IOC Report
QUOTATION_SEPQTRA071244#U00faPDF.scr.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QUOTATION_SEPQTRA071244#U00faPDF.scr.exe
"C:\Users\user\Desktop\QUOTATION_SEPQTRA071244#U00faPDF.scr.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://s24.filetransfer.io/storage/download/klH4VFXHnzlT
188.114.97.3
malicious
http://filetransfer.io/data-package/Ky4pZ0WB/download
188.114.97.3
malicious
https://filetransfer.io/data-package/Ky4pZ0WB/download
188.114.97.3
malicious
https://reallyfreegeoip.org/xml/8.46.123.33p
unknown
http://checkip.dyndns.org/
193.122.130.0
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://checkip.dyndns.org/q
unknown
http://reallyfreegeoip.org
unknown
https://filetransfer.io
unknown
https://github.com/mgravell/protobuf-net
unknown
https://reallyfreegeoip.org
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.com
unknown
http://filetransfer.io
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.96.3
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://s24.filetransfer.io
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s24.filetransfer.io
188.114.97.3
malicious
filetransfer.io
188.114.97.3
malicious
reallyfreegeoip.org
188.114.96.3
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
193.122.130.0

IPs

IP
Domain
Country
Malicious
188.114.97.3
s24.filetransfer.io
European Union
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
193.122.130.0
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_SEPQTRA071244#U00faPDF_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_SEPQTRA071244#U00faPDF_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_SEPQTRA071244#U00faPDF_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_SEPQTRA071244#U00faPDF_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_SEPQTRA071244#U00faPDF_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_SEPQTRA071244#U00faPDF_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_SEPQTRA071244#U00faPDF_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_SEPQTRA071244#U00faPDF_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_SEPQTRA071244#U00faPDF_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_SEPQTRA071244#U00faPDF_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_SEPQTRA071244#U00faPDF_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_SEPQTRA071244#U00faPDF_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_SEPQTRA071244#U00faPDF_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_SEPQTRA071244#U00faPDF_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
FileDirectory
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
22935D11000
trusted library allocation
page read and write
malicious
22934340000
trusted library section
page read and write
malicious
22935F56000
trusted library allocation
page read and write
malicious
28ADF002000
trusted library allocation
page read and write
malicious
28ACE51D000
trusted library allocation
page read and write
malicious
22945D19000
trusted library allocation
page read and write
malicious
28AE6E50000
trusted library section
page read and write
malicious
28ACE8AE000
trusted library allocation
page read and write
BCF33FE000
stack
page read and write
28ACC6C0000
unkown
page readonly
28ACE792000
trusted library allocation
page read and write
28ACE904000
trusted library allocation
page read and write
28ACE8F0000
trusted library allocation
page read and write
28ACEC3B000
trusted library allocation
page read and write
28ACEBED000
trusted library allocation
page read and write
BCF23FE000
stack
page read and write
229343F0000
heap
page read and write
28ACE90C000
trusted library allocation
page read and write
7FFD3467D000
trusted library allocation
page execute and read and write
7FFD34756000
trusted library allocation
page execute and read and write
28AE6C60000
heap
page read and write
28ACC972000
heap
page read and write
28ACEBBC000
trusted library allocation
page read and write
22935EB5000
trusted library allocation
page read and write
229343E5000
heap
page read and write
28ACEB0C000
trusted library allocation
page read and write
229341D0000
trusted library section
page read and write
28ACE72E000
trusted library allocation
page read and write
28ACE670000
trusted library allocation
page read and write
7FFD3492B000
trusted library allocation
page read and write
28ACEBD1000
trusted library allocation
page read and write
28ACEB5F000
trusted library allocation
page read and write
28ACEBEF000
trusted library allocation
page read and write
28ACE71D000
trusted library allocation
page read and write
28ACEC24000
trusted library allocation
page read and write
28ACE678000
trusted library allocation
page read and write
28AE6D0F000
heap
page read and write
7FFD34680000
trusted library allocation
page read and write
22935E66000
trusted library allocation
page read and write
2293428A000
heap
page read and write
7FFD34824000
trusted library allocation
page execute and read and write
28ACE71F000
trusted library allocation
page read and write
28ACE932000
trusted library allocation
page read and write
BCF1FFE000
stack
page read and write
28ACE89D000
trusted library allocation
page read and write
BCF10EE000
stack
page read and write
2294E5AC000
heap
page read and write
28ACEBF5000
trusted library allocation
page read and write
22945DCB000
trusted library allocation
page read and write
28ACE93F000
trusted library allocation
page read and write
22935E1D000
trusted library allocation
page read and write
28ACE741000
trusted library allocation
page read and write
28ACE4A9000
trusted library allocation
page read and write
8014BFF000
stack
page read and write
7FFD34810000
trusted library allocation
page read and write
7FFD34672000
trusted library allocation
page read and write
28ACEAE2000
trusted library allocation
page read and write
2294E500000
heap
page read and write
28ACE795000
trusted library allocation
page read and write
28ACE831000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page execute and read and write
28ACEACF000
trusted library allocation
page read and write
28ACEB5D000
trusted library allocation
page read and write
28ACEB2D000
trusted library allocation
page read and write
28AE6D05000
heap
page read and write
28ACEB28000
trusted library allocation
page read and write
2294E4E4000
heap
page read and write
28ACE683000
trusted library allocation
page read and write
28ACEBBA000
trusted library allocation
page read and write
80135BE000
stack
page read and write
28ACEBF1000
trusted library allocation
page read and write
22935CB0000
heap
page execute and read and write
28ACEB85000
trusted library allocation
page read and write
28ACC719000
unkown
page readonly
28ACE91F000
trusted library allocation
page read and write
28ACE280000
heap
page read and write
BCF1BFE000
stack
page read and write
28ACE1D0000
trusted library allocation
page read and write
28ACE7EA000
trusted library allocation
page read and write
22934410000
heap
page read and write
BCF47FE000
stack
page read and write
7FFD34680000
trusted library allocation
page read and write
7FFD3494E000
trusted library allocation
page read and write
7FFD34A02000
trusted library allocation
page read and write
28ACE69E000
trusted library allocation
page read and write
28ACE7D8000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
7FFD34810000
trusted library allocation
page read and write
7FF4E6330000
trusted library allocation
page execute and read and write
2294E561000
heap
page read and write
22934262000
heap
page read and write
7FFD348E0000
trusted library allocation
page execute and read and write
28ACEA50000
trusted library allocation
page read and write
7FFD34673000
trusted library allocation
page execute and read and write
7FFD348F0000
trusted library allocation
page read and write
28ACE8EA000
trusted library allocation
page read and write
7FFD3487D000
trusted library allocation
page read and write
28ACEB74000
trusted library allocation
page read and write
28AE6F30000
heap
page read and write
28ACE654000
trusted library allocation
page read and write
28ACE8C8000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page read and write
28ACC8E0000
heap
page read and write
28ACE90E000
trusted library allocation
page read and write
28ACEBE2000
trusted library allocation
page read and write
28ACC8B5000
heap
page read and write
28ACEBAF000
trusted library allocation
page read and write
28ACC920000
heap
page read and write
22935FDE000
trusted library allocation
page read and write
28ACE985000
trusted library allocation
page read and write
7FFD34910000
trusted library allocation
page read and write
28ADE4A2000
trusted library allocation
page read and write
28ACC6C2000
unkown
page readonly
28ACE4DB000
trusted library allocation
page read and write
28ACE790000
trusted library allocation
page read and write
BCF2BFD000
stack
page read and write
28ACE1F0000
trusted library allocation
page read and write
28ACEBC7000
trusted library allocation
page read and write
28ACEBA9000
trusted library allocation
page read and write
22935EBD000
trusted library allocation
page read and write
28AE6CEB000
heap
page read and write
7FFD3468D000
trusted library allocation
page execute and read and write
7FFD34890000
trusted library allocation
page read and write
2294E4E2000
heap
page read and write
28ACE685000
trusted library allocation
page read and write
28ACEAD5000
trusted library allocation
page read and write
28ACC93C000
heap
page read and write
2294E4E0000
heap
page read and write
8015FFD000
stack
page read and write
28ACE910000
trusted library allocation
page read and write
28ACE875000
trusted library allocation
page read and write
28ACE943000
trusted library allocation
page read and write
7FFD348D0000
trusted library allocation
page execute and read and write
28ACE934000
trusted library allocation
page read and write
7FFD3472C000
trusted library allocation
page execute and read and write
7FFD34790000
trusted library allocation
page execute and read and write
22935E54000
trusted library allocation
page read and write
28ACE6E8000
trusted library allocation
page read and write
28ACEAD3000
trusted library allocation
page read and write
22934310000
trusted library allocation
page read and write
28ACE6A9000
trusted library allocation
page read and write
28ACEB9E000
trusted library allocation
page read and write
28ACE70E000
trusted library allocation
page read and write
22935EE8000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
7FFD34880000
trusted library allocation
page read and write
28ACE92C000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page execute and read and write
28ACE784000
trusted library allocation
page read and write
28ACEB50000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page read and write
22934249000
heap
page read and write
28ACE698000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
28ACE658000
trusted library allocation
page read and write
7FFD3467D000
trusted library allocation
page execute and read and write
28AE7130000
trusted library section
page read and write
28ACE7C1000
trusted library allocation
page read and write
8016BFE000
stack
page read and write
28AE6D50000
trusted library section
page read and write
7FFD34910000
trusted library allocation
page execute and read and write
28ACE76A000
trusted library allocation
page read and write
8015BFE000
stack
page read and write
22935FFC000
trusted library allocation
page read and write
28ACEAD1000
trusted library allocation
page read and write
28ACE8DD000
trusted library allocation
page read and write
28ACE8CA000
trusted library allocation
page read and write
7FFD34917000
trusted library allocation
page read and write
28ACE440000
heap
page execute and read and write
229341E0000
trusted library allocation
page read and write
22935D00000
heap
page read and write
28ACE974000
trusted library allocation
page read and write
28ACE8FB000
trusted library allocation
page read and write
28ACE912000
trusted library allocation
page read and write
28ACEC20000
trusted library allocation
page read and write
28ACE650000
trusted library allocation
page read and write
7FFD34756000
trusted library allocation
page execute and read and write
7FFD34820000
trusted library allocation
page execute and read and write
28ACE8AA000
trusted library allocation
page read and write
22935E3C000
trusted library allocation
page read and write
28ACE772000
trusted library allocation
page read and write
BCF3BFD000
stack
page read and write
28ACC925000
heap
page read and write
28ACE737000
trusted library allocation
page read and write
22935F0E000
trusted library allocation
page read and write
28ACEBE0000
trusted library allocation
page read and write
28ACE862000
trusted library allocation
page read and write
28ACEBC9000
trusted library allocation
page read and write
BCF27FE000
stack
page read and write
22934150000
direct allocation
page read and write
28ACE7AE000
trusted library allocation
page read and write
22934180000
heap
page read and write
28AE6C50000
heap
page read and write
7FFD34930000
trusted library allocation
page read and write
28ACC930000
heap
page read and write
28ACE687000
trusted library allocation
page read and write
28ACE7D2000
trusted library allocation
page read and write
28ACEB3B000
trusted library allocation
page read and write
28ACE884000
trusted library allocation
page read and write
28ACE6A7000
trusted library allocation
page read and write
28ACC999000
heap
page read and write
7FFD34830000
trusted library allocation
page read and write
28ACC96F000
heap
page read and write
28ADE578000
trusted library allocation
page read and write
28AE6C8B000
heap
page read and write
BCF4BFF000
stack
page read and write
28ACE886000
trusted library allocation
page read and write
28ACE844000
trusted library allocation
page read and write
28ACE74E000
trusted library allocation
page read and write
28ACEB08000
trusted library allocation
page read and write
7FFD3472C000
trusted library allocation
page execute and read and write
7FFD34A0D000
trusted library allocation
page read and write
28ACE6E0000
trusted library allocation
page read and write
28ACE963000
trusted library allocation
page read and write
28ACEBCF000
trusted library allocation
page read and write
28ACE6C6000
trusted library allocation
page read and write
22935E62000
trusted library allocation
page read and write
28ACE6AE000
trusted library allocation
page read and write
7FFD34683000
trusted library allocation
page read and write
28ACEB61000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page execute and read and write
801353E000
stack
page read and write
22935EA5000
trusted library allocation
page read and write
22934320000
trusted library allocation
page read and write
28ACE952000
trusted library allocation
page read and write
28ACE97A000
trusted library allocation
page read and write
28ACE849000
trusted library allocation
page read and write
22934430000
heap
page read and write
28ACEB0A000
trusted library allocation
page read and write
28ACE69A000
trusted library allocation
page read and write
22934200000
trusted library allocation
page read and write
28ACE88C000
trusted library allocation
page read and write
22935F30000
trusted library allocation
page read and write
28ADF2E2000
trusted library allocation
page read and write
BCF2FFE000
stack
page read and write
28ACE490000
trusted library allocation
page read and write
2294E903000
heap
page read and write
28AE6CD1000
heap
page read and write
7FFD34939000
trusted library allocation
page read and write
2293602B000
trusted library allocation
page read and write
22935F42000
trusted library allocation
page read and write
7FFD346CC000
trusted library allocation
page execute and read and write
28ACE8DB000
trusted library allocation
page read and write
28ACEBDE000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page execute and read and write
28ACE79D000
trusted library allocation
page read and write
7FFD34720000
trusted library allocation
page read and write
28ACE77F000
trusted library allocation
page read and write
28ACEB37000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
28ACE914000
trusted library allocation
page read and write
28ACE8CC000
trusted library allocation
page read and write
22936032000
trusted library allocation
page read and write
28ACEBB4000
trusted library allocation
page read and write
28ACE95A000
trusted library allocation
page read and write
28ACE92E000
trusted library allocation
page read and write
22935EAD000
trusted library allocation
page read and write
22935FF7000
trusted library allocation
page read and write
28ACEB5B000
trusted library allocation
page read and write
22936000000
trusted library allocation
page read and write
BCF43FE000
stack
page read and write
28ACC9A5000
heap
page read and write
28ACE879000
trusted library allocation
page read and write
28ACEBFC000
trusted library allocation
page read and write
28ACEBDC000
trusted library allocation
page read and write
2293603E000
trusted library allocation
page read and write
28ACE295000
heap
page read and write
28ACE7B4000
trusted library allocation
page read and write
7FFD3469B000
trusted library allocation
page execute and read and write
28ACE85A000
trusted library allocation
page read and write
2294E55F000
heap
page read and write
28ACE6F1000
trusted library allocation
page read and write
28ACE4B1000
trusted library allocation
page read and write
28ACE846000
trusted library allocation
page read and write
2294E505000
heap
page read and write
28ACE672000
trusted library allocation
page read and write
BCF4FFE000
stack
page read and write
22935EFB000
trusted library allocation
page read and write
7FFD3469D000
trusted library allocation
page execute and read and write
22936077000
trusted library allocation
page read and write
28ACE6D9000
trusted library allocation
page read and write
28ACE835000
trusted library allocation
page read and write
28ACE70C000
trusted library allocation
page read and write
28ACC7A0000
heap
page read and write
28ACEBB8000
trusted library allocation
page read and write
7FFD34726000
trusted library allocation
page read and write
28ACEB53000
trusted library allocation
page read and write
28ACEC26000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
28ACE7F2000
trusted library allocation
page read and write
28ACE77D000
trusted library allocation
page read and write
28ACE75D000
trusted library allocation
page read and write
7FFD349F0000
trusted library allocation
page read and write
28ACE871000
trusted library allocation
page read and write
28ACE945000
trusted library allocation
page read and write
28ACEB39000
trusted library allocation
page read and write
28ACEAE0000
trusted library allocation
page read and write
28ACEB24000
trusted library allocation
page read and write
28ADE461000
trusted library allocation
page read and write
28ACE8CE000
trusted library allocation
page read and write
28ACE70A000
trusted library allocation
page read and write
28AE6C5B000
heap
page read and write
28ACEAE6000
trusted library allocation
page read and write
28ACC6E7000
unkown
page readonly
28ACE708000
trusted library allocation
page read and write
7FF4E6310000
trusted library allocation
page execute and read and write
28ACE897000
trusted library allocation
page read and write
28AE6CD7000
heap
page read and write
28ACE7E5000
trusted library allocation
page read and write
7FFD348F0000
trusted library allocation
page read and write
28ACE663000
trusted library allocation
page read and write
28ADE51A000
trusted library allocation
page read and write
28ACC6CA000
unkown
page readonly
28ACE877000
trusted library allocation
page read and write
28ACE656000
trusted library allocation
page read and write
7FFD34720000
trusted library allocation
page read and write
28ACE721000
trusted library allocation
page read and write
8014FFD000
stack
page read and write
7FFD34920000
trusted library allocation
page read and write
22935ED5000
trusted library allocation
page read and write
7FFD34845000
trusted library allocation
page read and write
7FFD34674000
trusted library allocation
page read and write
22934210000
heap
page read and write
7FFD34900000
trusted library allocation
page read and write
229342B9000
heap
page read and write
7FFD34A07000
trusted library allocation
page read and write
7FF410360000
trusted library allocation
page execute and read and write
28ACEC29000
trusted library allocation
page read and write
7FFD34674000
trusted library allocation
page read and write
28ACE451000
trusted library allocation
page read and write
28ACE203000
trusted library allocation
page read and write
28ACEB13000
trusted library allocation
page read and write
7FFD34828000
trusted library allocation
page execute and read and write
28ACEB72000
trusted library allocation
page read and write
28AE6CB6000
heap
page read and write
2294E5A5000
heap
page read and write
28ACEBDA000
trusted library allocation
page read and write
22935FD9000
trusted library allocation
page read and write
28ACE711000
trusted library allocation
page read and write
28ACE734000
trusted library allocation
page read and write
28ADE841000
trusted library allocation
page read and write
28ACEAF5000
trusted library allocation
page read and write
28ACE724000
trusted library allocation
page read and write
28ACEB78000
trusted library allocation
page read and write
28ACC8C0000
heap
page read and write
BCF37FE000
stack
page read and write
22935F2B000
trusted library allocation
page read and write
28ACE7C7000
trusted library allocation
page read and write
28ACEAFB000
trusted library allocation
page read and write
28ACE4BB000
trusted library allocation
page read and write
28ACE745000
trusted library allocation
page read and write
BCF3FFE000
stack
page read and write
28ACE833000
trusted library allocation
page read and write
28ACE8DF000
trusted library allocation
page read and write
7FFD34920000
trusted library allocation
page execute and read and write
28ACEAE4000
trusted library allocation
page read and write
28ACE873000
trusted library allocation
page read and write
28ACE8EE000
trusted library allocation
page read and write
7FFD34730000
trusted library allocation
page execute and read and write
7FFD34813000
trusted library allocation
page read and write
28ACE6C8000
trusted library allocation
page read and write
7FFD348A0000
trusted library allocation
page read and write
22945D42000
trusted library allocation
page read and write
28ACEB8B000
trusted library allocation
page read and write
2293424C000
heap
page read and write
28ACE676000
trusted library allocation
page read and write
22936038000
trusted library allocation
page read and write
28ACE8EC000
trusted library allocation
page read and write
8013FF2000
stack
page read and write
BCF17EC000
stack
page read and write
28ACE954000
trusted library allocation
page read and write
22934360000
trusted library allocation
page read and write
28ACE200000
trusted library allocation
page read and write
28ACE7C3000
trusted library allocation
page read and write
28ACEB89000
trusted library allocation
page read and write
28ACC95A000
heap
page read and write
28ACEB3D000
trusted library allocation
page read and write
229341B0000
heap
page read and write
28ACE674000
trusted library allocation
page read and write
28ACC8B0000
heap
page read and write
28ACE972000
trusted library allocation
page read and write
28ACEBE4000
trusted library allocation
page read and write
28ACE696000
trusted library allocation
page read and write
28ACE976000
trusted library allocation
page read and write
22935FEE000
trusted library allocation
page read and write
28ACEAF9000
trusted library allocation
page read and write
28ACE8FD000
trusted library allocation
page read and write
22945D9F000
trusted library allocation
page read and write
22934218000
heap
page read and write
28ACEAD8000
trusted library allocation
page read and write
22935EB1000
trusted library allocation
page read and write
28ACE732000
trusted library allocation
page read and write
80153FE000
stack
page read and write
28ACEC31000
trusted library allocation
page read and write
28ACE71B000
trusted library allocation
page read and write
28ACEB4C000
trusted library allocation
page read and write
22935E56000
trusted library allocation
page read and write
7FFD34690000
trusted library allocation
page read and write
28ACEBCB000
trusted library allocation
page read and write
28ACE967000
trusted library allocation
page read and write
28ACE781000
trusted library allocation
page read and write
28ACE78C000
trusted library allocation
page read and write
28ACE7AC000
trusted library allocation
page read and write
28ACEBBE000
trusted library allocation
page read and write
28ACEB59000
trusted library allocation
page read and write
28ACE77B000
trusted library allocation
page read and write
28ACE7E7000
trusted library allocation
page read and write
28ACE6DD000
trusted library allocation
page read and write
28ACE7C5000
trusted library allocation
page read and write
28ACE864000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
7FFD3490A000
trusted library allocation
page read and write
22935E6B000
trusted library allocation
page read and write
28ACE88A000
trusted library allocation
page read and write
28ACE7D4000
trusted library allocation
page read and write
28ACE842000
trusted library allocation
page read and write
7FFD34826000
trusted library allocation
page execute and read and write
28ACEB98000
trusted library allocation
page read and write
28ACE82D000
trusted library allocation
page read and write
7FFD3493D000
trusted library allocation
page read and write
28ACE949000
trusted library allocation
page read and write
28ACE888000
trusted library allocation
page read and write
22945DA6000
trusted library allocation
page read and write
28ACE956000
trusted library allocation
page read and write
22934130000
heap
page read and write
28ACE8FF000
trusted library allocation
page read and write
28ACE770000
trusted library allocation
page read and write
22945DC1000
trusted library allocation
page read and write
28ACE89B000
trusted library allocation
page read and write
2294E900000
heap
page read and write
7FFD34850000
trusted library allocation
page read and write
22935FE4000
trusted library allocation
page read and write
28ACE730000
trusted library allocation
page read and write
28ACEBCD000
trusted library allocation
page read and write
BCF10AF000
stack
page read and write
22934050000
heap
page read and write
28ACE7D6000
trusted library allocation
page read and write
22935EB9000
trusted library allocation
page read and write
28ACEBA7000
trusted library allocation
page read and write
28ACE837000
trusted library allocation
page read and write
28ACE978000
trusted library allocation
page read and write
28ACE6CE000
trusted library allocation
page read and write
22934010000
remote allocation
page execute and read and write
22934435000
heap
page read and write
7FFD34870000
trusted library allocation
page read and write
28ACE941000
trusted library allocation
page read and write
28ADE5A0000
trusted library allocation
page read and write
28ACE930000
trusted library allocation
page read and write
7FFD34940000
trusted library allocation
page read and write
28ACEB40000
trusted library allocation
page read and write
28ACE240000
heap
page execute and read and write
2294E50B000
heap
page read and write
22934363000
trusted library allocation
page read and write
28AE6ED0000
trusted library section
page read and write
28ACE899000
trusted library allocation
page read and write
28ACE7C9000
trusted library allocation
page read and write
7FFD34726000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page read and write
22945DD7000
trusted library allocation
page read and write
7FFD34694000
trusted library allocation
page read and write
28ACE851000
trusted library allocation
page read and write
2294E600000
heap
page execute and read and write
2294E5A3000
heap
page read and write
7FFD34900000
trusted library allocation
page read and write
22934260000
heap
page read and write
28ACE965000
trusted library allocation
page read and write
28ACE689000
trusted library allocation
page read and write
28ADE451000
trusted library allocation
page read and write
28ACEB06000
trusted library allocation
page read and write
28ACE6CC000
trusted library allocation
page read and write
28ACEB4A000
trusted library allocation
page read and write
28ACE89F000
trusted library allocation
page read and write
28ACEA16000
trusted library allocation
page read and write
28ACE8B7000
trusted library allocation
page read and write
22935EA9000
trusted library allocation
page read and write
28ACC99B000
heap
page read and write
28ACEB8D000
trusted library allocation
page read and write
28ACEB7B000
trusted library allocation
page read and write
28ACE652000
trusted library allocation
page read and write
28ACE6AB000
trusted library allocation
page read and write
7FFD3481D000
trusted library allocation
page execute and read and write
801357E000
stack
page read and write
28ACE7B0000
trusted library allocation
page read and write
BCF53FF000
stack
page read and write
28AE6480000
trusted library allocation
page read and write
28ACE75F000
trusted library allocation
page read and write
28ACEBFE000
trusted library allocation
page read and write
28ACE857000
trusted library allocation
page read and write
28ACE6EE000
trusted library allocation
page read and write
28AE6C89000
heap
page read and write
28ACEC04000
trusted library allocation
page read and write
28ACE4C3000
trusted library allocation
page read and write
22945D11000
trusted library allocation
page read and write
80167FF000
stack
page read and write
28ACE8AC000
trusted library allocation
page read and write
229342C7000
heap
page read and write
28ACEAF3000
trusted library allocation
page read and write
28ACEC37000
trusted library allocation
page read and write
28ACE68B000
trusted library allocation
page read and write
7FFD34822000
trusted library allocation
page read and write
80163FE000
stack
page read and write
7FFD34913000
trusted library allocation
page read and write
28ACE76E000
trusted library allocation
page read and write
28ACE519000
trusted library allocation
page read and write
28ACE701000
trusted library allocation
page read and write
28ACE4BF000
trusted library allocation
page read and write
7FFD34673000
trusted library allocation
page execute and read and write
7FFD34670000
trusted library allocation
page read and write
28ACE7B2000
trusted library allocation
page read and write
28ACE7BF000
trusted library allocation
page read and write
7FFD34685000
trusted library allocation
page read and write
7FF4E6320000
trusted library allocation
page execute and read and write
28ACE6DB000
trusted library allocation
page read and write
80157FE000
stack
page read and write
28ACE76C000
trusted library allocation
page read and write
229343E0000
heap
page read and write
28ACE6CA000
trusted library allocation
page read and write
7FFD34730000
trusted library allocation
page execute and read and write
28AE7220000
heap
page read and write
8016FFE000
stack
page read and write
28ACE96A000
trusted library allocation
page read and write
28ACEB2A000
trusted library allocation
page read and write
28ACE947000
trusted library allocation
page read and write
28ACE8F2000
trusted library allocation
page read and write
28ADF375000
trusted library allocation
page read and write
28ACC880000
heap
page read and write
7FFD34944000
trusted library allocation
page read and write
28ACEB1A000
trusted library allocation
page read and write
28ACEB15000
trusted library allocation
page read and write
28ACE7A1000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
22935E5E000
trusted library allocation
page read and write
There are 522 hidden memdumps, click here to show them.