IOC Report
QUOTATION_NOVQTRA071244PDF.scr.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QUOTATION_NOVQTRA071244PDF.scr.exe
"C:\Users\user\Desktop\QUOTATION_NOVQTRA071244PDF.scr.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://entityframework-extensions.net/md5-exception
unknown
https://bulk-operations.net
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://dapper-plus.net/getting-started-mapping#instance-context-mapping.
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://dapper-plus.net/pricing.
unknown
https://www.nuget.org/packages/NetTopologySuite.IO.SqlServerBytes/
unknown
https://s23.filetransfer.io/storage/download/mOA1FV1QAe83
188.114.96.3
https://github.com/mgravell/protobuf-net
unknown
https://entityframework-extensions.net/)
unknown
http://checkip.dyndns.org
unknown
http://www.zzzprojects.com
unknown
https://bulk-operations.net/pricing.
unknown
https://s23.filetransfer.io
unknown
https://entityframework-extensions.net/include-graph).
unknown
https://entityframework-extensions.net/pricing.
unknown
https://dapper-plus.net/getting-started-mapping#instance-context-mapping
unknown
https://linqtosql-plus.net/pricing.
unknown
http://checkip.dyndns.org/
193.122.6.168
https://github.com/mgravell/protobuf-neti
unknown
https://reallyfreegeoip.org/xml/155.94.241.187p
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://filetransfer.io/data-package/Bh1Kj4RD/download
188.114.96.3
http://filetransfer.io/data-package/Bh1Kj4RD/download
188.114.96.3
http://checkip.dyndns.org/q
unknown
http://entityframework-plus.net/
unknown
http://reallyfreegeoip.org
unknown
https://filetransfer.io
unknown
https://reallyfreegeoip.org
unknown
https://github.com/npgsql/npgsql/issues/2623#issuecomment-627622215
unknown
http://checkip.dyndns.com
unknown
http://filetransfer.io
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/155.94.241.187
188.114.97.3
https://dapper-plus.net
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
filetransfer.io
188.114.96.3
reallyfreegeoip.org
188.114.97.3
s23.filetransfer.io
188.114.96.3
checkip.dyndns.com
193.122.6.168
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
188.114.97.3
reallyfreegeoip.org
European Union
193.122.6.168
checkip.dyndns.com
United States
188.114.96.3
filetransfer.io
European Union

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
FileDirectory
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
210A7EAE000
trusted library allocation
page read and write
malicious
1E500245000
trusted library allocation
page read and write
malicious
210C07B0000
trusted library section
page read and write
malicious
1E510009000
trusted library allocation
page read and write
malicious
210B7D01000
trusted library allocation
page read and write
malicious
1E56C560000
trusted library section
page read and write
malicious
1E500001000
trusted library allocation
page read and write
malicious
210A84A0000
trusted library allocation
page read and write
210A8083000
trusted library allocation
page read and write
210A8010000
trusted library allocation
page read and write
7FF7C10F1000
trusted library allocation
page read and write
210A803B000
trusted library allocation
page read and write
210A82DA000
trusted library allocation
page read and write
1E510035000
trusted library allocation
page read and write
1E56E700000
heap
page execute and read and write
1E5001AC000
trusted library allocation
page read and write
210A8548000
trusted library allocation
page read and write
CE080BE000
stack
page read and write
7FF7C11B0000
trusted library allocation
page read and write
CE05FFD000
stack
page read and write
210A8489000
trusted library allocation
page read and write
CE0687E000
stack
page read and write
7FF7C10D8000
trusted library allocation
page execute and read and write
210C04C0000
heap
page execute and read and write
210A8382000
trusted library allocation
page read and write
CE0787F000
stack
page read and write
210A83EE000
trusted library allocation
page read and write
7FF7C1360000
trusted library allocation
page read and write
210A850F000
trusted library allocation
page read and write
210A8568000
trusted library allocation
page read and write
210C04E4000
heap
page execute and read and write
210A8255000
trusted library allocation
page read and write
210C0630000
trusted library section
page read and write
210A81D8000
trusted library allocation
page read and write
7FF7C0F6B000
trusted library allocation
page execute and read and write
1E56C39C000
heap
page read and write
210A8299000
trusted library allocation
page read and write
1E56C530000
trusted library allocation
page read and write
210A7DE2000
trusted library allocation
page read and write
1E500198000
trusted library allocation
page read and write
210A6111000
heap
page read and write
1E500194000
trusted library allocation
page read and write
7FF7C1120000
trusted library allocation
page read and write
210A7AA0000
trusted library allocation
page read and write
210A81A6000
trusted library allocation
page read and write
210A856E000
trusted library allocation
page read and write
210A8292000
trusted library allocation
page read and write
1E56C38A000
heap
page read and write
7FF7C11D0000
trusted library allocation
page execute and read and write
210A8052000
trusted library allocation
page read and write
210A81DA000
trusted library allocation
page read and write
210A84CD000
trusted library allocation
page read and write
210A84CF000
trusted library allocation
page read and write
7FF7C1100000
trusted library allocation
page execute and read and write
210A82D2000
trusted library allocation
page read and write
1E50021B000
trusted library allocation
page read and write
7FF7C0F23000
trusted library allocation
page execute and read and write
210A8513000
trusted library allocation
page read and write
210A7DB4000
trusted library allocation
page read and write
210A858A000
trusted library allocation
page read and write
7FF7C11A0000
trusted library allocation
page read and write
210A8283000
trusted library allocation
page read and write
210A837E000
trusted library allocation
page read and write
210A824F000
trusted library allocation
page read and write
1E5001D7000
trusted library allocation
page read and write
210A858E000
trusted library allocation
page read and write
210A7DE6000
trusted library allocation
page read and write
1E56C3A1000
heap
page read and write
210A8041000
trusted library allocation
page read and write
72DE839000
stack
page read and write
7FF7C1170000
trusted library allocation
page read and write
210A823E000
trusted library allocation
page read and write
210A815E000
trusted library allocation
page read and write
210A801F000
trusted library allocation
page read and write
210A83F7000
trusted library allocation
page read and write
1E5100B3000
trusted library allocation
page read and write
210A823C000
trusted library allocation
page read and write
210A820D000
trusted library allocation
page read and write
210A8515000
trusted library allocation
page read and write
210A8570000
trusted library allocation
page read and write
72DE53E000
stack
page read and write
7FF7C10E2000
trusted library allocation
page read and write
210A84EF000
trusted library allocation
page read and write
210A802E000
trusted library allocation
page read and write
210A8504000
trusted library allocation
page read and write
7FF7C11F0000
trusted library allocation
page read and write
1E5002BF000
trusted library allocation
page read and write
1E56C260000
heap
page read and write
7FF7C1000000
trusted library allocation
page execute and read and write
210A818F000
trusted library allocation
page read and write
210B801F000
trusted library allocation
page read and write
72DE0FE000
stack
page read and write
210A5E82000
unkown
page readonly
210A81EF000
trusted library allocation
page read and write
210A8294000
trusted library allocation
page read and write
7FF7C0FF0000
trusted library allocation
page read and write
210A83E0000
trusted library allocation
page read and write
210A83F9000
trusted library allocation
page read and write
210A840A000
trusted library allocation
page read and write
72DE1FE000
stack
page read and write
7FF7C10C3000
trusted library allocation
page read and write
210A7E00000
trusted library allocation
page read and write
1E5002E2000
trusted library allocation
page read and write
7FF7C0F24000
trusted library allocation
page read and write
7FF7C1210000
trusted library allocation
page read and write
1E500311000
trusted library allocation
page read and write
CE07C7E000
stack
page read and write
7FF7C11E0000
trusted library allocation
page read and write
210A83EC000
trusted library allocation
page read and write
210A7BC3000
heap
page read and write
1E50019C000
trusted library allocation
page read and write
7FF7C0F60000
trusted library allocation
page read and write
210A8487000
trusted library allocation
page read and write
210A60D0000
heap
page read and write
1E56C360000
heap
page read and write
7FF7C11C7000
trusted library allocation
page read and write
1E56DEE0000
heap
page read and write
210A83BB000
trusted library allocation
page read and write
1E500144000
trusted library allocation
page read and write
7FF7C0FE0000
trusted library allocation
page execute and read and write
210A8032000
trusted library allocation
page read and write
210A842C000
trusted library allocation
page read and write
210A8470000
trusted library allocation
page read and write
210A821C000
trusted library allocation
page read and write
210A81A2000
trusted library allocation
page read and write
7FF40EF80000
trusted library allocation
page execute and read and write
210A84E0000
trusted library allocation
page read and write
210A7B70000
trusted library section
page read and write
1E50031D000
trusted library allocation
page read and write
72DEE3F000
stack
page read and write
1E500151000
trusted library allocation
page read and write
1E56EAC3000
heap
page read and write
210C0489000
heap
page read and write
210C045D000
heap
page read and write
210A81FE000
trusted library allocation
page read and write
210A822B000
trusted library allocation
page read and write
1E56C540000
trusted library allocation
page read and write
7FF7C1100000
trusted library allocation
page read and write
7FF7C1040000
trusted library allocation
page execute and read and write
210A820F000
trusted library allocation
page read and write
7FF7C0FFC000
trusted library allocation
page execute and read and write
210A82DC000
trusted library allocation
page read and write
210A844E000
trusted library allocation
page read and write
210A83FD000
trusted library allocation
page read and write
210A8122000
trusted library allocation
page read and write
210A5E80000
unkown
page readonly
210A84E2000
trusted library allocation
page read and write
210A7DDE000
trusted library allocation
page read and write
210A8232000
trusted library allocation
page read and write
7FF7C10CD000
trusted library allocation
page execute and read and write
210A613D000
heap
page read and write
1E510032000
trusted library allocation
page read and write
1E50010C000
trusted library allocation
page read and write
1E56E8A4000
heap
page read and write
210C0BB0000
heap
page read and write
1E56E8ED000
heap
page read and write
210A8457000
trusted library allocation
page read and write
1E50012C000
trusted library allocation
page read and write
210A82F8000
trusted library allocation
page read and write
210A82A7000
trusted library allocation
page read and write
210A60DC000
heap
page read and write
210A85A1000
trusted library allocation
page read and write
1E56C580000
heap
page execute and read and write
210A8212000
trusted library allocation
page read and write
210A84F3000
trusted library allocation
page read and write
210A6070000
heap
page read and write
CE05BFE000
stack
page read and write
7FF7C11E9000
trusted library allocation
page read and write
1E5100BF000
trusted library allocation
page read and write
210A8441000
trusted library allocation
page read and write
210A803F000
trusted library allocation
page read and write
210A6090000
heap
page read and write
210A62C0000
heap
page read and write
7FF7C1180000
trusted library allocation
page read and write
210A843F000
trusted library allocation
page read and write
1E5001C3000
trusted library allocation
page read and write
210A8411000
trusted library allocation
page read and write
7FF7C1119000
trusted library allocation
page read and write
210A82E5000
trusted library allocation
page read and write
7FF7C1006000
trusted library allocation
page execute and read and write
7FF7C10FD000
trusted library allocation
page read and write
210A8072000
trusted library allocation
page read and write
210A818B000
trusted library allocation
page read and write
210A8191000
trusted library allocation
page read and write
210A8502000
trusted library allocation
page read and write
210A82BA000
trusted library allocation
page read and write
210A8375000
trusted library allocation
page read and write
1E56C340000
heap
page read and write
1E500231000
trusted library allocation
page read and write
210A8287000
trusted library allocation
page read and write
210A8043000
trusted library allocation
page read and write
7FF7C0F53000
trusted library allocation
page read and write
210A84BE000
trusted library allocation
page read and write
210A8391000
trusted library allocation
page read and write
7FF7C1180000
trusted library allocation
page execute and read and write
7FF7C11ED000
trusted library allocation
page read and write
210A7CD0000
heap
page execute and read and write
210A8209000
trusted library allocation
page read and write
7FF7C10E0000
trusted library allocation
page read and write
72DE93E000
stack
page read and write
1E5001B0000
trusted library allocation
page read and write
210A60FD000
heap
page read and write
210B7CE1000
trusted library allocation
page read and write
210A62A0000
heap
page read and write
210A7FFB000
trusted library allocation
page read and write
210A81A0000
trusted library allocation
page read and write
72DE3F4000
stack
page read and write
210A854D000
trusted library allocation
page read and write
1E56DF40000
heap
page read and write
210A8586000
trusted library allocation
page read and write
210A8450000
trusted library allocation
page read and write
72DE2FF000
stack
page read and write
1E56E8E0000
heap
page read and write
210A82FE000
trusted library allocation
page read and write
1E56E853000
heap
page read and write
210A8506000
trusted library allocation
page read and write
210A8086000
trusted library allocation
page read and write
210A6095000
heap
page read and write
7FF7C1200000
trusted library allocation
page execute and read and write
210A801D000
trusted library allocation
page read and write
72DDAED000
stack
page read and write
210A7DD4000
trusted library allocation
page read and write
7FF7C0F64000
trusted library allocation
page read and write
210A804E000
trusted library allocation
page read and write
CE07CBF000
stack
page read and write
7FF7C0F22000
trusted library allocation
page read and write
7FF7C0F6D000
trusted library allocation
page execute and read and write
210A84DC000
trusted library allocation
page read and write
7FF7C1130000
trusted library allocation
page execute and read and write
210A84F5000
trusted library allocation
page read and write
7FF7C0F4D000
trusted library allocation
page execute and read and write
210A84BC000
trusted library allocation
page read and write
210C0459000
heap
page read and write
7FF7C1270000
trusted library allocation
page read and write
210A840E000
trusted library allocation
page read and write
72DE43E000
stack
page read and write
210A8465000
trusted library allocation
page read and write
7FF7C1320000
trusted library allocation
page read and write
7FF7C1124000
trusted library allocation
page read and write
7FF7C10FA000
trusted library allocation
page read and write
7FF7C1260000
trusted library allocation
page read and write
1E5001FE000
trusted library allocation
page read and write
210A8013000
trusted library allocation
page read and write
72DD7FE000
stack
page read and write
210A83E6000
trusted library allocation
page read and write
1E5002DD000
trusted library allocation
page read and write
1E56DF50000
heap
page read and write
210A819C000
trusted library allocation
page read and write
1E56C593000
trusted library allocation
page read and write
210A8045000
trusted library allocation
page read and write
210A856C000
trusted library allocation
page read and write
210A81E9000
trusted library allocation
page read and write
1E56C460000
direct allocation
page read and write
7FF7C1106000
trusted library allocation
page read and write
210A6113000
heap
page read and write
1E5002D4000
trusted library allocation
page read and write
210A8266000
trusted library allocation
page read and write
1E500155000
trusted library allocation
page read and write
1E50035C000
trusted library allocation
page read and write
210A830D000
trusted library allocation
page read and write
7FF7C1190000
trusted library allocation
page read and write
7FF7C0F43000
trusted library allocation
page execute and read and write
1E50014D000
trusted library allocation
page read and write
210A84E5000
trusted library allocation
page read and write
1E51008E000
trusted library allocation
page read and write
210A81F8000
trusted library allocation
page read and write
7FF7C10D0000
trusted library allocation
page read and write
210A81D4000
trusted library allocation
page read and write
210A8588000
trusted library allocation
page read and write
7FF7C1140000
trusted library allocation
page execute and read and write
210A843D000
trusted library allocation
page read and write
7FF7C10C0000
trusted library allocation
page read and write
72DE63D000
stack
page read and write
1E5002CA000
trusted library allocation
page read and write
210A8061000
trusted library allocation
page read and write
72DDEFE000
stack
page read and write
7FF7C1026000
trusted library allocation
page execute and read and write
210A848B000
trusted library allocation
page read and write
1E5000FB000
trusted library allocation
page read and write
210A833C000
trusted library allocation
page read and write
210A81BE000
trusted library allocation
page read and write
72DDFFD000
stack
page read and write
1E56C590000
trusted library allocation
page read and write
1E5000E5000
trusted library allocation
page read and write
7FF7C0FF6000
trusted library allocation
page read and write
210A81AF000
trusted library allocation
page read and write
210A822D000
trusted library allocation
page read and write
210A81A4000
trusted library allocation
page read and write
CE04FF2000
stack
page read and write
210A82C9000
trusted library allocation
page read and write
210A8050000
trusted library allocation
page read and write
7FF7C0F5D000
trusted library allocation
page execute and read and write
210A84B3000
trusted library allocation
page read and write
210A82A5000
trusted library allocation
page read and write
210A82FC000
trusted library allocation
page read and write
7FF7C1300000
trusted library allocation
page read and write
72DE73E000
stack
page read and write
210A82D4000
trusted library allocation
page read and write
210A859B000
trusted library allocation
page read and write
210A8200000
trusted library allocation
page read and write
210A803D000
trusted library allocation
page read and write
7FF7C1160000
trusted library allocation
page read and write
210A8408000
trusted library allocation
page read and write
210A802A000
trusted library allocation
page read and write
1E56C620000
heap
page read and write
210A8345000
trusted library allocation
page read and write
1E50015A000
trusted library allocation
page read and write
210B7CF5000
trusted library allocation
page read and write
210A81FA000
trusted library allocation
page read and write
210A84F8000
trusted library allocation
page read and write
210A8368000
trusted library allocation
page read and write
210A7E42000
trusted library allocation
page read and write
210A82EB000
trusted library allocation
page read and write
210A8476000
trusted library allocation
page read and write
7FF7C1220000
trusted library allocation
page read and write
1E56C3CA000
heap
page read and write
210A842E000
trusted library allocation
page read and write
7FF7C0F35000
trusted library allocation
page read and write
7FF7C1060000
trusted library allocation
page execute and read and write
7FF40EFA0000
trusted library allocation
page execute and read and write
210A8533000
trusted library allocation
page read and write
7FF7C1103000
trusted library allocation
page read and write
210A8260000
trusted library allocation
page read and write
210A8063000
trusted library allocation
page read and write
210A82B8000
trusted library allocation
page read and write
210A81EB000
trusted library allocation
page read and write
7FF7C0F40000
trusted library allocation
page read and write
210A84DE000
trusted library allocation
page read and write
210A6144000
heap
page read and write
210A82A9000
trusted library allocation
page read and write
210C03A0000
heap
page read and write
1E500323000
trusted library allocation
page read and write
7FF7C11C0000
trusted library allocation
page read and write
210A6475000
heap
page read and write
210A8240000
trusted library allocation
page read and write
210A7AF0000
trusted library allocation
page read and write
210B8176000
trusted library allocation
page read and write
210A7FFD000
trusted library allocation
page read and write
7FF7C126D000
trusted library allocation
page read and write
1E56C625000
heap
page read and write
210A84AF000
trusted library allocation
page read and write
7FF7C1280000
trusted library allocation
page execute and read and write
210A82B6000
trusted library allocation
page read and write
210A8074000
trusted library allocation
page read and write
72DEB3C000
stack
page read and write
7FF7C0FDC000
trusted library allocation
page execute and read and write
210A8076000
trusted library allocation
page read and write
210A8065000
trusted library allocation
page read and write
210A82D8000
trusted library allocation
page read and write
210A8490000
trusted library allocation
page read and write
210A7FFF000
trusted library allocation
page read and write
210A82FA000
trusted library allocation
page read and write
210A82E7000
trusted library allocation
page read and write
210A841F000
trusted library allocation
page read and write
210A7E3E000
trusted library allocation
page read and write
7FF7C1340000
trusted library allocation
page read and write
CE0607E000
stack
page read and write
210A7FF3000
trusted library allocation
page read and write
210A849C000
trusted library allocation
page read and write
210A84F1000
trusted library allocation
page read and write
7FF7C1350000
trusted library allocation
page read and write
210A8454000
trusted library allocation
page read and write
7FF49BE00000
trusted library allocation
page execute and read and write
7FF7C1190000
trusted library allocation
page execute and read and write
210A60A0000
heap
page read and write
1E5002C4000
trusted library allocation
page read and write
7FF7C136C000
trusted library allocation
page read and write
7FF7C11A1000
trusted library allocation
page read and write
CE0747F000
stack
page read and write
210A8262000
trusted library allocation
page read and write
210A8056000
trusted library allocation
page read and write
1E500317000
trusted library allocation
page read and write
210A8428000
trusted library allocation
page read and write
1E56C220000
remote allocation
page execute and read and write
1E5100AA000
trusted library allocation
page read and write
210A83EA000
trusted library allocation
page read and write
1E56EA20000
heap
page read and write
1E56C39F000
heap
page read and write
210A8599000
trusted library allocation
page read and write
210A853B000
trusted library allocation
page read and write
210A8251000
trusted library allocation
page read and write
210A8258000
trusted library allocation
page read and write
210A8444000
trusted library allocation
page read and write
210A843B000
trusted library allocation
page read and write
210A848D000
trusted library allocation
page read and write
210A8386000
trusted library allocation
page read and write
210A8555000
trusted library allocation
page read and write
1E56C37B000
heap
page read and write
7FF7C0FD0000
trusted library allocation
page read and write
CE0647E000
stack
page read and write
7FF7C11C3000
trusted library allocation
page read and write
210A8296000
trusted library allocation
page read and write
210A856A000
trusted library allocation
page read and write
210A7CE1000
trusted library allocation
page read and write
210A84C9000
trusted library allocation
page read and write
210A8544000
trusted library allocation
page read and write
210A8400000
trusted library allocation
page read and write
210A8452000
trusted library allocation
page read and write
210A847E000
trusted library allocation
page read and write
210A8264000
trusted library allocation
page read and write
CE0707D000
stack
page read and write
210A849E000
trusted library allocation
page read and write
7FF7C10D6000
trusted library allocation
page execute and read and write
210A8070000
trusted library allocation
page read and write
210A8364000
trusted library allocation
page read and write
7FF7C0FD6000
trusted library allocation
page read and write
7FF40EF90000
trusted library allocation
page execute and read and write
1E56C490000
heap
page read and write
210A821F000
trusted library allocation
page read and write
210A7AD3000
trusted library allocation
page read and write
210A8290000
trusted library allocation
page read and write
210A8461000
trusted library allocation
page read and write
7FF7C0F44000
trusted library allocation
page read and write
210A8285000
trusted library allocation
page read and write
7FF7C1312000
trusted library allocation
page read and write
7FF7C10F5000
trusted library allocation
page read and write
7FF7C1110000
trusted library allocation
page read and write
1E56E8F3000
heap
page read and write
210A82E9000
trusted library allocation
page read and write
7FF7C10D2000
trusted library allocation
page read and write
210A8023000
trusted library allocation
page read and write
7FF7C11B0000
trusted library allocation
page read and write
1E5002E6000
trusted library allocation
page read and write
210A8245000
trusted library allocation
page read and write
1E5001A0000
trusted library allocation
page read and write
210A800A000
trusted library allocation
page read and write
1E56C4C0000
heap
page read and write
210BFD10000
trusted library allocation
page read and write
210A613B000
heap
page read and write
210B80B2000
trusted library allocation
page read and write
210A825E000
trusted library allocation
page read and write
1E56E856000
heap
page read and write
1E56DF55000
heap
page read and write
210C040D000
heap
page read and write
210A81B3000
trusted library allocation
page read and write
210A8067000
trusted library allocation
page read and write
210A83A6000
trusted library allocation
page read and write
210A8253000
trusted library allocation
page read and write
210A8340000
trusted library allocation
page read and write
7FF7C1330000
trusted library allocation
page read and write
210C0890000
heap
page read and write
210C03DC000
heap
page read and write
210A82ED000
trusted library allocation
page read and write
210A818D000
trusted library allocation
page read and write
210A849A000
trusted library allocation
page read and write
210C0477000
heap
page read and write
CE06C7E000
stack
page read and write
210A8333000
trusted library allocation
page read and write
210A7BB0000
heap
page read and write
7FF7C10F0000
trusted library allocation
page read and write
210A82D6000
trusted library allocation
page read and write
210C0830000
trusted library section
page read and write
210A81FC000
trusted library allocation
page read and write
210A81E7000
trusted library allocation
page read and write
210A81D6000
trusted library allocation
page read and write
1E56C36F000
heap
page read and write
1E510001000
trusted library allocation
page read and write
1E56C453000
heap
page read and write
210A8300000
trusted library allocation
page read and write
210C04E0000
heap
page execute and read and write
210C0A90000
trusted library section
page read and write
210A7AC0000
trusted library allocation
page read and write
210A82A3000
trusted library allocation
page read and write
210A84D2000
trusted library allocation
page read and write
7FF7C11D0000
trusted library allocation
page read and write
72DEA3D000
stack
page read and write
7FF7C0F30000
trusted library allocation
page read and write
1E56C368000
heap
page read and write
210A8002000
trusted library allocation
page read and write
1E56C520000
trusted library allocation
page read and write
1E56C500000
trusted library allocation
page read and write
210B7CE7000
trusted library allocation
page read and write
1E56EAC0000
heap
page read and write
210C040B000
heap
page read and write
1E56E850000
heap
page read and write
CE045FE000
stack
page read and write
210A820B000
trusted library allocation
page read and write
7FF7C11F4000
trusted library allocation
page read and write
210A8546000
trusted library allocation
page read and write
1E510038000
trusted library allocation
page read and write
210A6470000
heap
page read and write
1E56E8A2000
heap
page read and write
210A81DC000
trusted library allocation
page read and write
210A83FB000
trusted library allocation
page read and write
7FF7C0F9C000
trusted library allocation
page execute and read and write
210A7DCD000
trusted library allocation
page read and write
210A8058000
trusted library allocation
page read and write
210A8229000
trusted library allocation
page read and write
7FF7C1116000
trusted library allocation
page read and write
1E5001A8000
trusted library allocation
page read and write
210A8511000
trusted library allocation
page read and write
210A8193000
trusted library allocation
page read and write
210A846E000
trusted library allocation
page read and write
210A8054000
trusted library allocation
page read and write
7FF7C1150000
trusted library allocation
page read and write
7FF7C1366000
trusted library allocation
page read and write
210A842A000
trusted library allocation
page read and write
7FF7C0F2D000
trusted library allocation
page execute and read and write
7FF7C10D4000
trusted library allocation
page execute and read and write
1E50021F000
trusted library allocation
page read and write
1E5001A4000
trusted library allocation
page read and write
210A8030000
trusted library allocation
page read and write
210A7AD0000
trusted library allocation
page read and write
7FF7C1370000
trusted library allocation
page read and write
210A8431000
trusted library allocation
page read and write
7FF7C11C0000
trusted library allocation
page read and write
1E56C4E0000
trusted library section
page read and write
1E5001EA000
trusted library allocation
page read and write
210A82BC000
trusted library allocation
page read and write
210A819E000
trusted library allocation
page read and write
210A8310000
trusted library allocation
page read and write
210A83E8000
trusted library allocation
page read and write
There are 502 hidden memdumps, click here to show them.