220000
trusted library allocation
page read and write
7200000
heap
page read and write
608E000
heap
page read and write
7FFAAC854000
trusted library allocation
page read and write
1D8B966F000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
1D8B74B0000
heap
page read and write
2B75000
trusted library allocation
page read and write
522D000
stack
page read and write
1D8B9745000
trusted library allocation
page read and write
610E000
stack
page read and write
7FFAAC6B0000
trusted library allocation
page read and write
63E5000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
6262000
trusted library allocation
page read and write
736D000
heap
page read and write
1D8D1C26000
heap
page read and write
1D8B9653000
trusted library allocation
page read and write
2F56000
trusted library allocation
page read and write
F80000
heap
page read and write
1D8B966B000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
3ED5000
trusted library allocation
page read and write
1D8CA155000
trusted library allocation
page read and write
1D8B91D1000
trusted library allocation
page read and write
1D8B978F000
trusted library allocation
page read and write
2C7B000
trusted library allocation
page read and write
53B0000
trusted library allocation
page execute and read and write
7FFAAC7B0000
trusted library allocation
page execute and read and write
53A0000
trusted library allocation
page read and write
1D8B9766000
trusted library allocation
page read and write
1D8B9690000
trusted library allocation
page read and write
92E6CFE000
stack
page read and write
50AD000
stack
page read and write
2BDD000
trusted library allocation
page read and write
3EC2000
trusted library allocation
page read and write
F30000
trusted library allocation
page read and write
6082000
heap
page read and write
70490000
unkown
page readonly
304C000
trusted library allocation
page read and write
1D8C9D55000
trusted library allocation
page read and write
3E23000
trusted library allocation
page read and write
624A000
trusted library allocation
page read and write
1D8B9707000
trusted library allocation
page read and write
1D8B7755000
heap
page read and write
2AC2000
trusted library allocation
page read and write
1D8C91F4000
trusted library allocation
page read and write
68BE000
stack
page read and write
92E72FE000
stack
page read and write
2EBD000
trusted library allocation
page read and write
7FFAAC746000
trusted library allocation
page read and write
7FFAAC6BD000
trusted library allocation
page execute and read and write
1D8B9140000
heap
page read and write
1D8B9680000
trusted library allocation
page read and write
6950000
heap
page read and write
63D6000
trusted library allocation
page read and write
3056000
trusted library allocation
page read and write
1D8B97A0000
trusted library allocation
page read and write
3BFA000
trusted library allocation
page read and write
2BE3000
trusted library allocation
page read and write
4BED000
stack
page read and write
EED000
stack
page read and write
1D8C91D1000
trusted library allocation
page read and write
1D8B9797000
trusted library allocation
page read and write
6225000
trusted library allocation
page read and write
1D8B97F2000
trusted library allocation
page read and write
1D8B96C2000
trusted library allocation
page read and write
1D8B9646000
trusted library allocation
page read and write
1D8B9731000
trusted library allocation
page read and write
1D8B97EA000
trusted library allocation
page read and write
7FFAAC776000
trusted library allocation
page execute and read and write
621E000
stack
page read and write
F32000
trusted library allocation
page read and write
F2D000
trusted library allocation
page execute and read and write
5FD2000
heap
page read and write
1D8B9749000
trusted library allocation
page read and write
7388000
heap
page read and write
7190000
trusted library allocation
page execute and read and write
6037000
heap
page read and write
55FE000
trusted library allocation
page read and write
63CE000
trusted library allocation
page read and write
92E6DFE000
stack
page read and write
60B0000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
3DCA000
trusted library allocation
page read and write
63B6000
trusted library allocation
page read and write
1D8B96D6000
trusted library allocation
page read and write
6350000
trusted library allocation
page read and write
1D8B76E0000
heap
page execute and read and write
2F48000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
1D8B971C000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
506F000
stack
page read and write
5F90000
heap
page read and write
F42000
trusted library allocation
page read and write
3EC5000
trusted library allocation
page read and write
6087000
heap
page read and write
1D8C91D8000
trusted library allocation
page read and write
62ED000
stack
page read and write
C3E000
stack
page read and write
1D8B976E000
trusted library allocation
page read and write
28C0000
trusted library allocation
page read and write
7FFAAC694000
trusted library allocation
page read and write
1D8B9688000
trusted library allocation
page read and write
1D8B9615000
trusted library allocation
page read and write
594E000
stack
page read and write
1D8B9776000
trusted library allocation
page read and write
3BE5000
trusted library allocation
page read and write
6053000
heap
page read and write
1D8B96CE000
trusted library allocation
page read and write
1D8B7710000
heap
page read and write
66B0000
trusted library allocation
page read and write
1D8B9756000
trusted library allocation
page read and write
1D8B9718000
trusted library allocation
page read and write
1D8B9678000
trusted library allocation
page read and write
3DDC000
trusted library allocation
page read and write
1D8B97B0000
trusted library allocation
page read and write
6260000
trusted library allocation
page read and write
1D8B9735000
trusted library allocation
page read and write
2BFF000
trusted library allocation
page read and write
6370000
trusted library allocation
page read and write
6265000
trusted library allocation
page read and write
5341000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
B20000
heap
page read and write
92E70FD000
stack
page read and write
735F000
heap
page read and write
63D8000
trusted library allocation
page read and write
7BB000
stack
page read and write
1D8B97A4000
trusted library allocation
page read and write
624F000
trusted library allocation
page read and write
1D8C9D41000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
71F0000
trusted library allocation
page execute and read and write
108F000
stack
page read and write
1D8B97C5000
trusted library allocation
page read and write
7310000
heap
page read and write
7358000
heap
page read and write
1D8B970C000
trusted library allocation
page read and write
D4F000
stack
page read and write
6254000
trusted library allocation
page read and write
1D8B9667000
trusted library allocation
page read and write
1D8B932E000
trusted library allocation
page read and write
3E35000
trusted library allocation
page read and write
28B0000
trusted library allocation
page read and write
7FFB1E105000
unkown
page readonly
623F000
trusted library allocation
page read and write
1D8B9272000
trusted library allocation
page read and write
7FFB1E0F6000
unkown
page readonly
63BC000
trusted library allocation
page read and write
1D8B9611000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
1D8B7366000
unkown
page readonly
2B85000
trusted library allocation
page read and write
DE6000
heap
page read and write
1D8C95C1000
trusted library allocation
page read and write
1D8B9655000
trusted library allocation
page read and write
1D8B97FA000
trusted library allocation
page read and write
1D8B7352000
unkown
page readonly
28D0000
trusted library allocation
page read and write
7300000
heap
page read and write
532F000
stack
page read and write
7373000
heap
page read and write
2B7F000
trusted library allocation
page read and write
1D8B97D9000
trusted library allocation
page read and write
1D8B97F6000
trusted library allocation
page read and write
1D8B96BD000
trusted library allocation
page read and write
3A5E000
trusted library allocation
page read and write
7FFAAC6EC000
trusted library allocation
page execute and read and write
7FFAAC69D000
trusted library allocation
page execute and read and write
1D8B969F000
trusted library allocation
page read and write
699B000
stack
page read and write
1D8B97BC000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
1D8D1BC0000
heap
page read and write
1D8B74F3000
heap
page read and write
1D8B7594000
heap
page read and write
7FFAAC8A0000
trusted library allocation
page read and write
3A51000
trusted library allocation
page read and write
F1D000
trusted library allocation
page execute and read and write
7FFAAC6B4000
trusted library allocation
page read and write
3DD0000
trusted library allocation
page read and write
602E000
heap
page read and write
3DD7000
trusted library allocation
page read and write
2FE2000
trusted library allocation
page read and write
1D8B9050000
heap
page read and write
1D8B7420000
heap
page read and write
1D8CA44D000
trusted library allocation
page read and write
92E76FD000
stack
page read and write
3EBC000
trusted library allocation
page read and write
1D8B7440000
heap
page read and write
1D8B9772000
trusted library allocation
page read and write
542A000
trusted library allocation
page read and write
63B4000
trusted library allocation
page read and write
1D8B97E1000
trusted library allocation
page read and write
7FFAAC690000
trusted library allocation
page read and write
3BB7000
trusted library allocation
page read and write
3BF4000
trusted library allocation
page read and write
2900000
heap
page execute and read and write
2F3E000
trusted library allocation
page read and write
1D8B967A000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
7FFAAC870000
trusted library allocation
page read and write
92E6EFE000
stack
page read and write
1D8B96C6000
trusted library allocation
page read and write
50E3000
heap
page execute and read and write
D80000
heap
page read and write
1D8B7598000
heap
page read and write
1D8B97FE000
trusted library allocation
page read and write
1D8B96DA000
trusted library allocation
page read and write
1D8C9D48000
trusted library allocation
page read and write
3EB9000
trusted library allocation
page read and write
1D8B91C0000
heap
page execute and read and write
693E000
stack
page read and write
1D8B9703000
trusted library allocation
page read and write
1D8B96E7000
trusted library allocation
page read and write
3AC5000
trusted library allocation
page read and write
1D8B9336000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
1D8B973D000
trusted library allocation
page read and write
7FFAAC880000
trusted library allocation
page read and write
7FFB1E100000
unkown
page read and write
67BE000
stack
page read and write
1D8B977B000
trusted library allocation
page read and write
2E0E000
trusted library allocation
page read and write
1D8B76A3000
trusted library allocation
page read and write
6229000
trusted library allocation
page read and write
1D8B9657000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
549D000
stack
page read and write
7383000
heap
page read and write
55F0000
trusted library allocation
page read and write
1D8B975E000
trusted library allocation
page read and write
6044000
heap
page read and write
1D8CA148000
trusted library allocation
page read and write
1D8B976A000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
1D8C91E8000
trusted library allocation
page read and write
7FFAAC850000
trusted library allocation
page read and write
3BEB000
trusted library allocation
page read and write
7140000
heap
page read and write
1D8B7525000
heap
page read and write
55EF000
stack
page read and write
7FAF0000
trusted library allocation
page execute and read and write
1D8B76C3000
heap
page read and write
1D8B9621000
trusted library allocation
page read and write
63E2000
trusted library allocation
page read and write
757E000
stack
page read and write
7FFAAC693000
trusted library allocation
page execute and read and write
7FFB1E0E1000
unkown
page execute read
3068000
trusted library allocation
page read and write
3BB1000
trusted library allocation
page read and write
8A80000
heap
page read and write
1D8B7359000
unkown
page readonly
704A6000
unkown
page readonly
1D8B97CD000
trusted library allocation
page read and write
2FC6000
trusted library allocation
page read and write
7D7E000
stack
page read and write
7FFAAC6A2000
trusted library allocation
page read and write
2CFE000
trusted library allocation
page read and write
92E73FE000
stack
page read and write
7FF4B4CE0000
trusted library allocation
page execute and read and write
1D8CA04D000
trusted library allocation
page read and write
1D8B9728000
trusted library allocation
page read and write
1D8B963E000
trusted library allocation
page read and write
C45000
heap
page read and write
1D8C95C8000
trusted library allocation
page read and write
92E6FFD000
stack
page read and write
1D8C94ED000
trusted library allocation
page read and write
51EE000
stack
page read and write
1D8B97C9000
trusted library allocation
page read and write
1D8B7415000
heap
page read and write
3BBC000
trusted library allocation
page read and write
7C7F000
stack
page read and write
1D8B9684000
trusted library allocation
page read and write
1D8B964E000
trusted library allocation
page read and write
3ECA000
trusted library allocation
page read and write
1D8B74A0000
trusted library allocation
page read and write
6940000
trusted library allocation
page read and write
1D8B974D000
trusted library allocation
page read and write
1D8B97A8000
trusted library allocation
page read and write
63D1000
trusted library allocation
page read and write
1D8B9751000
trusted library allocation
page read and write
1D8B96F3000
trusted library allocation
page read and write
1D8B9741000
trusted library allocation
page read and write
6650000
trusted library allocation
page read and write
704AD000
unkown
page read and write
2C85000
trusted library allocation
page read and write
1D8B7350000
unkown
page readonly
71A0000
trusted library allocation
page read and write
2D07000
trusted library allocation
page read and write
DB8000
heap
page read and write
1D8B9698000
trusted library allocation
page read and write
7FFAAC890000
trusted library allocation
page execute and read and write
1D8C95D5000
trusted library allocation
page read and write
1D8B73F0000
heap
page read and write
1D8B7750000
heap
page read and write
3E81000
trusted library allocation
page read and write
28AC000
stack
page read and write
71D0000
trusted library allocation
page read and write
1D8B97D5000
trusted library allocation
page read and write
70491000
unkown
page execute read
1D8B96E2000
trusted library allocation
page read and write
1D8B97C0000
trusted library allocation
page read and write
3C0F000
trusted library allocation
page read and write
1D8B76C0000
heap
page read and write
5352000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
1D8B96A5000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
1D8B9787000
trusted library allocation
page read and write
1D8B9642000
trusted library allocation
page read and write
DDA000
heap
page read and write
1D8B97EE000
trusted library allocation
page read and write
6670000
trusted library allocation
page read and write
4F6E000
stack
page read and write
3C02000
trusted library allocation
page read and write
3EC8000
trusted library allocation
page read and write
There are 520 hidden memdumps, click here to show them.