IOC Report
QUOTATION_OCTQTRA071244#U00faPDF.scr.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QUOTATION_OCTQTRA071244#U00faPDF.scr.exe
"C:\Users\user\Desktop\QUOTATION_OCTQTRA071244#U00faPDF.scr.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://reallyfreegeoip.org/xml/8.46.123.33p
unknown
http://filetransfer.io/data-package/MlZtCPkK/download
188.114.97.3
http://checkip.dyndns.org/
158.101.44.242
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://checkip.dyndns.org/q
unknown
https://filetransfer.io/data-package/MlZtCPkK/download
188.114.97.3
http://reallyfreegeoip.org
unknown
https://filetransfer.io
unknown
https://github.com/mgravell/protobuf-net
unknown
https://reallyfreegeoip.org
unknown
https://s20.filetransfer.io/storage/download/LuTcDMs7R8e5
188.114.96.3
http://checkip.dyndns.org
unknown
https://s20.filetransfer.io
unknown
http://checkip.dyndns.com
unknown
http://filetransfer.io
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.96.3
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
malicious
checkip.dyndns.org
unknown
malicious
filetransfer.io
188.114.97.3
s20.filetransfer.io
188.114.96.3
checkip.dyndns.com
158.101.44.242

IPs

IP
Domain
Country
Malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
188.114.97.3
filetransfer.io
European Union
158.101.44.242
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00faPDF_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00faPDF_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00faPDF_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00faPDF_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00faPDF_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00faPDF_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00faPDF_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00faPDF_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00faPDF_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00faPDF_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00faPDF_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00faPDF_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00faPDF_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00faPDF_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
FileDirectory
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
17A0D6A4000
trusted library allocation
page read and write
malicious
1AE00001000
trusted library allocation
page read and write
malicious
1AE0024B000
trusted library allocation
page read and write
malicious
17A1D5C9000
trusted library allocation
page read and write
malicious
1AE6ADA0000
trusted library section
page read and write
malicious
1AE10009000
trusted library allocation
page read and write
malicious
17A26210000
trusted library section
page read and write
malicious
17A0DB62000
trusted library allocation
page read and write
16E737F000
stack
page read and write
17A0DC4F000
trusted library allocation
page read and write
7FF887B90000
trusted library allocation
page read and write
17A0D908000
trusted library allocation
page read and write
17A0DCD9000
trusted library allocation
page read and write
1AE6AD30000
trusted library allocation
page read and write
1AE69420000
heap
page read and write
1AE001CA000
trusted library allocation
page read and write
17A0DBE7000
trusted library allocation
page read and write
7FF8879FD000
trusted library allocation
page execute and read and write
7FF8879DD000
trusted library allocation
page execute and read and write
7FF887D50000
trusted library allocation
page read and write
1AE692A0000
remote allocation
page execute and read and write
17A0BE15000
heap
page read and write
17A0DC07000
trusted library allocation
page read and write
17A0DC51000
trusted library allocation
page read and write
1AE693F0000
direct allocation
page read and write
7FF887B10000
trusted library allocation
page execute and read and write
1AE6B8CC000
heap
page read and write
1AE6AEE5000
heap
page read and write
17A0D94A000
trusted library allocation
page read and write
17A0DB16000
trusted library allocation
page read and write
17A0DA53000
trusted library allocation
page read and write
17A0D96A000
trusted library allocation
page read and write
7FF887D60000
trusted library allocation
page read and write
17A0D9DF000
trusted library allocation
page read and write
17A0D8DE000
trusted library allocation
page read and write
17A0DB99000
trusted library allocation
page read and write
1AE002E1000
trusted library allocation
page read and write
7FF8879D4000
trusted library allocation
page read and write
17A0DB1A000
trusted library allocation
page read and write
7FF8879E3000
trusted library allocation
page read and write
17A0DCE8000
trusted library allocation
page read and write
17A0DD4F000
trusted library allocation
page read and write
7FF887BA0000
trusted library allocation
page read and write
17A0D97B000
trusted library allocation
page read and write
17A0DBBB000
trusted library allocation
page read and write
17A0B6B2000
unkown
page readonly
17A0D944000
trusted library allocation
page read and write
17A0BAA7000
heap
page read and write
17A0DA9B000
trusted library allocation
page read and write
7FF4E7810000
trusted library allocation
page execute and read and write
17A0DB53000
trusted library allocation
page read and write
1AE001AB000
trusted library allocation
page read and write
17A0DCC8000
trusted library allocation
page read and write
17A0DA55000
trusted library allocation
page read and write
17A0DAAC000
trusted library allocation
page read and write
17A0D953000
trusted library allocation
page read and write
1AE00372000
trusted library allocation
page read and write
17A0DBD6000
trusted library allocation
page read and write
16E723F000
stack
page read and write
7FF887C90000
trusted library allocation
page read and write
17A26290000
trusted library section
page read and write
17A0D590000
heap
page read and write
4646A7F000
stack
page read and write
17A0DC96000
trusted library allocation
page read and write
17A0DCB1000
trusted library allocation
page read and write
17A0DC14000
trusted library allocation
page read and write
17A0BA8B000
heap
page read and write
17A0D937000
trusted library allocation
page read and write
17A0DC5C000
trusted library allocation
page read and write
7FF887BAA000
trusted library allocation
page read and write
7FF462DB0000
trusted library allocation
page execute and read and write
7FF887CC0000
trusted library allocation
page read and write
17A0B9C0000
heap
page read and write
17A0D61A000
trusted library allocation
page read and write
7FF8879FB000
trusted library allocation
page execute and read and write
17A0D6A0000
trusted library allocation
page read and write
17A0DD5A000
trusted library allocation
page read and write
17A25EA0000
heap
page read and write
17A0D9DB000
trusted library allocation
page read and write
17A25F2C000
heap
page read and write
17A0DB51000
trusted library allocation
page read and write
17A0DA9F000
trusted library allocation
page read and write
17A0DC5A000
trusted library allocation
page read and write
17A0DB2F000
trusted library allocation
page read and write
1AE0014C000
trusted library allocation
page read and write
7FF8879ED000
trusted library allocation
page execute and read and write
17A0DB6A000
trusted library allocation
page read and write
7FF887A86000
trusted library allocation
page read and write
17A0DA64000
trusted library allocation
page read and write
17A0DBD8000
trusted library allocation
page read and write
7FF887B90000
trusted library allocation
page read and write
17A0DD8B000
trusted library allocation
page read and write
17A0DBEA000
trusted library allocation
page read and write
16E68FE000
stack
page read and write
16E70FE000
stack
page read and write
17A26350000
heap
page read and write
17A0D8F1000
trusted library allocation
page read and write
17A0DD80000
trusted library allocation
page read and write
1AE694B1000
heap
page read and write
17A0DB71000
trusted library allocation
page read and write
16E6BFD000
stack
page read and write
17A0D8E0000
trusted library allocation
page read and write
17A0DDCD000
trusted library allocation
page read and write
17A0D939000
trusted library allocation
page read and write
17A0DBE1000
trusted library allocation
page read and write
17A0D988000
trusted library allocation
page read and write
17A0DB95000
trusted library allocation
page read and write
7FF887D9C000
trusted library allocation
page read and write
17A0DA71000
trusted library allocation
page read and write
7FF887AAC000
trusted library allocation
page execute and read and write
17A0D643000
trusted library allocation
page read and write
7FF887CCE000
trusted library allocation
page read and write
7FF8879FD000
trusted library allocation
page execute and read and write
17A0D9BD000
trusted library allocation
page read and write
17A0D632000
trusted library allocation
page read and write
17A0DB8B000
trusted library allocation
page read and write
7FF887C40000
trusted library allocation
page read and write
17A0DBE5000
trusted library allocation
page read and write
7FF887A2C000
trusted library allocation
page execute and read and write
17A0D9CE000
trusted library allocation
page read and write
17A0BA2C000
heap
page read and write
17A0DC8D000
trusted library allocation
page read and write
17A0D9AE000
trusted library allocation
page read and write
7FF887BC0000
trusted library allocation
page read and write
7FF887B9D000
trusted library allocation
page execute and read and write
7FF887D80000
trusted library allocation
page read and write
17A0DD7C000
trusted library allocation
page read and write
1AE6AD60000
trusted library allocation
page read and write
17A0DC3C000
trusted library allocation
page read and write
17A0DDCF000
trusted library allocation
page read and write
17A0DC3E000
trusted library allocation
page read and write
17A0D977000
trusted library allocation
page read and write
17A0D935000
trusted library allocation
page read and write
1AE6BE00000
heap
page read and write
17A0DAF8000
trusted library allocation
page read and write
17A0D904000
trusted library allocation
page read and write
17A0DC8F000
trusted library allocation
page read and write
17A0DD8D000
trusted library allocation
page read and write
17A0D948000
trusted library allocation
page read and write
16E69FE000
stack
page read and write
1AE100B7000
trusted library allocation
page read and write
17A0D928000
trusted library allocation
page read and write
7FF887A00000
trusted library allocation
page read and write
7FF887AB0000
trusted library allocation
page execute and read and write
1AE00204000
trusted library allocation
page read and write
1AE0031A000
trusted library allocation
page read and write
7FF887BA8000
trusted library allocation
page execute and read and write
17A0D906000
trusted library allocation
page read and write
17A0DD95000
trusted library allocation
page read and write
17A0DC58000
trusted library allocation
page read and write
17A0D922000
trusted library allocation
page read and write
17A0DCF7000
trusted library allocation
page read and write
17A0BB30000
trusted library allocation
page read and write
17A0DB09000
trusted library allocation
page read and write
17A0D5A1000
trusted library allocation
page read and write
17A0B6B0000
unkown
page readonly
17A0D946000
trusted library allocation
page read and write
1AE00113000
trusted library allocation
page read and write
7FF887AA0000
trusted library allocation
page read and write
17A0DDBC000
trusted library allocation
page read and write
17A0DA73000
trusted library allocation
page read and write
1AE100AE000
trusted library allocation
page read and write
17A0DC09000
trusted library allocation
page read and write
17A0DB97000
trusted library allocation
page read and write
7FF887CC4000
trusted library allocation
page read and write
17A0DD82000
trusted library allocation
page read and write
16E733E000
stack
page read and write
17A0D9AC000
trusted library allocation
page read and write
17A0DAC5000
trusted library allocation
page read and write
1AE100C3000
trusted library allocation
page read and write
17A0B81C000
unkown
page readonly
464727E000
stack
page read and write
17A0DB12000
trusted library allocation
page read and write
7FF887C90000
trusted library allocation
page read and write
17A1D8CD000
trusted library allocation
page read and write
1AE6AD90000
heap
page execute and read and write
17A0DA42000
trusted library allocation
page read and write
17A0DAFB000
trusted library allocation
page read and write
7FF8879D3000
trusted library allocation
page execute and read and write
17A0D90A000
trusted library allocation
page read and write
17A0DB18000
trusted library allocation
page read and write
7FF887C30000
trusted library allocation
page execute and read and write
464767D000
stack
page read and write
17A0DA8C000
trusted library allocation
page read and write
17A0BC20000
heap
page read and write
17A0DCD7000
trusted library allocation
page read and write
17A0DD25000
trusted library allocation
page read and write
17A0DCFB000
trusted library allocation
page read and write
17A0DD6B000
trusted library allocation
page read and write
7FF887A90000
trusted library allocation
page execute and read and write
464667F000
stack
page read and write
17A0DB7A000
trusted library allocation
page read and write
7FF8879F0000
trusted library allocation
page read and write
1AE69470000
heap
page read and write
17A0BB90000
trusted library section
page read and write
1AE002D7000
trusted library allocation
page read and write
17A0BA4B000
heap
page read and write
17A0DA8A000
trusted library allocation
page read and write
17A0D8F7000
trusted library allocation
page read and write
7FF4E7800000
trusted library allocation
page execute and read and write
1AE0031E000
trusted library allocation
page read and write
1AE00238000
trusted library allocation
page read and write
17A0D917000
trusted library allocation
page read and write
17A25DDE000
heap
page read and write
1AE6B8E1000
heap
page read and write
17A0D8E6000
trusted library allocation
page read and write
17A0D955000
trusted library allocation
page read and write
17A25F1F000
heap
page read and write
17A0DD5E000
trusted library allocation
page read and write
17A0DAE8000
trusted library allocation
page read and write
17A0DB9B000
trusted library allocation
page read and write
7FF887AB6000
trusted library allocation
page execute and read and write
17A0DA51000
trusted library allocation
page read and write
17A0D639000
trusted library allocation
page read and write
17A0D8E2000
trusted library allocation
page read and write
1AE10092000
trusted library allocation
page read and write
1AE001A3000
trusted library allocation
page read and write
1AE002F3000
trusted library allocation
page read and write
1AE00110000
trusted library allocation
page read and write
17A0DD08000
trusted library allocation
page read and write
17A0DC1A000
trusted library allocation
page read and write
17A0DDC7000
trusted library allocation
page read and write
17A0DB40000
trusted library allocation
page read and write
7FF887C00000
trusted library allocation
page read and write
17A0DD38000
trusted library allocation
page read and write
17A0DB88000
trusted library allocation
page read and write
17A0D435000
heap
page read and write
17A0DDCB000
trusted library allocation
page read and write
1AE00226000
trusted library allocation
page read and write
464827E000
stack
page read and write
1AE694DC000
heap
page read and write
17A0DA57000
trusted library allocation
page read and write
7FF887CBD000
trusted library allocation
page read and write
1AE6AD10000
trusted library section
page read and write
17A0DD8F000
trusted library allocation
page read and write
7FF887BA6000
trusted library allocation
page read and write
7FF887D97000
trusted library allocation
page read and write
17A0DD7E000
trusted library allocation
page read and write
17A0DB77000
trusted library allocation
page read and write
1AE0032B000
trusted library allocation
page read and write
17A0DAC3000
trusted library allocation
page read and write
17A0BC25000
heap
page read and write
17A0DC4B000
trusted library allocation
page read and write
17A0DD7A000
trusted library allocation
page read and write
17A0DABF000
trusted library allocation
page read and write
17A1D92A000
trusted library allocation
page read and write
17A0DA59000
trusted library allocation
page read and write
7FF887DB0000
trusted library allocation
page read and write
17A255D0000
trusted library allocation
page read and write
17A0D81C000
trusted library allocation
page read and write
17A25E11000
heap
page read and write
17A0DB35000
trusted library allocation
page read and write
7FF887C50000
trusted library allocation
page execute and read and write
17A260A0000
trusted library section
page read and write
7FF8879E8000
trusted library allocation
page read and write
46465FC000
stack
page read and write
17A0D9E1000
trusted library allocation
page read and write
1AE001B3000
trusted library allocation
page read and write
17A0DD36000
trusted library allocation
page read and write
17A0DD6F000
trusted library allocation
page read and write
16E767E000
stack
page read and write
17A0D9CA000
trusted library allocation
page read and write
17A0DD0A000
trusted library allocation
page read and write
1AE00221000
trusted library allocation
page read and write
17A0D9B3000
trusted library allocation
page read and write
17A0DD91000
trusted library allocation
page read and write
17A0DD3C000
trusted library allocation
page read and write
17A0D915000
trusted library allocation
page read and write
17A0D8EF000
trusted library allocation
page read and write
17A0DCEA000
trusted library allocation
page read and write
1AE001F1000
trusted library allocation
page read and write
1AE0015C000
trusted library allocation
page read and write
17A0D9D2000
trusted library allocation
page read and write
17A0DAF4000
trusted library allocation
page read and write
7FF887C80000
trusted library allocation
page read and write
7FF8879F2000
trusted library allocation
page read and write
17A0DBD4000
trusted library allocation
page read and write
17A0D64B000
trusted library allocation
page read and write
17A0D986000
trusted library allocation
page read and write
7FF887D90000
trusted library allocation
page read and write
7FF887B72000
trusted library allocation
page read and write
7FF887AD6000
trusted library allocation
page execute and read and write
17A0DC1C000
trusted library allocation
page read and write
1AE00158000
trusted library allocation
page read and write
7FF887C60000
trusted library allocation
page execute and read and write
17A0D8D1000
trusted library allocation
page read and write
17A0DBF2000
trusted library allocation
page read and write
17A0DBD0000
trusted library allocation
page read and write
17A0DBFB000
trusted library allocation
page read and write
1AE6AEE0000
heap
page read and write
17A1D5A1000
trusted library allocation
page read and write
17A0BE10000
heap
page read and write
1AE00324000
trusted library allocation
page read and write
17A0DA6A000
trusted library allocation
page read and write
1AE00331000
trusted library allocation
page read and write
17A0D9E4000
trusted library allocation
page read and write
17A0DC38000
trusted library allocation
page read and write
17A0DC3A000
trusted library allocation
page read and write
17A0DB33000
trusted library allocation
page read and write
17A0DD69000
trusted library allocation
page read and write
7FF887B87000
trusted library allocation
page read and write
17A0D9DD000
trusted library allocation
page read and write
17A0DC7E000
trusted library allocation
page read and write
7FF887D70000
trusted library allocation
page read and write
1AE6949A000
heap
page read and write
17A0DCFF000
trusted library allocation
page read and write
1AE002EA000
trusted library allocation
page read and write
16E6EFE000
stack
page read and write
17A0DD23000
trusted library allocation
page read and write
17A1D84D000
trusted library allocation
page read and write
17A0DB1C000
trusted library allocation
page read and write
17A0D9BF000
trusted library allocation
page read and write
17A0DC05000
trusted library allocation
page read and write
16E757F000
stack
page read and write
1AE6AD70000
trusted library allocation
page read and write
7FF887B93000
trusted library allocation
page read and write
17A0D8D4000
trusted library allocation
page read and write
16E747E000
stack
page read and write
7FF887C70000
trusted library allocation
page read and write
7FF887C10000
trusted library allocation
page read and write
17A0BA20000
heap
page read and write
17A0D9CC000
trusted library allocation
page read and write
1AE10032000
trusted library allocation
page read and write
17A0DC84000
trusted library allocation
page read and write
17A0DDA2000
trusted library allocation
page read and write
17A0DD29000
trusted library allocation
page read and write
17A0D856000
trusted library allocation
page read and write
17A0DB05000
trusted library allocation
page read and write
1AE00154000
trusted library allocation
page read and write
7FF887BB0000
trusted library allocation
page read and write
17A0D8DC000
trusted library allocation
page read and write
7FF887A80000
trusted library allocation
page read and write
17A0DCB7000
trusted library allocation
page read and write
17A1D7B9000
trusted library allocation
page read and write
17A0DCB5000
trusted library allocation
page read and write
17A0DB46000
trusted library allocation
page read and write
17A0D9AA000
trusted library allocation
page read and write
17A0DCC6000
trusted library allocation
page read and write
17A0DD04000
trusted library allocation
page read and write
17A0DAD2000
trusted library allocation
page read and write
17A0DD27000
trusted library allocation
page read and write
17A0DCE4000
trusted library allocation
page read and write
46486BE000
stack
page read and write
16E67FE000
stack
page read and write
17A0DB64000
trusted library allocation
page read and write
1AE002D1000
trusted library allocation
page read and write
7FF8879F4000
trusted library allocation
page read and write
17A0DBA8000
trusted library allocation
page read and write
17A0DC29000
trusted library allocation
page read and write
17A0DA44000
trusted library allocation
page read and write
17A25EB0000
heap
page read and write
17A0DC9E000
trusted library allocation
page read and write
17A0D964000
trusted library allocation
page read and write
17A0DA3E000
trusted library allocation
page read and write
17A0D8F3000
trusted library allocation
page read and write
17A0DB3E000
trusted library allocation
page read and write
16E71FE000
stack
page read and write
17A0DBB7000
trusted library allocation
page read and write
17A0BA63000
heap
page read and write
17A0DB2D000
trusted library allocation
page read and write
17A0D98F000
trusted library allocation
page read and write
17A0DD71000
trusted library allocation
page read and write
17A0DA79000
trusted library allocation
page read and write
17A0DD2B000
trusted library allocation
page read and write
17A0D8E4000
trusted library allocation
page read and write
17A25DA0000
heap
page read and write
1AE00161000
trusted library allocation
page read and write
17A0DC93000
trusted library allocation
page read and write
17A0D8F5000
trusted library allocation
page read and write
17A0DB59000
trusted library allocation
page read and write
7FF887B8E000
trusted library allocation
page read and write
7FF887C70000
trusted library allocation
page read and write
16E6CFE000
stack
page read and write
17A0DAAE000
trusted library allocation
page read and write
17A0DBAA000
trusted library allocation
page read and write
17A0B980000
heap
page read and write
17A0D9C5000
trusted library allocation
page read and write
17A0D942000
trusted library allocation
page read and write
1AE6ADC0000
trusted library allocation
page read and write
1AE1008C000
trusted library allocation
page read and write
17A0D913000
trusted library allocation
page read and write
17A0D98A000
trusted library allocation
page read and write
17A0B8A0000
heap
page read and write
17A0DA75000
trusted library allocation
page read and write
16E6AFE000
stack
page read and write
16E66ED000
stack
page read and write
17A0BB43000
trusted library allocation
page read and write
17A0DAA3000
trusted library allocation
page read and write
17A0DB31000
trusted library allocation
page read and write
7FF887A8C000
trusted library allocation
page execute and read and write
7FF887BE0000
trusted library allocation
page read and write
17A0DCC0000
trusted library allocation
page read and write
17A0DC18000
trusted library allocation
page read and write
1AE6AE80000
heap
page read and write
17A0DAD7000
trusted library allocation
page read and write
1AE693C0000
heap
page read and write
17A0DCE6000
trusted library allocation
page read and write
1AE6B898000
heap
page read and write
7FF8879F3000
trusted library allocation
page execute and read and write
1AE6B850000
heap
page read and write
7FF4E77F0000
trusted library allocation
page execute and read and write
17A0DD6D000
trusted library allocation
page read and write
1AE6B864000
heap
page read and write
1AE0014A000
trusted library allocation
page read and write
7FF887CA0000
trusted library allocation
page read and write
17A0DAB2000
trusted library allocation
page read and write
1AE002EF000
trusted library allocation
page read and write
7FF8879F4000
trusted library allocation
page read and write
7FF887BF0000
trusted library allocation
page read and write
7FF887DA0000
trusted library allocation
page read and write
1AE0019F000
trusted library allocation
page read and write
17A0D8ED000
trusted library allocation
page read and write
1AE6AE40000
heap
page read and write
17A0DCA2000
trusted library allocation
page read and write
1AE10034000
trusted library allocation
page read and write
17A0D647000
trusted library allocation
page read and write
17A0DB07000
trusted library allocation
page read and write
4646E7E000
stack
page read and write
7FF887BC0000
trusted library allocation
page execute and read and write
1AE10001000
trusted library allocation
page read and write
7FF887BB0000
trusted library allocation
page read and write
17A0DCB3000
trusted library allocation
page read and write
7FF887AA6000
trusted library allocation
page read and write
1AE6BA03000
heap
page read and write
1AE001DE000
trusted library allocation
page read and write
1AE694AF000
heap
page read and write
17A0DA66000
trusted library allocation
page read and write
17A0DB44000
trusted library allocation
page read and write
1AE693C5000
heap
page read and write
17A0D966000
trusted library allocation
page read and write
1AE0019B000
trusted library allocation
page read and write
17A0BB40000
trusted library allocation
page read and write
17A0D9D0000
trusted library allocation
page read and write
7FF887BD0000
trusted library allocation
page execute and read and write
17A0DAF2000
trusted library allocation
page read and write
46461FF000
stack
page read and write
17A0DC7C000
trusted library allocation
page read and write
7FF887BD0000
trusted library allocation
page execute and read and write
1AE00103000
trusted library allocation
page read and write
17A0DBB1000
trusted library allocation
page read and write
17A0BDC0000
trusted library section
page read and write
17A0DBF4000
trusted library allocation
page read and write
17A0D933000
trusted library allocation
page read and write
17A0DCF9000
trusted library allocation
page read and write
17A0D9B0000
trusted library allocation
page read and write
1AE6B840000
heap
page execute and read and write
17A0D9D4000
trusted library allocation
page read and write
17A0DA9D000
trusted library allocation
page read and write
17A25EC8000
heap
page read and write
1AE692E0000
heap
page read and write
1AE694DA000
heap
page read and write
7FF887C9B000
trusted library allocation
page read and write
46482BE000
stack
page read and write
17A0DB9E000
trusted library allocation
page read and write
7FF887BA2000
trusted library allocation
page read and write
17A0DB0E000
trusted library allocation
page read and write
17A0DD4B000
trusted library allocation
page read and write
17A0DC2D000
trusted library allocation
page read and write
17A0DB68000
trusted library allocation
page read and write
17A0BA10000
trusted library allocation
page read and write
17A0DAF6000
trusted library allocation
page read and write
17A0B9A0000
heap
page read and write
17A0DD58000
trusted library allocation
page read and write
1AE001AF000
trusted library allocation
page read and write
16E6FFD000
stack
page read and write
17A0DA8E000
trusted library allocation
page read and write
17A0DDAD000
trusted library allocation
page read and write
17A0DC4D000
trusted library allocation
page read and write
4647E7E000
stack
page read and write
1AE00132000
trusted library allocation
page read and write
1AE69478000
heap
page read and write
17A0D968000
trusted library allocation
page read and write
17A0DAD0000
trusted library allocation
page read and write
17A0DDC9000
trusted library allocation
page read and write
1AE002CC000
trusted library allocation
page read and write
1AE69450000
heap
page read and write
17A0D902000
trusted library allocation
page read and write
17A0DAC1000
trusted library allocation
page read and write
17A0D979000
trusted library allocation
page read and write
7FF887C20000
trusted library allocation
page read and write
17A0BA60000
heap
page read and write
1AE6BA00000
heap
page read and write
17A0D9C1000
trusted library allocation
page read and write
17A0DBAC000
trusted library allocation
page read and write
7FF887CD0000
trusted library allocation
page execute and read and write
17A0DB0B000
trusted library allocation
page read and write
7FF887C93000
trusted library allocation
page read and write
7FF887CB9000
trusted library allocation
page read and write
17A0DA92000
trusted library allocation
page read and write
7FF887BA4000
trusted library allocation
page execute and read and write
46455F2000
stack
page read and write
7FF887A05000
trusted library allocation
page read and write
17A0D95C000
trusted library allocation
page read and write
7FF887C80000
trusted library allocation
page read and write
1AE6ADC3000
trusted library allocation
page read and write
17A0D9C3000
trusted library allocation
page read and write
17A0DD9E000
trusted library allocation
page read and write
1AE6B896000
heap
page read and write
17A0DD93000
trusted library allocation
page read and write
17A0DA46000
trusted library allocation
page read and write
17A0DCC2000
trusted library allocation
page read and write
1AE693D0000
heap
page read and write
7FF887B99000
trusted library allocation
page read and write
17A0DC25000
trusted library allocation
page read and write
7FF887CB2000
trusted library allocation
page read and write
7FF887BA6000
trusted library allocation
page execute and read and write
17A0BA8D000
heap
page read and write
17A0D957000
trusted library allocation
page read and write
17A0D9A0000
trusted library allocation
page read and write
17A0D7DC000
trusted library allocation
page read and write
17A0DC82000
trusted library allocation
page read and write
16E6DFE000
stack
page read and write
17A0DC2B000
trusted library allocation
page read and write
4644BDE000
stack
page read and write
7FF887BC5000
trusted library allocation
page read and write
1AE001B7000
trusted library allocation
page read and write
17A0DB73000
trusted library allocation
page read and write
1AE001A7000
trusted library allocation
page read and write
17A0DC40000
trusted library allocation
page read and write
17A0BBC0000
heap
page execute and read and write
17A0DAC7000
trusted library allocation
page read and write
17A0DBB9000
trusted library allocation
page read and write
17A0D540000
heap
page execute and read and write
7FF887C97000
trusted library allocation
page read and write
17A0DCED000
trusted library allocation
page read and write
7FF8879D0000
trusted library allocation
page read and write
1AE69566000
heap
page read and write
7FF887C15000
trusted library allocation
page read and write
17A0DD3A000
trusted library allocation
page read and write
4647A7E000
stack
page read and write
17A0DACE000
trusted library allocation
page read and write
17A0DD06000
trusted library allocation
page read and write
1AE6AD50000
trusted library allocation
page read and write
7FF887BA0000
trusted library allocation
page read and write
7FF887AF0000
trusted library allocation
page execute and read and write
7FF887CA0000
trusted library allocation
page execute and read and write
There are 526 hidden memdumps, click here to show them.