IOC Report
Quotation#4873920.js

loading gif

Files

File Path
Type
Category
Malicious
Quotation#4873920.js
ASCII text, with very long lines (64556)
initial sample
malicious
C:\Users\user\AppData\Roaming\rybdyjbhxf.txt
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\ProgramData\Oracle\Java\.oracle_jre_usage\b5820291038aa69c.timestamp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\6556
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\83aa4cc77f591dfc2374580bbd95f6ba_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Quotation#4873920.js"
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
"C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\rybdyjbhxf.txt"
malicious
C:\Windows\SysWOW64\icacls.exe
C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://wshsoft.company/jv/jrex.zip
unknown
malicious
http://crl.xrampsecurity.com/XGCA.crl
unknown
https://repo1.maven.org/maven2/net/java/dev/jna/jna-platform/5.5.0/jna-platform-5.5.0.jar
unknown
http://crl.chambersign.org/chambersroot.crl0
unknown
https://github.com
unknown
https://repository.luxtrust.lu0
unknown
http://bugreport.sun.com/bugreport/
unknown
http://cps.chambersign.org/cps/chambersroot.html0
unknown
http://java.oracle.com/
unknown
http://null.oracle.com/
unknown
http://www.chambersign.org1
unknown
http://repository.swisssign.com/0
unknown
https://repo1.maven.org/maven2/net/java/dev/jna/jna/5.5.0/jna-5.5.0.jar
unknown
http://policy.camerfirma.com
unknown
https://ocsp.quovadisoffshore.com
unknown
https://repo1.maven.org/maven2/org/xerial/sqlite-jdbc/3.14.2.1/sqlite-jdbc-3.14.2.1.jar
unknown
http://crl.securetrust.com/STCA.crl0
unknown
http://www.quovadisglobal.com/cps
unknown
http://cps.chambersign.org/cps/chambersroot.html
unknown
http://crl.securetrust.com/STCA.crl
unknown
https://repo1.maven.org
unknown
https://repository.luxtrust.lu
unknown
http://www.quovadisglobal.com/cps0
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
http://www.quovadis.bm
unknown
http://www.quovadis.bm0
unknown
https://ocsp.quovadisoffshore.com0
unknown
http://www.allatori.com
unknown
http://crl.chambersign.org/chambersroot.crl
unknown
http://repository.swisssign.com/
unknown
http://www.chambersign.org
unknown
https://github.com/kristian/system-hook/releases/download/3.5/system-hook-3.5.jar
unknown
http://policy.camerfirma.com0
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
github.com
140.82.121.3
dualstack.sonatype.map.fastly.net
199.232.192.209
repo1.maven.org
unknown

IPs

IP
Domain
Country
Malicious
199.232.192.209
dualstack.sonatype.map.fastly.net
United States
140.82.121.3
github.com
United States
140.82.121.4
unknown
United States
199.232.196.209
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
9B63000
trusted library allocation
page read and write
malicious
9B69000
trusted library allocation
page read and write
malicious
9B95000
trusted library allocation
page read and write
malicious
22D3DF35000
heap
page read and write
14FF0000
heap
page read and write
971000
heap
page read and write
9EBF000
trusted library allocation
page read and write
A25E000
trusted library allocation
page read and write
477B000
trusted library allocation
page read and write
9D9C000
trusted library allocation
page read and write
15A22000
heap
page read and write
22D3BE10000
heap
page read and write
A1F2000
trusted library allocation
page read and write
22D3C16C000
heap
page read and write
2F9D000
stack
page read and write
45FC000
heap
page read and write
A04A000
trusted library allocation
page read and write
15549000
unkown
page read and write
22D3BD90000
heap
page read and write
A086000
trusted library allocation
page read and write
4ADB000
trusted library allocation
page read and write
55C000
stack
page read and write
22D3DE51000
heap
page read and write
A293000
trusted library allocation
page read and write
159E4000
heap
page read and write
A2A1000
trusted library allocation
page read and write
F9AC0FE000
stack
page read and write
150E0000
heap
page read and write
15EB0000
trusted library allocation
page read and write
22D3DE33000
heap
page read and write
4500000
heap
page read and write
A1D0000
trusted library allocation
page read and write
A00F000
trusted library allocation
page read and write
22D3C16E000
heap
page read and write
A2E2000
trusted library allocation
page read and write
4B36000
trusted library allocation
page read and write
A026000
trusted library allocation
page read and write
22D3DF5A000
heap
page read and write
4837000
trusted library allocation
page read and write
490B000
trusted library allocation
page read and write
22D3BEC2000
heap
page read and write
45FE000
heap
page read and write
22D3BE96000
heap
page read and write
A00D000
trusted library allocation
page read and write
22D3DC7A000
heap
page read and write
15157000
heap
page read and write
22D3E033000
heap
page read and write
22D3E2A0000
heap
page read and write
22D3DE43000
heap
page read and write
22D3E560000
heap
page read and write
A0B7000
trusted library allocation
page read and write
9EF5000
trusted library allocation
page read and write
22D3DC53000
heap
page read and write
22D3BEA6000
heap
page read and write
45F4000
heap
page read and write
A229000
trusted library allocation
page read and write
23CE000
trusted library allocation
page execute and read and write
22D3DE50000
heap
page read and write
A09D000
trusted library allocation
page read and write
9BFB000
trusted library allocation
page read and write
A250000
trusted library allocation
page read and write
22D3E033000
heap
page read and write
9F5E000
trusted library allocation
page read and write
22D3DF73000
heap
page read and write
9F77000
trusted library allocation
page read and write
22D3DC5D000
heap
page read and write
4ABE000
trusted library allocation
page read and write
A205000
trusted library allocation
page read and write
22D3DFFA000
heap
page read and write
22D3DC6E000
heap
page read and write
9F6F000
trusted library allocation
page read and write
159B0000
heap
page read and write
22D3DCEC000
heap
page read and write
A08E000
trusted library allocation
page read and write
A0E5000
trusted library allocation
page read and write
460D000
trusted library allocation
page read and write
4A67000
trusted library allocation
page read and write
22D3E11F000
heap
page read and write
A1A8000
trusted library allocation
page read and write
44A0000
trusted library allocation
page read and write
15EAE000
trusted library allocation
page read and write
A05F000
trusted library allocation
page read and write
A154000
trusted library allocation
page read and write
2426000
trusted library allocation
page execute and read and write
22D3DE4B000
heap
page read and write
49B5000
trusted library allocation
page read and write
22D3DF12000
heap
page read and write
1546D000
stack
page read and write
15062000
heap
page read and write
A0A0000
trusted library allocation
page read and write
A1AA000
trusted library allocation
page read and write
22D3DCEC000
heap
page read and write
4A62000
trusted library allocation
page read and write
9D9E000
trusted library allocation
page read and write
A0EB000
trusted library allocation
page read and write
22D3E033000
heap
page read and write
45FE000
heap
page read and write
A12F000
trusted library allocation
page read and write
9C22000
trusted library allocation
page read and write
45FE000
heap
page read and write
A1A2000
trusted library allocation
page read and write
22D3DCE8000
heap
page read and write
9F7F000
trusted library allocation
page read and write
9FFF000
trusted library allocation
page read and write
A08C000
trusted library allocation
page read and write
22D3DC5C000
heap
page read and write
A162000
trusted library allocation
page read and write
22D3BECD000
heap
page read and write
2360000
heap
page read and write
3320000
heap
page read and write
22D3DC85000
heap
page read and write
22D3BE98000
heap
page read and write
4AB7000
trusted library allocation
page read and write
22D3DE3E000
heap
page read and write
9D7D000
trusted library allocation
page read and write
45DC000
heap
page read and write
22D3DC51000
heap
page read and write
4B4E000
trusted library allocation
page read and write
14B7E000
unkown
page read and write
15127000
heap
page read and write
22D3DE33000
heap
page read and write
F9AB737000
stack
page read and write
15380000
trusted library allocation
page read and write
4B1A000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A0F8000
trusted library allocation
page read and write
5B5000
heap
page read and write
A19F000
trusted library allocation
page read and write
9F6D000
trusted library allocation
page read and write
22D3EBAB000
heap
page read and write
9CF4000
trusted library allocation
page read and write
22D3DCA5000
heap
page read and write
15A1B000
heap
page read and write
159DB000
heap
page read and write
4572000
heap
page read and write
4ACC000
trusted library allocation
page read and write
9F4C000
trusted library allocation
page read and write
A043000
trusted library allocation
page read and write
22D3E19F000
heap
page read and write
A270000
trusted library allocation
page read and write
A2D1000
trusted library allocation
page read and write
22D3BEA6000
heap
page read and write
4930000
trusted library allocation
page read and write
478E000
trusted library allocation
page read and write
A03C000
trusted library allocation
page read and write
22D3BE96000
heap
page read and write
230D000
stack
page read and write
14DAE000
unkown
page read and write
4576000
heap
page read and write
22D3DF62000
heap
page read and write
343F000
stack
page read and write
22D3BECE000
heap
page read and write
A1BC000
trusted library allocation
page read and write
22D3DCC7000
heap
page read and write
4AB0000
trusted library allocation
page read and write
22D3E033000
heap
page read and write
22D3BE96000
heap
page read and write
B20000
heap
page read and write
9CBB000
trusted library allocation
page read and write
9D05000
trusted library allocation
page read and write
A0AE000
trusted library allocation
page read and write
48EB000
trusted library allocation
page read and write
5D0000
heap
page read and write
22D3BE98000
heap
page read and write
9CFE000
trusted library allocation
page read and write
A2DA000
trusted library allocation
page read and write
22D3DC69000
heap
page read and write
4AE0000
trusted library allocation
page read and write
22D3E010000
heap
page read and write
4390000
trusted library allocation
page read and write
22D3E048000
heap
page read and write
4633000
trusted library allocation
page read and write
22D3DC83000
heap
page read and write
22D3DE31000
heap
page read and write
A2CE000
trusted library allocation
page read and write
22D3DCE7000
heap
page read and write
A268000
trusted library allocation
page read and write
A097000
trusted library allocation
page read and write
22D3BD80000
heap
page read and write
A006000
trusted library allocation
page read and write
50C000
stack
page read and write
9F3C000
trusted library allocation
page read and write
15127000
heap
page read and write
9F03000
trusted library allocation
page read and write
A066000
trusted library allocation
page read and write
22D3BEC2000
heap
page read and write
22D3BDD0000
heap
page read and write
A2D7000
trusted library allocation
page read and write
A02E000
trusted library allocation
page read and write
154FD000
stack
page read and write
22D3DE4E000
heap
page read and write
22D3EBAD000
heap
page read and write
48B8000
trusted library allocation
page read and write
3240000
heap
page read and write
4A5A000
trusted library allocation
page read and write
22D3DC83000
heap
page read and write
22D3BDF9000
heap
page read and write
4A64000
trusted library allocation
page read and write
A2BD000
trusted library allocation
page read and write
22D3C16D000
heap
page read and write
9CEE000
trusted library allocation
page read and write
22D3EBAC000
heap
page read and write
45C9000
heap
page read and write
1542F000
trusted library allocation
page read and write
4AFA000
trusted library allocation
page read and write
22D3BEC2000
heap
page read and write
15177000
heap
page read and write
22D3DCC7000
heap
page read and write
22D3E048000
heap
page read and write
A14D000
trusted library allocation
page read and write
A18C000
trusted library allocation
page read and write
9C27000
trusted library allocation
page read and write
A2D4000
trusted library allocation
page read and write
22D3DDCE000
heap
page read and write
A06D000
trusted library allocation
page read and write
22D3DC51000
heap
page read and write
9F2A000
trusted library allocation
page read and write
1558D000
stack
page read and write
A089000
trusted library allocation
page read and write
F9AB732000
stack
page read and write
A1B3000
trusted library allocation
page read and write
9F1A000
trusted library allocation
page read and write
A1B9000
trusted library allocation
page read and write
4800000
trusted library allocation
page read and write
22D3DE40000
heap
page read and write
34B0000
heap
page read and write
22D3DC85000
heap
page read and write
22D3EB90000
heap
page read and write
22D3DFBB000
heap
page read and write
2390000
trusted library allocation
page execute and read and write
45F4000
heap
page read and write
A094000
trusted library allocation
page read and write
22D3DF62000
heap
page read and write
A217000
trusted library allocation
page read and write
A1CA000
trusted library allocation
page read and write
A1B0000
trusted library allocation
page read and write
22D3BE77000
heap
page read and write
A21E000
trusted library allocation
page read and write
A1F8000
trusted library allocation
page read and write
4A28000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
22D3DC7B000
heap
page read and write
1504B000
heap
page read and write
22D3C160000
heap
page read and write
A1A5000
trusted library allocation
page read and write
22D3E048000
heap
page read and write
1561D000
stack
page read and write
A193000
trusted library allocation
page read and write
A080000
trusted library allocation
page read and write
22D3DC52000
heap
page read and write
22D3DF36000
heap
page read and write
A140000
trusted library allocation
page read and write
22D3E19F000
heap
page read and write
2380000
unkown
page read and write
22D3E6F0000
trusted library allocation
page read and write
22D3BE0F000
heap
page read and write
22D3DC50000
heap
page read and write
A1D5000
trusted library allocation
page read and write
15083000
heap
page read and write
22D3DDD6000
heap
page read and write
9EFB000
trusted library allocation
page read and write
15130000
heap
page read and write
473C000
trusted library allocation
page read and write
4B44000
trusted library allocation
page read and write
22D3DCEC000
heap
page read and write
9F0A000
trusted library allocation
page read and write
160CF000
stack
page read and write
22D3E2D0000
heap
page read and write
22D3DC85000
heap
page read and write
23CA000
trusted library allocation
page execute and read and write
150E0000
heap
page read and write
49B1000
trusted library allocation
page read and write
F9ABFFE000
stack
page read and write
A0DF000
trusted library allocation
page read and write
22D3DE3D000
heap
page read and write
22D3DCE7000
heap
page read and write
45F4000
heap
page read and write
4835000
trusted library allocation
page read and write
9C11000
trusted library allocation
page read and write
A1C1000
trusted library allocation
page read and write
A0D3000
trusted library allocation
page read and write
22D3DEEE000
heap
page read and write
22D3DC7A000
heap
page read and write
46B1000
trusted library allocation
page read and write
14E7D000
stack
page read and write
22D3DF18000
heap
page read and write
4B28000
trusted library allocation
page read and write
A1D3000
trusted library allocation
page read and write
A051000
trusted library allocation
page read and write
22D3C165000
heap
page read and write
9ED4000
trusted library allocation
page read and write
22D3DCEC000
heap
page read and write
22D3DF77000
heap
page read and write
A255000
trusted library allocation
page read and write
22D3E1A0000
heap
page read and write
33FE000
stack
page read and write
22D3E400000
heap
page read and write
33B0000
heap
page read and write
22D3DF1D000
heap
page read and write
22D3DCE7000
heap
page read and write
9CAE000
trusted library allocation
page read and write
A1CD000
trusted library allocation
page read and write
A211000
trusted library allocation
page read and write
45D9000
heap
page read and write
22D3DF5A000
heap
page read and write
22D3BECD000
heap
page read and write
1515F000
heap
page read and write
22D3BE98000
heap
page read and write
15049000
heap
page read and write
A105000
trusted library allocation
page read and write
22D3E013000
heap
page read and write
A13B000
trusted library allocation
page read and write
22D3DDB7000
heap
page read and write
A122000
trusted library allocation
page read and write
159E1000
heap
page read and write
22D3DE33000
heap
page read and write
4B21000
trusted library allocation
page read and write
22D3E120000
heap
page read and write
46AF000
trusted library allocation
page read and write
22D3DF62000
heap
page read and write
4ACF000
trusted library allocation
page read and write
A0AB000
trusted library allocation
page read and write
5B0000
heap
page read and write
A2CB000
trusted library allocation
page read and write
45FE000
heap
page read and write
46B6000
trusted library allocation
page read and write
33AF000
stack
page read and write
22D3DC7A000
heap
page read and write
22D3DF14000
heap
page read and write
A20B000
trusted library allocation
page read and write
4629000
trusted library allocation
page read and write
14FFC000
heap
page read and write
A0A5000
trusted library allocation
page read and write
A17E000
trusted library allocation
page read and write
A09A000
trusted library allocation
page read and write
A083000
trusted library allocation
page read and write
A185000
trusted library allocation
page read and write
22D3E570000
heap
page read and write
2FDD000
stack
page read and write
A2DD000
trusted library allocation
page read and write
22D3E048000
heap
page read and write
22D3E120000
heap
page read and write
F9ABBFE000
stack
page read and write
F9ABDFE000
stack
page read and write
22D3DC54000
heap
page read and write
4B13000
trusted library allocation
page read and write
2434000
trusted library allocation
page execute and read and write
A29A000
trusted library allocation
page read and write
22D3DE4E000
heap
page read and write
A0F2000
trusted library allocation
page read and write
9F39000
trusted library allocation
page read and write
22D3E033000
heap
page read and write
22D3E6E0000
heap
page read and write
22D3DF1D000
heap
page read and write
2392000
trusted library allocation
page execute and read and write
22D3DD50000
heap
page read and write
9C04000
trusted library allocation
page read and write
22D3DCC7000
heap
page read and write
888000
heap
page read and write
242D000
trusted library allocation
page execute and read and write
A0A3000
trusted library allocation
page read and write
49A4000
trusted library allocation
page read and write
22D3DE36000
heap
page read and write
14DED000
stack
page read and write
1607E000
stack
page read and write
4AC5000
trusted library allocation
page read and write
22D3DEEE000
heap
page read and write
F9AC4FB000
stack
page read and write
14F5E000
unkown
page read and write
45CB000
heap
page read and write
A1AD000
trusted library allocation
page read and write
150E0000
heap
page read and write
4744000
trusted library allocation
page read and write
4AA1000
trusted library allocation
page read and write
22D3C16E000
heap
page read and write
22D3DCCF000
heap
page read and write
159D0000
heap
page read and write
9F8C000
trusted library allocation
page read and write
1566A000
unkown
page read and write
22D3BDD7000
heap
page read and write
22D3DCE7000
heap
page read and write
151E2000
heap
page read and write
22D3DCE7000
heap
page read and write
46D4000
trusted library allocation
page read and write
9F53000
trusted library allocation
page read and write
46C2000
trusted library allocation
page read and write
14F0D000
stack
page read and write
4781000
trusted library allocation
page read and write
22D3DE37000
heap
page read and write
A2F1000
trusted library allocation
page read and write
22D3DF62000
heap
page read and write
2358000
unkown
page read and write
9CCE000
trusted library allocation
page read and write
A25B000
trusted library allocation
page read and write
22D3DF53000
heap
page read and write
A146000
trusted library allocation
page read and write
22D3C16B000
heap
page read and write
45F4000
heap
page read and write
A2EE000
trusted library allocation
page read and write
A2AE000
trusted library allocation
page read and write
9F44000
trusted library allocation
page read and write
15083000
heap
page read and write
4736000
trusted library allocation
page read and write
22D3DF5A000
heap
page read and write
22D3D7F0000
heap
page read and write
A1B6000
trusted library allocation
page read and write
22D3DC5D000
heap
page read and write
22D3DF35000
heap
page read and write
A035000
trusted library allocation
page read and write
A2C3000
trusted library allocation
page read and write
A0D9000
trusted library allocation
page read and write
9F11000
trusted library allocation
page read and write
A0B1000
trusted library allocation
page read and write
23E3000
trusted library allocation
page execute and read and write
A0B4000
trusted library allocation
page read and write
15A24000
heap
page read and write
9ECE000
trusted library allocation
page read and write
14A69000
heap
page read and write
22D3E120000
heap
page read and write
23D2000
trusted library allocation
page execute and read and write
22D3BEC3000
heap
page read and write
22D3BE86000
heap
page read and write
22D3DDC8000
heap
page read and write
22D3DEF0000
heap
page read and write
4A80000
trusted library allocation
page read and write
A058000
trusted library allocation
page read and write
880000
heap
page read and write
895000
heap
page read and write
483C000
trusted library allocation
page read and write
22D3DF5A000
heap
page read and write
A139000
trusted library allocation
page read and write
A2BA000
trusted library allocation
page read and write
F9AC1FD000
stack
page read and write
14C0E000
unkown
page read and write
22D3C16C000
heap
page read and write
A169000
trusted library allocation
page read and write
A074000
trusted library allocation
page read and write
22D3E051000
heap
page read and write
A2C0000
trusted library allocation
page read and write
22D3DCCF000
heap
page read and write
4B2F000
trusted library allocation
page read and write
22D3E016000
heap
page read and write
9CAA000
trusted library allocation
page read and write
22D3DCCF000
heap
page read and write
9F56000
trusted library allocation
page read and write
15127000
heap
page read and write
9DB3000
trusted library allocation
page read and write
15124000
heap
page read and write
22D3BE77000
heap
page read and write
22D3E360000
heap
page read and write
22D3DF16000
heap
page read and write
15FEE000
stack
page read and write
23DB000
trusted library allocation
page execute and read and write
155D9000
unkown
page read and write
22D3BE0F000
heap
page read and write
15002000
heap
page read and write
4639000
trusted library allocation
page read and write
9F88000
trusted library allocation
page read and write
A1BF000
trusted library allocation
page read and write
A28C000
trusted library allocation
page read and write
F9AC2FF000
stack
page read and write
9F32000
trusted library allocation
page read and write
14D5D000
stack
page read and write
15A0B000
heap
page read and write
14A9D000
stack
page read and write
14B2D000
stack
page read and write
497A000
trusted library allocation
page read and write
A136000
trusted library allocation
page read and write
22D3DCEC000
heap
page read and write
F9ABAFD000
stack
page read and write
22D3DC83000
heap
page read and write
14E3E000
unkown
page read and write
22D3E010000
heap
page read and write
1603F000
stack
page read and write
22D3DCCF000
heap
page read and write
22D3E012000
heap
page read and write
A2C6000
trusted library allocation
page read and write
9D0B000
trusted library allocation
page read and write
A19C000
trusted library allocation
page read and write
46C6000
trusted library allocation
page read and write
9DB1000
trusted library allocation
page read and write
A128000
trusted library allocation
page read and write
1506B000
heap
page read and write
A2E0000
trusted library allocation
page read and write
4A2E000
trusted library allocation
page read and write
151A0000
heap
page read and write
14FEE000
stack
page read and write
22D3DF73000
heap
page read and write
A2B7000
trusted library allocation
page read and write
22D3DC69000
heap
page read and write
9EDA000
trusted library allocation
page read and write
4600000
trusted library allocation
page read and write
22D3DC52000
heap
page read and write
15F00000
trusted library allocation
page read and write
A2EB000
trusted library allocation
page read and write
A15B000
trusted library allocation
page read and write
22D3E015000
heap
page read and write
A27E000
trusted library allocation
page read and write
22D3DCC9000
heap
page read and write
14ECD000
unkown
page read and write
22D3BE86000
heap
page read and write
4615000
trusted library allocation
page read and write
15127000
heap
page read and write
14F9D000
stack
page read and write
9D16000
trusted library allocation
page read and write
34B8000
heap
page read and write
22D3E033000
heap
page read and write
476E000
trusted library allocation
page read and write
4B3D000
trusted library allocation
page read and write
A1FF000
trusted library allocation
page read and write
159DC000
heap
page read and write
46A5000
trusted library allocation
page read and write
49C2000
trusted library allocation
page read and write
22D3C16E000
heap
page read and write
22D3E048000
heap
page read and write
A277000
trusted library allocation
page read and write
22D3DC85000
heap
page read and write
4AA8000
trusted library allocation
page read and write
A1C7000
trusted library allocation
page read and write
14BBD000
stack
page read and write
9F91000
trusted library allocation
page read and write
A224000
trusted library allocation
page read and write
A091000
trusted library allocation
page read and write
9F66000
trusted library allocation
page read and write
22D3DF49000
heap
page read and write
15A1B000
heap
page read and write
A2A8000
trusted library allocation
page read and write
22D3DC5C000
heap
page read and write
A2E8000
trusted library allocation
page read and write
22D3DC6C000
heap
page read and write
15150000
heap
page read and write
22D3BDB0000
heap
page read and write
22D3DC73000
heap
page read and write
151A0000
heap
page read and write
A2E5000
trusted library allocation
page read and write
14FF1000
heap
page read and write
15DB0000
trusted library allocation
page read and write
9F22000
trusted library allocation
page read and write
933000
heap
page read and write
15172000
heap
page read and write
482B000
trusted library allocation
page read and write
22D3DCCF000
heap
page read and write
48FE000
trusted library allocation
page read and write
A07D000
trusted library allocation
page read and write
22D3DC5D000
heap
page read and write
45F5000
heap
page read and write
34CA000
heap
page read and write
F9ABEFE000
stack
page read and write
A0A8000
trusted library allocation
page read and write
9CA3000
trusted library allocation
page read and write
22D3DE3B000
heap
page read and write
4576000
heap
page read and write
22D3DF73000
heap
page read and write
22D3DC83000
heap
page read and write
A177000
trusted library allocation
page read and write
4849000
trusted library allocation
page read and write
22D3DC55000
heap
page read and write
22D3BEA6000
heap
page read and write
9C0B000
trusted library allocation
page read and write
47F9000
trusted library allocation
page read and write
45CB000
heap
page read and write
A01F000
trusted library allocation
page read and write
A1C4000
trusted library allocation
page read and write
15140000
heap
page read and write
22D3DF73000
heap
page read and write
22D3D810000
heap
page read and write
22D3E050000
heap
page read and write
A285000
trusted library allocation
page read and write
22D3DE3C000
heap
page read and write
14AEE000
stack
page read and write
A2C9000
trusted library allocation
page read and write
22D3E048000
heap
page read and write
22D3BE86000
heap
page read and write
3470000
heap
page read and write
22D3BDFA000
heap
page read and write
48B1000
trusted library allocation
page read and write
22D3DCC9000
heap
page read and write
15062000
heap
page read and write
22D3E011000
heap
page read and write
150E0000
heap
page read and write
46C0000
trusted library allocation
page read and write
14600000
trusted library allocation
page read and write
15330000
trusted library allocation
page read and write
4A9A000
trusted library allocation
page read and write
154B8000
unkown
page read and write
5C0000
heap
page read and write
4B4B000
trusted library allocation
page read and write
159FB000
heap
page read and write
9F8F000
trusted library allocation
page read and write
49AE000
trusted library allocation
page read and write
22D3DD51000
heap
page read and write
22D3DF12000
heap
page read and write
4B0B000
trusted library allocation
page read and write
336E000
stack
page read and write
22D3DF1A000
heap
page read and write
48F8000
trusted library allocation
page read and write
22D3DCC7000
heap
page read and write
A170000
trusted library allocation
page read and write
There are 588 hidden memdumps, click here to show them.