Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Quotation#4873920.js
|
ASCII text, with very long lines (64556)
|
initial sample
|
||
C:\Users\user\AppData\Roaming\rybdyjbhxf.txt
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\ProgramData\Oracle\Java\.oracle_jre_usage\b5820291038aa69c.timestamp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\hsperfdata_user\6556
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\83aa4cc77f591dfc2374580bbd95f6ba_9e146be9-c76a-4720-bcdb-53011b87bd06
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Quotation#4873920.js"
|
||
C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
|
"C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\rybdyjbhxf.txt"
|
||
C:\Windows\SysWOW64\icacls.exe
|
C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://wshsoft.company/jv/jrex.zip
|
unknown
|
||
http://crl.xrampsecurity.com/XGCA.crl
|
unknown
|
||
https://repo1.maven.org/maven2/net/java/dev/jna/jna-platform/5.5.0/jna-platform-5.5.0.jar
|
unknown
|
||
http://crl.chambersign.org/chambersroot.crl0
|
unknown
|
||
https://github.com
|
unknown
|
||
https://repository.luxtrust.lu0
|
unknown
|
||
http://bugreport.sun.com/bugreport/
|
unknown
|
||
http://cps.chambersign.org/cps/chambersroot.html0
|
unknown
|
||
http://java.oracle.com/
|
unknown
|
||
http://null.oracle.com/
|
unknown
|
||
http://www.chambersign.org1
|
unknown
|
||
http://repository.swisssign.com/0
|
unknown
|
||
https://repo1.maven.org/maven2/net/java/dev/jna/jna/5.5.0/jna-5.5.0.jar
|
unknown
|
||
http://policy.camerfirma.com
|
unknown
|
||
https://ocsp.quovadisoffshore.com
|
unknown
|
||
https://repo1.maven.org/maven2/org/xerial/sqlite-jdbc/3.14.2.1/sqlite-jdbc-3.14.2.1.jar
|
unknown
|
||
http://crl.securetrust.com/STCA.crl0
|
unknown
|
||
http://www.quovadisglobal.com/cps
|
unknown
|
||
http://cps.chambersign.org/cps/chambersroot.html
|
unknown
|
||
http://crl.securetrust.com/STCA.crl
|
unknown
|
||
https://repo1.maven.org
|
unknown
|
||
https://repository.luxtrust.lu
|
unknown
|
||
http://www.quovadisglobal.com/cps0
|
unknown
|
||
http://crl.xrampsecurity.com/XGCA.crl0
|
unknown
|
||
http://www.quovadis.bm
|
unknown
|
||
http://www.quovadis.bm0
|
unknown
|
||
https://ocsp.quovadisoffshore.com0
|
unknown
|
||
http://www.allatori.com
|
unknown
|
||
http://crl.chambersign.org/chambersroot.crl
|
unknown
|
||
http://repository.swisssign.com/
|
unknown
|
||
http://www.chambersign.org
|
unknown
|
||
https://github.com/kristian/system-hook/releases/download/3.5/system-hook-3.5.jar
|
unknown
|
||
http://policy.camerfirma.com0
|
unknown
|
There are 23 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
github.com
|
140.82.121.3
|
||
dualstack.sonatype.map.fastly.net
|
199.232.192.209
|
||
repo1.maven.org
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
199.232.192.209
|
dualstack.sonatype.map.fastly.net
|
United States
|
||
140.82.121.3
|
github.com
|
United States
|
||
140.82.121.4
|
unknown
|
United States
|
||
199.232.196.209
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
|
JScriptSetScriptStateStarted
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
9B63000
|
trusted library allocation
|
page read and write
|
||
9B69000
|
trusted library allocation
|
page read and write
|
||
9B95000
|
trusted library allocation
|
page read and write
|
||
22D3DF35000
|
heap
|
page read and write
|
||
14FF0000
|
heap
|
page read and write
|
||
971000
|
heap
|
page read and write
|
||
9EBF000
|
trusted library allocation
|
page read and write
|
||
A25E000
|
trusted library allocation
|
page read and write
|
||
477B000
|
trusted library allocation
|
page read and write
|
||
9D9C000
|
trusted library allocation
|
page read and write
|
||
15A22000
|
heap
|
page read and write
|
||
22D3BE10000
|
heap
|
page read and write
|
||
A1F2000
|
trusted library allocation
|
page read and write
|
||
22D3C16C000
|
heap
|
page read and write
|
||
2F9D000
|
stack
|
page read and write
|
||
45FC000
|
heap
|
page read and write
|
||
A04A000
|
trusted library allocation
|
page read and write
|
||
15549000
|
unkown
|
page read and write
|
||
22D3BD90000
|
heap
|
page read and write
|
||
A086000
|
trusted library allocation
|
page read and write
|
||
4ADB000
|
trusted library allocation
|
page read and write
|
||
55C000
|
stack
|
page read and write
|
||
22D3DE51000
|
heap
|
page read and write
|
||
A293000
|
trusted library allocation
|
page read and write
|
||
159E4000
|
heap
|
page read and write
|
||
A2A1000
|
trusted library allocation
|
page read and write
|
||
F9AC0FE000
|
stack
|
page read and write
|
||
150E0000
|
heap
|
page read and write
|
||
15EB0000
|
trusted library allocation
|
page read and write
|
||
22D3DE33000
|
heap
|
page read and write
|
||
4500000
|
heap
|
page read and write
|
||
A1D0000
|
trusted library allocation
|
page read and write
|
||
A00F000
|
trusted library allocation
|
page read and write
|
||
22D3C16E000
|
heap
|
page read and write
|
||
A2E2000
|
trusted library allocation
|
page read and write
|
||
4B36000
|
trusted library allocation
|
page read and write
|
||
A026000
|
trusted library allocation
|
page read and write
|
||
22D3DF5A000
|
heap
|
page read and write
|
||
4837000
|
trusted library allocation
|
page read and write
|
||
490B000
|
trusted library allocation
|
page read and write
|
||
22D3BEC2000
|
heap
|
page read and write
|
||
45FE000
|
heap
|
page read and write
|
||
22D3BE96000
|
heap
|
page read and write
|
||
A00D000
|
trusted library allocation
|
page read and write
|
||
22D3DC7A000
|
heap
|
page read and write
|
||
15157000
|
heap
|
page read and write
|
||
22D3E033000
|
heap
|
page read and write
|
||
22D3E2A0000
|
heap
|
page read and write
|
||
22D3DE43000
|
heap
|
page read and write
|
||
22D3E560000
|
heap
|
page read and write
|
||
A0B7000
|
trusted library allocation
|
page read and write
|
||
9EF5000
|
trusted library allocation
|
page read and write
|
||
22D3DC53000
|
heap
|
page read and write
|
||
22D3BEA6000
|
heap
|
page read and write
|
||
45F4000
|
heap
|
page read and write
|
||
A229000
|
trusted library allocation
|
page read and write
|
||
23CE000
|
trusted library allocation
|
page execute and read and write
|
||
22D3DE50000
|
heap
|
page read and write
|
||
A09D000
|
trusted library allocation
|
page read and write
|
||
9BFB000
|
trusted library allocation
|
page read and write
|
||
A250000
|
trusted library allocation
|
page read and write
|
||
22D3E033000
|
heap
|
page read and write
|
||
9F5E000
|
trusted library allocation
|
page read and write
|
||
22D3DF73000
|
heap
|
page read and write
|
||
9F77000
|
trusted library allocation
|
page read and write
|
||
22D3DC5D000
|
heap
|
page read and write
|
||
4ABE000
|
trusted library allocation
|
page read and write
|
||
A205000
|
trusted library allocation
|
page read and write
|
||
22D3DFFA000
|
heap
|
page read and write
|
||
22D3DC6E000
|
heap
|
page read and write
|
||
9F6F000
|
trusted library allocation
|
page read and write
|
||
159B0000
|
heap
|
page read and write
|
||
22D3DCEC000
|
heap
|
page read and write
|
||
A08E000
|
trusted library allocation
|
page read and write
|
||
A0E5000
|
trusted library allocation
|
page read and write
|
||
460D000
|
trusted library allocation
|
page read and write
|
||
4A67000
|
trusted library allocation
|
page read and write
|
||
22D3E11F000
|
heap
|
page read and write
|
||
A1A8000
|
trusted library allocation
|
page read and write
|
||
44A0000
|
trusted library allocation
|
page read and write
|
||
15EAE000
|
trusted library allocation
|
page read and write
|
||
A05F000
|
trusted library allocation
|
page read and write
|
||
A154000
|
trusted library allocation
|
page read and write
|
||
2426000
|
trusted library allocation
|
page execute and read and write
|
||
22D3DE4B000
|
heap
|
page read and write
|
||
49B5000
|
trusted library allocation
|
page read and write
|
||
22D3DF12000
|
heap
|
page read and write
|
||
1546D000
|
stack
|
page read and write
|
||
15062000
|
heap
|
page read and write
|
||
A0A0000
|
trusted library allocation
|
page read and write
|
||
A1AA000
|
trusted library allocation
|
page read and write
|
||
22D3DCEC000
|
heap
|
page read and write
|
||
4A62000
|
trusted library allocation
|
page read and write
|
||
9D9E000
|
trusted library allocation
|
page read and write
|
||
A0EB000
|
trusted library allocation
|
page read and write
|
||
22D3E033000
|
heap
|
page read and write
|
||
45FE000
|
heap
|
page read and write
|
||
A12F000
|
trusted library allocation
|
page read and write
|
||
9C22000
|
trusted library allocation
|
page read and write
|
||
45FE000
|
heap
|
page read and write
|
||
A1A2000
|
trusted library allocation
|
page read and write
|
||
22D3DCE8000
|
heap
|
page read and write
|
||
9F7F000
|
trusted library allocation
|
page read and write
|
||
9FFF000
|
trusted library allocation
|
page read and write
|
||
A08C000
|
trusted library allocation
|
page read and write
|
||
22D3DC5C000
|
heap
|
page read and write
|
||
A162000
|
trusted library allocation
|
page read and write
|
||
22D3BECD000
|
heap
|
page read and write
|
||
2360000
|
heap
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
22D3DC85000
|
heap
|
page read and write
|
||
22D3BE98000
|
heap
|
page read and write
|
||
4AB7000
|
trusted library allocation
|
page read and write
|
||
22D3DE3E000
|
heap
|
page read and write
|
||
9D7D000
|
trusted library allocation
|
page read and write
|
||
45DC000
|
heap
|
page read and write
|
||
22D3DC51000
|
heap
|
page read and write
|
||
4B4E000
|
trusted library allocation
|
page read and write
|
||
14B7E000
|
unkown
|
page read and write
|
||
15127000
|
heap
|
page read and write
|
||
22D3DE33000
|
heap
|
page read and write
|
||
F9AB737000
|
stack
|
page read and write
|
||
15380000
|
trusted library allocation
|
page read and write
|
||
4B1A000
|
trusted library allocation
|
page read and write
|
||
9F20000
|
trusted library allocation
|
page read and write
|
||
A0F8000
|
trusted library allocation
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
A19F000
|
trusted library allocation
|
page read and write
|
||
9F6D000
|
trusted library allocation
|
page read and write
|
||
22D3EBAB000
|
heap
|
page read and write
|
||
9CF4000
|
trusted library allocation
|
page read and write
|
||
22D3DCA5000
|
heap
|
page read and write
|
||
15A1B000
|
heap
|
page read and write
|
||
159DB000
|
heap
|
page read and write
|
||
4572000
|
heap
|
page read and write
|
||
4ACC000
|
trusted library allocation
|
page read and write
|
||
9F4C000
|
trusted library allocation
|
page read and write
|
||
A043000
|
trusted library allocation
|
page read and write
|
||
22D3E19F000
|
heap
|
page read and write
|
||
A270000
|
trusted library allocation
|
page read and write
|
||
A2D1000
|
trusted library allocation
|
page read and write
|
||
22D3BEA6000
|
heap
|
page read and write
|
||
4930000
|
trusted library allocation
|
page read and write
|
||
478E000
|
trusted library allocation
|
page read and write
|
||
A03C000
|
trusted library allocation
|
page read and write
|
||
22D3BE96000
|
heap
|
page read and write
|
||
230D000
|
stack
|
page read and write
|
||
14DAE000
|
unkown
|
page read and write
|
||
4576000
|
heap
|
page read and write
|
||
22D3DF62000
|
heap
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
22D3BECE000
|
heap
|
page read and write
|
||
A1BC000
|
trusted library allocation
|
page read and write
|
||
22D3DCC7000
|
heap
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
22D3E033000
|
heap
|
page read and write
|
||
22D3BE96000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
9CBB000
|
trusted library allocation
|
page read and write
|
||
9D05000
|
trusted library allocation
|
page read and write
|
||
A0AE000
|
trusted library allocation
|
page read and write
|
||
48EB000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
22D3BE98000
|
heap
|
page read and write
|
||
9CFE000
|
trusted library allocation
|
page read and write
|
||
A2DA000
|
trusted library allocation
|
page read and write
|
||
22D3DC69000
|
heap
|
page read and write
|
||
4AE0000
|
trusted library allocation
|
page read and write
|
||
22D3E010000
|
heap
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
22D3E048000
|
heap
|
page read and write
|
||
4633000
|
trusted library allocation
|
page read and write
|
||
22D3DC83000
|
heap
|
page read and write
|
||
22D3DE31000
|
heap
|
page read and write
|
||
A2CE000
|
trusted library allocation
|
page read and write
|
||
22D3DCE7000
|
heap
|
page read and write
|
||
A268000
|
trusted library allocation
|
page read and write
|
||
A097000
|
trusted library allocation
|
page read and write
|
||
22D3BD80000
|
heap
|
page read and write
|
||
A006000
|
trusted library allocation
|
page read and write
|
||
50C000
|
stack
|
page read and write
|
||
9F3C000
|
trusted library allocation
|
page read and write
|
||
15127000
|
heap
|
page read and write
|
||
9F03000
|
trusted library allocation
|
page read and write
|
||
A066000
|
trusted library allocation
|
page read and write
|
||
22D3BEC2000
|
heap
|
page read and write
|
||
22D3BDD0000
|
heap
|
page read and write
|
||
A2D7000
|
trusted library allocation
|
page read and write
|
||
A02E000
|
trusted library allocation
|
page read and write
|
||
154FD000
|
stack
|
page read and write
|
||
22D3DE4E000
|
heap
|
page read and write
|
||
22D3EBAD000
|
heap
|
page read and write
|
||
48B8000
|
trusted library allocation
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
4A5A000
|
trusted library allocation
|
page read and write
|
||
22D3DC83000
|
heap
|
page read and write
|
||
22D3BDF9000
|
heap
|
page read and write
|
||
4A64000
|
trusted library allocation
|
page read and write
|
||
A2BD000
|
trusted library allocation
|
page read and write
|
||
22D3C16D000
|
heap
|
page read and write
|
||
9CEE000
|
trusted library allocation
|
page read and write
|
||
22D3EBAC000
|
heap
|
page read and write
|
||
45C9000
|
heap
|
page read and write
|
||
1542F000
|
trusted library allocation
|
page read and write
|
||
4AFA000
|
trusted library allocation
|
page read and write
|
||
22D3BEC2000
|
heap
|
page read and write
|
||
15177000
|
heap
|
page read and write
|
||
22D3DCC7000
|
heap
|
page read and write
|
||
22D3E048000
|
heap
|
page read and write
|
||
A14D000
|
trusted library allocation
|
page read and write
|
||
A18C000
|
trusted library allocation
|
page read and write
|
||
9C27000
|
trusted library allocation
|
page read and write
|
||
A2D4000
|
trusted library allocation
|
page read and write
|
||
22D3DDCE000
|
heap
|
page read and write
|
||
A06D000
|
trusted library allocation
|
page read and write
|
||
22D3DC51000
|
heap
|
page read and write
|
||
9F2A000
|
trusted library allocation
|
page read and write
|
||
1558D000
|
stack
|
page read and write
|
||
A089000
|
trusted library allocation
|
page read and write
|
||
F9AB732000
|
stack
|
page read and write
|
||
A1B3000
|
trusted library allocation
|
page read and write
|
||
9F1A000
|
trusted library allocation
|
page read and write
|
||
A1B9000
|
trusted library allocation
|
page read and write
|
||
4800000
|
trusted library allocation
|
page read and write
|
||
22D3DE40000
|
heap
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
22D3DC85000
|
heap
|
page read and write
|
||
22D3EB90000
|
heap
|
page read and write
|
||
22D3DFBB000
|
heap
|
page read and write
|
||
2390000
|
trusted library allocation
|
page execute and read and write
|
||
45F4000
|
heap
|
page read and write
|
||
A094000
|
trusted library allocation
|
page read and write
|
||
22D3DF62000
|
heap
|
page read and write
|
||
A217000
|
trusted library allocation
|
page read and write
|
||
A1CA000
|
trusted library allocation
|
page read and write
|
||
A1B0000
|
trusted library allocation
|
page read and write
|
||
22D3BE77000
|
heap
|
page read and write
|
||
A21E000
|
trusted library allocation
|
page read and write
|
||
A1F8000
|
trusted library allocation
|
page read and write
|
||
4A28000
|
trusted library allocation
|
page read and write
|
||
9B50000
|
trusted library allocation
|
page read and write
|
||
22D3DC7B000
|
heap
|
page read and write
|
||
1504B000
|
heap
|
page read and write
|
||
22D3C160000
|
heap
|
page read and write
|
||
A1A5000
|
trusted library allocation
|
page read and write
|
||
22D3E048000
|
heap
|
page read and write
|
||
1561D000
|
stack
|
page read and write
|
||
A193000
|
trusted library allocation
|
page read and write
|
||
A080000
|
trusted library allocation
|
page read and write
|
||
22D3DC52000
|
heap
|
page read and write
|
||
22D3DF36000
|
heap
|
page read and write
|
||
A140000
|
trusted library allocation
|
page read and write
|
||
22D3E19F000
|
heap
|
page read and write
|
||
2380000
|
unkown
|
page read and write
|
||
22D3E6F0000
|
trusted library allocation
|
page read and write
|
||
22D3BE0F000
|
heap
|
page read and write
|
||
22D3DC50000
|
heap
|
page read and write
|
||
A1D5000
|
trusted library allocation
|
page read and write
|
||
15083000
|
heap
|
page read and write
|
||
22D3DDD6000
|
heap
|
page read and write
|
||
9EFB000
|
trusted library allocation
|
page read and write
|
||
15130000
|
heap
|
page read and write
|
||
473C000
|
trusted library allocation
|
page read and write
|
||
4B44000
|
trusted library allocation
|
page read and write
|
||
22D3DCEC000
|
heap
|
page read and write
|
||
9F0A000
|
trusted library allocation
|
page read and write
|
||
160CF000
|
stack
|
page read and write
|
||
22D3E2D0000
|
heap
|
page read and write
|
||
22D3DC85000
|
heap
|
page read and write
|
||
23CA000
|
trusted library allocation
|
page execute and read and write
|
||
150E0000
|
heap
|
page read and write
|
||
49B1000
|
trusted library allocation
|
page read and write
|
||
F9ABFFE000
|
stack
|
page read and write
|
||
A0DF000
|
trusted library allocation
|
page read and write
|
||
22D3DE3D000
|
heap
|
page read and write
|
||
22D3DCE7000
|
heap
|
page read and write
|
||
45F4000
|
heap
|
page read and write
|
||
4835000
|
trusted library allocation
|
page read and write
|
||
9C11000
|
trusted library allocation
|
page read and write
|
||
A1C1000
|
trusted library allocation
|
page read and write
|
||
A0D3000
|
trusted library allocation
|
page read and write
|
||
22D3DEEE000
|
heap
|
page read and write
|
||
22D3DC7A000
|
heap
|
page read and write
|
||
46B1000
|
trusted library allocation
|
page read and write
|
||
14E7D000
|
stack
|
page read and write
|
||
22D3DF18000
|
heap
|
page read and write
|
||
4B28000
|
trusted library allocation
|
page read and write
|
||
A1D3000
|
trusted library allocation
|
page read and write
|
||
A051000
|
trusted library allocation
|
page read and write
|
||
22D3C165000
|
heap
|
page read and write
|
||
9ED4000
|
trusted library allocation
|
page read and write
|
||
22D3DCEC000
|
heap
|
page read and write
|
||
22D3DF77000
|
heap
|
page read and write
|
||
A255000
|
trusted library allocation
|
page read and write
|
||
22D3E1A0000
|
heap
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
22D3E400000
|
heap
|
page read and write
|
||
33B0000
|
heap
|
page read and write
|
||
22D3DF1D000
|
heap
|
page read and write
|
||
22D3DCE7000
|
heap
|
page read and write
|
||
9CAE000
|
trusted library allocation
|
page read and write
|
||
A1CD000
|
trusted library allocation
|
page read and write
|
||
A211000
|
trusted library allocation
|
page read and write
|
||
45D9000
|
heap
|
page read and write
|
||
22D3DF5A000
|
heap
|
page read and write
|
||
22D3BECD000
|
heap
|
page read and write
|
||
1515F000
|
heap
|
page read and write
|
||
22D3BE98000
|
heap
|
page read and write
|
||
15049000
|
heap
|
page read and write
|
||
A105000
|
trusted library allocation
|
page read and write
|
||
22D3E013000
|
heap
|
page read and write
|
||
A13B000
|
trusted library allocation
|
page read and write
|
||
22D3DDB7000
|
heap
|
page read and write
|
||
A122000
|
trusted library allocation
|
page read and write
|
||
159E1000
|
heap
|
page read and write
|
||
22D3DE33000
|
heap
|
page read and write
|
||
4B21000
|
trusted library allocation
|
page read and write
|
||
22D3E120000
|
heap
|
page read and write
|
||
46AF000
|
trusted library allocation
|
page read and write
|
||
22D3DF62000
|
heap
|
page read and write
|
||
4ACF000
|
trusted library allocation
|
page read and write
|
||
A0AB000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
A2CB000
|
trusted library allocation
|
page read and write
|
||
45FE000
|
heap
|
page read and write
|
||
46B6000
|
trusted library allocation
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
22D3DC7A000
|
heap
|
page read and write
|
||
22D3DF14000
|
heap
|
page read and write
|
||
A20B000
|
trusted library allocation
|
page read and write
|
||
4629000
|
trusted library allocation
|
page read and write
|
||
14FFC000
|
heap
|
page read and write
|
||
A0A5000
|
trusted library allocation
|
page read and write
|
||
A17E000
|
trusted library allocation
|
page read and write
|
||
A09A000
|
trusted library allocation
|
page read and write
|
||
A083000
|
trusted library allocation
|
page read and write
|
||
A185000
|
trusted library allocation
|
page read and write
|
||
22D3E570000
|
heap
|
page read and write
|
||
2FDD000
|
stack
|
page read and write
|
||
A2DD000
|
trusted library allocation
|
page read and write
|
||
22D3E048000
|
heap
|
page read and write
|
||
22D3E120000
|
heap
|
page read and write
|
||
F9ABBFE000
|
stack
|
page read and write
|
||
F9ABDFE000
|
stack
|
page read and write
|
||
22D3DC54000
|
heap
|
page read and write
|
||
4B13000
|
trusted library allocation
|
page read and write
|
||
2434000
|
trusted library allocation
|
page execute and read and write
|
||
A29A000
|
trusted library allocation
|
page read and write
|
||
22D3DE4E000
|
heap
|
page read and write
|
||
A0F2000
|
trusted library allocation
|
page read and write
|
||
9F39000
|
trusted library allocation
|
page read and write
|
||
22D3E033000
|
heap
|
page read and write
|
||
22D3E6E0000
|
heap
|
page read and write
|
||
22D3DF1D000
|
heap
|
page read and write
|
||
2392000
|
trusted library allocation
|
page execute and read and write
|
||
22D3DD50000
|
heap
|
page read and write
|
||
9C04000
|
trusted library allocation
|
page read and write
|
||
22D3DCC7000
|
heap
|
page read and write
|
||
888000
|
heap
|
page read and write
|
||
242D000
|
trusted library allocation
|
page execute and read and write
|
||
A0A3000
|
trusted library allocation
|
page read and write
|
||
49A4000
|
trusted library allocation
|
page read and write
|
||
22D3DE36000
|
heap
|
page read and write
|
||
14DED000
|
stack
|
page read and write
|
||
1607E000
|
stack
|
page read and write
|
||
4AC5000
|
trusted library allocation
|
page read and write
|
||
22D3DEEE000
|
heap
|
page read and write
|
||
F9AC4FB000
|
stack
|
page read and write
|
||
14F5E000
|
unkown
|
page read and write
|
||
45CB000
|
heap
|
page read and write
|
||
A1AD000
|
trusted library allocation
|
page read and write
|
||
150E0000
|
heap
|
page read and write
|
||
4744000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
22D3C16E000
|
heap
|
page read and write
|
||
22D3DCCF000
|
heap
|
page read and write
|
||
159D0000
|
heap
|
page read and write
|
||
9F8C000
|
trusted library allocation
|
page read and write
|
||
1566A000
|
unkown
|
page read and write
|
||
22D3BDD7000
|
heap
|
page read and write
|
||
22D3DCE7000
|
heap
|
page read and write
|
||
151E2000
|
heap
|
page read and write
|
||
22D3DCE7000
|
heap
|
page read and write
|
||
46D4000
|
trusted library allocation
|
page read and write
|
||
9F53000
|
trusted library allocation
|
page read and write
|
||
46C2000
|
trusted library allocation
|
page read and write
|
||
14F0D000
|
stack
|
page read and write
|
||
4781000
|
trusted library allocation
|
page read and write
|
||
22D3DE37000
|
heap
|
page read and write
|
||
A2F1000
|
trusted library allocation
|
page read and write
|
||
22D3DF62000
|
heap
|
page read and write
|
||
2358000
|
unkown
|
page read and write
|
||
9CCE000
|
trusted library allocation
|
page read and write
|
||
A25B000
|
trusted library allocation
|
page read and write
|
||
22D3DF53000
|
heap
|
page read and write
|
||
A146000
|
trusted library allocation
|
page read and write
|
||
22D3C16B000
|
heap
|
page read and write
|
||
45F4000
|
heap
|
page read and write
|
||
A2EE000
|
trusted library allocation
|
page read and write
|
||
A2AE000
|
trusted library allocation
|
page read and write
|
||
9F44000
|
trusted library allocation
|
page read and write
|
||
15083000
|
heap
|
page read and write
|
||
4736000
|
trusted library allocation
|
page read and write
|
||
22D3DF5A000
|
heap
|
page read and write
|
||
22D3D7F0000
|
heap
|
page read and write
|
||
A1B6000
|
trusted library allocation
|
page read and write
|
||
22D3DC5D000
|
heap
|
page read and write
|
||
22D3DF35000
|
heap
|
page read and write
|
||
A035000
|
trusted library allocation
|
page read and write
|
||
A2C3000
|
trusted library allocation
|
page read and write
|
||
A0D9000
|
trusted library allocation
|
page read and write
|
||
9F11000
|
trusted library allocation
|
page read and write
|
||
A0B1000
|
trusted library allocation
|
page read and write
|
||
23E3000
|
trusted library allocation
|
page execute and read and write
|
||
A0B4000
|
trusted library allocation
|
page read and write
|
||
15A24000
|
heap
|
page read and write
|
||
9ECE000
|
trusted library allocation
|
page read and write
|
||
14A69000
|
heap
|
page read and write
|
||
22D3E120000
|
heap
|
page read and write
|
||
23D2000
|
trusted library allocation
|
page execute and read and write
|
||
22D3BEC3000
|
heap
|
page read and write
|
||
22D3BE86000
|
heap
|
page read and write
|
||
22D3DDC8000
|
heap
|
page read and write
|
||
22D3DEF0000
|
heap
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
A058000
|
trusted library allocation
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
895000
|
heap
|
page read and write
|
||
483C000
|
trusted library allocation
|
page read and write
|
||
22D3DF5A000
|
heap
|
page read and write
|
||
A139000
|
trusted library allocation
|
page read and write
|
||
A2BA000
|
trusted library allocation
|
page read and write
|
||
F9AC1FD000
|
stack
|
page read and write
|
||
14C0E000
|
unkown
|
page read and write
|
||
22D3C16C000
|
heap
|
page read and write
|
||
A169000
|
trusted library allocation
|
page read and write
|
||
A074000
|
trusted library allocation
|
page read and write
|
||
22D3E051000
|
heap
|
page read and write
|
||
A2C0000
|
trusted library allocation
|
page read and write
|
||
22D3DCCF000
|
heap
|
page read and write
|
||
4B2F000
|
trusted library allocation
|
page read and write
|
||
22D3E016000
|
heap
|
page read and write
|
||
9CAA000
|
trusted library allocation
|
page read and write
|
||
22D3DCCF000
|
heap
|
page read and write
|
||
9F56000
|
trusted library allocation
|
page read and write
|
||
15127000
|
heap
|
page read and write
|
||
9DB3000
|
trusted library allocation
|
page read and write
|
||
15124000
|
heap
|
page read and write
|
||
22D3BE77000
|
heap
|
page read and write
|
||
22D3E360000
|
heap
|
page read and write
|
||
22D3DF16000
|
heap
|
page read and write
|
||
15FEE000
|
stack
|
page read and write
|
||
23DB000
|
trusted library allocation
|
page execute and read and write
|
||
155D9000
|
unkown
|
page read and write
|
||
22D3BE0F000
|
heap
|
page read and write
|
||
15002000
|
heap
|
page read and write
|
||
4639000
|
trusted library allocation
|
page read and write
|
||
9F88000
|
trusted library allocation
|
page read and write
|
||
A1BF000
|
trusted library allocation
|
page read and write
|
||
A28C000
|
trusted library allocation
|
page read and write
|
||
F9AC2FF000
|
stack
|
page read and write
|
||
9F32000
|
trusted library allocation
|
page read and write
|
||
14D5D000
|
stack
|
page read and write
|
||
15A0B000
|
heap
|
page read and write
|
||
14A9D000
|
stack
|
page read and write
|
||
14B2D000
|
stack
|
page read and write
|
||
497A000
|
trusted library allocation
|
page read and write
|
||
A136000
|
trusted library allocation
|
page read and write
|
||
22D3DCEC000
|
heap
|
page read and write
|
||
F9ABAFD000
|
stack
|
page read and write
|
||
22D3DC83000
|
heap
|
page read and write
|
||
14E3E000
|
unkown
|
page read and write
|
||
22D3E010000
|
heap
|
page read and write
|
||
1603F000
|
stack
|
page read and write
|
||
22D3DCCF000
|
heap
|
page read and write
|
||
22D3E012000
|
heap
|
page read and write
|
||
A2C6000
|
trusted library allocation
|
page read and write
|
||
9D0B000
|
trusted library allocation
|
page read and write
|
||
A19C000
|
trusted library allocation
|
page read and write
|
||
46C6000
|
trusted library allocation
|
page read and write
|
||
9DB1000
|
trusted library allocation
|
page read and write
|
||
A128000
|
trusted library allocation
|
page read and write
|
||
1506B000
|
heap
|
page read and write
|
||
A2E0000
|
trusted library allocation
|
page read and write
|
||
4A2E000
|
trusted library allocation
|
page read and write
|
||
151A0000
|
heap
|
page read and write
|
||
14FEE000
|
stack
|
page read and write
|
||
22D3DF73000
|
heap
|
page read and write
|
||
A2B7000
|
trusted library allocation
|
page read and write
|
||
22D3DC69000
|
heap
|
page read and write
|
||
9EDA000
|
trusted library allocation
|
page read and write
|
||
4600000
|
trusted library allocation
|
page read and write
|
||
22D3DC52000
|
heap
|
page read and write
|
||
15F00000
|
trusted library allocation
|
page read and write
|
||
A2EB000
|
trusted library allocation
|
page read and write
|
||
A15B000
|
trusted library allocation
|
page read and write
|
||
22D3E015000
|
heap
|
page read and write
|
||
A27E000
|
trusted library allocation
|
page read and write
|
||
22D3DCC9000
|
heap
|
page read and write
|
||
14ECD000
|
unkown
|
page read and write
|
||
22D3BE86000
|
heap
|
page read and write
|
||
4615000
|
trusted library allocation
|
page read and write
|
||
15127000
|
heap
|
page read and write
|
||
14F9D000
|
stack
|
page read and write
|
||
9D16000
|
trusted library allocation
|
page read and write
|
||
34B8000
|
heap
|
page read and write
|
||
22D3E033000
|
heap
|
page read and write
|
||
476E000
|
trusted library allocation
|
page read and write
|
||
4B3D000
|
trusted library allocation
|
page read and write
|
||
A1FF000
|
trusted library allocation
|
page read and write
|
||
159DC000
|
heap
|
page read and write
|
||
46A5000
|
trusted library allocation
|
page read and write
|
||
49C2000
|
trusted library allocation
|
page read and write
|
||
22D3C16E000
|
heap
|
page read and write
|
||
22D3E048000
|
heap
|
page read and write
|
||
A277000
|
trusted library allocation
|
page read and write
|
||
22D3DC85000
|
heap
|
page read and write
|
||
4AA8000
|
trusted library allocation
|
page read and write
|
||
A1C7000
|
trusted library allocation
|
page read and write
|
||
14BBD000
|
stack
|
page read and write
|
||
9F91000
|
trusted library allocation
|
page read and write
|
||
A224000
|
trusted library allocation
|
page read and write
|
||
A091000
|
trusted library allocation
|
page read and write
|
||
9F66000
|
trusted library allocation
|
page read and write
|
||
22D3DF49000
|
heap
|
page read and write
|
||
15A1B000
|
heap
|
page read and write
|
||
A2A8000
|
trusted library allocation
|
page read and write
|
||
22D3DC5C000
|
heap
|
page read and write
|
||
A2E8000
|
trusted library allocation
|
page read and write
|
||
22D3DC6C000
|
heap
|
page read and write
|
||
15150000
|
heap
|
page read and write
|
||
22D3BDB0000
|
heap
|
page read and write
|
||
22D3DC73000
|
heap
|
page read and write
|
||
151A0000
|
heap
|
page read and write
|
||
A2E5000
|
trusted library allocation
|
page read and write
|
||
14FF1000
|
heap
|
page read and write
|
||
15DB0000
|
trusted library allocation
|
page read and write
|
||
9F22000
|
trusted library allocation
|
page read and write
|
||
933000
|
heap
|
page read and write
|
||
15172000
|
heap
|
page read and write
|
||
482B000
|
trusted library allocation
|
page read and write
|
||
22D3DCCF000
|
heap
|
page read and write
|
||
48FE000
|
trusted library allocation
|
page read and write
|
||
A07D000
|
trusted library allocation
|
page read and write
|
||
22D3DC5D000
|
heap
|
page read and write
|
||
45F5000
|
heap
|
page read and write
|
||
34CA000
|
heap
|
page read and write
|
||
F9ABEFE000
|
stack
|
page read and write
|
||
A0A8000
|
trusted library allocation
|
page read and write
|
||
9CA3000
|
trusted library allocation
|
page read and write
|
||
22D3DE3B000
|
heap
|
page read and write
|
||
4576000
|
heap
|
page read and write
|
||
22D3DF73000
|
heap
|
page read and write
|
||
22D3DC83000
|
heap
|
page read and write
|
||
A177000
|
trusted library allocation
|
page read and write
|
||
4849000
|
trusted library allocation
|
page read and write
|
||
22D3DC55000
|
heap
|
page read and write
|
||
22D3BEA6000
|
heap
|
page read and write
|
||
9C0B000
|
trusted library allocation
|
page read and write
|
||
47F9000
|
trusted library allocation
|
page read and write
|
||
45CB000
|
heap
|
page read and write
|
||
A01F000
|
trusted library allocation
|
page read and write
|
||
A1C4000
|
trusted library allocation
|
page read and write
|
||
15140000
|
heap
|
page read and write
|
||
22D3DF73000
|
heap
|
page read and write
|
||
22D3D810000
|
heap
|
page read and write
|
||
22D3E050000
|
heap
|
page read and write
|
||
A285000
|
trusted library allocation
|
page read and write
|
||
22D3DE3C000
|
heap
|
page read and write
|
||
14AEE000
|
stack
|
page read and write
|
||
A2C9000
|
trusted library allocation
|
page read and write
|
||
22D3E048000
|
heap
|
page read and write
|
||
22D3BE86000
|
heap
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
22D3BDFA000
|
heap
|
page read and write
|
||
48B1000
|
trusted library allocation
|
page read and write
|
||
22D3DCC9000
|
heap
|
page read and write
|
||
15062000
|
heap
|
page read and write
|
||
22D3E011000
|
heap
|
page read and write
|
||
150E0000
|
heap
|
page read and write
|
||
46C0000
|
trusted library allocation
|
page read and write
|
||
14600000
|
trusted library allocation
|
page read and write
|
||
15330000
|
trusted library allocation
|
page read and write
|
||
4A9A000
|
trusted library allocation
|
page read and write
|
||
154B8000
|
unkown
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
4B4B000
|
trusted library allocation
|
page read and write
|
||
159FB000
|
heap
|
page read and write
|
||
9F8F000
|
trusted library allocation
|
page read and write
|
||
49AE000
|
trusted library allocation
|
page read and write
|
||
22D3DD51000
|
heap
|
page read and write
|
||
22D3DF12000
|
heap
|
page read and write
|
||
4B0B000
|
trusted library allocation
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
22D3DF1A000
|
heap
|
page read and write
|
||
48F8000
|
trusted library allocation
|
page read and write
|
||
22D3DCC7000
|
heap
|
page read and write
|
||
A170000
|
trusted library allocation
|
page read and write
|
There are 588 hidden memdumps, click here to show them.