Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\QUOTATION_NOVQTRA071244PDF.scr.exe
|
"C:\Users\user\Desktop\QUOTATION_NOVQTRA071244PDF.scr.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.microsoft.coH
|
unknown
|
||
http://checkip.dyndns.org/
|
193.122.6.168
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.75p
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
https://filetransfer.io
|
unknown
|
||
https://github.com/mgravell/protobuf-net
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
https://s24.filetransfer.io/storage/download/ndvzPJWaMUSB
|
188.114.97.3
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://filetransfer.io/data-package/I7fmQg9d/download
|
188.114.96.3
|
||
http://checkip.dyndns.com
|
unknown
|
||
http://filetransfer.io
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://s24.filetransfer.io
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.75
|
188.114.97.3
|
||
https://filetransfer.io/data-package/I7fmQg9d/download
|
188.114.96.3
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 13 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s24.filetransfer.io
|
188.114.97.3
|
||
filetransfer.io
|
188.114.96.3
|
||
reallyfreegeoip.org
|
188.114.97.3
|
||
checkip.dyndns.com
|
193.122.6.168
|
||
checkip.dyndns.org
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
s24.filetransfer.io
|
European Union
|
||
193.122.6.168
|
checkip.dyndns.com
|
United States
|
||
188.114.96.3
|
filetransfer.io
|
European Union
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
FileDirectory
|
There are 18 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
19060C89000
|
trusted library allocation
|
page read and write
|
||
19050C81000
|
trusted library allocation
|
page read and write
|
||
19050ECE000
|
trusted library allocation
|
page read and write
|
||
22880090000
|
trusted library section
|
page read and write
|
||
228E6D71000
|
trusted library allocation
|
page read and write
|
||
228F6D46000
|
trusted library allocation
|
page read and write
|
||
19050AE0000
|
trusted library section
|
page read and write
|
||
228E6F21000
|
trusted library allocation
|
page read and write
|
||
228E6F28000
|
trusted library allocation
|
page read and write
|
||
228E6C94000
|
trusted library allocation
|
page read and write
|
||
228E71F2000
|
trusted library allocation
|
page read and write
|
||
228E7243000
|
trusted library allocation
|
page read and write
|
||
228E72A2000
|
trusted library allocation
|
page read and write
|
||
228E7306000
|
trusted library allocation
|
page read and write
|
||
DA643FE000
|
stack
|
page read and write
|
||
46193EF000
|
stack
|
page read and write
|
||
1904F01A000
|
heap
|
page read and write
|
||
19050E87000
|
trusted library allocation
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
228E7445000
|
trusted library allocation
|
page read and write
|
||
19050FB6000
|
trusted library allocation
|
page read and write
|
||
228E72A6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA4D000
|
trusted library allocation
|
page read and write
|
||
228E6EDB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B934000
|
trusted library allocation
|
page execute and read and write
|
||
19050BE8000
|
heap
|
page read and write
|
||
7FF4A4500000
|
trusted library allocation
|
page execute and read and write
|
||
19050B9C000
|
heap
|
page read and write
|
||
228E7266000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
228E7291000
|
trusted library allocation
|
page read and write
|
||
228E6CD8000
|
trusted library allocation
|
page read and write
|
||
228E71FF000
|
trusted library allocation
|
page read and write
|
||
228E4F10000
|
heap
|
page read and write
|
||
228E6EA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
228E7430000
|
trusted library allocation
|
page read and write
|
||
19060D3C000
|
trusted library allocation
|
page read and write
|
||
228E7392000
|
trusted library allocation
|
page read and write
|
||
228E70C1000
|
trusted library allocation
|
page read and write
|
||
19050DD8000
|
trusted library allocation
|
page read and write
|
||
228E5120000
|
heap
|
page read and write
|
||
228E6FBF000
|
trusted library allocation
|
page read and write
|
||
190694A0000
|
heap
|
page read and write
|
||
228E6FD0000
|
trusted library allocation
|
page read and write
|
||
228E6F0C000
|
trusted library allocation
|
page read and write
|
||
22880180000
|
heap
|
page read and write
|
||
228F6C21000
|
trusted library allocation
|
page read and write
|
||
228E738A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
461B9FE000
|
stack
|
page read and write
|
||
228E6F41000
|
trusted library allocation
|
page read and write
|
||
228E6EB3000
|
trusted library allocation
|
page read and write
|
||
228E6EB7000
|
trusted library allocation
|
page read and write
|
||
228E6F3D000
|
trusted library allocation
|
page read and write
|
||
228E720E000
|
trusted library allocation
|
page read and write
|
||
DA663FE000
|
stack
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
228E723C000
|
trusted library allocation
|
page read and write
|
||
228E734A000
|
trusted library allocation
|
page read and write
|
||
461C63E000
|
stack
|
page read and write
|
||
19050D94000
|
trusted library allocation
|
page read and write
|
||
228E737B000
|
trusted library allocation
|
page read and write
|
||
DA66FFE000
|
stack
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
19050980000
|
trusted library allocation
|
page read and write
|
||
228E7231000
|
trusted library allocation
|
page read and write
|
||
228E73C8000
|
trusted library allocation
|
page read and write
|
||
228E7186000
|
trusted library allocation
|
page read and write
|
||
19050E3B000
|
trusted library allocation
|
page read and write
|
||
228E72AB000
|
trusted library allocation
|
page read and write
|
||
228E7016000
|
trusted library allocation
|
page read and write
|
||
19050FA4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
461ADFD000
|
stack
|
page read and write
|
||
228E73DD000
|
trusted library allocation
|
page read and write
|
||
19050DE4000
|
trusted library allocation
|
page read and write
|
||
228E5440000
|
heap
|
page read and write
|
||
228E7184000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA4B000
|
trusted library allocation
|
page read and write
|
||
228E6C10000
|
heap
|
page read and write
|
||
228E6FD4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
228E72A8000
|
trusted library allocation
|
page read and write
|
||
1904EFB0000
|
heap
|
page read and write
|
||
228E7326000
|
trusted library allocation
|
page read and write
|
||
228E6FD8000
|
trusted library allocation
|
page read and write
|
||
228E6F2C000
|
trusted library allocation
|
page read and write
|
||
228E71D9000
|
trusted library allocation
|
page read and write
|
||
228F6CF8000
|
trusted library allocation
|
page read and write
|
||
228E5100000
|
heap
|
page read and write
|
||
19050B9A000
|
heap
|
page read and write
|
||
228E740A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
228E7426000
|
trusted library allocation
|
page read and write
|
||
228E7280000
|
trusted library allocation
|
page read and write
|
||
228E6EE6000
|
trusted library allocation
|
page read and write
|
||
19050E2A000
|
trusted library allocation
|
page read and write
|
||
228E73BB000
|
trusted library allocation
|
page read and write
|
||
228E6F39000
|
trusted library allocation
|
page read and write
|
||
4619DF2000
|
stack
|
page read and write
|
||
7FFD9BA49000
|
trusted library allocation
|
page read and write
|
||
228E6F94000
|
trusted library allocation
|
page read and write
|
||
19069610000
|
heap
|
page read and write
|
||
19050AB0000
|
trusted library allocation
|
page read and write
|
||
228E6EF9000
|
trusted library allocation
|
page read and write
|
||
228E6E8B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page execute and read and write
|
||
228E6C21000
|
trusted library allocation
|
page read and write
|
||
228E6F0A000
|
trusted library allocation
|
page read and write
|
||
DA63BFE000
|
stack
|
page read and write
|
||
19050F66000
|
trusted library allocation
|
page read and write
|
||
228E7413000
|
trusted library allocation
|
page read and write
|
||
228E730A000
|
trusted library allocation
|
page read and write
|
||
228E71F0000
|
trusted library allocation
|
page read and write
|
||
228E71D7000
|
trusted library allocation
|
page read and write
|
||
228E7251000
|
trusted library allocation
|
page read and write
|
||
7FF4A44E0000
|
trusted library allocation
|
page execute and read and write
|
||
228E6FE7000
|
trusted library allocation
|
page read and write
|
||
228E6F0E000
|
trusted library allocation
|
page read and write
|
||
228E7390000
|
trusted library allocation
|
page read and write
|
||
228E7221000
|
trusted library allocation
|
page read and write
|
||
228E72A4000
|
trusted library allocation
|
page read and write
|
||
228E724D000
|
trusted library allocation
|
page read and write
|
||
228E7452000
|
trusted library allocation
|
page read and write
|
||
19050E4D000
|
trusted library allocation
|
page read and write
|
||
228E6F24000
|
trusted library allocation
|
page read and write
|
||
228E6ED5000
|
trusted library allocation
|
page read and write
|
||
228E72D5000
|
trusted library allocation
|
page read and write
|
||
228E73FD000
|
trusted library allocation
|
page read and write
|
||
DA647FE000
|
stack
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
228FF3E7000
|
heap
|
page read and write
|
||
22880480000
|
heap
|
page read and write
|
||
228E6E8D000
|
trusted library allocation
|
page read and write
|
||
228E5040000
|
heap
|
page read and write
|
||
19050DDC000
|
trusted library allocation
|
page read and write
|
||
228E6F9F000
|
trusted library allocation
|
page read and write
|
||
228E7337000
|
trusted library allocation
|
page read and write
|
||
228E719C000
|
trusted library allocation
|
page read and write
|
||
228E7012000
|
trusted library allocation
|
page read and write
|
||
DA65BF4000
|
stack
|
page read and write
|
||
228E5043000
|
heap
|
page read and write
|
||
228E6F7B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
19050B50000
|
heap
|
page read and write
|
||
7FFD9B92D000
|
trusted library allocation
|
page execute and read and write
|
||
228E7319000
|
trusted library allocation
|
page read and write
|
||
228E6CCE000
|
trusted library allocation
|
page read and write
|
||
228E71EA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
228E71FB000
|
trusted library allocation
|
page read and write
|
||
1904EF50000
|
direct allocation
|
page read and write
|
||
228E7271000
|
trusted library allocation
|
page read and write
|
||
228E6C61000
|
trusted library allocation
|
page read and write
|
||
22880110000
|
trusted library section
|
page read and write
|
||
19050EA8000
|
trusted library allocation
|
page read and write
|
||
228E6EEA000
|
trusted library allocation
|
page read and write
|
||
228E721F000
|
trusted library allocation
|
page read and write
|
||
228E71C8000
|
trusted library allocation
|
page read and write
|
||
228E6F3F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
228E7339000
|
trusted library allocation
|
page read and write
|
||
228E6FE9000
|
trusted library allocation
|
page read and write
|
||
DA6313E000
|
stack
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
228E741F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA23000
|
trusted library allocation
|
page read and write
|
||
19050F5D000
|
trusted library allocation
|
page read and write
|
||
228E7007000
|
trusted library allocation
|
page read and write
|
||
228E7348000
|
trusted library allocation
|
page read and write
|
||
228E6FBB000
|
trusted library allocation
|
page read and write
|
||
228E6FA3000
|
trusted library allocation
|
page read and write
|
||
228E72DC000
|
trusted library allocation
|
page read and write
|
||
228E71EE000
|
trusted library allocation
|
page read and write
|
||
19050BED000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
228E731D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page execute and read and write
|
||
228E4E30000
|
unkown
|
page readonly
|
||
19050E26000
|
trusted library allocation
|
page read and write
|
||
228E4E34000
|
unkown
|
page readonly
|
||
228E4E83000
|
unkown
|
page readonly
|
||
228E7328000
|
trusted library allocation
|
page read and write
|
||
228E6F08000
|
trusted library allocation
|
page read and write
|
||
228E6FD6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA54000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
228E735D000
|
trusted library allocation
|
page read and write
|
||
19050EA4000
|
trusted library allocation
|
page read and write
|
||
228E6C90000
|
trusted library allocation
|
page read and write
|
||
228E71A4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page execute and read and write
|
||
19050E32000
|
trusted library allocation
|
page read and write
|
||
228E5140000
|
heap
|
page read and write
|
||
7FFD9BA72000
|
trusted library allocation
|
page read and write
|
||
19050DCE000
|
trusted library allocation
|
page read and write
|
||
228E6EDD000
|
trusted library allocation
|
page read and write
|
||
228E71C4000
|
trusted library allocation
|
page read and write
|
||
228E736C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
228E71CC000
|
trusted library allocation
|
page read and write
|
||
DA64BFC000
|
stack
|
page read and write
|
||
228E4E32000
|
unkown
|
page readonly
|
||
228E734C000
|
trusted library allocation
|
page read and write
|
||
228E5445000
|
heap
|
page read and write
|
||
228E72F5000
|
trusted library allocation
|
page read and write
|
||
228E71CA000
|
trusted library allocation
|
page read and write
|
||
228E4E51000
|
unkown
|
page readonly
|
||
461B1FE000
|
stack
|
page read and write
|
||
228E7193000
|
trusted library allocation
|
page read and write
|
||
228E6F32000
|
trusted library allocation
|
page read and write
|
||
19050FB0000
|
trusted library allocation
|
page read and write
|
||
228E72C4000
|
trusted library allocation
|
page read and write
|
||
19060D14000
|
trusted library allocation
|
page read and write
|
||
228E5074000
|
heap
|
page read and write
|
||
228E7014000
|
trusted library allocation
|
page read and write
|
||
228E71DF000
|
trusted library allocation
|
page read and write
|
||
DA667FD000
|
stack
|
page read and write
|
||
228E7450000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
228E6FF4000
|
trusted library allocation
|
page read and write
|
||
19050D7E000
|
trusted library allocation
|
page read and write
|
||
228E7421000
|
trusted library allocation
|
page read and write
|
||
228E6EA9000
|
trusted library allocation
|
page read and write
|
||
228E51A0000
|
trusted library allocation
|
page read and write
|
||
228E6FFA000
|
trusted library allocation
|
page read and write
|
||
19050BEB000
|
heap
|
page read and write
|
||
228E6FF8000
|
trusted library allocation
|
page read and write
|
||
228E71E8000
|
trusted library allocation
|
page read and write
|
||
228E6FC3000
|
trusted library allocation
|
page read and write
|
||
228E72B7000
|
trusted library allocation
|
page read and write
|
||
228E6F30000
|
trusted library allocation
|
page read and write
|
||
228E73BD000
|
trusted library allocation
|
page read and write
|
||
228E6F7F000
|
trusted library allocation
|
page read and write
|
||
228E7182000
|
trusted library allocation
|
page read and write
|
||
228FF3EB000
|
heap
|
page read and write
|
||
19050AA0000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page execute and read and write
|
||
461CE7E000
|
stack
|
page read and write
|
||
DA657FF000
|
stack
|
page read and write
|
||
7FFD9B782000
|
trusted library allocation
|
page read and write
|
||
228E51B0000
|
heap
|
page execute and read and write
|
||
228E7293000
|
trusted library allocation
|
page read and write
|
||
DA64FFE000
|
stack
|
page read and write
|
||
228E5295000
|
heap
|
page read and write
|
||
228E6ECC000
|
trusted library allocation
|
page read and write
|
||
228E71B7000
|
trusted library allocation
|
page read and write
|
||
228E73AA000
|
trusted library allocation
|
page read and write
|
||
228E7434000
|
trusted library allocation
|
page read and write
|
||
228E7423000
|
trusted library allocation
|
page read and write
|
||
461A9FF000
|
stack
|
page read and write
|
||
228E6FE3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
228E723E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B923000
|
trusted library allocation
|
page read and write
|
||
228E7009000
|
trusted library allocation
|
page read and write
|
||
228F6C31000
|
trusted library allocation
|
page read and write
|
||
228E6EC6000
|
trusted library allocation
|
page read and write
|
||
228E72D9000
|
trusted library allocation
|
page read and write
|
||
228E51C3000
|
trusted library allocation
|
page read and write
|
||
19050B03000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page read and write
|
||
DA65FFE000
|
stack
|
page read and write
|
||
228E743D000
|
trusted library allocation
|
page read and write
|
||
461CA3E000
|
stack
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
228E7379000
|
trusted library allocation
|
page read and write
|
||
19050940000
|
heap
|
page read and write
|
||
1904EFA0000
|
trusted library section
|
page read and write
|
||
19069613000
|
heap
|
page read and write
|
||
228E6FA1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
228E6F6C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
228E7454000
|
trusted library allocation
|
page read and write
|
||
228E506B000
|
heap
|
page read and write
|
||
228E723A000
|
trusted library allocation
|
page read and write
|
||
228E73F9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
228E6EB9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B938000
|
trusted library allocation
|
page execute and read and write
|
||
228E73B7000
|
trusted library allocation
|
page read and write
|
||
22880000000
|
heap
|
page execute and read and write
|
||
228E6F8C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
228FF49A000
|
heap
|
page read and write
|
||
228E70FA000
|
trusted library allocation
|
page read and write
|
||
228E740E000
|
trusted library allocation
|
page read and write
|
||
228E6EBB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
228E736E000
|
trusted library allocation
|
page read and write
|
||
228E73B5000
|
trusted library allocation
|
page read and write
|
||
1904EF20000
|
heap
|
page read and write
|
||
228E6F8E000
|
trusted library allocation
|
page read and write
|
||
228F6C81000
|
trusted library allocation
|
page read and write
|
||
228FF620000
|
trusted library section
|
page read and write
|
||
228E721D000
|
trusted library allocation
|
page read and write
|
||
1904EEC0000
|
remote allocation
|
page execute and read and write
|
||
228E735B000
|
trusted library allocation
|
page read and write
|
||
228E7188000
|
trusted library allocation
|
page read and write
|
||
228E6FA6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA27000
|
trusted library allocation
|
page read and write
|
||
1904EF00000
|
heap
|
page read and write
|
||
228FF437000
|
heap
|
page read and write
|
||
228FF490000
|
heap
|
page read and write
|
||
228E73E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B936000
|
trusted library allocation
|
page execute and read and write
|
||
1904EFB8000
|
heap
|
page read and write
|
||
461CA7E000
|
stack
|
page read and write
|
||
228E6EA2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB3A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
228E740C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
228E72C2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
228E72D3000
|
trusted library allocation
|
page read and write
|
||
228E6CF9000
|
trusted library allocation
|
page read and write
|
||
228E7197000
|
trusted library allocation
|
page read and write
|
||
461B5FE000
|
stack
|
page read and write
|
||
19050BCD000
|
heap
|
page read and write
|
||
228E6C7A000
|
trusted library allocation
|
page read and write
|
||
228E741D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page execute and read and write
|
||
228E72E8000
|
trusted library allocation
|
page read and write
|
||
228E6EA6000
|
trusted library allocation
|
page read and write
|
||
19050BD3000
|
heap
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
228E73CA000
|
trusted library allocation
|
page read and write
|
||
228E7240000
|
trusted library allocation
|
page read and write
|
||
228E71B9000
|
trusted library allocation
|
page read and write
|
||
228E73FB000
|
trusted library allocation
|
page read and write
|
||
228E737D000
|
trusted library allocation
|
page read and write
|
||
228F708A000
|
trusted library allocation
|
page read and write
|
||
19060D39000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
7FF478B70000
|
trusted library allocation
|
page execute and read and write
|
||
228E720A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
19050AC0000
|
trusted library allocation
|
page read and write
|
||
228E6FE5000
|
trusted library allocation
|
page read and write
|
||
228E6F71000
|
trusted library allocation
|
page read and write
|
||
228E72F7000
|
trusted library allocation
|
page read and write
|
||
19050B00000
|
trusted library allocation
|
page read and write
|
||
228E7304000
|
trusted library allocation
|
page read and write
|
||
228E6F7D000
|
trusted library allocation
|
page read and write
|
||
228FF4AC000
|
heap
|
page read and write
|
||
7FFD9B795000
|
trusted library allocation
|
page read and write
|
||
228E720C000
|
trusted library allocation
|
page read and write
|
||
228E6FEB000
|
trusted library allocation
|
page read and write
|
||
19050E2E000
|
trusted library allocation
|
page read and write
|
||
19060C81000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
228FF439000
|
heap
|
page read and write
|
||
228FF3D0000
|
heap
|
page execute and read and write
|
||
228E6EA4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
228E744E000
|
trusted library allocation
|
page read and write
|
||
228E7201000
|
trusted library allocation
|
page read and write
|
||
228E7346000
|
trusted library allocation
|
page read and write
|
||
228E6CD4000
|
trusted library allocation
|
page read and write
|
||
228E7333000
|
trusted library allocation
|
page read and write
|
||
7FFD9B97B000
|
trusted library allocation
|
page read and write
|
||
228FEC50000
|
trusted library allocation
|
page read and write
|
||
228E7456000
|
trusted library allocation
|
page read and write
|
||
228FF3D4000
|
heap
|
page execute and read and write
|
||
19060D2F000
|
trusted library allocation
|
page read and write
|
||
19050F52000
|
trusted library allocation
|
page read and write
|
||
228E6E76000
|
trusted library allocation
|
page read and write
|
||
228E71DB000
|
trusted library allocation
|
page read and write
|
||
228E73B9000
|
trusted library allocation
|
page read and write
|
||
DA673FD000
|
stack
|
page read and write
|
||
461C5FE000
|
stack
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
228E71AA000
|
trusted library allocation
|
page read and write
|
||
228E6FF6000
|
trusted library allocation
|
page read and write
|
||
228E6EFB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
19050960000
|
trusted library allocation
|
page read and write
|
||
228E6EC4000
|
trusted library allocation
|
page read and write
|
||
228E6F6E000
|
trusted library allocation
|
page read and write
|
||
228E6FC5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
19050F57000
|
trusted library allocation
|
page read and write
|
||
228E500C000
|
heap
|
page read and write
|
||
228E6E7A000
|
trusted library allocation
|
page read and write
|
||
228E7282000
|
trusted library allocation
|
page read and write
|
||
DA66BF9000
|
stack
|
page read and write
|
||
228E6FD2000
|
trusted library allocation
|
page read and write
|
||
228E7410000
|
trusted library allocation
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
228E726F000
|
trusted library allocation
|
page read and write
|
||
228E728F000
|
trusted library allocation
|
page read and write
|
||
19050935000
|
heap
|
page read and write
|
||
7FFD9B782000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
228E5180000
|
trusted library allocation
|
page read and write
|
||
7FFD9B955000
|
trusted library allocation
|
page read and write
|
||
DA677FC000
|
stack
|
page read and write
|
||
19050F75000
|
trusted library allocation
|
page read and write
|
||
19050DE0000
|
trusted library allocation
|
page read and write
|
||
228E6F2E000
|
trusted library allocation
|
page read and write
|
||
461C1FF000
|
stack
|
page read and write
|
||
228E51C0000
|
trusted library allocation
|
page read and write
|
||
228E7302000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
228E724B000
|
trusted library allocation
|
page read and write
|
||
228E6F1B000
|
trusted library allocation
|
page read and write
|
||
1904EF25000
|
heap
|
page read and write
|
||
19050F70000
|
trusted library allocation
|
page read and write
|
||
228E6FB2000
|
trusted library allocation
|
page read and write
|
||
228F6F2C000
|
trusted library allocation
|
page read and write
|
||
228E738E000
|
trusted library allocation
|
page read and write
|
||
DA637ED000
|
stack
|
page read and write
|
||
228E71EC000
|
trusted library allocation
|
page read and write
|
||
228E502B000
|
heap
|
page read and write
|
||
228E73C6000
|
trusted library allocation
|
page read and write
|
||
228E7199000
|
trusted library allocation
|
page read and write
|
||
228E7195000
|
trusted library allocation
|
page read and write
|
||
19050C70000
|
heap
|
page execute and read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
228E718A000
|
trusted library allocation
|
page read and write
|
||
228E724F000
|
trusted library allocation
|
page read and write
|
||
228E6FC1000
|
trusted library allocation
|
page read and write
|
||
228E734F000
|
trusted library allocation
|
page read and write
|
||
228E6F4A000
|
trusted library allocation
|
page read and write
|
||
228E72D7000
|
trusted library allocation
|
page read and write
|
||
228E6ED9000
|
trusted library allocation
|
page read and write
|
||
228E7285000
|
trusted library allocation
|
page read and write
|
||
228E6EFE000
|
trusted library allocation
|
page read and write
|
||
1904EF80000
|
heap
|
page read and write
|
||
22880380000
|
trusted library section
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
228E7253000
|
trusted library allocation
|
page read and write
|
||
228E7362000
|
trusted library allocation
|
page read and write
|
||
228E72B9000
|
trusted library allocation
|
page read and write
|
||
228E6F11000
|
trusted library allocation
|
page read and write
|
||
228E73D9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
1904EFEF000
|
heap
|
page read and write
|
||
228E71D5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
19050E1E000
|
trusted library allocation
|
page read and write
|
||
19050930000
|
heap
|
page read and write
|
||
228E7400000
|
trusted library allocation
|
page read and write
|
||
19050BD0000
|
heap
|
page read and write
|
||
19050E74000
|
trusted library allocation
|
page read and write
|
||
228E6F92000
|
trusted library allocation
|
page read and write
|
||
228E6EF5000
|
trusted library allocation
|
page read and write
|
||
228E6F1D000
|
trusted library allocation
|
page read and write
|
||
228E73CF000
|
trusted library allocation
|
page read and write
|
||
228E73CC000
|
trusted library allocation
|
page read and write
|
||
228E72FA000
|
trusted library allocation
|
page read and write
|
||
228E727C000
|
trusted library allocation
|
page read and write
|
||
228E735F000
|
trusted library allocation
|
page read and write
|
||
228E6ED7000
|
trusted library allocation
|
page read and write
|
||
228E71DD000
|
trusted library allocation
|
page read and write
|
||
228E73F7000
|
trusted library allocation
|
page read and write
|
||
DA683FF000
|
stack
|
page read and write
|
||
461BDFD000
|
stack
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
19050E22000
|
trusted library allocation
|
page read and write
|
||
228E7308000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
228E7262000
|
trusted library allocation
|
page read and write
|
||
228E6C8C000
|
trusted library allocation
|
page read and write
|
||
19050F79000
|
trusted library allocation
|
page read and write
|
||
228E6CC4000
|
trusted library allocation
|
page read and write
|
||
228E6F9D000
|
trusted library allocation
|
page read and write
|
||
19050DB6000
|
trusted library allocation
|
page read and write
|
||
228E738C000
|
trusted library allocation
|
page read and write
|
||
19050C50000
|
heap
|
page execute and read and write
|
||
228E733C000
|
trusted library allocation
|
page read and write
|
||
DA630FF000
|
stack
|
page read and write
|
||
228E72F3000
|
trusted library allocation
|
page read and write
|
||
228E6EB1000
|
trusted library allocation
|
page read and write
|
||
19069A50000
|
heap
|
page read and write
|
||
DA63FFE000
|
stack
|
page read and write
|
||
19050E36000
|
trusted library allocation
|
page read and write
|
||
DA653FE000
|
stack
|
page read and write
|
||
228E6FBD000
|
trusted library allocation
|
page read and write
|
||
228E51E0000
|
trusted library allocation
|
page read and write
|
||
228E5000000
|
heap
|
page read and write
|
||
228E7295000
|
trusted library allocation
|
page read and write
|
||
19060D0F000
|
trusted library allocation
|
page read and write
|
||
19050FAA000
|
trusted library allocation
|
page read and write
|
||
228E72C6000
|
trusted library allocation
|
page read and write
|
||
228E5290000
|
heap
|
page read and write
|
||
228E6C81000
|
trusted library allocation
|
page read and write
|
||
19050D96000
|
trusted library allocation
|
page read and write
|
||
228E7298000
|
trusted library allocation
|
page read and write
|
||
228FF3E0000
|
heap
|
page read and write
|
||
228E6A6F000
|
heap
|
page read and write
|
||
228E6F6A000
|
trusted library allocation
|
page read and write
|
||
228E7370000
|
trusted library allocation
|
page read and write
|
||
228E7359000
|
trusted library allocation
|
page read and write
|
||
228E73EE000
|
trusted library allocation
|
page read and write
|
||
1904EF30000
|
heap
|
page read and write
|
||
228E6FF2000
|
trusted library allocation
|
page read and write
|
||
7FF4A44F0000
|
trusted library allocation
|
page execute and read and write
|
||
228E7223000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
228E6E78000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB42000
|
trusted library allocation
|
page read and write
|
||
228E6F2A000
|
trusted library allocation
|
page read and write
|
||
228E721B000
|
trusted library allocation
|
page read and write
|
There are 510 hidden memdumps, click here to show them.