IOC Report
Request For Quotation.js

loading gif

Files

File Path
Type
Category
Malicious
Request For Quotation.js
ASCII text, with very long lines (64538)
initial sample
malicious
C:\Users\user\AppData\Roaming\bszhidta.txt
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\ProgramData\Oracle\Java\.oracle_jre_usage\b5820291038aa69c.timestamp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\3300
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\83aa4cc77f591dfc2374580bbd95f6ba_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Request For Quotation.js"
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
"C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\bszhidta.txt"
malicious
C:\Windows\SysWOW64\icacls.exe
C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://wshsoft.company/jv/jrex.zip
unknown
malicious
http://crl.xrampsecurity.com/XGCA.crl
unknown
https://repo1.maven.org/maven2/net/java/dev/jna/jna-platform/5.5.0/jna-platform-5.5.0.jar
unknown
http://crl.chambersign.org/chambersroot.crl0
unknown
https://github.com
unknown
https://repository.luxtrust.lu0
unknown
http://bugreport.sun.com/bugreport/
unknown
http://cps.chambersign.org/cps/chambersroot.html0
unknown
http://java.oracle.com/
unknown
http://null.oracle.com/
unknown
http://www.chambersign.org1
unknown
http://repository.swisssign.com/0
unknown
https://repo1.maven.org/maven2/net/java/dev/jna/jna/5.5.0/jna-5.5.0.jar
unknown
http://policy.camerfirma.com
unknown
https://repo1.maven.org/maven2/org/xerial/sqlite-jdbc/
unknown
http://wshsoft.company/jv/jrex.zipleB
unknown
https://ocsp.quovadisoffshore.com
unknown
https://repo1.maven.org/maven2/org/xerial/sqlite-jdbc/3.14.2.1/sqlite-jdbc-3.14.2.1.jar
unknown
http://crl.securetrust.com/STCA.crl0
unknown
http://www.quovadisglobal.com/cps
unknown
http://cps.chambersign.org/cps/chambersroot.html
unknown
http://crl.securetrust.com/STCA.crl
unknown
https://repo1.maven.org
unknown
https://repository.luxtrust.lu
unknown
http://www.quovadisglobal.com/cps0
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
http://www.quovadis.bm
unknown
http://www.quovadis.bm0
unknown
https://github.com/kristian/system-hook/releases/download/3.5/system-hook-3.5.jar.1.jarar
unknown
https://ocsp.quovadisoffshore.com0
unknown
http://www.allatori.com
unknown
http://crl.chambersign.org/chambersroot.crl
unknown
http://repository.swisssign.com/
unknown
http://www.chambersign.org
unknown
https://github.com/kristian/system-hook/releases/download/3.5/system-hook-3.5.jar
unknown
http://policy.camerfirma.com0
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
github.com
140.82.121.3
dualstack.sonatype.map.fastly.net
199.232.192.209
15.164.165.52.in-addr.arpa
unknown
repo1.maven.org
unknown

IPs

IP
Domain
Country
Malicious
199.232.192.209
dualstack.sonatype.map.fastly.net
United States
140.82.121.3
github.com
United States
140.82.121.4
unknown
United States
199.232.196.209
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
9D63000
trusted library allocation
page read and write
malicious
9D95000
trusted library allocation
page read and write
malicious
9D69000
trusted library allocation
page read and write
malicious
14A21E4B000
heap
page read and write
14A21D92000
heap
page read and write
A3C0000
trusted library allocation
page read and write
161D3000
heap
page read and write
A2D3000
trusted library allocation
page read and write
14A1FD21000
heap
page read and write
14A21E56000
heap
page read and write
9EAD000
trusted library allocation
page read and write
14A21E64000
heap
page read and write
14A21FD0000
heap
page read and write
A216000
trusted library allocation
page read and write
27CB000
trusted library allocation
page execute and read and write
14A21E60000
heap
page read and write
14A21E43000
heap
page read and write
14A21E55000
heap
page read and write
15D05000
heap
page read and write
7066FE000
stack
page read and write
A223000
trusted library allocation
page read and write
4CC4000
trusted library allocation
page read and write
14A1FC60000
heap
page read and write
A2A5000
trusted library allocation
page read and write
A367000
trusted library allocation
page read and write
154F3000
heap
page read and write
14A21E6F000
heap
page read and write
1645F000
stack
page read and write
14A1FD21000
heap
page read and write
14A21E74000
heap
page read and write
A270000
trusted library allocation
page read and write
14A21E41000
heap
page read and write
14A21E41000
heap
page read and write
A3D1000
trusted library allocation
page read and write
A4DA000
trusted library allocation
page read and write
A10C000
trusted library allocation
page read and write
A2B7000
trusted library allocation
page read and write
A22A000
trusted library allocation
page read and write
14A21E60000
heap
page read and write
A16B000
trusted library allocation
page read and write
14A21DF1000
heap
page read and write
4B7B000
trusted library allocation
page read and write
4CBD000
trusted library allocation
page read and write
15384000
heap
page read and write
14A21E27000
heap
page read and write
14A21E60000
heap
page read and write
2782000
trusted library allocation
page execute and read and write
A152000
trusted library allocation
page read and write
14A21C0E000
heap
page read and write
4CA8000
trusted library allocation
page read and write
14A21C11000
heap
page read and write
14F40000
heap
page read and write
4BC4000
trusted library allocation
page read and write
A4CF000
trusted library allocation
page read and write
14A22380000
heap
page read and write
14A21E12000
heap
page read and write
14A1FD42000
heap
page read and write
14A1FD4D000
heap
page read and write
14A21D3B000
heap
page read and write
A4E6000
trusted library allocation
page read and write
14A21E51000
heap
page read and write
4A4F000
trusted library allocation
page read and write
4809000
trusted library allocation
page read and write
A254000
trusted library allocation
page read and write
9F09000
trusted library allocation
page read and write
2D4E000
stack
page read and write
A140000
trusted library allocation
page read and write
14A21E29000
heap
page read and write
4D15000
trusted library allocation
page read and write
14A21E46000
heap
page read and write
14A1FD5D000
heap
page read and write
A269000
trusted library allocation
page read and write
14A21E3F000
heap
page read and write
14A21A1F000
heap
page read and write
14A1FC00000
heap
page read and write
A36E000
trusted library allocation
page read and write
15D32000
heap
page read and write
14A21E70000
heap
page read and write
156A0000
trusted library allocation
page read and write
A3C8000
trusted library allocation
page read and write
154EE000
heap
page read and write
2D00000
heap
page read and write
14A21D92000
heap
page read and write
A325000
trusted library allocation
page read and write
14A21E74000
heap
page read and write
14A1FC35000
heap
page read and write
14A21E59000
heap
page read and write
C70000
heap
page read and write
14A21E74000
heap
page read and write
14A21E60000
heap
page read and write
2D90000
heap
page read and write
2C9D000
stack
page read and write
4A2C000
trusted library allocation
page read and write
DC8000
heap
page read and write
A4E9000
trusted library allocation
page read and write
1649E000
stack
page read and write
15D38000
heap
page read and write
14A21E74000
heap
page read and write
A422000
trusted library allocation
page read and write
14A21A90000
heap
page read and write
14A1FCA2000
heap
page read and write
4C9A000
trusted library allocation
page read and write
14A21DF3000
heap
page read and write
A3D4000
trusted library allocation
page read and write
14A21E51000
heap
page read and write
14FC5000
heap
page read and write
15394000
heap
page read and write
14A21E15000
heap
page read and write
A360000
trusted library allocation
page read and write
A19B000
trusted library allocation
page read and write
14A21E51000
heap
page read and write
A28C000
trusted library allocation
page read and write
15D24000
heap
page read and write
15988000
unkown
page read and write
A469000
trusted library allocation
page read and write
A3BA000
trusted library allocation
page read and write
27C2000
trusted library allocation
page execute and read and write
A4E3000
trusted library allocation
page read and write
4A3B000
trusted library allocation
page read and write
14A21FD0000
heap
page read and write
14A21E49000
heap
page read and write
14A21E5C000
heap
page read and write
15310000
heap
page read and write
A3F6000
trusted library allocation
page read and write
4D1C000
trusted library allocation
page read and write
14890000
trusted library allocation
page read and write
14A21E63000
heap
page read and write
14A21E60000
heap
page read and write
153FC000
heap
page read and write
4AEA000
trusted library allocation
page read and write
14A21E31000
heap
page read and write
A2AE000
trusted library allocation
page read and write
14A21BA4000
heap
page read and write
14A21E41000
heap
page read and write
1546B000
heap
page read and write
1530E000
stack
page read and write
14A21C0B000
heap
page read and write
14A21E31000
heap
page read and write
15385000
heap
page read and write
14A21E63000
heap
page read and write
14A22970000
heap
page read and write
14A21E4D000
heap
page read and write
7AC000
stack
page read and write
D70000
heap
page read and write
14A21C0C000
heap
page read and write
4D01000
trusted library allocation
page read and write
A39D000
trusted library allocation
page read and write
14A21E11000
heap
page read and write
154F3000
heap
page read and write
14FCC000
heap
page read and write
F40000
trusted library allocation
page read and write
A280000
trusted library allocation
page read and write
4BB6000
trusted library allocation
page read and write
14A21E59000
heap
page read and write
E73000
heap
page read and write
4C8B000
trusted library allocation
page read and write
14A1FD5D000
heap
page read and write
14A21BB1000
heap
page read and write
14A21DF3000
heap
page read and write
4AE5000
trusted library allocation
page read and write
9EB9000
trusted library allocation
page read and write
14A1FD5D000
heap
page read and write
4CAF000
trusted library allocation
page read and write
14A223D0000
trusted library allocation
page read and write
14A21E63000
heap
page read and write
154EE000
heap
page read and write
49FE000
trusted library allocation
page read and write
14A21A16000
heap
page read and write
A3CE000
trusted library allocation
page read and write
1581D000
stack
page read and write
1522D000
stack
page read and write
14A21D2F000
heap
page read and write
14A21E63000
heap
page read and write
14A21BBC000
heap
page read and write
14A21BB0000
heap
page read and write
14A21E74000
heap
page read and write
14A21A15000
heap
page read and write
14A1FD4E000
heap
page read and write
4AB8000
trusted library allocation
page read and write
A0D1000
trusted library allocation
page read and write
14A21DDA000
heap
page read and write
A297000
trusted library allocation
page read and write
A3FD000
trusted library allocation
page read and write
14A21E60000
heap
page read and write
A4EC000
trusted library allocation
page read and write
14A21E51000
heap
page read and write
2F98000
heap
page read and write
14A21E1B000
heap
page read and write
4C64000
trusted library allocation
page read and write
A128000
trusted library allocation
page read and write
14A1FD5D000
heap
page read and write
1515E000
unkown
page read and write
14A21D25000
heap
page read and write
14A21E49000
heap
page read and write
A4EE000
trusted library allocation
page read and write
15311000
heap
page read and write
DC0000
heap
page read and write
14A21A11000
heap
page read and write
14A21C10000
heap
page read and write
14A21DDA000
heap
page read and write
14A21AA3000
heap
page read and write
4D2A000
trusted library allocation
page read and write
14A22130000
heap
page read and write
A457000
trusted library allocation
page read and write
C15000
heap
page read and write
1544D000
heap
page read and write
14A227D0000
heap
page read and write
15D38000
heap
page read and write
9F7B000
trusted library allocation
page read and write
14A21E51000
heap
page read and write
A3C2000
trusted library allocation
page read and write
A2B4000
trusted library allocation
page read and write
14A1FD0A000
heap
page read and write
14A21E74000
heap
page read and write
4B04000
trusted library allocation
page read and write
14A21BA3000
heap
page read and write
A262000
trusted library allocation
page read and write
161E6000
heap
page read and write
9E0B000
trusted library allocation
page read and write
14A21E49000
heap
page read and write
A426000
trusted library allocation
page read and write
1544C000
heap
page read and write
14A21E41000
heap
page read and write
A28E000
trusted library allocation
page read and write
A34B000
trusted library allocation
page read and write
14A21E5D000
heap
page read and write
9E22000
trusted library allocation
page read and write
A2EC000
trusted library allocation
page read and write
14A21E51000
heap
page read and write
14A21E4F000
heap
page read and write
9EFC000
trusted library allocation
page read and write
A2A0000
trusted library allocation
page read and write
A38A000
trusted library allocation
page read and write
14A21E74000
heap
page read and write
9EEC000
trusted library allocation
page read and write
A344000
trusted library allocation
page read and write
A3B1000
trusted library allocation
page read and write
14A21CB2000
heap
page read and write
154F3000
heap
page read and write
14A21E51000
heap
page read and write
14A21BAC000
heap
page read and write
DD6000
heap
page read and write
154EE000
heap
page read and write
A148000
trusted library allocation
page read and write
A337000
trusted library allocation
page read and write
A45C000
trusted library allocation
page read and write
A339000
trusted library allocation
page read and write
D48000
unkown
page read and write
A125000
trusted library allocation
page read and write
A4BB000
trusted library allocation
page read and write
14A21B79000
heap
page read and write
7067FF000
stack
page read and write
A285000
trusted library allocation
page read and write
14A21E6F000
heap
page read and write
14A215C0000
heap
page read and write
14A21E64000
heap
page read and write
A29A000
trusted library allocation
page read and write
158AD000
stack
page read and write
14A21D92000
heap
page read and write
4A3D000
trusted library allocation
page read and write
9FAF000
trusted library allocation
page read and write
15463000
heap
page read and write
14A1FBE0000
heap
page read and write
47FD000
stack
page read and write
A2B1000
trusted library allocation
page read and write
16320000
trusted library allocation
page read and write
14A1FD2D000
heap
page read and write
A4DD000
trusted library allocation
page read and write
14A21E41000
heap
page read and write
14A1FCA1000
heap
page read and write
A470000
trusted library allocation
page read and write
14A21E59000
heap
page read and write
161E0000
heap
page read and write
A138000
trusted library allocation
page read and write
14A1FD47000
heap
page read and write
A23F000
trusted library allocation
page read and write
4980000
trusted library allocation
page read and write
153FC000
heap
page read and write
14A21A11000
heap
page read and write
9EF2000
trusted library allocation
page read and write
1574F000
trusted library allocation
page read and write
14A21BE8000
heap
page read and write
706CFB000
stack
page read and write
14A21A12000
heap
page read and write
14A21E51000
heap
page read and write
A477000
trusted library allocation
page read and write
A289000
trusted library allocation
page read and write
14A21BA7000
heap
page read and write
A17B000
trusted library allocation
page read and write
15359000
heap
page read and write
14A21E5C000
heap
page read and write
15384000
heap
page read and write
A2E0000
trusted library allocation
page read and write
A3CB000
trusted library allocation
page read and write
4A42000
trusted library allocation
page read and write
14A1FD4B000
heap
page read and write
A40F000
trusted library allocation
page read and write
7062FE000
stack
page read and write
A2D9000
trusted library allocation
page read and write
14A21D3B000
heap
page read and write
14A21BC6000
heap
page read and write
14A21D92000
heap
page read and write
14A1FD1F000
heap
page read and write
14A21E63000
heap
page read and write
A3AB000
trusted library allocation
page read and write
A4B8000
trusted library allocation
page read and write
14A21E60000
heap
page read and write
1527E000
unkown
page read and write
14A21A10000
heap
page read and write
14A1FD4C000
heap
page read and write
A334000
trusted library allocation
page read and write
14A21E31000
heap
page read and write
A203000
trusted library allocation
page read and write
4CA1000
trusted library allocation
page read and write
A41C000
trusted library allocation
page read and write
A2E6000
trusted library allocation
page read and write
A3C5000
trusted library allocation
page read and write
1544C000
heap
page read and write
A3B4000
trusted library allocation
page read and write
14A21D0D000
heap
page read and write
9ECC000
trusted library allocation
page read and write
14A21CB1000
heap
page read and write
4A25000
trusted library allocation
page read and write
15325000
heap
page read and write
15D38000
heap
page read and write
14A21E49000
heap
page read and write
14A21E49000
heap
page read and write
15384000
heap
page read and write
154F3000
heap
page read and write
14E5D000
stack
page read and write
154EE000
heap
page read and write
14A1FD43000
heap
page read and write
14A21E74000
heap
page read and write
2816000
trusted library allocation
page execute and read and write
4D31000
trusted library allocation
page read and write
154C3000
heap
page read and write
14A21E41000
heap
page read and write
A485000
trusted library allocation
page read and write
15869000
unkown
page read and write
14A1FC89000
heap
page read and write
A4C0000
trusted library allocation
page read and write
A165000
trusted library allocation
page read and write
14A21E74000
heap
page read and write
14A21E14000
heap
page read and write
9EA3000
trusted library allocation
page read and write
14A1FC8E000
heap
page read and write
4944000
trusted library allocation
page read and write
14A1FC30000
heap
page read and write
2F60000
heap
page read and write
A231000
trusted library allocation
page read and write
A238000
trusted library allocation
page read and write
14A1FC8D000
heap
page read and write
A2F8000
trusted library allocation
page read and write
A3A3000
trusted library allocation
page read and write
14A21E70000
heap
page read and write
A0D7000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
A06E000
trusted library allocation
page read and write
14A21C0A000
heap
page read and write
14A220A0000
heap
page read and write
A21C000
trusted library allocation
page read and write
27D3000
trusted library allocation
page execute and read and write
15CF0000
heap
page read and write
14A21E56000
heap
page read and write
14A21E42000
heap
page read and write
14A21CB1000
heap
page read and write
14A221F0000
heap
page read and write
14DCD000
stack
page read and write
14A21E31000
heap
page read and write
152BD000
stack
page read and write
4C7A000
trusted library allocation
page read and write
A4BE000
trusted library allocation
page read and write
14A21A11000
heap
page read and write
A17E000
trusted library allocation
page read and write
14A1FC8A000
heap
page read and write
14A21E41000
heap
page read and write
A60000
heap
page read and write
14A21E18000
heap
page read and write
A321000
trusted library allocation
page read and write
A120000
trusted library allocation
page read and write
D90000
unkown
page read and write
14A21BE8000
heap
page read and write
14A21D8E000
heap
page read and write
A185000
trusted library allocation
page read and write
14A21D3B000
heap
page read and write
14A21BA9000
heap
page read and write
14FA1000
heap
page read and write
14ED0000
heap
page read and write
496E000
trusted library allocation
page read and write
14A21D2F000
heap
page read and write
4A34000
trusted library allocation
page read and write
A2AB000
trusted library allocation
page read and write
48A3000
trusted library allocation
page read and write
14A21E57000
heap
page read and write
A45A000
trusted library allocation
page read and write
A37C000
trusted library allocation
page read and write
14A21E49000
heap
page read and write
14A21E60000
heap
page read and write
14A21E49000
heap
page read and write
14A21A90000
heap
page read and write
A48C000
trusted library allocation
page read and write
C10000
heap
page read and write
14CF4000
heap
page read and write
15D46000
heap
page read and write
14A21E31000
heap
page read and write
A4A8000
trusted library allocation
page read and write
A4E0000
trusted library allocation
page read and write
14A223C0000
heap
page read and write
A2A3000
trusted library allocation
page read and write
14FC5000
heap
page read and write
2780000
trusted library allocation
page execute and read and write
14A21E6F000
heap
page read and write
14A21E60000
heap
page read and write
A197000
trusted library allocation
page read and write
14A21BBA000
heap
page read and write
4CB6000
trusted library allocation
page read and write
15385000
heap
page read and write
A115000
trusted library allocation
page read and write
14A21E5A000
heap
page read and write
14A21E4C000
heap
page read and write
14A21E5C000
heap
page read and write
14A21E6F000
heap
page read and write
14D3E000
stack
page read and write
A24D000
trusted library allocation
page read and write
14A21E2F000
heap
page read and write
15320000
heap
page read and write
14A1FD1E000
heap
page read and write
14A21B10000
heap
page read and write
14A21E31000
heap
page read and write
14A21E24000
heap
page read and write
C90000
heap
page read and write
2D8F000
stack
page read and write
A277000
trusted library allocation
page read and write
14A1FD5D000
heap
page read and write
14A21B11000
heap
page read and write
14A21E1D000
heap
page read and write
4D4D000
trusted library allocation
page read and write
14E1E000
unkown
page read and write
15321000
heap
page read and write
A4F1000
trusted library allocation
page read and write
9F03000
trusted library allocation
page read and write
A391000
trusted library allocation
page read and write
A4D7000
trusted library allocation
page read and write
14A21BA7000
heap
page read and write
9DFA000
trusted library allocation
page read and write
158F9000
unkown
page read and write
14F9A000
heap
page read and write
4C31000
trusted library allocation
page read and write
A294000
trusted library allocation
page read and write
4AE8000
trusted library allocation
page read and write
15493000
heap
page read and write
A493000
trusted library allocation
page read and write
14A21E45000
heap
page read and write
481E000
trusted library allocation
page read and write
157D9000
unkown
page read and write
A3B7000
trusted library allocation
page read and write
A49A000
trusted library allocation
page read and write
14A21E31000
heap
page read and write
A4C6000
trusted library allocation
page read and write
4A29000
trusted library allocation
page read and write
A4C9000
trusted library allocation
page read and write
14A21E70000
heap
page read and write
14A21E51000
heap
page read and write
160D0000
trusted library allocation
page read and write
15328000
heap
page read and write
14A1FD40000
heap
page read and write
A359000
trusted library allocation
page read and write
14A1FD47000
heap
page read and write
4D3F000
trusted library allocation
page read and write
1578C000
stack
page read and write
14A21E74000
heap
page read and write
14A21E74000
heap
page read and write
281D000
trusted library allocation
page execute and read and write
15359000
heap
page read and write
48D7000
trusted library allocation
page read and write
14A21E2A000
heap
page read and write
A4D5000
trusted library allocation
page read and write
151ED000
unkown
page read and write
14A1FD29000
heap
page read and write
14A21E51000
heap
page read and write
164EF000
stack
page read and write
2824000
trusted library allocation
page execute and read and write
14A21F47000
heap
page read and write
154C3000
heap
page read and write
1519D000
stack
page read and write
4AEE000
trusted library allocation
page read and write
4C82000
trusted library allocation
page read and write
4AF5000
trusted library allocation
page read and write
4BBE000
trusted library allocation
page read and write
14A21E12000
heap
page read and write
1593D000
stack
page read and write
A32C000
trusted library allocation
page read and write
153FC000
heap
page read and write
14A21A11000
heap
page read and write
A209000
trusted library allocation
page read and write
A4C3000
trusted library allocation
page read and write
15D46000
heap
page read and write
A0DD000
trusted library allocation
page read and write
14A21E5C000
heap
page read and write
14A21E70000
heap
page read and write
14A21A9E000
heap
page read and write
4823000
trusted library allocation
page read and write
A173000
trusted library allocation
page read and write
A3AE000
trusted library allocation
page read and write
14A21E55000
heap
page read and write
A47E000
trusted library allocation
page read and write
14A21BA3000
heap
page read and write
14FC6000
heap
page read and write
9D50000
trusted library allocation
page read and write
14A21F45000
heap
page read and write
14A21E17000
heap
page read and write
4D38000
trusted library allocation
page read and write
14A21E60000
heap
page read and write
14A21C08000
heap
page read and write
14A21E44000
heap
page read and write
705FD1000
stack
page read and write
4813000
trusted library allocation
page read and write
705FD7000
stack
page read and write
A20F000
trusted library allocation
page read and write
14A21DF3000
heap
page read and write
15384000
heap
page read and write
A283000
trusted library allocation
page read and write
14A21D96000
heap
page read and write
1536D000
heap
page read and write
14A21E56000
heap
page read and write
7068FE000
stack
page read and write
14A21D92000
heap
page read and write
14A21E74000
heap
page read and write
14A21E74000
heap
page read and write
14A21E2B000
heap
page read and write
A4AF000
trusted library allocation
page read and write
7FC000
stack
page read and write
4CCA000
trusted library allocation
page read and write
14EAE000
unkown
page read and write
4970000
trusted library allocation
page read and write
7069FD000
stack
page read and write
A162000
trusted library allocation
page read and write
A0FF000
trusted library allocation
page read and write
A383000
trusted library allocation
page read and write
4CCE000
trusted library allocation
page read and write
15CD0000
heap
page read and write
2DD0000
heap
page read and write
A438000
trusted library allocation
page read and write
7063FE000
stack
page read and write
14A21E51000
heap
page read and write
14A21BB5000
heap
page read and write
A0FA000
trusted library allocation
page read and write
4AF7000
trusted library allocation
page read and write
27BE000
trusted library allocation
page execute and read and write
14A21BEB000
heap
page read and write
A14B000
trusted library allocation
page read and write
14A21E41000
heap
page read and write
A44E000
trusted library allocation
page read and write
7065FE000
stack
page read and write
2F90000
heap
page read and write
4D23000
trusted library allocation
page read and write
A2F2000
trusted library allocation
page read and write
14A21E51000
heap
page read and write
14A21E45000
heap
page read and write
4800000
trusted library allocation
page read and write
A29D000
trusted library allocation
page read and write
14A21E74000
heap
page read and write
2C5D000
stack
page read and write
48A5000
trusted library allocation
page read and write
15650000
trusted library allocation
page read and write
14A21E63000
heap
page read and write
A4D2000
trusted library allocation
page read and write
14A21E74000
heap
page read and write
A352000
trusted library allocation
page read and write
A25B000
trusted library allocation
page read and write
A3F0000
trusted library allocation
page read and write
14A21E67000
heap
page read and write
A307000
trusted library allocation
page read and write
14A21E60000
heap
page read and write
706BFE000
stack
page read and write
47BD000
stack
page read and write
1536D000
heap
page read and write
14A1FD5D000
heap
page read and write
A131000
trusted library allocation
page read and write
14A21E10000
heap
page read and write
4994000
trusted library allocation
page read and write
14A1FD21000
heap
page read and write
4CDD000
trusted library allocation
page read and write
14A221D0000
heap
page read and write
CFC000
stack
page read and write
A18C000
trusted library allocation
page read and write
14A21E51000
heap
page read and write
14A21D2F000
heap
page read and write
14A21E70000
heap
page read and write
14A21E11000
heap
page read and write
14A21FD0000
heap
page read and write
A403000
trusted library allocation
page read and write
A4A1000
trusted library allocation
page read and write
162D0000
trusted library allocation
page read and write
A2A8000
trusted library allocation
page read and write
A3BD000
trusted library allocation
page read and write
14A21E49000
heap
page read and write
14A21E27000
heap
page read and write
9FB1000
trusted library allocation
page read and write
14A21E49000
heap
page read and write
2FA8000
heap
page read and write
48AB000
trusted library allocation
page read and write
9E11000
trusted library allocation
page read and write
14A21E74000
heap
page read and write
4BA9000
trusted library allocation
page read and write
14A21E26000
heap
page read and write
A194000
trusted library allocation
page read and write
14A1FC9F000
heap
page read and write
A39A000
trusted library allocation
page read and write
A3A0000
trusted library allocation
page read and write
A409000
trusted library allocation
page read and write
4CE2000
trusted library allocation
page read and write
14A1FD30000
heap
page read and write
14A1FD0A000
heap
page read and write
A3A6000
trusted library allocation
page read and write
A159000
trusted library allocation
page read and write
14A215D0000
heap
page read and write
9E27000
trusted library allocation
page read and write
14A21E74000
heap
page read and write
161F0000
heap
page read and write
4BC0000
trusted library allocation
page read and write
14A21E49000
heap
page read and write
14A21DF3000
heap
page read and write
A11B000
trusted library allocation
page read and write
A375000
trusted library allocation
page read and write
9F9A000
trusted library allocation
page read and write
A312000
trusted library allocation
page read and write
A3A9000
trusted library allocation
page read and write
9E04000
trusted library allocation
page read and write
4D46000
trusted library allocation
page read and write
9F9C000
trusted library allocation
page read and write
14A21E64000
heap
page read and write
14A21BFE000
heap
page read and write
4C62000
trusted library allocation
page read and write
14A21D51000
heap
page read and write
14A21E31000
heap
page read and write
15483000
heap
page read and write
14A21E31000
heap
page read and write
1510D000
stack
page read and write
4974000
trusted library allocation
page read and write
14A21E51000
heap
page read and write
9F14000
trusted library allocation
page read and write
4829000
trusted library allocation
page read and write
A416000
trusted library allocation
page read and write
15473000
heap
page read and write
14A21E74000
heap
page read and write
A246000
trusted library allocation
page read and write
1640E000
stack
page read and write
14A1FD2B000
heap
page read and write
4C5A000
trusted library allocation
page read and write
14A21E31000
heap
page read and write
4C66000
trusted library allocation
page read and write
4830000
trusted library allocation
page read and write
27BA000
trusted library allocation
page execute and read and write
14A1FB00000
heap
page read and write
4982000
trusted library allocation
page read and write
4987000
trusted library allocation
page read and write
14D8E000
unkown
page read and write
14A21A11000
heap
page read and write
161CE000
trusted library allocation
page read and write
14A21E74000
heap
page read and write
14A1FC8E000
heap
page read and write
14A21E74000
heap
page read and write
14A21E45000
heap
page read and write
A291000
trusted library allocation
page read and write
A4CC000
trusted library allocation
page read and write
There are 656 hidden memdumps, click here to show them.