Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\QUOTATION_NOVQTRA071244PDF.scr.exe
|
"C:\Users\user\Desktop\QUOTATION_NOVQTRA071244PDF.scr.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://entityframework-extensions.net/md5-exception
|
unknown
|
||
https://bulk-operations.net
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://dapper-plus.net/getting-started-mapping#instance-context-mapping.
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
https://dapper-plus.net/pricing.
|
unknown
|
||
https://www.nuget.org/packages/NetTopologySuite.IO.SqlServerBytes/
|
unknown
|
||
https://s23.filetransfer.io/storage/download/mOA1FV1QAe83
|
188.114.96.3
|
||
https://github.com/mgravell/protobuf-net
|
unknown
|
||
https://entityframework-extensions.net/)
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://www.zzzprojects.com
|
unknown
|
||
https://bulk-operations.net/pricing.
|
unknown
|
||
https://s23.filetransfer.io
|
unknown
|
||
https://entityframework-extensions.net/include-graph).
|
unknown
|
||
https://entityframework-extensions.net/pricing.
|
unknown
|
||
https://dapper-plus.net/getting-started-mapping#instance-context-mapping
|
unknown
|
||
https://linqtosql-plus.net/pricing.
|
unknown
|
||
http://checkip.dyndns.org/
|
193.122.6.168
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
https://reallyfreegeoip.org/xml/155.94.241.187p
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
||
https://filetransfer.io/data-package/Bh1Kj4RD/download
|
188.114.96.3
|
||
http://filetransfer.io/data-package/Bh1Kj4RD/download
|
188.114.96.3
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
http://entityframework-plus.net/
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
https://filetransfer.io
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
https://github.com/npgsql/npgsql/issues/2623#issuecomment-627622215
|
unknown
|
||
http://checkip.dyndns.com
|
unknown
|
||
http://filetransfer.io
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://reallyfreegeoip.org/xml/155.94.241.187
|
188.114.97.3
|
||
https://dapper-plus.net
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 27 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
filetransfer.io
|
188.114.96.3
|
||
reallyfreegeoip.org
|
188.114.97.3
|
||
s23.filetransfer.io
|
188.114.96.3
|
||
checkip.dyndns.com
|
193.122.6.168
|
||
checkip.dyndns.org
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
reallyfreegeoip.org
|
European Union
|
||
193.122.6.168
|
checkip.dyndns.com
|
United States
|
||
188.114.96.3
|
filetransfer.io
|
European Union
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
FileDirectory
|
There are 18 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
210A7EAE000
|
trusted library allocation
|
page read and write
|
||
1E500245000
|
trusted library allocation
|
page read and write
|
||
210C07B0000
|
trusted library section
|
page read and write
|
||
1E510009000
|
trusted library allocation
|
page read and write
|
||
210B7D01000
|
trusted library allocation
|
page read and write
|
||
1E56C560000
|
trusted library section
|
page read and write
|
||
1E500001000
|
trusted library allocation
|
page read and write
|
||
210A84A0000
|
trusted library allocation
|
page read and write
|
||
210A8083000
|
trusted library allocation
|
page read and write
|
||
210A8010000
|
trusted library allocation
|
page read and write
|
||
7FF7C10F1000
|
trusted library allocation
|
page read and write
|
||
210A803B000
|
trusted library allocation
|
page read and write
|
||
210A82DA000
|
trusted library allocation
|
page read and write
|
||
1E510035000
|
trusted library allocation
|
page read and write
|
||
1E56E700000
|
heap
|
page execute and read and write
|
||
1E5001AC000
|
trusted library allocation
|
page read and write
|
||
210A8548000
|
trusted library allocation
|
page read and write
|
||
CE080BE000
|
stack
|
page read and write
|
||
7FF7C11B0000
|
trusted library allocation
|
page read and write
|
||
CE05FFD000
|
stack
|
page read and write
|
||
210A8489000
|
trusted library allocation
|
page read and write
|
||
CE0687E000
|
stack
|
page read and write
|
||
7FF7C10D8000
|
trusted library allocation
|
page execute and read and write
|
||
210C04C0000
|
heap
|
page execute and read and write
|
||
210A8382000
|
trusted library allocation
|
page read and write
|
||
CE0787F000
|
stack
|
page read and write
|
||
210A83EE000
|
trusted library allocation
|
page read and write
|
||
7FF7C1360000
|
trusted library allocation
|
page read and write
|
||
210A850F000
|
trusted library allocation
|
page read and write
|
||
210A8568000
|
trusted library allocation
|
page read and write
|
||
210C04E4000
|
heap
|
page execute and read and write
|
||
210A8255000
|
trusted library allocation
|
page read and write
|
||
210C0630000
|
trusted library section
|
page read and write
|
||
210A81D8000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F6B000
|
trusted library allocation
|
page execute and read and write
|
||
1E56C39C000
|
heap
|
page read and write
|
||
210A8299000
|
trusted library allocation
|
page read and write
|
||
1E56C530000
|
trusted library allocation
|
page read and write
|
||
210A7DE2000
|
trusted library allocation
|
page read and write
|
||
1E500198000
|
trusted library allocation
|
page read and write
|
||
210A6111000
|
heap
|
page read and write
|
||
1E500194000
|
trusted library allocation
|
page read and write
|
||
7FF7C1120000
|
trusted library allocation
|
page read and write
|
||
210A7AA0000
|
trusted library allocation
|
page read and write
|
||
210A81A6000
|
trusted library allocation
|
page read and write
|
||
210A856E000
|
trusted library allocation
|
page read and write
|
||
210A8292000
|
trusted library allocation
|
page read and write
|
||
1E56C38A000
|
heap
|
page read and write
|
||
7FF7C11D0000
|
trusted library allocation
|
page execute and read and write
|
||
210A8052000
|
trusted library allocation
|
page read and write
|
||
210A81DA000
|
trusted library allocation
|
page read and write
|
||
210A84CD000
|
trusted library allocation
|
page read and write
|
||
210A84CF000
|
trusted library allocation
|
page read and write
|
||
7FF7C1100000
|
trusted library allocation
|
page execute and read and write
|
||
210A82D2000
|
trusted library allocation
|
page read and write
|
||
1E50021B000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F23000
|
trusted library allocation
|
page execute and read and write
|
||
210A8513000
|
trusted library allocation
|
page read and write
|
||
210A7DB4000
|
trusted library allocation
|
page read and write
|
||
210A858A000
|
trusted library allocation
|
page read and write
|
||
7FF7C11A0000
|
trusted library allocation
|
page read and write
|
||
210A8283000
|
trusted library allocation
|
page read and write
|
||
210A837E000
|
trusted library allocation
|
page read and write
|
||
210A824F000
|
trusted library allocation
|
page read and write
|
||
1E5001D7000
|
trusted library allocation
|
page read and write
|
||
210A858E000
|
trusted library allocation
|
page read and write
|
||
210A7DE6000
|
trusted library allocation
|
page read and write
|
||
1E56C3A1000
|
heap
|
page read and write
|
||
210A8041000
|
trusted library allocation
|
page read and write
|
||
72DE839000
|
stack
|
page read and write
|
||
7FF7C1170000
|
trusted library allocation
|
page read and write
|
||
210A823E000
|
trusted library allocation
|
page read and write
|
||
210A815E000
|
trusted library allocation
|
page read and write
|
||
210A801F000
|
trusted library allocation
|
page read and write
|
||
210A83F7000
|
trusted library allocation
|
page read and write
|
||
1E5100B3000
|
trusted library allocation
|
page read and write
|
||
210A823C000
|
trusted library allocation
|
page read and write
|
||
210A820D000
|
trusted library allocation
|
page read and write
|
||
210A8515000
|
trusted library allocation
|
page read and write
|
||
210A8570000
|
trusted library allocation
|
page read and write
|
||
72DE53E000
|
stack
|
page read and write
|
||
7FF7C10E2000
|
trusted library allocation
|
page read and write
|
||
210A84EF000
|
trusted library allocation
|
page read and write
|
||
210A802E000
|
trusted library allocation
|
page read and write
|
||
210A8504000
|
trusted library allocation
|
page read and write
|
||
7FF7C11F0000
|
trusted library allocation
|
page read and write
|
||
1E5002BF000
|
trusted library allocation
|
page read and write
|
||
1E56C260000
|
heap
|
page read and write
|
||
7FF7C1000000
|
trusted library allocation
|
page execute and read and write
|
||
210A818F000
|
trusted library allocation
|
page read and write
|
||
210B801F000
|
trusted library allocation
|
page read and write
|
||
72DE0FE000
|
stack
|
page read and write
|
||
210A5E82000
|
unkown
|
page readonly
|
||
210A81EF000
|
trusted library allocation
|
page read and write
|
||
210A8294000
|
trusted library allocation
|
page read and write
|
||
7FF7C0FF0000
|
trusted library allocation
|
page read and write
|
||
210A83E0000
|
trusted library allocation
|
page read and write
|
||
210A83F9000
|
trusted library allocation
|
page read and write
|
||
210A840A000
|
trusted library allocation
|
page read and write
|
||
72DE1FE000
|
stack
|
page read and write
|
||
7FF7C10C3000
|
trusted library allocation
|
page read and write
|
||
210A7E00000
|
trusted library allocation
|
page read and write
|
||
1E5002E2000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F24000
|
trusted library allocation
|
page read and write
|
||
7FF7C1210000
|
trusted library allocation
|
page read and write
|
||
1E500311000
|
trusted library allocation
|
page read and write
|
||
CE07C7E000
|
stack
|
page read and write
|
||
7FF7C11E0000
|
trusted library allocation
|
page read and write
|
||
210A83EC000
|
trusted library allocation
|
page read and write
|
||
210A7BC3000
|
heap
|
page read and write
|
||
1E50019C000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F60000
|
trusted library allocation
|
page read and write
|
||
210A8487000
|
trusted library allocation
|
page read and write
|
||
210A60D0000
|
heap
|
page read and write
|
||
1E56C360000
|
heap
|
page read and write
|
||
7FF7C11C7000
|
trusted library allocation
|
page read and write
|
||
1E56DEE0000
|
heap
|
page read and write
|
||
210A83BB000
|
trusted library allocation
|
page read and write
|
||
1E500144000
|
trusted library allocation
|
page read and write
|
||
7FF7C0FE0000
|
trusted library allocation
|
page execute and read and write
|
||
210A8032000
|
trusted library allocation
|
page read and write
|
||
210A842C000
|
trusted library allocation
|
page read and write
|
||
210A8470000
|
trusted library allocation
|
page read and write
|
||
210A821C000
|
trusted library allocation
|
page read and write
|
||
210A81A2000
|
trusted library allocation
|
page read and write
|
||
7FF40EF80000
|
trusted library allocation
|
page execute and read and write
|
||
210A84E0000
|
trusted library allocation
|
page read and write
|
||
210A7B70000
|
trusted library section
|
page read and write
|
||
1E50031D000
|
trusted library allocation
|
page read and write
|
||
72DEE3F000
|
stack
|
page read and write
|
||
1E500151000
|
trusted library allocation
|
page read and write
|
||
1E56EAC3000
|
heap
|
page read and write
|
||
210C0489000
|
heap
|
page read and write
|
||
210C045D000
|
heap
|
page read and write
|
||
210A81FE000
|
trusted library allocation
|
page read and write
|
||
210A822B000
|
trusted library allocation
|
page read and write
|
||
1E56C540000
|
trusted library allocation
|
page read and write
|
||
7FF7C1100000
|
trusted library allocation
|
page read and write
|
||
7FF7C1040000
|
trusted library allocation
|
page execute and read and write
|
||
210A820F000
|
trusted library allocation
|
page read and write
|
||
7FF7C0FFC000
|
trusted library allocation
|
page execute and read and write
|
||
210A82DC000
|
trusted library allocation
|
page read and write
|
||
210A844E000
|
trusted library allocation
|
page read and write
|
||
210A83FD000
|
trusted library allocation
|
page read and write
|
||
210A8122000
|
trusted library allocation
|
page read and write
|
||
210A5E80000
|
unkown
|
page readonly
|
||
210A84E2000
|
trusted library allocation
|
page read and write
|
||
210A7DDE000
|
trusted library allocation
|
page read and write
|
||
210A8232000
|
trusted library allocation
|
page read and write
|
||
7FF7C10CD000
|
trusted library allocation
|
page execute and read and write
|
||
210A613D000
|
heap
|
page read and write
|
||
1E510032000
|
trusted library allocation
|
page read and write
|
||
1E50010C000
|
trusted library allocation
|
page read and write
|
||
1E56E8A4000
|
heap
|
page read and write
|
||
210C0BB0000
|
heap
|
page read and write
|
||
1E56E8ED000
|
heap
|
page read and write
|
||
210A8457000
|
trusted library allocation
|
page read and write
|
||
1E50012C000
|
trusted library allocation
|
page read and write
|
||
210A82F8000
|
trusted library allocation
|
page read and write
|
||
210A82A7000
|
trusted library allocation
|
page read and write
|
||
210A60DC000
|
heap
|
page read and write
|
||
210A85A1000
|
trusted library allocation
|
page read and write
|
||
1E56C580000
|
heap
|
page execute and read and write
|
||
210A8212000
|
trusted library allocation
|
page read and write
|
||
210A84F3000
|
trusted library allocation
|
page read and write
|
||
210A6070000
|
heap
|
page read and write
|
||
CE05BFE000
|
stack
|
page read and write
|
||
7FF7C11E9000
|
trusted library allocation
|
page read and write
|
||
1E5100BF000
|
trusted library allocation
|
page read and write
|
||
210A8441000
|
trusted library allocation
|
page read and write
|
||
210A803F000
|
trusted library allocation
|
page read and write
|
||
210A6090000
|
heap
|
page read and write
|
||
210A62C0000
|
heap
|
page read and write
|
||
7FF7C1180000
|
trusted library allocation
|
page read and write
|
||
210A843F000
|
trusted library allocation
|
page read and write
|
||
1E5001C3000
|
trusted library allocation
|
page read and write
|
||
210A8411000
|
trusted library allocation
|
page read and write
|
||
7FF7C1119000
|
trusted library allocation
|
page read and write
|
||
210A82E5000
|
trusted library allocation
|
page read and write
|
||
7FF7C1006000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C10FD000
|
trusted library allocation
|
page read and write
|
||
210A8072000
|
trusted library allocation
|
page read and write
|
||
210A818B000
|
trusted library allocation
|
page read and write
|
||
210A8191000
|
trusted library allocation
|
page read and write
|
||
210A8502000
|
trusted library allocation
|
page read and write
|
||
210A82BA000
|
trusted library allocation
|
page read and write
|
||
210A8375000
|
trusted library allocation
|
page read and write
|
||
1E56C340000
|
heap
|
page read and write
|
||
1E500231000
|
trusted library allocation
|
page read and write
|
||
210A8287000
|
trusted library allocation
|
page read and write
|
||
210A8043000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F53000
|
trusted library allocation
|
page read and write
|
||
210A84BE000
|
trusted library allocation
|
page read and write
|
||
210A8391000
|
trusted library allocation
|
page read and write
|
||
7FF7C1180000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C11ED000
|
trusted library allocation
|
page read and write
|
||
210A7CD0000
|
heap
|
page execute and read and write
|
||
210A8209000
|
trusted library allocation
|
page read and write
|
||
7FF7C10E0000
|
trusted library allocation
|
page read and write
|
||
72DE93E000
|
stack
|
page read and write
|
||
1E5001B0000
|
trusted library allocation
|
page read and write
|
||
210A60FD000
|
heap
|
page read and write
|
||
210B7CE1000
|
trusted library allocation
|
page read and write
|
||
210A62A0000
|
heap
|
page read and write
|
||
210A7FFB000
|
trusted library allocation
|
page read and write
|
||
210A81A0000
|
trusted library allocation
|
page read and write
|
||
72DE3F4000
|
stack
|
page read and write
|
||
210A854D000
|
trusted library allocation
|
page read and write
|
||
1E56DF40000
|
heap
|
page read and write
|
||
210A8586000
|
trusted library allocation
|
page read and write
|
||
210A8450000
|
trusted library allocation
|
page read and write
|
||
72DE2FF000
|
stack
|
page read and write
|
||
1E56E8E0000
|
heap
|
page read and write
|
||
210A82FE000
|
trusted library allocation
|
page read and write
|
||
1E56E853000
|
heap
|
page read and write
|
||
210A8506000
|
trusted library allocation
|
page read and write
|
||
210A8086000
|
trusted library allocation
|
page read and write
|
||
210A6095000
|
heap
|
page read and write
|
||
7FF7C1200000
|
trusted library allocation
|
page execute and read and write
|
||
210A801D000
|
trusted library allocation
|
page read and write
|
||
72DDAED000
|
stack
|
page read and write
|
||
210A7DD4000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F64000
|
trusted library allocation
|
page read and write
|
||
210A804E000
|
trusted library allocation
|
page read and write
|
||
CE07CBF000
|
stack
|
page read and write
|
||
7FF7C0F22000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F6D000
|
trusted library allocation
|
page execute and read and write
|
||
210A84DC000
|
trusted library allocation
|
page read and write
|
||
7FF7C1130000
|
trusted library allocation
|
page execute and read and write
|
||
210A84F5000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F4D000
|
trusted library allocation
|
page execute and read and write
|
||
210A84BC000
|
trusted library allocation
|
page read and write
|
||
210C0459000
|
heap
|
page read and write
|
||
7FF7C1270000
|
trusted library allocation
|
page read and write
|
||
210A840E000
|
trusted library allocation
|
page read and write
|
||
72DE43E000
|
stack
|
page read and write
|
||
210A8465000
|
trusted library allocation
|
page read and write
|
||
7FF7C1320000
|
trusted library allocation
|
page read and write
|
||
7FF7C1124000
|
trusted library allocation
|
page read and write
|
||
7FF7C10FA000
|
trusted library allocation
|
page read and write
|
||
7FF7C1260000
|
trusted library allocation
|
page read and write
|
||
1E5001FE000
|
trusted library allocation
|
page read and write
|
||
210A8013000
|
trusted library allocation
|
page read and write
|
||
72DD7FE000
|
stack
|
page read and write
|
||
210A83E6000
|
trusted library allocation
|
page read and write
|
||
1E5002DD000
|
trusted library allocation
|
page read and write
|
||
1E56DF50000
|
heap
|
page read and write
|
||
210A819C000
|
trusted library allocation
|
page read and write
|
||
1E56C593000
|
trusted library allocation
|
page read and write
|
||
210A8045000
|
trusted library allocation
|
page read and write
|
||
210A856C000
|
trusted library allocation
|
page read and write
|
||
210A81E9000
|
trusted library allocation
|
page read and write
|
||
1E56C460000
|
direct allocation
|
page read and write
|
||
7FF7C1106000
|
trusted library allocation
|
page read and write
|
||
210A6113000
|
heap
|
page read and write
|
||
1E5002D4000
|
trusted library allocation
|
page read and write
|
||
210A8266000
|
trusted library allocation
|
page read and write
|
||
1E500155000
|
trusted library allocation
|
page read and write
|
||
1E50035C000
|
trusted library allocation
|
page read and write
|
||
210A830D000
|
trusted library allocation
|
page read and write
|
||
7FF7C1190000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F43000
|
trusted library allocation
|
page execute and read and write
|
||
1E50014D000
|
trusted library allocation
|
page read and write
|
||
210A84E5000
|
trusted library allocation
|
page read and write
|
||
1E51008E000
|
trusted library allocation
|
page read and write
|
||
210A81F8000
|
trusted library allocation
|
page read and write
|
||
7FF7C10D0000
|
trusted library allocation
|
page read and write
|
||
210A81D4000
|
trusted library allocation
|
page read and write
|
||
210A8588000
|
trusted library allocation
|
page read and write
|
||
7FF7C1140000
|
trusted library allocation
|
page execute and read and write
|
||
210A843D000
|
trusted library allocation
|
page read and write
|
||
7FF7C10C0000
|
trusted library allocation
|
page read and write
|
||
72DE63D000
|
stack
|
page read and write
|
||
1E5002CA000
|
trusted library allocation
|
page read and write
|
||
210A8061000
|
trusted library allocation
|
page read and write
|
||
72DDEFE000
|
stack
|
page read and write
|
||
7FF7C1026000
|
trusted library allocation
|
page execute and read and write
|
||
210A848B000
|
trusted library allocation
|
page read and write
|
||
1E5000FB000
|
trusted library allocation
|
page read and write
|
||
210A833C000
|
trusted library allocation
|
page read and write
|
||
210A81BE000
|
trusted library allocation
|
page read and write
|
||
72DDFFD000
|
stack
|
page read and write
|
||
1E56C590000
|
trusted library allocation
|
page read and write
|
||
1E5000E5000
|
trusted library allocation
|
page read and write
|
||
7FF7C0FF6000
|
trusted library allocation
|
page read and write
|
||
210A81AF000
|
trusted library allocation
|
page read and write
|
||
210A822D000
|
trusted library allocation
|
page read and write
|
||
210A81A4000
|
trusted library allocation
|
page read and write
|
||
CE04FF2000
|
stack
|
page read and write
|
||
210A82C9000
|
trusted library allocation
|
page read and write
|
||
210A8050000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F5D000
|
trusted library allocation
|
page execute and read and write
|
||
210A84B3000
|
trusted library allocation
|
page read and write
|
||
210A82A5000
|
trusted library allocation
|
page read and write
|
||
210A82FC000
|
trusted library allocation
|
page read and write
|
||
7FF7C1300000
|
trusted library allocation
|
page read and write
|
||
72DE73E000
|
stack
|
page read and write
|
||
210A82D4000
|
trusted library allocation
|
page read and write
|
||
210A859B000
|
trusted library allocation
|
page read and write
|
||
210A8200000
|
trusted library allocation
|
page read and write
|
||
210A803D000
|
trusted library allocation
|
page read and write
|
||
7FF7C1160000
|
trusted library allocation
|
page read and write
|
||
210A8408000
|
trusted library allocation
|
page read and write
|
||
210A802A000
|
trusted library allocation
|
page read and write
|
||
1E56C620000
|
heap
|
page read and write
|
||
210A8345000
|
trusted library allocation
|
page read and write
|
||
1E50015A000
|
trusted library allocation
|
page read and write
|
||
210B7CF5000
|
trusted library allocation
|
page read and write
|
||
210A81FA000
|
trusted library allocation
|
page read and write
|
||
210A84F8000
|
trusted library allocation
|
page read and write
|
||
210A8368000
|
trusted library allocation
|
page read and write
|
||
210A7E42000
|
trusted library allocation
|
page read and write
|
||
210A82EB000
|
trusted library allocation
|
page read and write
|
||
210A8476000
|
trusted library allocation
|
page read and write
|
||
7FF7C1220000
|
trusted library allocation
|
page read and write
|
||
1E56C3CA000
|
heap
|
page read and write
|
||
210A842E000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F35000
|
trusted library allocation
|
page read and write
|
||
7FF7C1060000
|
trusted library allocation
|
page execute and read and write
|
||
7FF40EFA0000
|
trusted library allocation
|
page execute and read and write
|
||
210A8533000
|
trusted library allocation
|
page read and write
|
||
7FF7C1103000
|
trusted library allocation
|
page read and write
|
||
210A8260000
|
trusted library allocation
|
page read and write
|
||
210A8063000
|
trusted library allocation
|
page read and write
|
||
210A82B8000
|
trusted library allocation
|
page read and write
|
||
210A81EB000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F40000
|
trusted library allocation
|
page read and write
|
||
210A84DE000
|
trusted library allocation
|
page read and write
|
||
210A6144000
|
heap
|
page read and write
|
||
210A82A9000
|
trusted library allocation
|
page read and write
|
||
210C03A0000
|
heap
|
page read and write
|
||
1E500323000
|
trusted library allocation
|
page read and write
|
||
7FF7C11C0000
|
trusted library allocation
|
page read and write
|
||
210A6475000
|
heap
|
page read and write
|
||
210A8240000
|
trusted library allocation
|
page read and write
|
||
210A7AF0000
|
trusted library allocation
|
page read and write
|
||
210B8176000
|
trusted library allocation
|
page read and write
|
||
210A7FFD000
|
trusted library allocation
|
page read and write
|
||
7FF7C126D000
|
trusted library allocation
|
page read and write
|
||
1E56C625000
|
heap
|
page read and write
|
||
210A84AF000
|
trusted library allocation
|
page read and write
|
||
7FF7C1280000
|
trusted library allocation
|
page execute and read and write
|
||
210A82B6000
|
trusted library allocation
|
page read and write
|
||
210A8074000
|
trusted library allocation
|
page read and write
|
||
72DEB3C000
|
stack
|
page read and write
|
||
7FF7C0FDC000
|
trusted library allocation
|
page execute and read and write
|
||
210A8076000
|
trusted library allocation
|
page read and write
|
||
210A8065000
|
trusted library allocation
|
page read and write
|
||
210A82D8000
|
trusted library allocation
|
page read and write
|
||
210A8490000
|
trusted library allocation
|
page read and write
|
||
210A7FFF000
|
trusted library allocation
|
page read and write
|
||
210A82FA000
|
trusted library allocation
|
page read and write
|
||
210A82E7000
|
trusted library allocation
|
page read and write
|
||
210A841F000
|
trusted library allocation
|
page read and write
|
||
210A7E3E000
|
trusted library allocation
|
page read and write
|
||
7FF7C1340000
|
trusted library allocation
|
page read and write
|
||
CE0607E000
|
stack
|
page read and write
|
||
210A7FF3000
|
trusted library allocation
|
page read and write
|
||
210A849C000
|
trusted library allocation
|
page read and write
|
||
210A84F1000
|
trusted library allocation
|
page read and write
|
||
7FF7C1350000
|
trusted library allocation
|
page read and write
|
||
210A8454000
|
trusted library allocation
|
page read and write
|
||
7FF49BE00000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C1190000
|
trusted library allocation
|
page execute and read and write
|
||
210A60A0000
|
heap
|
page read and write
|
||
1E5002C4000
|
trusted library allocation
|
page read and write
|
||
7FF7C136C000
|
trusted library allocation
|
page read and write
|
||
7FF7C11A1000
|
trusted library allocation
|
page read and write
|
||
CE0747F000
|
stack
|
page read and write
|
||
210A8262000
|
trusted library allocation
|
page read and write
|
||
210A8056000
|
trusted library allocation
|
page read and write
|
||
1E500317000
|
trusted library allocation
|
page read and write
|
||
210A8428000
|
trusted library allocation
|
page read and write
|
||
1E56C220000
|
remote allocation
|
page execute and read and write
|
||
1E5100AA000
|
trusted library allocation
|
page read and write
|
||
210A83EA000
|
trusted library allocation
|
page read and write
|
||
1E56EA20000
|
heap
|
page read and write
|
||
1E56C39F000
|
heap
|
page read and write
|
||
210A8599000
|
trusted library allocation
|
page read and write
|
||
210A853B000
|
trusted library allocation
|
page read and write
|
||
210A8251000
|
trusted library allocation
|
page read and write
|
||
210A8258000
|
trusted library allocation
|
page read and write
|
||
210A8444000
|
trusted library allocation
|
page read and write
|
||
210A843B000
|
trusted library allocation
|
page read and write
|
||
210A848D000
|
trusted library allocation
|
page read and write
|
||
210A8386000
|
trusted library allocation
|
page read and write
|
||
210A8555000
|
trusted library allocation
|
page read and write
|
||
1E56C37B000
|
heap
|
page read and write
|
||
7FF7C0FD0000
|
trusted library allocation
|
page read and write
|
||
CE0647E000
|
stack
|
page read and write
|
||
7FF7C11C3000
|
trusted library allocation
|
page read and write
|
||
210A8296000
|
trusted library allocation
|
page read and write
|
||
210A856A000
|
trusted library allocation
|
page read and write
|
||
210A7CE1000
|
trusted library allocation
|
page read and write
|
||
210A84C9000
|
trusted library allocation
|
page read and write
|
||
210A8544000
|
trusted library allocation
|
page read and write
|
||
210A8400000
|
trusted library allocation
|
page read and write
|
||
210A8452000
|
trusted library allocation
|
page read and write
|
||
210A847E000
|
trusted library allocation
|
page read and write
|
||
210A8264000
|
trusted library allocation
|
page read and write
|
||
CE0707D000
|
stack
|
page read and write
|
||
210A849E000
|
trusted library allocation
|
page read and write
|
||
7FF7C10D6000
|
trusted library allocation
|
page execute and read and write
|
||
210A8070000
|
trusted library allocation
|
page read and write
|
||
210A8364000
|
trusted library allocation
|
page read and write
|
||
7FF7C0FD6000
|
trusted library allocation
|
page read and write
|
||
7FF40EF90000
|
trusted library allocation
|
page execute and read and write
|
||
1E56C490000
|
heap
|
page read and write
|
||
210A821F000
|
trusted library allocation
|
page read and write
|
||
210A7AD3000
|
trusted library allocation
|
page read and write
|
||
210A8290000
|
trusted library allocation
|
page read and write
|
||
210A8461000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F44000
|
trusted library allocation
|
page read and write
|
||
210A8285000
|
trusted library allocation
|
page read and write
|
||
7FF7C1312000
|
trusted library allocation
|
page read and write
|
||
7FF7C10F5000
|
trusted library allocation
|
page read and write
|
||
7FF7C1110000
|
trusted library allocation
|
page read and write
|
||
1E56E8F3000
|
heap
|
page read and write
|
||
210A82E9000
|
trusted library allocation
|
page read and write
|
||
7FF7C10D2000
|
trusted library allocation
|
page read and write
|
||
210A8023000
|
trusted library allocation
|
page read and write
|
||
7FF7C11B0000
|
trusted library allocation
|
page read and write
|
||
1E5002E6000
|
trusted library allocation
|
page read and write
|
||
210A8245000
|
trusted library allocation
|
page read and write
|
||
1E5001A0000
|
trusted library allocation
|
page read and write
|
||
210A800A000
|
trusted library allocation
|
page read and write
|
||
1E56C4C0000
|
heap
|
page read and write
|
||
210BFD10000
|
trusted library allocation
|
page read and write
|
||
210A613B000
|
heap
|
page read and write
|
||
210B80B2000
|
trusted library allocation
|
page read and write
|
||
210A825E000
|
trusted library allocation
|
page read and write
|
||
1E56E856000
|
heap
|
page read and write
|
||
1E56DF55000
|
heap
|
page read and write
|
||
210C040D000
|
heap
|
page read and write
|
||
210A81B3000
|
trusted library allocation
|
page read and write
|
||
210A8067000
|
trusted library allocation
|
page read and write
|
||
210A83A6000
|
trusted library allocation
|
page read and write
|
||
210A8253000
|
trusted library allocation
|
page read and write
|
||
210A8340000
|
trusted library allocation
|
page read and write
|
||
7FF7C1330000
|
trusted library allocation
|
page read and write
|
||
210C0890000
|
heap
|
page read and write
|
||
210C03DC000
|
heap
|
page read and write
|
||
210A82ED000
|
trusted library allocation
|
page read and write
|
||
210A818D000
|
trusted library allocation
|
page read and write
|
||
210A849A000
|
trusted library allocation
|
page read and write
|
||
210C0477000
|
heap
|
page read and write
|
||
CE06C7E000
|
stack
|
page read and write
|
||
210A8333000
|
trusted library allocation
|
page read and write
|
||
210A7BB0000
|
heap
|
page read and write
|
||
7FF7C10F0000
|
trusted library allocation
|
page read and write
|
||
210A82D6000
|
trusted library allocation
|
page read and write
|
||
210C0830000
|
trusted library section
|
page read and write
|
||
210A81FC000
|
trusted library allocation
|
page read and write
|
||
210A81E7000
|
trusted library allocation
|
page read and write
|
||
210A81D6000
|
trusted library allocation
|
page read and write
|
||
1E56C36F000
|
heap
|
page read and write
|
||
1E510001000
|
trusted library allocation
|
page read and write
|
||
1E56C453000
|
heap
|
page read and write
|
||
210A8300000
|
trusted library allocation
|
page read and write
|
||
210C04E0000
|
heap
|
page execute and read and write
|
||
210C0A90000
|
trusted library section
|
page read and write
|
||
210A7AC0000
|
trusted library allocation
|
page read and write
|
||
210A82A3000
|
trusted library allocation
|
page read and write
|
||
210A84D2000
|
trusted library allocation
|
page read and write
|
||
7FF7C11D0000
|
trusted library allocation
|
page read and write
|
||
72DEA3D000
|
stack
|
page read and write
|
||
7FF7C0F30000
|
trusted library allocation
|
page read and write
|
||
1E56C368000
|
heap
|
page read and write
|
||
210A8002000
|
trusted library allocation
|
page read and write
|
||
1E56C520000
|
trusted library allocation
|
page read and write
|
||
1E56C500000
|
trusted library allocation
|
page read and write
|
||
210B7CE7000
|
trusted library allocation
|
page read and write
|
||
1E56EAC0000
|
heap
|
page read and write
|
||
210C040B000
|
heap
|
page read and write
|
||
1E56E850000
|
heap
|
page read and write
|
||
CE045FE000
|
stack
|
page read and write
|
||
210A820B000
|
trusted library allocation
|
page read and write
|
||
7FF7C11F4000
|
trusted library allocation
|
page read and write
|
||
210A8546000
|
trusted library allocation
|
page read and write
|
||
1E510038000
|
trusted library allocation
|
page read and write
|
||
210A6470000
|
heap
|
page read and write
|
||
1E56E8A2000
|
heap
|
page read and write
|
||
210A81DC000
|
trusted library allocation
|
page read and write
|
||
210A83FB000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F9C000
|
trusted library allocation
|
page execute and read and write
|
||
210A7DCD000
|
trusted library allocation
|
page read and write
|
||
210A8058000
|
trusted library allocation
|
page read and write
|
||
210A8229000
|
trusted library allocation
|
page read and write
|
||
7FF7C1116000
|
trusted library allocation
|
page read and write
|
||
1E5001A8000
|
trusted library allocation
|
page read and write
|
||
210A8511000
|
trusted library allocation
|
page read and write
|
||
210A8193000
|
trusted library allocation
|
page read and write
|
||
210A846E000
|
trusted library allocation
|
page read and write
|
||
210A8054000
|
trusted library allocation
|
page read and write
|
||
7FF7C1150000
|
trusted library allocation
|
page read and write
|
||
7FF7C1366000
|
trusted library allocation
|
page read and write
|
||
210A842A000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C10D4000
|
trusted library allocation
|
page execute and read and write
|
||
1E50021F000
|
trusted library allocation
|
page read and write
|
||
1E5001A4000
|
trusted library allocation
|
page read and write
|
||
210A8030000
|
trusted library allocation
|
page read and write
|
||
210A7AD0000
|
trusted library allocation
|
page read and write
|
||
7FF7C1370000
|
trusted library allocation
|
page read and write
|
||
210A8431000
|
trusted library allocation
|
page read and write
|
||
7FF7C11C0000
|
trusted library allocation
|
page read and write
|
||
1E56C4E0000
|
trusted library section
|
page read and write
|
||
1E5001EA000
|
trusted library allocation
|
page read and write
|
||
210A82BC000
|
trusted library allocation
|
page read and write
|
||
210A819E000
|
trusted library allocation
|
page read and write
|
||
210A8310000
|
trusted library allocation
|
page read and write
|
||
210A83E8000
|
trusted library allocation
|
page read and write
|
There are 502 hidden memdumps, click here to show them.