IOC Report
quotation spec.js

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps108642010010Label

Files

File Path
Type
Category
Malicious
Download
quotation spec.js
ASCII text, with very long lines, with no line terminators
initial sample
malicious
C:\Users\user\AppData\Roaming\tqah.txt
Zip archive data, at least v2.0 to extract
dropped
malicious
C:\ProgramData\Oracle\Java\.oracle_jre_usage\cce3fe3b0d8d8784.timestamp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\KFJOHorrTR.js
ASCII text, with very long lines, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\quotation spec.js"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\KFJOHorrTR.js"
malicious
C:\Program Files (x86)\Java\jre1.8.0_301\bin\javaw.exe
C:\Program Files (x86)\Java\jre1.8.0_301\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\tqah.txt
malicious
C:\Windows\SysWOW64\icacls.exe
C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://filebin.net/vp9p14fwe6dwyzsj/jre.zip
unknown
malicious
http://crl.xrampsecurity.com/XGCA.crl
unknown
https://repo1.maven.org/maven2/net/java/dev/jna/jna-platform/5.5.0/jna-platform-5.5.0.jar
unknown
http://crl.chambersign.org/chambersroot.crl0
unknown
https://github.com
unknown
https://repository.luxtrust.lu0
unknown
http://bugreport.sun.com/bugreport/
unknown
http://cps.chambersign.org/cps/chambersroot.html0
unknown
http://java.oracle.com/
unknown
http://null.oracle.com/
unknown
http://www.chambersign.org1
unknown
http://repository.swisssign.com/0
unknown
https://repo1.maven.org/maven2/net/java/dev/jna/jna/5.5.0/jna-5.5.0.jar
unknown
http://policy.camerfirma.com
unknown
https://ocsp.quovadisoffshore.com
unknown
https://repo1.maven.org/maven2/org/xerial/sqlite-jdbc/3.14.2.1/sqlite-jdbc-3.14.2.1.jar
unknown
http://crl.securetrust.com/STCA.crl0
unknown
http://www.quovadisglobal.com/cps
unknown
http://cps.chambersign.org/cps/chambersroot.html
unknown
http://crl.securetrust.com/STCA.crl
unknown
https://repo1.maven.org
unknown
https://repository.luxtrust.lu
unknown
http://www.quovadisglobal.com/cps0
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
http://www.quovadis.bm
unknown
http://www.quovadis.bm0
unknown
https://ocsp.quovadisoffshore.com0
unknown
http://www.allatori.com
unknown
http://crl.chambersign.org/chambersroot.crl
unknown
http://repository.swisssign.com/
unknown
http://www.chambersign.org
unknown
https://github.com/kristian/system-hook/releases/download/3.5/system-hook-3.5.jar
unknown
http://policy.camerfirma.com0
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sonatype.map.fastly.net
199.232.192.209
github.com
140.82.121.3
repo1.maven.org
unknown

IPs

IP
Domain
Country
Malicious
199.232.192.209
sonatype.map.fastly.net
United States
140.82.121.3
github.com
United States
140.82.121.4
unknown
United States
199.232.196.209
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
2187E430000
heap
page read and write
malicious
A5A0000
trusted library allocation
page read and write
malicious
2187E430000
heap
page read and write
malicious
2187E4F0000
heap
page read and write
malicious
2187E371000
heap
page read and write
malicious
2187E430000
heap
page read and write
malicious
A560000
trusted library allocation
page read and write
malicious
2187E430000
heap
page read and write
malicious
2187E430000
heap
page read and write
malicious
2187E4E0000
heap
page read and write
malicious
2187DAC0000
heap
page read and write
malicious
161CC4D5000
heap
page read and write
347E000
stack
page read and write
161CC309000
heap
page read and write
19847FE000
stack
page read and write
161CC305000
heap
page read and write
2187D400000
heap
page read and write
15DC3000
trusted library allocation
page read and write
54F9000
trusted library allocation
page read and write
165B0000
trusted library allocation
page read and write
161CE0BF000
heap
page read and write
5477000
trusted library allocation
page read and write
161CE0C4000
heap
page read and write
2187E4D6000
heap
page read and write
161CE0DD000
heap
page read and write
1984AFF000
stack
page read and write
1353000
heap
page read and write
2187E445000
heap
page read and write
160FD000
stack
page read and write
15DC9000
trusted library allocation
page read and write
1566E000
unkown
page read and write
548C000
trusted library allocation
page read and write
161CE106000
heap
page read and write
161CE0B6000
heap
page read and write
2187B58F000
heap
page read and write
2187D400000
heap
page read and write
15816000
trusted library allocation
page read and write
161CC2B5000
heap
page read and write
161CC4D9000
heap
page read and write
161CE0C9000
heap
page read and write
16149000
unkown
page read and write
1561E000
stack
page read and write
2F8E000
trusted library allocation
page execute and read and write
15DC0000
trusted library allocation
page read and write
2187D4B0000
heap
page read and write
16603000
trusted library allocation
page read and write
161CE6A2000
trusted library allocation
page read and write
161CE4E0000
heap
page read and write
15D3A000
trusted library allocation
page read and write
2187D400000
heap
page read and write
161CC2E7000
heap
page read and write
2187D426000
heap
page read and write
161CC281000
heap
page read and write
14DF000
stack
page read and write
15839000
trusted library allocation
page read and write
161CE0BF000
heap
page read and write
2187B360000
heap
page read and write
15839000
trusted library allocation
page read and write
2187B57B000
heap
page read and write
2187D3FD000
heap
page read and write
2187D4C2000
heap
page read and write
2187D6E3000
heap
page read and write
525E000
trusted library allocation
page read and write
2187E412000
heap
page read and write
15DBD000
trusted library allocation
page read and write
161CC4B0000
heap
page read and write
1555E000
trusted library allocation
page read and write
2187E445000
heap
page read and write
161CE107000
heap
page read and write
2187B5FE000
heap
page read and write
F30000
unclassified section
page readonly
157F6000
trusted library allocation
page read and write
161CC309000
heap
page read and write
15DBC000
trusted library allocation
page read and write
547F000
trusted library allocation
page read and write
2187B5FE000
heap
page read and write
2187D5D0000
heap
page read and write
161CE0E5000
heap
page read and write
2187B562000
heap
page read and write
5484000
trusted library allocation
page read and write
2187D6DF000
heap
page read and write
2187B642000
heap
page read and write
15DC0000
trusted library allocation
page read and write
2187D6E3000
heap
page read and write
2187E4D5000
heap
page read and write
2187D6FF000
heap
page read and write
12A4DFF000
stack
page read and write
3241000
heap
page read and write
2187D3E0000
heap
page read and write
161CE0D5000
heap
page read and write
548A000
trusted library allocation
page read and write
2187D401000
heap
page read and write
8349F7A000
stack
page read and write
165CB000
trusted library allocation
page read and write
2187D40E000
heap
page read and write
19850FB000
stack
page read and write
2187D40E000
heap
page read and write
2187D3E6000
heap
page read and write
2187D4C7000
heap
page read and write
2187D820000
heap
page read and write
2187E371000
heap
page read and write
15804000
trusted library allocation
page read and write
1984EFD000
stack
page read and write
1558E000
stack
page read and write
2187B64E000
heap
page read and write
15DC9000
trusted library allocation
page read and write
2187DAB0000
heap
page read and write
15DC9000
trusted library allocation
page read and write
2187B770000
heap
page read and write
2187D4CD000
heap
page read and write
15839000
trusted library allocation
page read and write
2187D69E000
heap
page read and write
2187D6DF000
heap
page read and write
197E5CE0000
heap
page read and write
1661B000
trusted library allocation
page read and write
34C0000
trusted library allocation
page read and write
2187B7A0000
heap
page read and write
2187D4E0000
heap
page read and write
16150000
trusted library allocation
page read and write
2187B750000
heap
page read and write
2187B57F000
heap
page read and write
161CE6A4000
trusted library allocation
page read and write
15D5B000
trusted library allocation
page read and write
161CE0CF000
heap
page read and write
2187E3CB000
heap
page read and write
5253000
trusted library allocation
page read and write
197E5960000
heap
page read and write
161CE0E6000
heap
page read and write
161CE3A0000
heap
page read and write
2187E47B000
heap
page read and write
161CC2C2000
heap
page read and write
165A0000
trusted library allocation
page read and write
2187D5D7000
heap
page read and write
A5ED000
trusted library allocation
page read and write
1580D000
trusted library allocation
page read and write
2187D4CB000
heap
page read and write
161CC2C2000
heap
page read and write
15F4D000
stack
page read and write
2187D42E000
heap
page read and write
2187B57C000
heap
page read and write
2187D4B0000
heap
page read and write
161CE6A5000
trusted library allocation
page read and write
2187D4CD000
heap
page read and write
161CC2AC000
heap
page read and write
15CE6000
trusted library allocation
page read and write
2187E48D000
heap
page read and write
15C6A000
trusted library allocation
page read and write
197E5A21000
heap
page read and write
2187D3FD000
heap
page read and write
2187DF10000
heap
page read and write
197E5A40000
heap
page read and write
161CE0EC000
heap
page read and write
2FED000
trusted library allocation
page execute and read and write
5515000
trusted library allocation
page read and write
15DC9000
trusted library allocation
page read and write
2187D6FF000
heap
page read and write
15D1B000
trusted library allocation
page read and write
127E000
stack
page read and write
165EB000
trusted library allocation
page read and write
161CE0D8000
heap
page read and write
15D3A000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
A8E5000
trusted library allocation
page read and write
161CE0BF000
heap
page read and write
15C7A000
trusted library allocation
page read and write
2187D5DE000
heap
page read and write
FAE000
stack
page read and write
2187D427000
heap
page read and write
2187D423000
heap
page read and write
16603000
trusted library allocation
page read and write
2187E4D2000
heap
page read and write
54A1000
trusted library allocation
page read and write
15DC9000
trusted library allocation
page read and write
2187D6E3000
heap
page read and write
161CE0BF000
heap
page read and write
2187D6DF000
heap
page read and write
15F98000
unkown
page read and write
161CC2AA000
heap
page read and write
161CC272000
heap
page read and write
15816000
trusted library allocation
page read and write
161CC2E7000
heap
page read and write
34BF000
stack
page read and write
A597000
trusted library allocation
page read and write
2187D5E1000
heap
page read and write
2187D53F000
heap
page read and write
15BD0000
trusted library allocation
page read and write
2187B576000
heap
page read and write
15C98000
trusted library allocation
page read and write
13B5000
heap
page read and write
2187D4C3000
heap
page read and write
A70E000
trusted library allocation
page read and write
15DC4000
trusted library allocation
page read and write
161CE6A6000
trusted library allocation
page read and write
8349D7F000
stack
page read and write
2187D410000
heap
page read and write
165E3000
trusted library allocation
page read and write
161CC2A9000
heap
page read and write
2187E4D1000
heap
page read and write
A623000
trusted library allocation
page read and write
2187DF70000
trusted library allocation
page read and write
15DBC000
trusted library allocation
page read and write
2FE6000
trusted library allocation
page execute and read and write
197E5A89000
heap
page read and write
2187B760000
heap
page read and write
A88C000
trusted library allocation
page read and write
161CE0D2000
heap
page read and write
2187D6FF000
heap
page read and write
15C6A000
trusted library allocation
page read and write
15839000
trusted library allocation
page read and write
2187B650000
heap
page read and write
15B3F000
unkown
page read and write
2187E427000
heap
page read and write
2187E445000
heap
page read and write
155DE000
stack
page read and write
2187E447000
heap
page read and write
15804000
trusted library allocation
page read and write
2187D4CA000
heap
page read and write
161CE0FB000
heap
page read and write
2187D3E1000
heap
page read and write
161CE0B3000
heap
page read and write
F60000
heap
page read and write
157F6000
trusted library allocation
page read and write
15DBD000
trusted library allocation
page read and write
15D32000
trusted library allocation
page read and write
15C3A000
trusted library allocation
page read and write
2187D3FB000
heap
page read and write
547C000
trusted library allocation
page read and write
157F6000
trusted library allocation
page read and write
5256000
trusted library allocation
page read and write
2187D6DF000
heap
page read and write
15D22000
trusted library allocation
page read and write
161CC2B5000
heap
page read and write
12A0000
heap
page read and write
12A49FE000
stack
page read and write
A8D6000
trusted library allocation
page read and write
2187D42E000
heap
page read and write
15839000
trusted library allocation
page read and write
15DBC000
trusted library allocation
page read and write
197E5B02000
heap
page read and write
2187E48B000
heap
page read and write
15D1D000
trusted library allocation
page read and write
161CC305000
heap
page read and write
197E5A3C000
heap
page read and write
2187D3E1000
heap
page read and write
2ED0000
heap
page read and write
2187E43E000
heap
page read and write
161CE0E5000
heap
page read and write
161CE3E0000
heap
page read and write
343F000
stack
page read and write
2187D090000
heap
page read and write
161CC260000
heap
page read and write
15D2B000
trusted library allocation
page read and write
15FDD000
stack
page read and write
2187D3E7000
heap
page read and write
5529000
trusted library allocation
page read and write
2187E47B000
heap
page read and write
12A4CFE000
stack
page read and write
A637000
trusted library allocation
page read and write
54DC000
trusted library allocation
page read and write
2187B580000
heap
page read and write
161CE0FA000
heap
page read and write
2187E43E000
heap
page read and write
2187E4E0000
heap
page read and write
2187B7A5000
heap
page read and write
2187D69F000
heap
page read and write
2187B642000
heap
page read and write
15C98000
trusted library allocation
page read and write
2187D5DE000
heap
page read and write
134F000
heap
page read and write
15DC3000
trusted library allocation
page read and write
5538000
trusted library allocation
page read and write
2187D42E000
heap
page read and write
150F0000
trusted library allocation
page read and write
2187E48B000
heap
page read and write
2187E3C7000
heap
page read and write
15DC0000
trusted library allocation
page read and write
2187D401000
heap
page read and write
2F50000
trusted library allocation
page execute and read and write
2187D4C7000
heap
page read and write
2F8A000
trusted library allocation
page execute and read and write
1598F000
unkown
page read and write
2187D3EA000
heap
page read and write
165CB000
trusted library allocation
page read and write
E50000
heap
page read and write
2187D5D0000
heap
page read and write
197E5A8F000
heap
page read and write
16603000
trusted library allocation
page read and write
12A4AFF000
stack
page read and write
545C000
trusted library allocation
page read and write
F30000
unclassified section
page readonly
161CE0E1000
heap
page read and write
15C3A000
trusted library allocation
page read and write
2187D4C2000
heap
page read and write
161CC2C2000
heap
page read and write
2187D788000
heap
page read and write
161CC286000
heap
page read and write
2187B646000
heap
page read and write
12A47FE000
stack
page read and write
2187D6DF000
heap
page read and write
161CC29F000
heap
page read and write
5505000
trusted library allocation
page read and write
161CE0B2000
heap
page read and write
12A45FE000
stack
page read and write
2187E445000
heap
page read and write
A8EC000
trusted library allocation
page read and write
54F7000
trusted library allocation
page read and write
2187E48B000
heap
page read and write
15DC9000
trusted library allocation
page read and write
2187E3FA000
heap
page read and write
A64C000
trusted library allocation
page read and write
2187E43E000
heap
page read and write
12A46FE000
stack
page read and write
83497CB000
stack
page read and write
15D5B000
trusted library allocation
page read and write
12A44F9000
stack
page read and write
2F92000
trusted library allocation
page execute and read and write
2187DC00000
heap
page read and write
15DBB000
trusted library allocation
page read and write
A62A000
trusted library allocation
page read and write
2187E4E0000
heap
page read and write
197E5A84000
heap
page read and write
2187D4B0000
heap
page read and write
15DBC000
trusted library allocation
page read and write
2187E445000
heap
page read and write
15090000
trusted library allocation
page read and write
161CE106000
heap
page read and write
2187D40E000
heap
page read and write
8349E7E000
stack
page read and write
2187D4CE000
heap
page read and write
2187E507000
heap
page read and write
16029000
unkown
page read and write
2187D410000
heap
page read and write
161CC2A0000
heap
page read and write
197E59F0000
unclassified section
page readonly
36E0000
heap
page read and write
197E5A45000
heap
page read and write
165DA000
trusted library allocation
page read and write
161CC305000
heap
page read and write
2187D6FF000
heap
page read and write
5500000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
A550000
trusted library allocation
page read and write
15D2B000
trusted library allocation
page read and write
2187D5DE000
heap
page read and write
5496000
trusted library allocation
page read and write
16A60000
trusted library allocation
page read and write
2187DF60000
heap
page read and write
15C98000
trusted library allocation
page read and write
EFD000
stack
page read and write
2187DD80000
heap
page read and write
157C7000
trusted library allocation
page read and write
161CC2AD000
heap
page read and write
A8DD000
trusted library allocation
page read and write
161CE0FF000
heap
page read and write
2187E48B000
heap
page read and write
3237000
heap
page read and write
161CE290000
heap
page read and write
161CC306000
heap
page read and write
2187B642000
heap
page read and write
161CC4D0000
heap
page read and write
161CC28C000
heap
page read and write
161CE0BF000
heap
page read and write
A631000
trusted library allocation
page read and write
161CC4DE000
heap
page read and write
15D46000
trusted library allocation
page read and write
A5D4000
trusted library allocation
page read and write
5405000
trusted library allocation
page read and write
15DC7000
trusted library allocation
page read and write
197E5A24000
heap
page read and write
5509000
trusted library allocation
page read and write
197E5A13000
heap
page read and write
2187E454000
heap
page read and write
161CE630000
heap
page read and write
550C000
trusted library allocation
page read and write
2187D3E3000
heap
page read and write
15806000
trusted library allocation
page read and write
2187B642000
heap
page read and write
165DB000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
161CC291000
heap
page read and write
15CE6000
trusted library allocation
page read and write
161CC2B5000
heap
page read and write
161CC28B000
heap
page read and write
15C7A000
trusted library allocation
page read and write
156AE000
stack
page read and write
161CE103000
heap
page read and write
15D1D000
trusted library allocation
page read and write
2187D400000
heap
page read and write
16622000
trusted library allocation
page read and write
54B9000
trusted library allocation
page read and write
A566000
trusted library allocation
page read and write
15A1F000
unkown
page read and write
15DC0000
trusted library allocation
page read and write
2187DF50000
heap
page read and write
2187E370000
heap
page read and write
15DBD000
trusted library allocation
page read and write
A884000
trusted library allocation
page read and write
15D1D000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
2187D413000
heap
page read and write
161CC4DE000
heap
page read and write
2187D4C7000
heap
page read and write
161CE0FF000
heap
page read and write
161CE6A3000
trusted library allocation
page read and write
A71E000
trusted library allocation
page read and write
161CE0BF000
heap
page read and write
161CE0B1000
heap
page read and write
1600000
trusted library allocation
page read and write
2187E3EE000
heap
page read and write
161CC2B3000
heap
page read and write
12B6000
heap
page read and write
161CC305000
heap
page read and write
2187D3F8000
heap
page read and write
15AAD000
unkown
page read and write
161CC2E7000
heap
page read and write
161CC4DB000
heap
page read and write
A717000
trusted library allocation
page read and write
15A5D000
stack
page read and write
15DC7000
trusted library allocation
page read and write
161CE0E5000
heap
page read and write
165FA000
trusted library allocation
page read and write
16678000
trusted library allocation
page read and write
165D2000
trusted library allocation
page read and write
161CC269000
heap
page read and write
197E5CD0000
unclassified section
page readonly
15AEE000
stack
page read and write
161CC297000
heap
page read and write
2187E427000
heap
page read and write
2F52000
trusted library allocation
page execute and read and write
16990000
trusted library allocation
page read and write
2187E454000
heap
page read and write
161CE2D0000
heap
page read and write
15DBD000
trusted library allocation
page read and write
161CC470000
heap
page read and write
15D2C000
trusted library allocation
page read and write
165C3000
trusted library allocation
page read and write
2187E4D1000
heap
page read and write
2FF4000
trusted library allocation
page execute and read and write
165FD000
trusted library allocation
page read and write
161CE0E9000
heap
page read and write
15DBB000
trusted library allocation
page read and write
15D2F000
trusted library allocation
page read and write
A775000
trusted library allocation
page read and write
161CE690000
heap
page read and write
5459000
trusted library allocation
page read and write
161CC27C000
heap
page read and write
1984BFE000
stack
page read and write
2187E47B000
heap
page read and write
15DC9000
trusted library allocation
page read and write
15C98000
trusted library allocation
page read and write
161CE0B6000
heap
page read and write
2187E3FA000
heap
page read and write
15D1D000
trusted library allocation
page read and write
157C7000
trusted library allocation
page read and write
2187E3C4000
heap
page read and write
15806000
trusted library allocation
page read and write
15D2C000
trusted library allocation
page read and write
2187D3F7000
heap
page read and write
165FA000
trusted library allocation
page read and write
161CE0FF000
heap
page read and write
2187E454000
heap
page read and write
2187E47B000
heap
page read and write
2187D960000
heap
page read and write
FAC000
stack
page read and write
15DC9000
trusted library allocation
page read and write
552B000
trusted library allocation
page read and write
2187E3EE000
heap
page read and write
E40000
unclassified section
page readonly
161CC3E0000
heap
page read and write
2187D4C7000
heap
page read and write
5468000
trusted library allocation
page read and write
161CE0FE000
heap
page read and write
2187D69F000
heap
page read and write
5490000
trusted library allocation
page read and write
A87D000
trusted library allocation
page read and write
161CE0FC000
heap
page read and write
16C0000
heap
page read and write
161CE0BE000
heap
page read and write
3249000
heap
page read and write
2187D6E3000
heap
page read and write
161CE0B0000
heap
page read and write
15740000
trusted library allocation
page read and write
15805000
trusted library allocation
page read and write
12A44F3000
stack
page read and write
19848FD000
stack
page read and write
15CE8000
trusted library allocation
page read and write
2187E427000
heap
page read and write
2187E454000
heap
page read and write
161CC309000
heap
page read and write
197E5A65000
heap
page read and write
197E5A00000
heap
page read and write
197E59C0000
heap
page read and write
2187B64E000
heap
page read and write
161CC2C3000
heap
page read and write
54DA000
trusted library allocation
page read and write
15CE6000
trusted library allocation
page read and write
2187D5E0000
heap
page read and write
161CE0E9000
heap
page read and write
A6F4000
trusted library allocation
page read and write
16590000
trusted library allocation
page read and write
161CE2B0000
heap
page read and write
161CE6A1000
trusted library allocation
page read and write
2187D6E3000
heap
page read and write
15BCF000
stack
page read and write
19843B9000
stack
page read and write
2187D400000
heap
page read and write
2187E4DC000
heap
page read and write
2187D3E8000
heap
page read and write
15DC0000
trusted library allocation
page read and write
2187D8B0000
heap
page read and write
A724000
trusted library allocation
page read and write
159CE000
stack
page read and write
2187E454000
heap
page read and write
4F50000
trusted library allocation
page read and write
2187D700000
heap
page read and write
1581E000
trusted library allocation
page read and write
2187D6FF000
heap
page read and write
161CC450000
heap
page read and write
197E5A32000
heap
page read and write
1984CFE000
stack
page read and write
15802000
trusted library allocation
page read and write
197E5A54000
heap
page read and write
54E9000
trusted library allocation
page read and write
2187D3EA000
heap
page read and write
2187DD50000
heap
page read and write
12A4BFE000
stack
page read and write
2187B550000
heap
page read and write
2187E4E1000
heap
page read and write
197E5A49000
heap
page read and write
15B7E000
stack
page read and write
197E5A7D000
heap
page read and write
2187E4DD000
heap
page read and write
161CE210000
heap
page read and write
A896000
trusted library allocation
page read and write
A875000
trusted library allocation
page read and write
161CE0C4000
heap
page read and write
553A000
trusted library allocation
page read and write
161CC30B000
heap
page read and write
54C8000
trusted library allocation
page read and write
15DC0000
trusted library allocation
page read and write
13B0000
heap
page read and write
1984DFE000
stack
page read and write
3230000
heap
page read and write
A6C1000
trusted library allocation
page read and write
2187D5D0000
heap
page read and write
2187E3C8000
heap
page read and write
161CE0EF000
heap
page read and write
161CC296000
heap
page read and write
157FF000
trusted library allocation
page read and write
2187D5D7000
heap
page read and write
2187D419000
heap
page read and write
165EA000
trusted library allocation
page read and write
2187E47B000
heap
page read and write
161CC4DE000
heap
page read and write
54AB000
trusted library allocation
page read and write
2187D400000
heap
page read and write
1581E000
trusted library allocation
page read and write
197E62D0000
trusted library allocation
page read and write
2187D890000
heap
page read and write
161CC309000
heap
page read and write
2187D416000
heap
page read and write
551D000
trusted library allocation
page read and write
161CC281000
heap
page read and write
2187D410000
heap
page read and write
A900000
trusted library allocation
page read and write
2187E3FA000
heap
page read and write
161CE6A8000
trusted library allocation
page read and write
161CE670000
heap
page read and write
15DC9000
trusted library allocation
page read and write
161CC010000
heap
page read and write
2187E43E000
heap
page read and write
2187D4CD000
heap
page read and write
2187D4CC000
heap
page read and write
A713000
trusted library allocation
page read and write
2187D3E7000
heap
page read and write
2EB8000
unkown
page read and write
1230000
unclassified section
page readonly
2187B559000
heap
page read and write
A646000
trusted library allocation
page read and write
2187D6E3000
heap
page read and write
157A9000
trusted library allocation
page read and write
156FE000
unkown
page read and write
15D5B000
trusted library allocation
page read and write
2187D6FF000
heap
page read and write
157F6000
trusted library allocation
page read and write
5479000
trusted library allocation
page read and write
2187D4E1000
heap
page read and write
15DBD000
trusted library allocation
page read and write
161CC305000
heap
page read and write
2187D3FF000
heap
page read and write
2187D3F8000
heap
page read and write
2187E48B000
heap
page read and write
15D43000
trusted library allocation
page read and write
161CE0C1000
heap
page read and write
2187D5D7000
heap
page read and write
161CC286000
heap
page read and write
15D32000
trusted library allocation
page read and write
2F9B000
trusted library allocation
page execute and read and write
12A7000
heap
page read and write
15839000
trusted library allocation
page read and write
161CE0B6000
heap
page read and write
165FA000
trusted library allocation
page read and write
15DC9000
trusted library allocation
page read and write
161CE6A7000
trusted library allocation
page read and write
160BA000
unkown
page read and write
2187D424000
heap
page read and write
19843B3000
stack
page read and write
1573E000
stack
page read and write
2187D830000
heap
page read and write
2187B5ED000
heap
page read and write
2187D4CE000
heap
page read and write
2187B623000
heap
page read and write
2F40000
unkown
page read and write
2187E42D000
heap
page read and write
2187D400000
heap
page read and write
161CC2B3000
heap
page read and write
15DC9000
trusted library allocation
page read and write
1662B000
trusted library allocation
page read and write
2187E3CF000
heap
page read and write
161CC2B3000
heap
page read and write
15DBD000
trusted library allocation
page read and write
161CE4C0000
heap
page read and write
54F0000
trusted library allocation
page read and write
161CC480000
heap
page read and write
161CE106000
heap
page read and write
2187D3F7000
heap
page read and write
2187B623000
heap
page read and write
551B000
trusted library allocation
page read and write
19846FE000
stack
page read and write
161CE2F0000
heap
page read and write
54FD000
trusted library allocation
page read and write
1606D000
stack
page read and write
16AD000
stack
page read and write
2187E43E000
heap
page read and write
161CC1E0000
heap
page read and write
15D96000
trusted library allocation
page read and write
FFC000
stack
page read and write
2187D3FB000
heap
page read and write
2FA3000
trusted library allocation
page execute and read and write
161CC150000
heap
page read and write
15CE3000
trusted library allocation
page read and write
157FD000
trusted library allocation
page read and write
161CE0BB000
heap
page read and write
5534000
trusted library allocation
page read and write
197E5A7F000
heap
page read and write
197E6402000
trusted library allocation
page read and write
15545000
trusted library allocation
page read and write
15D5B000
trusted library allocation
page read and write
2187E4E0000
heap
page read and write
15DC0000
trusted library allocation
page read and write
53FE000
trusted library allocation
page read and write
2187E448000
heap
page read and write
2187D4CD000
heap
page read and write
161CC2E7000
heap
page read and write
15D3A000
trusted library allocation
page read and write
165D2000
trusted library allocation
page read and write
15DC0000
trusted library allocation
page read and write
161CC286000
heap
page read and write
2187D080000
heap
page read and write
161CC2E7000
heap
page read and write
2187D4C7000
heap
page read and write
161CE0E5000
heap
page read and write
161CC309000
heap
page read and write
161CE6A0000
trusted library allocation
page read and write
161CC2E7000
heap
page read and write
F40000
heap
page read and write
165C3000
trusted library allocation
page read and write
2187B4A0000
heap
page read and write
161CC291000
heap
page read and write
15DBD000
trusted library allocation
page read and write
EBD000
stack
page read and write
There are 661 hidden memdumps, click here to show them.