IOC Report
Request For Quotation.js

loading gif

Files

File Path
Type
Category
Malicious
Request For Quotation.js
ASCII text, with very long lines (64556)
initial sample
malicious
C:\Users\user\AppData\Roaming\otyhtiklwj.txt
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\ProgramData\Oracle\Java\.oracle_jre_usage\b5820291038aa69c.timestamp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\7100
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\83aa4cc77f591dfc2374580bbd95f6ba_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Request For Quotation.js"
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
"C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\otyhtiklwj.txt"
malicious
C:\Windows\SysWOW64\icacls.exe
C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://wshsoft.company/jv/jrex.zip
unknown
malicious
http://crl.xrampsecurity.com/XGCA.crl
unknown
https://repo1.maven.org/maven2/net/java/dev/jna/jna-platform/5.5.0/jna-platform-5.5.0.jar
unknown
http://crl.chambersign.org/chambersroot.crl0
unknown
https://github.com
unknown
https://repository.luxtrust.lu0
unknown
http://bugreport.sun.com/bugreport/
unknown
http://cps.chambersign.org/cps/chambersroot.html0
unknown
http://java.oracle.com/
unknown
http://null.oracle.com/
unknown
http://www.chambersign.org1
unknown
http://repository.swisssign.com/0
unknown
https://repo1.maven.org/maven2/net/java/dev/jna/jna/5.5.0/jna-5.5.0.jar
unknown
http://policy.camerfirma.com
unknown
https://repo1.maven.org/maven2/net/java/dev/jna/jna/5.5.0/jna-5.5.0.jarplatform-5.5.0.jar
unknown
http://wshsoft.company/jv/jrex.zipleB
unknown
https://ocsp.quovadisoffshore.com
unknown
https://repo1.maven.org/maven2/org/xerial/sqlite-jdbc/3.14.2.1/sqlite-jdbc-3.14.2.1.jar
unknown
http://crl.securetrust.com/STCA.crl0
unknown
http://www.quovadisglobal.com/cps
unknown
http://cps.chambersign.org/cps/chambersroot.html
unknown
http://crl.securetrust.com/STCA.crl
unknown
https://repo1.maven.org
unknown
https://repository.luxtrust.lu
unknown
http://www.quovadisglobal.com/cps0
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
http://www.quovadis.bm
unknown
http://www.quovadis.bm0
unknown
https://ocsp.quovadisoffshore.com0
unknown
http://www.allatori.com
unknown
http://crl.chambersign.org/chambersroot.crl
unknown
http://repository.swisssign.com/
unknown
http://www.chambersign.org
unknown
https://github.com/kristian/system-hook/releases/download/3.5/system-hook-3.5.jar
unknown
http://policy.camerfirma.com0
unknown
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
github.com
140.82.121.4
dualstack.sonatype.map.fastly.net
199.232.192.209
repo1.maven.org
unknown

IPs

IP
Domain
Country
Malicious
199.232.192.209
dualstack.sonatype.map.fastly.net
United States
140.82.121.3
unknown
United States
140.82.121.4
github.com
United States
199.232.196.209
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
9B95000
trusted library allocation
page read and write
malicious
237A8D65000
heap
page read and write
malicious
9B63000
trusted library allocation
page read and write
malicious
9B69000
trusted library allocation
page read and write
malicious
A2F3000
trusted library allocation
page read and write
237A8E50000
heap
page read and write
237A6CC3000
heap
page read and write
237A8BEA000
heap
page read and write
237A8E5A000
heap
page read and write
47CB000
trusted library allocation
page read and write
237A8E50000
heap
page read and write
9CFC000
trusted library allocation
page read and write
237A8E6B000
heap
page read and write
499A000
trusted library allocation
page read and write
A0A9000
trusted library allocation
page read and write
1508D000
stack
page read and write
237A8DD8000
heap
page read and write
237A8E5B000
heap
page read and write
49BF000
trusted library allocation
page read and write
237A8BD9000
heap
page read and write
4B3B000
trusted library allocation
page read and write
237A8DEE000
heap
page read and write
A064000
trusted library allocation
page read and write
4AE8000
trusted library allocation
page read and write
237A8E50000
heap
page read and write
237A8E5A000
heap
page read and write
A12F000
trusted library allocation
page read and write
469D000
trusted library allocation
page read and write
9F7D000
trusted library allocation
page read and write
237A8E50000
heap
page read and write
A7E000
stack
page read and write
A00D000
trusted library allocation
page read and write
A2D9000
trusted library allocation
page read and write
14D01000
heap
page read and write
237A8E98000
heap
page read and write
9F63000
trusted library allocation
page read and write
B3F000
stack
page read and write
237A8A41000
heap
page read and write
4AAF000
trusted library allocation
page read and write
237A8F73000
heap
page read and write
A198000
trusted library allocation
page read and write
9CCC000
trusted library allocation
page read and write
A0DA000
trusted library allocation
page read and write
A098000
trusted library allocation
page read and write
151D5000
heap
page read and write
2468000
unkown
page read and write
1555C000
stack
page read and write
237A8E6B000
heap
page read and write
A1D6000
trusted library allocation
page read and write
A0A3000
trusted library allocation
page read and write
A086000
trusted library allocation
page read and write
237A8E50000
heap
page read and write
237A8E5A000
heap
page read and write
9F09000
trusted library allocation
page read and write
237A8A41000
heap
page read and write
9F91000
trusted library allocation
page read and write
4A77000
trusted library allocation
page read and write
237A8E5A000
heap
page read and write
161BF000
stack
page read and write
9F97000
trusted library allocation
page read and write
237A8E63000
heap
page read and write
237A6D58000
heap
page read and write
9DAE000
trusted library allocation
page read and write
8D0000
heap
page read and write
4824000
trusted library allocation
page read and write
156C8000
unkown
page read and write
237A8E33000
heap
page read and write
4891000
trusted library allocation
page read and write
A1D3000
trusted library allocation
page read and write
2FC0000
heap
page read and write
A09B000
trusted library allocation
page read and write
9F60000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
4A72000
trusted library allocation
page read and write
48CB000
trusted library allocation
page read and write
237A8E50000
heap
page read and write
A0E0000
trusted library allocation
page read and write
A089000
trusted library allocation
page read and write
237A8E63000
heap
page read and write
4993000
trusted library allocation
page read and write
A204000
trusted library allocation
page read and write
9F32000
trusted library allocation
page read and write
237A8E32000
heap
page read and write
A191000
trusted library allocation
page read and write
1524B000
heap
page read and write
8D5000
heap
page read and write
237A8E54000
heap
page read and write
237A8BCA000
heap
page read and write
1515B000
heap
page read and write
15EA0000
trusted library allocation
page read and write
800000
heap
page read and write
9D03000
trusted library allocation
page read and write
237A8D63000
heap
page read and write
237A8D65000
heap
page read and write
9DB2000
trusted library allocation
page read and write
237A8E41000
heap
page read and write
5657BFE000
stack
page read and write
14D4A000
heap
page read and write
15144000
heap
page read and write
A236000
trusted library allocation
page read and write
237A8E98000
heap
page read and write
9DB0000
trusted library allocation
page read and write
237A8D3C000
heap
page read and write
960000
heap
page read and write
A16E000
trusted library allocation
page read and write
9F2B000
trusted library allocation
page read and write
237A8A30000
heap
page read and write
46AB000
trusted library allocation
page read and write
A2C2000
trusted library allocation
page read and write
237A8DE7000
heap
page read and write
A14B000
trusted library allocation
page read and write
4AEA000
trusted library allocation
page read and write
237A8AC0000
heap
page read and write
237A8E5A000
heap
page read and write
15283000
heap
page read and write
15144000
heap
page read and write
237A8D58000
heap
page read and write
1570D000
stack
page read and write
237A8E67000
heap
page read and write
237A8E41000
heap
page read and write
237A8E63000
heap
page read and write
15FE8000
trusted library allocation
page read and write
237A8A33000
heap
page read and write
237A8D53000
heap
page read and write
A1CE000
trusted library allocation
page read and write
A056000
trusted library allocation
page read and write
A1D1000
trusted library allocation
page read and write
237A8E4F000
heap
page read and write
4B34000
trusted library allocation
page read and write
237A8E54000
heap
page read and write
237A8E30000
heap
page read and write
15FA0000
trusted library allocation
page read and write
5657FFE000
stack
page read and write
237A8A41000
heap
page read and write
237A8E50000
heap
page read and write
237A8BD9000
heap
page read and write
237A8E5A000
heap
page read and write
237A8CD8000
heap
page read and write
9CA3000
trusted library allocation
page read and write
237A6D7E000
heap
page read and write
14A6C000
heap
page read and write
14D09000
heap
page read and write
237A8A31000
heap
page read and write
15FD0000
trusted library allocation
page read and write
237A8E5A000
heap
page read and write
A139000
trusted library allocation
page read and write
237A8E54000
heap
page read and write
1515B000
heap
page read and write
A21D000
trusted library allocation
page read and write
237A8E63000
heap
page read and write
9F3F000
trusted library allocation
page read and write
237A8DD8000
heap
page read and write
A1C2000
trusted library allocation
page read and write
237A8E3B000
heap
page read and write
4A6D000
trusted library allocation
page read and write
46D1000
trusted library allocation
page read and write
237A99A1000
heap
page read and write
237A8E6B000
heap
page read and write
237A8E41000
heap
page read and write
4849000
trusted library allocation
page read and write
1563A000
unkown
page read and write
237A8E50000
heap
page read and write
237A8E54000
heap
page read and write
237A8E54000
heap
page read and write
237A8E50000
heap
page read and write
237A8BC9000
heap
page read and write
237A8DEE000
heap
page read and write
A005000
trusted library allocation
page read and write
A2E5000
trusted library allocation
page read and write
3290000
heap
page read and write
237A8E5A000
heap
page read and write
237A8E6A000
heap
page read and write
9F8000
heap
page read and write
237A8F72000
heap
page read and write
237A8AC0000
heap
page read and write
2506000
trusted library allocation
page execute and read and write
480F000
trusted library allocation
page read and write
481F000
trusted library allocation
page read and write
9F68000
trusted library allocation
page read and write
237A8C31000
heap
page read and write
237A8D53000
heap
page read and write
237A8E5A000
heap
page read and write
ABF000
stack
page read and write
237A6D53000
heap
page read and write
14D4A000
heap
page read and write
4470000
trusted library allocation
page read and write
A2DC000
trusted library allocation
page read and write
A1DC000
trusted library allocation
page read and write
48BB000
trusted library allocation
page read and write
A282000
trusted library allocation
page read and write
1521A000
heap
page read and write
9F3B000
trusted library allocation
page read and write
A24D000
trusted library allocation
page read and write
4B26000
trusted library allocation
page read and write
237A8E74000
heap
page read and write
47D6000
trusted library allocation
page read and write
237A8BCF000
heap
page read and write
9F55000
trusted library allocation
page read and write
47D0000
trusted library allocation
page read and write
237A8E63000
heap
page read and write
A2EA000
trusted library allocation
page read and write
494B000
trusted library allocation
page read and write
237A8BB0000
heap
page read and write
9F22000
trusted library allocation
page read and write
237A8E54000
heap
page read and write
2472000
trusted library allocation
page execute and read and write
237A8E41000
heap
page read and write
237A8A36000
heap
page read and write
A18A000
trusted library allocation
page read and write
237A8E98000
heap
page read and write
150E0000
heap
page read and write
237A8E5B000
heap
page read and write
237A8E54000
heap
page read and write
237A8E5A000
heap
page read and write
A167000
trusted library allocation
page read and write
A2F0000
trusted library allocation
page read and write
237A8BB0000
heap
page read and write
15214000
heap
page read and write
237A8E63000
heap
page read and write
237A8DD8000
heap
page read and write
4985000
trusted library allocation
page read and write
237A6D6E000
heap
page read and write
237A6D7E000
heap
page read and write
5657AFE000
stack
page read and write
150EC000
heap
page read and write
237A8CD7000
heap
page read and write
237A8E98000
heap
page read and write
A017000
trusted library allocation
page read and write
237A8E63000
heap
page read and write
9D09000
trusted library allocation
page read and write
237A8E5A000
heap
page read and write
237A8E63000
heap
page read and write
241D000
stack
page read and write
A2B3000
trusted library allocation
page read and write
237A95A0000
trusted library allocation
page read and write
9F35000
trusted library allocation
page read and write
9D14000
trusted library allocation
page read and write
237A8DCB000
heap
page read and write
237A8E63000
heap
page read and write
4580000
trusted library allocation
page read and write
1612F000
stack
page read and write
237A8E74000
heap
page read and write
237A8E50000
heap
page read and write
237A8A35000
heap
page read and write
A2D6000
trusted library allocation
page read and write
237A8E63000
heap
page read and write
15AC0000
heap
page read and write
54C000
stack
page read and write
237A8E63000
heap
page read and write
14D38000
heap
page read and write
A2BA000
trusted library allocation
page read and write
2FC8000
heap
page read and write
15AA0000
heap
page read and write
9F0C000
trusted library allocation
page read and write
56582FD000
stack
page read and write
4A8F000
trusted library allocation
page read and write
A2A5000
trusted library allocation
page read and write
14600000
trusted library allocation
page read and write
237A8E98000
heap
page read and write
237A8E6B000
heap
page read and write
A110000
trusted library allocation
page read and write
237A8E54000
heap
page read and write
A095000
trusted library allocation
page read and write
1525B000
heap
page read and write
237A8E63000
heap
page read and write
471C000
trusted library allocation
page read and write
237A8E70000
heap
page read and write
237A8E75000
heap
page read and write
237A8E41000
heap
page read and write
9F1A000
trusted library allocation
page read and write
237A6D6E000
heap
page read and write
A1CB000
trusted library allocation
page read and write
A2E2000
trusted library allocation
page read and write
237A8E54000
heap
page read and write
237A8E69000
heap
page read and write
9BFA000
trusted library allocation
page read and write
155ED000
stack
page read and write
237A8E50000
heap
page read and write
237A8E98000
heap
page read and write
237A9590000
heap
page read and write
A0AF000
trusted library allocation
page read and write
237A8E66000
heap
page read and write
A1C5000
trusted library allocation
page read and write
9DAC000
trusted library allocation
page read and write
237A8E54000
heap
page read and write
237A6D7E000
heap
page read and write
9F11000
trusted library allocation
page read and write
237A8E63000
heap
page read and write
237A8D35000
heap
page read and write
9CB9000
trusted library allocation
page read and write
9F13000
trusted library allocation
page read and write
14EDD000
stack
page read and write
59C000
stack
page read and write
237A8E41000
heap
page read and write
237A85F0000
heap
page read and write
237A8E41000
heap
page read and write
237A8E55000
heap
page read and write
15AD0000
heap
page read and write
237A8BA2000
heap
page read and write
150DE000
stack
page read and write
237A9090000
heap
page read and write
8AD000
stack
page read and write
237A8E98000
heap
page read and write
237A8E63000
heap
page read and write
A144000
trusted library allocation
page read and write
A2D3000
trusted library allocation
page read and write
237A8E37000
heap
page read and write
4B08000
trusted library allocation
page read and write
237A8E50000
heap
page read and write
4A66000
trusted library allocation
page read and write
4B2D000
trusted library allocation
page read and write
4B1F000
trusted library allocation
page read and write
237A8DCB000
heap
page read and write
237A8E54000
heap
page read and write
9EF7000
trusted library allocation
page read and write
A092000
trusted library allocation
page read and write
A1A8000
trusted library allocation
page read and write
A217000
trusted library allocation
page read and write
14C0E000
unkown
page read and write
237A8E5F000
heap
page read and write
237A8BC9000
heap
page read and write
A07E000
trusted library allocation
page read and write
BA0000
heap
page read and write
A015000
trusted library allocation
page read and write
9C04000
trusted library allocation
page read and write
5657DFE000
stack
page read and write
237A8E5A000
heap
page read and write
237A8E6F000
heap
page read and write
237A8E50000
heap
page read and write
A183000
trusted library allocation
page read and write
237A8E09000
heap
page read and write
A04F000
trusted library allocation
page read and write
A0D4000
trusted library allocation
page read and write
A0F3000
trusted library allocation
page read and write
A1C8000
trusted library allocation
page read and write
4955000
trusted library allocation
page read and write
15ACD000
heap
page read and write
237A8BED000
heap
page read and write
24AE000
trusted library allocation
page execute and read and write
4940000
trusted library allocation
page read and write
237A6C87000
heap
page read and write
237A91C0000
heap
page read and write
4A75000
trusted library allocation
page read and write
237A8E54000
heap
page read and write
237A8E98000
heap
page read and write
237A8E60000
heap
page read and write
237A8F71000
heap
page read and write
2514000
trusted library allocation
page execute and read and write
237A8F73000
heap
page read and write
14F2E000
unkown
page read and write
237A8D65000
heap
page read and write
237A8A41000
heap
page read and write
237A8E6F000
heap
page read and write
237A8E70000
heap
page read and write
237A9340000
heap
page read and write
A0E6000
trusted library allocation
page read and write
A06000
heap
page read and write
4A3B000
trusted library allocation
page read and write
2FD9000
heap
page read and write
A2FE000
trusted library allocation
page read and write
160DE000
stack
page read and write
A0AC000
trusted library allocation
page read and write
237A8D77000
heap
page read and write
15AFB000
heap
page read and write
14C50000
heap
page read and write
24C3000
trusted library allocation
page execute and read and write
15B0E000
heap
page read and write
A1D9000
trusted library allocation
page read and write
A12A000
trusted library allocation
page read and write
15283000
heap
page read and write
920000
heap
page read and write
237A6D49000
heap
page read and write
1616E000
stack
page read and write
15243000
heap
page read and write
14A9D000
stack
page read and write
14B7E000
unkown
page read and write
1517C000
heap
page read and write
237A8D35000
heap
page read and write
A08C000
trusted library allocation
page read and write
A160000
trusted library allocation
page read and write
56577A6000
stack
page read and write
48D4000
trusted library allocation
page read and write
14AEE000
stack
page read and write
237A8D65000
heap
page read and write
A09D000
trusted library allocation
page read and write
56577A1000
stack
page read and write
4715000
trusted library allocation
page read and write
237A8E41000
heap
page read and write
48DB000
trusted library allocation
page read and write
A033000
trusted library allocation
page read and write
4A34000
trusted library allocation
page read and write
237A6D47000
heap
page read and write
9F6E000
trusted library allocation
page read and write
237A8E5A000
heap
page read and write
8ED000
stack
page read and write
237A8E57000
heap
page read and write
A0FF000
trusted library allocation
page read and write
4ACB000
trusted library allocation
page read and write
AFE000
stack
page read and write
A03A000
trusted library allocation
page read and write
237A8E98000
heap
page read and write
14D31000
heap
page read and write
A2D1000
trusted library allocation
page read and write
237A8D77000
heap
page read and write
2470000
trusted library allocation
page execute and read and write
237A8BCE000
heap
page read and write
237A8E63000
heap
page read and write
A1AE000
trusted library allocation
page read and write
237A6D7E000
heap
page read and write
237A8C2E000
heap
page read and write
237A8D5F000
heap
page read and write
9F79000
trusted library allocation
page read and write
237A8BA0000
heap
page read and write
237A6CAF000
heap
page read and write
15759000
unkown
page read and write
237A8E6B000
heap
page read and write
237A8E63000
heap
page read and write
A159000
trusted library allocation
page read and write
A27B000
trusted library allocation
page read and write
237A8E63000
heap
page read and write
A274000
trusted library allocation
page read and write
A1FE000
trusted library allocation
page read and write
237A6CA9000
heap
page read and write
237A99E5000
heap
page read and write
237A6F70000
heap
page read and write
237A8E98000
heap
page read and write
237A8E31000
heap
page read and write
237A8E63000
heap
page read and write
A1E2000
trusted library allocation
page read and write
4ADD000
trusted library allocation
page read and write
4B49000
trusted library allocation
page read and write
468A000
trusted library allocation
page read and write
1525B000
heap
page read and write
4945000
trusted library allocation
page read and write
237A6D7E000
heap
page read and write
15186000
heap
page read and write
237A8E5A000
heap
page read and write
9ED7000
trusted library allocation
page read and write
237A6C80000
heap
page read and write
481D000
trusted library allocation
page read and write
9B99000
trusted library allocation
page read and write
24AA000
trusted library allocation
page execute and read and write
9C11000
trusted library allocation
page read and write
237A8D3C000
heap
page read and write
14BBC000
stack
page read and write
A2F6000
trusted library allocation
page read and write
1504E000
unkown
page read and write
237A8E50000
heap
page read and write
237A8E50000
heap
page read and write
237A6CAA000
heap
page read and write
237A8B31000
heap
page read and write
A29E000
trusted library allocation
page read and write
237A8E55000
heap
page read and write
A048000
trusted library allocation
page read and write
A0A6000
trusted library allocation
page read and write
237A8E63000
heap
page read and write
A0B4000
trusted library allocation
page read and write
15214000
heap
page read and write
478A000
trusted library allocation
page read and write
237A8BD7000
heap
page read and write
237A8DEE000
heap
page read and write
A2AC000
trusted library allocation
page read and write
1518B000
heap
page read and write
237A8E63000
heap
page read and write
A265000
trusted library allocation
page read and write
237A8DD8000
heap
page read and write
4AA0000
trusted library allocation
page read and write
14E9E000
unkown
page read and write
A223000
trusted library allocation
page read and write
A07B000
trusted library allocation
page read and write
237A8DE7000
heap
page read and write
56580FF000
stack
page read and write
9CEC000
trusted library allocation
page read and write
14CB5000
heap
page read and write
237A8D65000
heap
page read and write
237A6CAA000
heap
page read and write
1515B000
heap
page read and write
4ACE000
trusted library allocation
page read and write
A1DF000
trusted library allocation
page read and write
237A8BD8000
heap
page read and write
9F4E000
trusted library allocation
page read and write
237A8E54000
heap
page read and write
237A9080000
heap
page read and write
4979000
trusted library allocation
page read and write
237A99A0000
heap
page read and write
237A6D71000
heap
page read and write
237A6CB0000
heap
page read and write
14FFD000
stack
page read and write
237A8BD3000
heap
page read and write
237A8A3B000
heap
page read and write
237A8A34000
heap
page read and write
237A8E50000
heap
page read and write
237A8E54000
heap
page read and write
237A8E5A000
heap
page read and write
237A8BDB000
heap
page read and write
A08F000
trusted library allocation
page read and write
A1AB000
trusted library allocation
page read and write
237A6D68000
heap
page read and write
237A8E55000
heap
page read and write
A261000
trusted library allocation
page read and write
237A8E5A000
heap
page read and write
237A8E3E000
heap
page read and write
A2CE000
trusted library allocation
page read and write
5657EFF000
stack
page read and write
9C27000
trusted library allocation
page read and write
155A9000
unkown
page read and write
A0B2000
trusted library allocation
page read and write
A304000
trusted library allocation
page read and write
14C4D000
stack
page read and write
14B2D000
stack
page read and write
237A8E74000
heap
page read and write
4ABD000
trusted library allocation
page read and write
A1BC000
trusted library allocation
page read and write
237A8E41000
heap
page read and write
237A6D48000
heap
page read and write
B40000
heap
page read and write
A175000
trusted library allocation
page read and write
237A8E50000
heap
page read and write
237A8DB5000
heap
page read and write
237A8E5A000
heap
page read and write
4AC4000
trusted library allocation
page read and write
237A8BA0000
heap
page read and write
237A8AC0000
heap
page read and write
237A8E41000
heap
page read and write
237A8D39000
heap
page read and write
9F2E000
trusted library allocation
page read and write
14F6D000
stack
page read and write
A1B4000
trusted library allocation
page read and write
9C0B000
trusted library allocation
page read and write
A2E8000
trusted library allocation
page read and write
237A8BCE000
heap
page read and write
15AEB000
heap
page read and write
237A8DE7000
heap
page read and write
56581FE000
stack
page read and write
4AD3000
trusted library allocation
page read and write
4AB6000
trusted library allocation
page read and write
4B4C000
trusted library allocation
page read and write
237A8E54000
heap
page read and write
A041000
trusted library allocation
page read and write
237A8A32000
heap
page read and write
9F02000
trusted library allocation
page read and write
237A8E34000
heap
page read and write
A17C000
trusted library allocation
page read and write
237A8E5A000
heap
page read and write
A05D000
trusted library allocation
page read and write
A0A0000
trusted library allocation
page read and write
A20A000
trusted library allocation
page read and write
237A8BA2000
heap
page read and write
9CF2000
trusted library allocation
page read and write
4606000
trusted library allocation
page read and write
498C000
trusted library allocation
page read and write
237A8E41000
heap
page read and write
237A99E5000
heap
page read and write
237A8E41000
heap
page read and write
237A8E41000
heap
page read and write
A210000
trusted library allocation
page read and write
1510D000
heap
page read and write
8A0000
heap
page read and write
4697000
trusted library allocation
page read and write
A297000
trusted library allocation
page read and write
A084000
trusted library allocation
page read and write
237A8B30000
heap
page read and write
237A6F75000
heap
page read and write
237A8E63000
heap
page read and write
237A8A3A000
heap
page read and write
237A8E41000
heap
page read and write
9F95000
trusted library allocation
page read and write
237A8E41000
heap
page read and write
151D5000
heap
page read and write
237A8D33000
heap
page read and write
15420000
trusted library allocation
page read and write
237A6D50000
heap
page read and write
237A6D80000
heap
page read and write
237A8E54000
heap
page read and write
237A6D72000
heap
page read and write
4751000
trusted library allocation
page read and write
4B42000
trusted library allocation
page read and write
9F0000
heap
page read and write
237A8E50000
heap
page read and write
237A8A41000
heap
page read and write
9F72000
trusted library allocation
page read and write
237A9DA1000
heap
page read and write
A136000
trusted library allocation
page read and write
15B02000
heap
page read and write
A081000
trusted library allocation
page read and write
15214000
heap
page read and write
237A8BE8000
heap
page read and write
237A8D53000
heap
page read and write
4765000
trusted library allocation
page read and write
237A8E5A000
heap
page read and write
B80000
heap
page read and write
A252000
trusted library allocation
page read and write
24B2000
trusted library allocation
page execute and read and write
237A8BE1000
heap
page read and write
237A6D6A000
heap
page read and write
9F88000
trusted library allocation
page read and write
237A8D76000
heap
page read and write
237A8E41000
heap
page read and write
14D4A000
heap
page read and write
237A8E70000
heap
page read and write
56584FB000
stack
page read and write
237A6CAB000
heap
page read and write
237A8C30000
heap
page read and write
15B0E000
heap
page read and write
237A6C60000
heap
page read and write
237A8D37000
heap
page read and write
237A8E75000
heap
page read and write
4A4E000
trusted library allocation
page read and write
237A6D6E000
heap
page read and write
237A8E54000
heap
page read and write
237A6CAC000
heap
page read and write
A2DF000
trusted library allocation
page read and write
A289000
trusted library allocation
page read and write
A2FC000
trusted library allocation
page read and write
486A000
trusted library allocation
page read and write
237A93C0000
heap
page read and write
237A8DE6000
heap
page read and write
A2CB000
trusted library allocation
page read and write
4745000
trusted library allocation
page read and write
A1BA000
trusted library allocation
page read and write
237A9180000
heap
page read and write
A19F000
trusted library allocation
page read and write
9CAD000
trusted library allocation
page read and write
15470000
trusted library allocation
page read and write
4816000
trusted library allocation
page read and write
9F81000
trusted library allocation
page read and write
4A5E000
trusted library allocation
page read and write
237A8DE7000
heap
page read and write
237A8E54000
heap
page read and write
A1B7000
trusted library allocation
page read and write
237A8E3A000
heap
page read and write
4900000
trusted library allocation
page read and write
4758000
trusted library allocation
page read and write
237A8E6B000
heap
page read and write
150E1000
heap
page read and write
237A8D34000
heap
page read and write
24BB000
trusted library allocation
page execute and read and write
237A8E5A000
heap
page read and write
237A8E41000
heap
page read and write
4987000
trusted library allocation
page read and write
14D4B000
heap
page read and write
A1BF000
trusted library allocation
page read and write
A06B000
trusted library allocation
page read and write
151D5000
heap
page read and write
AA3000
heap
page read and write
237A8C2E000
heap
page read and write
237A8A41000
heap
page read and write
14CC0000
heap
page read and write
A1B1000
trusted library allocation
page read and write
4995000
trusted library allocation
page read and write
15200000
heap
page read and write
A26E000
trusted library allocation
page read and write
237A8E50000
heap
page read and write
A2ED000
trusted library allocation
page read and write
237A8BD8000
heap
page read and write
237A9DA0000
heap
page read and write
237A8E54000
heap
page read and write
A259000
trusted library allocation
page read and write
1517C000
heap
page read and write
237A6D51000
heap
page read and write
237A93D0000
heap
page read and write
A290000
trusted library allocation
page read and write
237A6B80000
heap
page read and write
237A8BD5000
heap
page read and write
237A8E54000
heap
page read and write
237A8DE7000
heap
page read and write
237A8CD7000
heap
page read and write
237A8DEE000
heap
page read and write
A0F9000
trusted library allocation
page read and write
1567D000
stack
page read and write
14FBD000
unkown
page read and write
9E0000
unkown
page read and write
9F4A000
trusted library allocation
page read and write
237A8E3F000
heap
page read and write
237A8E57000
heap
page read and write
4B4F000
trusted library allocation
page read and write
237A8B9D000
heap
page read and write
237A9E2A000
heap
page read and write
A152000
trusted library allocation
page read and write
A025000
trusted library allocation
page read and write
A072000
trusted library allocation
page read and write
237A6D44000
heap
page read and write
A301000
trusted library allocation
page read and write
237A6D7E000
heap
page read and write
237A8E41000
heap
page read and write
4A44000
trusted library allocation
page read and write
237A8D36000
heap
page read and write
A263000
trusted library allocation
page read and write
4803000
trusted library allocation
page read and write
14D4A000
heap
page read and write
237A8E54000
heap
page read and write
A01E000
trusted library allocation
page read and write
237A8E61000
heap
page read and write
4811000
trusted library allocation
page read and write
4A0C000
trusted library allocation
page read and write
4AA8000
trusted library allocation
page read and write
A0ED000
trusted library allocation
page read and write
237A8AC5000
heap
page read and write
237A8DD8000
heap
page read and write
237A8C10000
heap
page read and write
4AE4000
trusted library allocation
page read and write
237A8E6B000
heap
page read and write
237A6D30000
heap
page read and write
250D000
trusted library allocation
page execute and read and write
9F46000
trusted library allocation
page read and write
A2F9000
trusted library allocation
page read and write
A02C000
trusted library allocation
page read and write
150F1000
heap
page read and write
There are 698 hidden memdumps, click here to show them.