IOC Report
Quote List.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
Quote List.scr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Quote List.scr.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Temp\XenoManager\Quote List.scr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\XenoManager\Quote List.scr.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\0ckz32p0.vg5
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5ioiwjby.ake.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bwqyhjhe.u2s.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hbeov3or.p1k.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hhbopwi4.atn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lm1ge354.lvx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pyxud3lx.p3m.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tgun5iiv.pbv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zw4qovnv.0io.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\c0x15ytk.npd
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\c5oaqdws.cs1
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\fsiukqpv.3qa
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\k0d4rjsb.fq1
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\m3w51req.inw
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\nsajgeyy.fvp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\s15sst01.ncp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
modified
C:\Users\user\AppData\Local\Temp\szy1nek2.2qr
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\xh1c3rgj.evp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Quote List.scr.exe
"C:\Users\user\Desktop\Quote List.scr.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote List.scr.exe"
malicious
C:\Users\user\Desktop\Quote List.scr.exe
"C:\Users\user\Desktop\Quote List.scr.exe"
malicious
C:\Users\user\AppData\Local\Temp\XenoManager\Quote List.scr.exe
"C:\Users\user\AppData\Local\Temp\XenoManager\Quote List.scr.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\XenoManager\Quote List.scr.exe"
malicious
C:\Users\user\AppData\Local\Temp\XenoManager\Quote List.scr.exe
"C:\Users\user\AppData\Local\Temp\XenoManager\Quote List.scr.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
66.63.168.142
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
66.63.168.142
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
6870000
trusted library section
page read and write
malicious
293C000
trusted library allocation
page read and write
malicious
27EE000
trusted library allocation
page read and write
malicious
2C9E000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
6A00000
heap
page read and write
6D5E000
heap
page read and write
6A68000
heap
page read and write
7A0E000
stack
page read and write
1680000
trusted library allocation
page read and write
4C3A000
trusted library allocation
page read and write
DED000
trusted library allocation
page execute and read and write
35DD000
trusted library allocation
page read and write
2366000
trusted library allocation
page execute and read and write
3619000
trusted library allocation
page read and write
3FE000
stack
page read and write
4C20000
trusted library allocation
page read and write
72E000
heap
page read and write
559000
stack
page read and write
26DA000
trusted library allocation
page read and write
69E0000
trusted library allocation
page execute and read and write
7C9E000
stack
page read and write
4F8A000
trusted library allocation
page read and write
5CBE000
stack
page read and write
1383000
heap
page read and write
10CC000
stack
page read and write
70B0000
trusted library allocation
page read and write
CD2E000
stack
page read and write
64B2000
trusted library allocation
page read and write
4061000
trusted library allocation
page read and write
DA5000
heap
page read and write
5DC0000
heap
page read and write
2710000
heap
page read and write
713D000
stack
page read and write
3F28000
trusted library allocation
page read and write
6712000
trusted library allocation
page read and write
4F96000
trusted library allocation
page read and write
133E000
stack
page read and write
DA8000
heap
page read and write
754000
heap
page read and write
EFE000
heap
page read and write
DF0000
heap
page read and write
B74000
trusted library allocation
page read and write
4C30000
trusted library allocation
page read and write
3C71000
trusted library allocation
page read and write
6F9D000
stack
page read and write
A65000
heap
page read and write
54C0000
heap
page execute and read and write
4F91000
trusted library allocation
page read and write
70F3000
heap
page read and write
4DEF000
stack
page read and write
70B5000
trusted library allocation
page read and write
15A4000
trusted library allocation
page read and write
584A000
stack
page read and write
70A0000
trusted library allocation
page read and write
4F74000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
4C47000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
2EF5000
trusted library allocation
page read and write
515E000
stack
page read and write
CECF000
stack
page read and write
6492000
trusted library allocation
page read and write
1340000
heap
page read and write
5891000
heap
page read and write
D00C000
stack
page read and write
5180000
heap
page read and write
2C2D000
stack
page read and write
E20000
trusted library allocation
page read and write
234D000
trusted library allocation
page execute and read and write
DA0000
heap
page read and write
6440000
heap
page read and write
820000
heap
page read and write
98C000
stack
page read and write
72FD000
stack
page read and write
30DB000
trusted library allocation
page read and write
6439000
stack
page read and write
751F000
stack
page read and write
7780000
trusted library allocation
page read and write
64CA000
trusted library allocation
page read and write
1010000
heap
page read and write
4EFE000
stack
page read and write
7840000
heap
page execute and read and write
25CF000
stack
page read and write
722E000
stack
page read and write
F0B000
heap
page read and write
4C60000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
B70000
trusted library allocation
page read and write
70FD000
stack
page read and write
26E0000
heap
page read and write
BB0000
trusted library allocation
page read and write
70A0000
trusted library allocation
page execute and read and write
69B0000
trusted library allocation
page read and write
3E86000
trusted library allocation
page read and write
C07000
heap
page read and write
2700000
heap
page execute and read and write
B90000
heap
page read and write
5C00000
trusted library allocation
page read and write
52AE000
stack
page read and write
151F000
stack
page read and write
141E000
stack
page read and write
574E000
stack
page read and write
6D50000
trusted library allocation
page read and write
15CB000
trusted library allocation
page execute and read and write
69A0000
trusted library allocation
page read and write
1670000
trusted library allocation
page execute and read and write
166E000
stack
page read and write
502E000
stack
page read and write
70B4000
heap
page read and write
78A0000
trusted library allocation
page read and write
4FD5000
trusted library allocation
page read and write
EE9000
heap
page read and write
A0E000
stack
page read and write
A90000
heap
page read and write
267F000
trusted library allocation
page read and write
731E000
stack
page read and write
4C2B000
trusted library allocation
page read and write
B80000
trusted library allocation
page read and write
1580000
trusted library allocation
page read and write
577E000
stack
page read and write
613C000
stack
page read and write
5C0E000
trusted library allocation
page read and write
235D000
trusted library allocation
page execute and read and write
5C04000
heap
page read and write
2961000
trusted library allocation
page read and write
58BD000
stack
page read and write
7949000
heap
page read and write
D4C000
stack
page read and write
6D50000
heap
page read and write
570E000
stack
page read and write
2360000
trusted library allocation
page read and write
7767000
trusted library allocation
page read and write
2350000
trusted library allocation
page read and write
5160000
trusted library section
page readonly
7050000
trusted library section
page read and write
23C3000
heap
page execute and read and write
2375000
trusted library allocation
page execute and read and write
DA0000
heap
page read and write
860000
heap
page read and write
646A000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
40E000
remote allocation
page execute and read and write
B8D000
trusted library allocation
page execute and read and write
5DD0000
heap
page read and write
53AE000
stack
page read and write
720000
heap
page read and write
26DE000
stack
page read and write
CF9000
stack
page read and write
78D0000
heap
page read and write
5040000
trusted library allocation
page execute and read and write
557F000
stack
page read and write
2356000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
2721000
trusted library allocation
page read and write
761000
heap
page read and write
2428000
trusted library allocation
page read and write
16B0000
heap
page read and write
3729000
trusted library allocation
page read and write
134D000
heap
page read and write
A50000
trusted library allocation
page read and write
5C3E000
stack
page read and write
B6F000
stack
page read and write
BA0000
trusted library allocation
page read and write
D8E0000
trusted library allocation
page execute and read and write
1030000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
580C000
stack
page read and write
A4E000
stack
page read and write
3EDA000
trusted library allocation
page read and write
CC9000
heap
page read and write
59FE000
stack
page read and write
6450000
trusted library allocation
page read and write
47FB000
stack
page read and write
7030000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
5F51000
heap
page read and write
6723000
heap
page read and write
513E000
stack
page read and write
E69000
heap
page read and write
7070000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
5DBE000
stack
page read and write
E07000
trusted library allocation
page execute and read and write
741E000
stack
page read and write
7000000
trusted library allocation
page read and write
A80000
trusted library allocation
page read and write
DD0000
trusted library allocation
page read and write
DDF000
stack
page read and write
10F0000
heap
page read and write
7075000
trusted library allocation
page read and write
6461000
trusted library allocation
page read and write
6688000
trusted library allocation
page read and write
4F7B000
trusted library allocation
page read and write
64B9000
trusted library allocation
page read and write
12E0000
heap
page read and write
5F67000
heap
page read and write
4FFE000
stack
page read and write
C14000
heap
page read and write
3B0000
heap
page read and write
70A0000
heap
page read and write
790C000
heap
page read and write
520D000
stack
page read and write
5770000
trusted library allocation
page read and write
7779000
trusted library allocation
page read and write
DD3000
trusted library allocation
page execute and read and write
6480000
heap
page read and write
2EBB000
trusted library allocation
page read and write
5230000
heap
page execute and read and write
78EA000
heap
page read and write
108E000
stack
page read and write
77B0000
trusted library allocation
page read and write
5C7E000
stack
page read and write
4C4D000
trusted library allocation
page read and write
7761000
trusted library allocation
page read and write
5AFE000
stack
page read and write
25D1000
trusted library allocation
page read and write
236A000
trusted library allocation
page execute and read and write
840000
heap
page read and write
7B9E000
stack
page read and write
BA2000
trusted library allocation
page read and write
4C3E000
trusted library allocation
page read and write
5C32000
trusted library allocation
page read and write
2F20000
heap
page execute and read and write
C21000
heap
page read and write
E0B000
trusted library allocation
page execute and read and write
59FD000
stack
page read and write
1040000
heap
page execute and read and write
B73000
trusted library allocation
page execute and read and write
5DD2000
heap
page read and write
35D9000
trusted library allocation
page read and write
3F75000
trusted library allocation
page read and write
5C70000
heap
page read and write
5C2D000
trusted library allocation
page read and write
30D5000
trusted library allocation
page read and write
5C26000
trusted library allocation
page read and write
2370000
trusted library allocation
page read and write
865000
heap
page read and write
10F9000
stack
page read and write
D3D000
stack
page read and write
6D9D000
stack
page read and write
440000
unkown
page readonly
2641000
trusted library allocation
page read and write
64D5000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
5C12000
trusted library allocation
page read and write
10D0000
trusted library allocation
page read and write
64CF000
trusted library allocation
page read and write
60FC000
stack
page read and write
71E0000
trusted library allocation
page execute and read and write
2C50000
heap
page read and write
2343000
trusted library allocation
page execute and read and write
5B0000
heap
page read and write
64B5000
trusted library allocation
page read and write
2F0E000
trusted library allocation
page read and write
11D0000
heap
page read and write
D76E000
stack
page read and write
4D00000
heap
page read and write
24C0000
heap
page read and write
BAA000
trusted library allocation
page execute and read and write
9E0000
heap
page read and write
57CE000
stack
page read and write
3E32000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
6990000
trusted library allocation
page execute and read and write
4DFD000
stack
page read and write
3061000
trusted library allocation
page read and write
4CE4000
heap
page read and write
5150000
heap
page read and write
517E000
stack
page read and write
400F000
trusted library allocation
page read and write
E5E000
heap
page read and write
6674000
trusted library allocation
page read and write
74E0000
trusted library section
page read and write
D08E000
stack
page read and write
27CF000
trusted library allocation
page read and write
2F19000
trusted library allocation
page read and write
58BC000
stack
page read and write
372D000
trusted library allocation
page read and write
6F7000
stack
page read and write
7903000
heap
page read and write
BA6000
trusted library allocation
page execute and read and write
B86000
trusted library allocation
page read and write
B89000
trusted library allocation
page read and write
BB7000
trusted library allocation
page execute and read and write
4EE0000
trusted library allocation
page read and write
BB5000
trusted library allocation
page execute and read and write
7860000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
23C0000
heap
page execute and read and write
4C80000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
6FDE000
stack
page read and write
2340000
trusted library allocation
page read and write
59B8000
stack
page read and write
BEE000
heap
page read and write
5DE0000
heap
page read and write
543C000
stack
page read and write
2D5D000
trusted library allocation
page read and write
DD4000
trusted library allocation
page read and write
F88000
heap
page read and write
4F8E000
trusted library allocation
page read and write
514E000
stack
page read and write
59BE000
stack
page read and write
3FC2000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
2791000
trusted library allocation
page read and write
587E000
stack
page read and write
51CB000
stack
page read and write
8F8000
stack
page read and write
E05000
trusted library allocation
page execute and read and write
3601000
trusted library allocation
page read and write
4EF0000
heap
page execute and read and write
10F7000
heap
page read and write
70CE000
heap
page read and write
4EF3000
heap
page execute and read and write
23B0000
trusted library allocation
page read and write
6D55000
trusted library allocation
page read and write
2390000
trusted library allocation
page read and write
5BCD000
stack
page read and write
442000
unkown
page readonly
503E000
stack
page read and write
A60000
heap
page read and write
23D0000
heap
page execute and read and write
4FA2000
trusted library allocation
page read and write
D50E000
stack
page read and write
4EBF000
stack
page read and write
77A0000
trusted library allocation
page read and write
305E000
stack
page read and write
15A0000
trusted library allocation
page read and write
7771000
trusted library allocation
page read and write
DF2000
trusted library allocation
page read and write
550B000
stack
page read and write
E75000
heap
page read and write
307F000
trusted library allocation
page read and write
4A60000
trusted library allocation
page read and write
2359000
trusted library allocation
page read and write
5760000
trusted library allocation
page execute and read and write
2BEE000
stack
page read and write
4C80000
trusted library allocation
page read and write
28EB000
trusted library allocation
page read and write
7921000
heap
page read and write
4FE0000
trusted library allocation
page read and write
A7E000
stack
page read and write
2F05000
trusted library allocation
page read and write
E30000
trusted library allocation
page execute and read and write
1540000
heap
page read and write
70BF000
heap
page read and write
518E000
stack
page read and write
6680000
trusted library allocation
page read and write
4A90000
heap
page read and write
4CA0000
trusted library allocation
page read and write
70B0000
trusted library allocation
page read and write
587E000
stack
page read and write
D040000
trusted library allocation
page execute and read and write
633F000
stack
page read and write
4FC0000
trusted library allocation
page read and write
55BE000
stack
page read and write
48FC000
stack
page read and write
54C5000
heap
page read and write
54B0000
heap
page read and write
5860000
trusted library allocation
page read and write
25DE000
stack
page read and write
30CE000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
BFF000
heap
page read and write
1590000
trusted library allocation
page read and write
E40000
heap
page read and write
3CC9000
trusted library allocation
page read and write
D7C000
stack
page read and write
4CDE000
stack
page read and write
402F000
trusted library allocation
page read and write
30E5000
trusted library allocation
page read and write
417F000
trusted library allocation
page read and write
2F16000
trusted library allocation
page read and write
6DDE000
stack
page read and write
7010000
heap
page execute and read and write
776B000
trusted library allocation
page read and write
9F0000
heap
page read and write
12E8000
heap
page read and write
BE0000
heap
page read and write
7452000
trusted library allocation
page read and write
CC2E000
stack
page read and write
DDD000
trusted library allocation
page execute and read and write
4C7E000
stack
page read and write
233F000
stack
page read and write
5C06000
trusted library allocation
page read and write
BB2000
trusted library allocation
page read and write
4C90000
trusted library allocation
page read and write
1593000
trusted library allocation
page execute and read and write
303F000
trusted library allocation
page read and write
740000
heap
page read and write
DFA000
trusted library allocation
page execute and read and write
7936000
heap
page read and write
4C85000
trusted library allocation
page read and write
139A000
heap
page read and write
801000
heap
page read and write
4FA0000
trusted library allocation
page read and write
A3F000
stack
page read and write
D40F000
stack
page read and write
5880000
heap
page read and write
5B3E000
stack
page read and write
5FFC000
stack
page read and write
7070000
trusted library allocation
page read and write
2F09000
trusted library allocation
page read and write
3075000
trusted library allocation
page read and write
533E000
stack
page read and write
623C000
stack
page read and write
11FB000
stack
page read and write
4FB0000
trusted library allocation
page read and write
7B50000
trusted library allocation
page execute and read and write
4C52000
trusted library allocation
page read and write
D8AC000
stack
page read and write
5DBC000
stack
page read and write
51A0000
heap
page read and write
F80000
heap
page read and write
6497000
trusted library allocation
page read and write
1316000
heap
page read and write
5C21000
trusted library allocation
page read and write
12FC000
stack
page read and write
4C24000
trusted library allocation
page read and write
4C41000
trusted library allocation
page read and write
748000
heap
page read and write
5C1A000
trusted library allocation
page read and write
5EC0000
heap
page read and write
2372000
trusted library allocation
page read and write
460C000
stack
page read and write
1380000
heap
page read and write
2C61000
trusted library allocation
page read and write
D92D000
stack
page read and write
4728000
trusted library allocation
page read and write
DF6000
trusted library allocation
page execute and read and write
4AA9000
trusted library allocation
page read and write
6490000
trusted library allocation
page read and write
844000
heap
page read and write
646D000
trusted library allocation
page read and write
54C0000
heap
page read and write
5170000
heap
page read and write
241E000
stack
page read and write
4CE0000
heap
page read and write
4AAB000
trusted library allocation
page read and write
72B000
heap
page read and write
2344000
trusted library allocation
page read and write
D66E000
stack
page read and write
CF0C000
stack
page read and write
5C0B000
trusted library allocation
page read and write
3098000
trusted library allocation
page read and write
5BD0000
heap
page read and write
2362000
trusted library allocation
page read and write
4CE0000
trusted library allocation
page read and write
72DE000
stack
page read and write
54AE000
stack
page read and write
56BC000
stack
page read and write
5AFE000
stack
page read and write
7060000
trusted library allocation
page read and write
64A0000
trusted library allocation
page read and write
69D0000
trusted library allocation
page execute and read and write
E48000
heap
page read and write
349000
stack
page read and write
1560000
heap
page read and write
7D4000
heap
page read and write
279B000
trusted library allocation
page read and write
162E000
stack
page read and write
D18E000
stack
page read and write
69C0000
trusted library allocation
page execute and read and write
7020000
trusted library allocation
page execute and read and write
2DFD000
trusted library allocation
page read and write
7B0E000
stack
page read and write
5BE0000
heap
page read and write
5EBC000
stack
page read and write
553E000
stack
page read and write
4AB4000
heap
page read and write
7830000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
237B000
trusted library allocation
page execute and read and write
D210000
heap
page read and write
5F00000
heap
page read and write
7B10000
trusted library section
page read and write
5030000
trusted library allocation
page read and write
1594000
trusted library allocation
page read and write
2829000
trusted library allocation
page read and write
3A0000
heap
page read and write
4AB0000
heap
page read and write
5750000
trusted library section
page read and write
5D7E000
stack
page read and write
64DA000
trusted library allocation
page read and write
CA30000
heap
page read and write
4CD0000
heap
page read and write
5C40000
trusted library allocation
page execute and read and write
5F5E000
heap
page read and write
5C0000
heap
page read and write
30D0000
trusted library allocation
page read and write
470C000
stack
page read and write
15C0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
3C89000
trusted library allocation
page read and write
7103000
heap
page read and write
2C30000
trusted library allocation
page read and write
DED000
stack
page read and write
733E000
stack
page read and write
30C8000
trusted library allocation
page read and write
5BFC000
stack
page read and write
2377000
trusted library allocation
page execute and read and write
130A000
heap
page read and write
2F50000
heap
page read and write
7850000
trusted library allocation
page execute and read and write
1347000
heap
page read and write
1690000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
64DF000
trusted library allocation
page read and write
E02000
trusted library allocation
page read and write
12DE000
stack
page read and write
23A0000
trusted library allocation
page execute and read and write
64B0000
trusted library allocation
page read and write
5870000
heap
page read and write
6720000
heap
page read and write
D7AC000
stack
page read and write
5185000
heap
page read and write
64C8000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
15C7000
trusted library allocation
page execute and read and write
7030000
trusted library allocation
page read and write
1303000
heap
page read and write
7E3000
heap
page read and write
6690000
trusted library allocation
page read and write
3F82000
trusted library allocation
page read and write
CC7000
heap
page read and write
5780000
trusted library allocation
page read and write
5510000
heap
page read and write
4CF0000
trusted library allocation
page execute and read and write
DA2E000
stack
page read and write
B7D000
trusted library allocation
page execute and read and write
7775000
trusted library allocation
page read and write
70D2000
heap
page read and write
BBB000
trusted library allocation
page execute and read and write
2860000
trusted library allocation
page read and write
11D5000
heap
page read and write
3721000
trusted library allocation
page read and write
3C61000
trusted library allocation
page read and write
F70000
trusted library allocation
page execute and read and write
4C60000
trusted library allocation
page read and write
35D1000
trusted library allocation
page read and write
4C68000
trusted library allocation
page read and write
5050000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
5190000
trusted library section
page readonly
5C1E000
trusted library allocation
page read and write
6670000
trusted library allocation
page read and write
5670000
heap
page read and write
There are 542 hidden memdumps, click here to show them.