Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\QUOTATION_OCTQTRA071244#U00b7PDF.scr.exe
|
"C:\Users\user\Desktop\QUOTATION_OCTQTRA071244#U00b7PDF.scr.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://s23.filetransfer.io/storage/download/gxyOEP84bSEs
|
188.114.96.3
|
||
https://reallyfreegeoip.org/xml/155.94.241.188p
|
unknown
|
||
http://checkip.dyndns.org/
|
158.101.44.242
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
https://filetransfer.io/data-package/jI82Ms6K/download
|
188.114.96.3
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
||
http://filetransfer.io/data-package/jI82Ms6K/download
|
188.114.96.3
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
http://filetransfer.io/data-package/jI82Ms6K/download?exceptionsAllowedBeforeBreakingAValue
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
https://filetransfer.io
|
unknown
|
||
https://github.com/mgravell/protobuf-net
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://checkip.dyndns.com
|
unknown
|
||
http://filetransfer.io
|
unknown
|
||
https://s23.filetransfer.io
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://reallyfreegeoip.org/xml/155.94.241.188
|
188.114.96.3
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 13 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.96.3
|
||
checkip.dyndns.org
|
unknown
|
||
filetransfer.io
|
188.114.96.3
|
||
s23.filetransfer.io
|
188.114.96.3
|
||
checkip.dyndns.com
|
158.101.44.242
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.96.3
|
filetransfer.io
|
European Union
|
||
158.101.44.242
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00b7PDF_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00b7PDF_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00b7PDF_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00b7PDF_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00b7PDF_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00b7PDF_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00b7PDF_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00b7PDF_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00b7PDF_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00b7PDF_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00b7PDF_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00b7PDF_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00b7PDF_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_OCTQTRA071244#U00b7PDF_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
FileDirectory
|
There are 18 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2C7B7BE9000
|
trusted library allocation
|
page read and write
|
||
2C61AB20000
|
trusted library section
|
page read and write
|
||
2C61AF69000
|
trusted library allocation
|
page read and write
|
||
2C61AD21000
|
trusted library allocation
|
page read and write
|
||
2C62AD29000
|
trusted library allocation
|
page read and write
|
||
2C7A779B000
|
trusted library allocation
|
page read and write
|
||
2C7C0000000
|
trusted library section
|
page read and write
|
||
2C7A7797000
|
trusted library allocation
|
page read and write
|
||
2C7A7C3A000
|
trusted library allocation
|
page read and write
|
||
2C7A7C4D000
|
trusted library allocation
|
page read and write
|
||
2C7A7702000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FF4BEC00000
|
trusted library allocation
|
page execute and read and write
|
||
2C7A7E03000
|
trusted library allocation
|
page read and write
|
||
2C61AEC3000
|
trusted library allocation
|
page read and write
|
||
2C7A7C38000
|
trusted library allocation
|
page read and write
|
||
2C7A7767000
|
trusted library allocation
|
page read and write
|
||
2C61AD00000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
2C7C0080000
|
trusted library section
|
page read and write
|
||
E63FBF9000
|
stack
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B878000
|
trusted library allocation
|
page execute and read and write
|
||
2C7A7E37000
|
trusted library allocation
|
page read and write
|
||
7FFD9B874000
|
trusted library allocation
|
page execute and read and write
|
||
2C7A7C92000
|
trusted library allocation
|
page read and write
|
||
2C7A7AEF000
|
trusted library allocation
|
page read and write
|
||
2C7A7E07000
|
trusted library allocation
|
page read and write
|
||
2C7A7BF8000
|
trusted library allocation
|
page read and write
|
||
2C7A5B83000
|
heap
|
page execute and read and write
|
||
2C7A5A40000
|
heap
|
page read and write
|
||
2C7A7B4E000
|
trusted library allocation
|
page read and write
|
||
2C7A7B8F000
|
trusted library allocation
|
page read and write
|
||
2C7B7DCB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
2C7A7D70000
|
trusted library allocation
|
page read and write
|
||
2C7A7E49000
|
trusted library allocation
|
page read and write
|
||
2C61905F000
|
heap
|
page read and write
|
||
2C61AFF7000
|
trusted library allocation
|
page read and write
|
||
2C7A7ACE000
|
trusted library allocation
|
page read and write
|
||
2C7A7B3C000
|
trusted library allocation
|
page read and write
|
||
2C7A7ACB000
|
trusted library allocation
|
page read and write
|
||
2C61AFEC000
|
trusted library allocation
|
page read and write
|
||
2C7A7D8C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
2C6190BB000
|
heap
|
page read and write
|
||
2C7A7E21000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
2C7A7A68000
|
trusted library allocation
|
page read and write
|
||
2C633460000
|
heap
|
page execute and read and write
|
||
7FFD9B6E3000
|
trusted library allocation
|
page execute and read and write
|
||
2C7A7D95000
|
trusted library allocation
|
page read and write
|
||
2C7A7B8B000
|
trusted library allocation
|
page read and write
|
||
2C61AE71000
|
trusted library allocation
|
page read and write
|
||
2C62ADCB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
2C7A7E87000
|
trusted library allocation
|
page read and write
|
||
2C7A7E14000
|
trusted library allocation
|
page read and write
|
||
2C7A7E1F000
|
trusted library allocation
|
page read and write
|
||
FD3F03E000
|
stack
|
page read and write
|
||
2C7A7CF3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
E63DFFD000
|
stack
|
page read and write
|
||
2C7A7D6A000
|
trusted library allocation
|
page read and write
|
||
E63DBFE000
|
stack
|
page read and write
|
||
2C7A7EA7000
|
trusted library allocation
|
page read and write
|
||
2C61B04A000
|
trusted library allocation
|
page read and write
|
||
2C7A7BB3000
|
trusted library allocation
|
page read and write
|
||
2C7A7B00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F2000
|
trusted library allocation
|
page read and write
|
||
2C7A7DF2000
|
trusted library allocation
|
page read and write
|
||
2C7A7CE2000
|
trusted library allocation
|
page read and write
|
||
2C7A7B7C000
|
trusted library allocation
|
page read and write
|
||
2C7A7ADE000
|
trusted library allocation
|
page read and write
|
||
2C61B013000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7A6000
|
trusted library allocation
|
page execute and read and write
|
||
2C7A7C9C000
|
trusted library allocation
|
page read and write
|
||
2C7A7D8E000
|
trusted library allocation
|
page read and write
|
||
2C7A5890000
|
heap
|
page read and write
|
||
7FFD9B963000
|
trusted library allocation
|
page read and write
|
||
2C7A7E7B000
|
trusted library allocation
|
page read and write
|
||
2C7A7772000
|
trusted library allocation
|
page read and write
|
||
7FFD9B92D000
|
trusted library allocation
|
page read and write
|
||
2C7A7A94000
|
trusted library allocation
|
page read and write
|
||
2C7A7D9D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7E0000
|
trusted library allocation
|
page execute and read and write
|
||
2C7B7F2E000
|
trusted library allocation
|
page read and write
|
||
E6413FE000
|
stack
|
page read and write
|
||
2C7A7E85000
|
trusted library allocation
|
page read and write
|
||
2C7A7B67000
|
trusted library allocation
|
page read and write
|
||
2C7A7BE1000
|
trusted library allocation
|
page read and write
|
||
2C7A7D09000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6FD000
|
trusted library allocation
|
page execute and read and write
|
||
2C7A7B7A000
|
trusted library allocation
|
page read and write
|
||
2C7A7BF4000
|
trusted library allocation
|
page read and write
|
||
2C61ACE0000
|
heap
|
page read and write
|
||
E63CBEC000
|
stack
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
7FF454EF0000
|
trusted library allocation
|
page execute and read and write
|
||
2C7BFE5A000
|
heap
|
page read and write
|
||
2C7A7D7D000
|
trusted library allocation
|
page read and write
|
||
2C7C00D0000
|
heap
|
page read and write
|
||
2C7A79A9000
|
trusted library allocation
|
page read and write
|
||
2C61AD10000
|
heap
|
page read and write
|
||
2C7A7E76000
|
trusted library allocation
|
page read and write
|
||
2C7A7E65000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
2C7A5E15000
|
heap
|
page read and write
|
||
2C7A7B3A000
|
trusted library allocation
|
page read and write
|
||
2C7A7DC3000
|
trusted library allocation
|
page read and write
|
||
2C7A5AAD000
|
heap
|
page read and write
|
||
2C7A7EBC000
|
trusted library allocation
|
page read and write
|
||
2C7A7B34000
|
trusted library allocation
|
page read and write
|
||
2C7A5A33000
|
trusted library allocation
|
page read and write
|
||
2C61AB43000
|
trusted library allocation
|
page read and write
|
||
2C7A7DDA000
|
trusted library allocation
|
page read and write
|
||
2C7A59B0000
|
heap
|
page read and write
|
||
2C7A5A81000
|
heap
|
page read and write
|
||
7FFD9B796000
|
trusted library allocation
|
page read and write
|
||
2C6335BF000
|
heap
|
page read and write
|
||
2C7A7C23000
|
trusted library allocation
|
page read and write
|
||
2C7A7C29000
|
trusted library allocation
|
page read and write
|
||
2C7A7DBF000
|
trusted library allocation
|
page read and write
|
||
2C7A7C27000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6F0000
|
trusted library allocation
|
page read and write
|
||
2C619058000
|
heap
|
page read and write
|
||
7FFD9B895000
|
trusted library allocation
|
page read and write
|
||
2C7A7E8B000
|
trusted library allocation
|
page read and write
|
||
2C7A7ADC000
|
trusted library allocation
|
page read and write
|
||
7FF4BEC10000
|
trusted library allocation
|
page execute and read and write
|
||
2C633664000
|
heap
|
page read and write
|
||
2C7A7E05000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9DD000
|
trusted library allocation
|
page read and write
|
||
2C61AB40000
|
trusted library allocation
|
page read and write
|
||
2C7A7D72000
|
trusted library allocation
|
page read and write
|
||
2C7A7CE4000
|
trusted library allocation
|
page read and write
|
||
2C7A7B49000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
2C7A7E30000
|
trusted library allocation
|
page read and write
|
||
2C7B7FA6000
|
trusted library allocation
|
page read and write
|
||
2C633C40000
|
heap
|
page read and write
|
||
2C7A7DB4000
|
trusted library allocation
|
page read and write
|
||
E63E3FF000
|
stack
|
page read and write
|
||
2C7BFDD6000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
2C633602000
|
heap
|
page read and write
|
||
2C63365F000
|
heap
|
page read and write
|
||
7FFD9B6C3000
|
trusted library allocation
|
page execute and read and write
|
||
E63F3FD000
|
stack
|
page read and write
|
||
2C7A7D04000
|
trusted library allocation
|
page read and write
|
||
2C7A7E68000
|
trusted library allocation
|
page read and write
|
||
2C7A7A87000
|
trusted library allocation
|
page read and write
|
||
2C7A7BE6000
|
trusted library allocation
|
page read and write
|
||
2C7A5A20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B704000
|
trusted library allocation
|
page read and write
|
||
2C7A7AC5000
|
trusted library allocation
|
page read and write
|
||
2C7A7CF1000
|
trusted library allocation
|
page read and write
|
||
2C7A7730000
|
trusted library allocation
|
page read and write
|
||
2C7A7A66000
|
trusted library allocation
|
page read and write
|
||
2C7A7B89000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F5000
|
trusted library allocation
|
page read and write
|
||
2C7A7BB1000
|
trusted library allocation
|
page read and write
|
||
FD3BBF2000
|
stack
|
page read and write
|
||
2C7B76C1000
|
trusted library allocation
|
page read and write
|
||
2C61AECC000
|
trusted library allocation
|
page read and write
|
||
2C7A7EB8000
|
trusted library allocation
|
page read and write
|
||
2C7A7A9D000
|
trusted library allocation
|
page read and write
|
||
2C7A7B38000
|
trusted library allocation
|
page read and write
|
||
7FFD9B872000
|
trusted library allocation
|
page read and write
|
||
2C7B7F25000
|
trusted library allocation
|
page read and write
|
||
E6407FC000
|
stack
|
page read and write
|
||
7FFD9B6E4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B98D000
|
trusted library allocation
|
page read and write
|
||
2C7A7C58000
|
trusted library allocation
|
page read and write
|
||
2C7A5C35000
|
heap
|
page read and write
|
||
2C7A7B36000
|
trusted library allocation
|
page read and write
|
||
2C61AAF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD6000
|
trusted library allocation
|
page read and write
|
||
7FF4BEC20000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6F2000
|
trusted library allocation
|
page read and write
|
||
2C7A772C000
|
trusted library allocation
|
page read and write
|
||
FD3CBFD000
|
stack
|
page read and write
|
||
2C7A5990000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
2C7A7C5D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
2C7C0400000
|
heap
|
page read and write
|
||
2C7BFD8A000
|
heap
|
page read and write
|
||
2C6335C2000
|
heap
|
page read and write
|
||
2C7A7B9E000
|
trusted library allocation
|
page read and write
|
||
2C61AEC8000
|
trusted library allocation
|
page read and write
|
||
2C6335B0000
|
heap
|
page read and write
|
||
FD3D7FE000
|
stack
|
page read and write
|
||
2C7A7C45000
|
trusted library allocation
|
page read and write
|
||
2C7A7B92000
|
trusted library allocation
|
page read and write
|
||
2C619260000
|
heap
|
page read and write
|
||
2C7A7BE3000
|
trusted library allocation
|
page read and write
|
||
2C7A5A4C000
|
heap
|
page read and write
|
||
2C7A7D81000
|
trusted library allocation
|
page read and write
|
||
2C7A5DD0000
|
heap
|
page execute and read and write
|
||
2C7A7C8B000
|
trusted library allocation
|
page read and write
|
||
2C7A7AF4000
|
trusted library allocation
|
page read and write
|
||
2C7A7E89000
|
trusted library allocation
|
page read and write
|
||
FD3B1DF000
|
stack
|
page read and write
|
||
2C7A7B8D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B86D000
|
trusted library allocation
|
page execute and read and write
|
||
2C7A7B76000
|
trusted library allocation
|
page read and write
|
||
2C7A7B0B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B73C000
|
trusted library allocation
|
page execute and read and write
|
||
2C7A7D13000
|
trusted library allocation
|
page read and write
|
||
2C7A7D7B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
2C7A776D000
|
trusted library allocation
|
page read and write
|
||
2C7A7DD4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
2C7A7E23000
|
trusted library allocation
|
page read and write
|
||
2C7A580A000
|
unkown
|
page readonly
|
||
2C7A5A6A000
|
heap
|
page read and write
|
||
7FFD9B7C6000
|
trusted library allocation
|
page execute and read and write
|
||
2C7A7C4B000
|
trusted library allocation
|
page read and write
|
||
2C7A7E72000
|
trusted library allocation
|
page read and write
|
||
2C7A7AE1000
|
trusted library allocation
|
page read and write
|
||
2C7A7CDE000
|
trusted library allocation
|
page read and write
|
||
2C6335C4000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page execute and read and write
|
||
2C7A7BA5000
|
trusted library allocation
|
page read and write
|
||
2C6192A0000
|
heap
|
page read and write
|
||
2C7A7C3C000
|
trusted library allocation
|
page read and write
|
||
2C61AEE7000
|
trusted library allocation
|
page read and write
|
||
FD3CFFE000
|
stack
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
2C7A5E10000
|
heap
|
page read and write
|
||
2C7A7C89000
|
trusted library allocation
|
page read and write
|
||
7FFD9B70D000
|
trusted library allocation
|
page execute and read and write
|
||
2C7A76B0000
|
heap
|
page execute and read and write
|
||
2C7A7C5A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B863000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
2C7A7ADA000
|
trusted library allocation
|
page read and write
|
||
2C7A5AD0000
|
heap
|
page read and write
|
||
2C7A7E61000
|
trusted library allocation
|
page read and write
|
||
2C7A5B90000
|
trusted library allocation
|
page read and write
|
||
2C7A7723000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
E63EBFF000
|
stack
|
page read and write
|
||
2C7A7C1F000
|
trusted library allocation
|
page read and write
|
||
2C61908F000
|
heap
|
page read and write
|
||
2C7A7B45000
|
trusted library allocation
|
page read and write
|
||
2C7A7E9C000
|
trusted library allocation
|
page read and write
|
||
2C7A5A00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
2C7A7BDD000
|
trusted library allocation
|
page read and write
|
||
FD3EBFE000
|
stack
|
page read and write
|
||
2C7A7B4B000
|
trusted library allocation
|
page read and write
|
||
2C61AED0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
2C7A7C03000
|
trusted library allocation
|
page read and write
|
||
2C61AF43000
|
trusted library allocation
|
page read and write
|
||
2C7A7EBA000
|
trusted library allocation
|
page read and write
|
||
2C7A7734000
|
trusted library allocation
|
page read and write
|
||
2C7A7DD2000
|
trusted library allocation
|
page read and write
|
||
2C7A7BF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
2C62ADD5000
|
trusted library allocation
|
page read and write
|
||
FD3EC3E000
|
stack
|
page read and write
|
||
2C61AAD0000
|
trusted library allocation
|
page read and write
|
||
2C7A7C36000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B989000
|
trusted library allocation
|
page read and write
|
||
2C7A7C25000
|
trusted library allocation
|
page read and write
|
||
2C7A7DC1000
|
trusted library allocation
|
page read and write
|
||
2C61AE7D000
|
trusted library allocation
|
page read and write
|
||
2C619143000
|
heap
|
page read and write
|
||
2C7A7721000
|
trusted library allocation
|
page read and write
|
||
2C7A7AED000
|
trusted library allocation
|
page read and write
|
||
2C7B801D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
2C633657000
|
heap
|
page read and write
|
||
2C7A7EBF000
|
trusted library allocation
|
page read and write
|
||
2C7A7A9A000
|
trusted library allocation
|
page read and write
|
||
2C62ADD8000
|
trusted library allocation
|
page read and write
|
||
2C7A7CE6000
|
trusted library allocation
|
page read and write
|
||
2C7A5AB7000
|
heap
|
page read and write
|
||
2C7A7A98000
|
trusted library allocation
|
page read and write
|
||
2C619265000
|
heap
|
page read and write
|
||
7FFD9BADC000
|
trusted library allocation
|
page read and write
|
||
2C7A7DB2000
|
trusted library allocation
|
page read and write
|
||
2C61AD03000
|
heap
|
page read and write
|
||
2C7A76C1000
|
trusted library allocation
|
page read and write
|
||
2C7A7D60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page execute and read and write
|
||
E6403FD000
|
stack
|
page read and write
|
||
2C619050000
|
heap
|
page read and write
|
||
2C6335B2000
|
heap
|
page read and write
|
||
2C7A78FB000
|
trusted library allocation
|
page read and write
|
||
2C7A7E26000
|
trusted library allocation
|
page read and write
|
||
2C7A7B78000
|
trusted library allocation
|
page read and write
|
||
2C61AB10000
|
heap
|
page read and write
|
||
2C7A7560000
|
heap
|
page read and write
|
||
2C7A7DAC000
|
trusted library allocation
|
page read and write
|
||
FD3E7FE000
|
stack
|
page read and write
|
||
2C7B76D1000
|
trusted library allocation
|
page read and write
|
||
2C7A7C12000
|
trusted library allocation
|
page read and write
|
||
2C7A7BA2000
|
trusted library allocation
|
page read and write
|
||
2C7A7D7F000
|
trusted library allocation
|
page read and write
|
||
2C7A774E000
|
trusted library allocation
|
page read and write
|
||
2C61AE2F000
|
trusted library allocation
|
page read and write
|
||
2C7A7AD8000
|
trusted library allocation
|
page read and write
|
||
2C62ADB0000
|
trusted library allocation
|
page read and write
|
||
E63F7FF000
|
stack
|
page read and write
|
||
7FFD9B700000
|
trusted library allocation
|
page read and write
|
||
2C7A7A85000
|
trusted library allocation
|
page read and write
|
||
2C7A7C49000
|
trusted library allocation
|
page read and write
|
||
2C7A7B9C000
|
trusted library allocation
|
page read and write
|
||
2C7A7D83000
|
trusted library allocation
|
page read and write
|
||
2C61907A000
|
heap
|
page read and write
|
||
2C61AAB0000
|
trusted library allocation
|
page read and write
|
||
2C61B00A000
|
trusted library allocation
|
page read and write
|
||
2C7A79E2000
|
trusted library allocation
|
page read and write
|
||
2C7A7B5C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page execute and read and write
|
||
FD3DFFF000
|
stack
|
page read and write
|
||
2C7A7CCD000
|
trusted library allocation
|
page read and write
|
||
2C61AA70000
|
heap
|
page read and write
|
||
2C7A7AA9000
|
trusted library allocation
|
page read and write
|
||
FD3DBFD000
|
stack
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page read and write
|
||
2C7A7E1D000
|
trusted library allocation
|
page read and write
|
||
2C7A7AEB000
|
trusted library allocation
|
page read and write
|
||
2C7BFE42000
|
heap
|
page read and write
|
||
2C61B03E000
|
trusted library allocation
|
page read and write
|
||
2C7A7DAE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77C000
|
trusted library allocation
|
page execute and read and write
|
||
2C7A5970000
|
heap
|
page read and write
|
||
2C61AF0E000
|
trusted library allocation
|
page read and write
|
||
2C7A5AD9000
|
heap
|
page read and write
|
||
2C61AB80000
|
heap
|
page execute and read and write
|
||
FD3D3FE000
|
stack
|
page read and write
|
||
2C7A7DC7000
|
trusted library allocation
|
page read and write
|
||
2C62AD21000
|
trusted library allocation
|
page read and write
|
||
2C619240000
|
heap
|
page read and write
|
||
2C7A7CA2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B70B000
|
trusted library allocation
|
page execute and read and write
|
||
2C61913C000
|
heap
|
page read and write
|
||
2C61AF55000
|
trusted library allocation
|
page read and write
|
||
2C61AAE0000
|
trusted library allocation
|
page read and write
|
||
2C7A7AC9000
|
trusted library allocation
|
page read and write
|
||
2C7A7EB6000
|
trusted library allocation
|
page read and write
|
||
2C7A7B02000
|
trusted library allocation
|
page read and write
|
||
2C619160000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
2C61B000000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page execute and read and write
|
||
2C7A7A89000
|
trusted library allocation
|
page read and write
|
||
2C7A5A84000
|
heap
|
page read and write
|
||
2C7A7BF2000
|
trusted library allocation
|
page read and write
|
||
2C7A7DE5000
|
trusted library allocation
|
page read and write
|
||
2C619270000
|
direct allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
2C7A7E9A000
|
trusted library allocation
|
page read and write
|
||
2C7A57F0000
|
unkown
|
page readonly
|
||
2C7BFD80000
|
heap
|
page read and write
|
||
2C7A7C47000
|
trusted library allocation
|
page read and write
|
||
E63C48F000
|
stack
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
2C7A7DD6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
2C7A7E78000
|
trusted library allocation
|
page read and write
|
||
2C7BFE3E000
|
heap
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page read and write
|
||
2C61AE79000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D5000
|
trusted library allocation
|
page read and write
|
||
2C7A7CA0000
|
trusted library allocation
|
page read and write
|
||
2C61AE4F000
|
trusted library allocation
|
page read and write
|
||
2C7A7A83000
|
trusted library allocation
|
page read and write
|
||
2C61AFF0000
|
trusted library allocation
|
page read and write
|
||
2C619091000
|
heap
|
page read and write
|
||
2C7A7E5F000
|
trusted library allocation
|
page read and write
|
||
2C7A7E43000
|
trusted library allocation
|
page read and write
|
||
2C7A7AC7000
|
trusted library allocation
|
page read and write
|
||
2C7A7BA0000
|
trusted library allocation
|
page read and write
|
||
2C7A7B2B000
|
trusted library allocation
|
page read and write
|
||
2C7A7B7F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6CD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
2C7A7A96000
|
trusted library allocation
|
page read and write
|
||
2C7A7C4F000
|
trusted library allocation
|
page read and write
|
||
2C61B050000
|
trusted library allocation
|
page read and write
|
||
2C7A7DB0000
|
trusted library allocation
|
page read and write
|
||
2C61AEBF000
|
trusted library allocation
|
page read and write
|
||
2C7A771B000
|
trusted library allocation
|
page read and write
|
||
FD3E3FE000
|
stack
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
2C61AA90000
|
trusted library section
|
page read and write
|
||
E63C4CE000
|
stack
|
page read and write
|
||
2C7A7D6C000
|
trusted library allocation
|
page read and write
|
||
E63EFFE000
|
stack
|
page read and write
|
||
2C7A7BDF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
2C7A7AFE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
2C7A7439000
|
heap
|
page read and write
|
||
2C61AED4000
|
trusted library allocation
|
page read and write
|
||
2C7A7D6E000
|
trusted library allocation
|
page read and write
|
||
2C7A7B5E000
|
trusted library allocation
|
page read and write
|
||
FD3B19E000
|
stack
|
page read and write
|
||
2C7A7BF6000
|
trusted library allocation
|
page read and write
|
||
2C7A7C67000
|
trusted library allocation
|
page read and write
|
||
2C7A7CAF000
|
trusted library allocation
|
page read and write
|
||
2C619020000
|
remote allocation
|
page execute and read and write
|
||
2C7A7C34000
|
trusted library allocation
|
page read and write
|
||
2C7A7C09000
|
trusted library allocation
|
page read and write
|
||
2C7A7B47000
|
trusted library allocation
|
page read and write
|
||
FD3C7FF000
|
stack
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
2C61AE67000
|
trusted library allocation
|
page read and write
|
||
2C7A7D92000
|
trusted library allocation
|
page read and write
|
||
7FFD9B967000
|
trusted library allocation
|
page read and write
|
||
2C7A7C32000
|
trusted library allocation
|
page read and write
|
||
2C7A7AF1000
|
trusted library allocation
|
page read and write
|
||
E63FFFE000
|
stack
|
page read and write
|
||
2C7A7E0B000
|
trusted library allocation
|
page read and write
|
||
2C61906B000
|
heap
|
page read and write
|
||
2C7A7A8B000
|
trusted library allocation
|
page read and write
|
||
2C7A7B27000
|
trusted library allocation
|
page read and write
|
||
2C7A7C80000
|
trusted library allocation
|
page read and write
|
||
2C7A5A30000
|
trusted library allocation
|
page read and write
|
||
2C61AEBB000
|
trusted library allocation
|
page read and write
|
||
2C7A7E8E000
|
trusted library allocation
|
page read and write
|
||
2C61AB15000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
2C7A7B29000
|
trusted library allocation
|
page read and write
|
||
2C7A5C30000
|
heap
|
page read and write
|
||
E63E7FE000
|
stack
|
page read and write
|
||
2C7A7E74000
|
trusted library allocation
|
page read and write
|
||
2C7A7CCB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page read and write
|
||
2C61B044000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6C2000
|
trusted library allocation
|
page read and write
|
||
2C7A7E34000
|
trusted library allocation
|
page read and write
|
||
2C61AF3F000
|
trusted library allocation
|
page read and write
|
||
2C7A57F2000
|
unkown
|
page readonly
|
||
2C7BFE80000
|
trusted library section
|
page read and write
|
||
2C7A5AD2000
|
heap
|
page read and write
|
||
2C7A7B0D000
|
trusted library allocation
|
page read and write
|
||
2C7A5B80000
|
heap
|
page execute and read and write
|
||
2C7A7E09000
|
trusted library allocation
|
page read and write
|
||
7FFD9B776000
|
trusted library allocation
|
page read and write
|
||
2C61AF21000
|
trusted library allocation
|
page read and write
|
||
2C7A7E32000
|
trusted library allocation
|
page read and write
|
||
2C7A7C21000
|
trusted library allocation
|
page read and write
|
||
2C61AE75000
|
trusted library allocation
|
page read and write
|
||
2C7A7DE9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6ED000
|
trusted library allocation
|
page execute and read and write
|
||
2C7A7E63000
|
trusted library allocation
|
page read and write
|
||
2C7A7E98000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
2C7A7DD8000
|
trusted library allocation
|
page read and write
|
||
2C7BF6F0000
|
trusted library allocation
|
page read and write
|
||
2C7A7DC5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C4000
|
trusted library allocation
|
page read and write
|
||
2C7A7BD4000
|
trusted library allocation
|
page read and write
|
||
2C7A5B2B000
|
heap
|
page read and write
|
||
2C633661000
|
heap
|
page read and write
|
||
2C61B00E000
|
trusted library allocation
|
page read and write
|
||
2C7C02D0000
|
trusted library section
|
page read and write
|
||
2C61AEB7000
|
trusted library allocation
|
page read and write
|
||
2C7A7CB5000
|
trusted library allocation
|
page read and write
|
||
2C7B7E5F000
|
trusted library allocation
|
page read and write
|
There are 466 hidden memdumps, click here to show them.