IOC Report
QUOTATION_NOVQTRA071244PDF.scr.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QUOTATION_NOVQTRA071244PDF.scr.exe
"C:\Users\user\Desktop\QUOTATION_NOVQTRA071244PDF.scr.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.microsoft.coH
unknown
http://checkip.dyndns.org/
193.122.6.168
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://reallyfreegeoip.org/xml/8.46.123.75p
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://checkip.dyndns.org/q
unknown
http://reallyfreegeoip.org
unknown
https://filetransfer.io
unknown
https://github.com/mgravell/protobuf-net
unknown
https://reallyfreegeoip.org
unknown
https://s24.filetransfer.io/storage/download/ndvzPJWaMUSB
188.114.97.3
http://checkip.dyndns.org
unknown
http://filetransfer.io/data-package/I7fmQg9d/download
188.114.96.3
http://checkip.dyndns.com
unknown
http://filetransfer.io
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://s24.filetransfer.io
unknown
https://reallyfreegeoip.org/xml/8.46.123.75
188.114.97.3
https://filetransfer.io/data-package/I7fmQg9d/download
188.114.96.3
https://reallyfreegeoip.org/xml/
unknown
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s24.filetransfer.io
188.114.97.3
filetransfer.io
188.114.96.3
reallyfreegeoip.org
188.114.97.3
checkip.dyndns.com
193.122.6.168
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
188.114.97.3
s24.filetransfer.io
European Union
193.122.6.168
checkip.dyndns.com
United States
188.114.96.3
filetransfer.io
European Union

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244PDF_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
FileDirectory
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
19060C89000
trusted library allocation
page read and write
malicious
19050C81000
trusted library allocation
page read and write
malicious
19050ECE000
trusted library allocation
page read and write
malicious
22880090000
trusted library section
page read and write
malicious
228E6D71000
trusted library allocation
page read and write
malicious
228F6D46000
trusted library allocation
page read and write
malicious
19050AE0000
trusted library section
page read and write
malicious
228E6F21000
trusted library allocation
page read and write
228E6F28000
trusted library allocation
page read and write
228E6C94000
trusted library allocation
page read and write
228E71F2000
trusted library allocation
page read and write
228E7243000
trusted library allocation
page read and write
228E72A2000
trusted library allocation
page read and write
228E7306000
trusted library allocation
page read and write
DA643FE000
stack
page read and write
46193EF000
stack
page read and write
1904F01A000
heap
page read and write
19050E87000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
228E7445000
trusted library allocation
page read and write
19050FB6000
trusted library allocation
page read and write
228E72A6000
trusted library allocation
page read and write
7FFD9B932000
trusted library allocation
page read and write
7FFD9BA4D000
trusted library allocation
page read and write
228E6EDB000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
7FFD9B934000
trusted library allocation
page execute and read and write
19050BE8000
heap
page read and write
7FF4A4500000
trusted library allocation
page execute and read and write
19050B9C000
heap
page read and write
228E7266000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
228E7291000
trusted library allocation
page read and write
228E6CD8000
trusted library allocation
page read and write
228E71FF000
trusted library allocation
page read and write
228E4F10000
heap
page read and write
228E6EA0000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
228E7430000
trusted library allocation
page read and write
19060D3C000
trusted library allocation
page read and write
228E7392000
trusted library allocation
page read and write
228E70C1000
trusted library allocation
page read and write
19050DD8000
trusted library allocation
page read and write
228E5120000
heap
page read and write
228E6FBF000
trusted library allocation
page read and write
190694A0000
heap
page read and write
228E6FD0000
trusted library allocation
page read and write
228E6F0C000
trusted library allocation
page read and write
22880180000
heap
page read and write
228F6C21000
trusted library allocation
page read and write
228E738A000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
461B9FE000
stack
page read and write
228E6F41000
trusted library allocation
page read and write
228E6EB3000
trusted library allocation
page read and write
228E6EB7000
trusted library allocation
page read and write
228E6F3D000
trusted library allocation
page read and write
228E720E000
trusted library allocation
page read and write
DA663FE000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
228E723C000
trusted library allocation
page read and write
228E734A000
trusted library allocation
page read and write
461C63E000
stack
page read and write
19050D94000
trusted library allocation
page read and write
228E737B000
trusted library allocation
page read and write
DA66FFE000
stack
page read and write
7FFD9B920000
trusted library allocation
page read and write
19050980000
trusted library allocation
page read and write
228E7231000
trusted library allocation
page read and write
228E73C8000
trusted library allocation
page read and write
228E7186000
trusted library allocation
page read and write
19050E3B000
trusted library allocation
page read and write
228E72AB000
trusted library allocation
page read and write
228E7016000
trusted library allocation
page read and write
19050FA4000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
7FFD9B910000
trusted library allocation
page read and write
461ADFD000
stack
page read and write
228E73DD000
trusted library allocation
page read and write
19050DE4000
trusted library allocation
page read and write
228E5440000
heap
page read and write
228E7184000
trusted library allocation
page read and write
7FFD9BA4B000
trusted library allocation
page read and write
228E6C10000
heap
page read and write
228E6FD4000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
228E72A8000
trusted library allocation
page read and write
1904EFB0000
heap
page read and write
228E7326000
trusted library allocation
page read and write
228E6FD8000
trusted library allocation
page read and write
228E6F2C000
trusted library allocation
page read and write
228E71D9000
trusted library allocation
page read and write
228F6CF8000
trusted library allocation
page read and write
228E5100000
heap
page read and write
19050B9A000
heap
page read and write
228E740A000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
228E7426000
trusted library allocation
page read and write
228E7280000
trusted library allocation
page read and write
228E6EE6000
trusted library allocation
page read and write
19050E2A000
trusted library allocation
page read and write
228E73BB000
trusted library allocation
page read and write
228E6F39000
trusted library allocation
page read and write
4619DF2000
stack
page read and write
7FFD9BA49000
trusted library allocation
page read and write
228E6F94000
trusted library allocation
page read and write
19069610000
heap
page read and write
19050AB0000
trusted library allocation
page read and write
228E6EF9000
trusted library allocation
page read and write
228E6E8B000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page execute and read and write
228E6C21000
trusted library allocation
page read and write
228E6F0A000
trusted library allocation
page read and write
DA63BFE000
stack
page read and write
19050F66000
trusted library allocation
page read and write
228E7413000
trusted library allocation
page read and write
228E730A000
trusted library allocation
page read and write
228E71F0000
trusted library allocation
page read and write
228E71D7000
trusted library allocation
page read and write
228E7251000
trusted library allocation
page read and write
7FF4A44E0000
trusted library allocation
page execute and read and write
228E6FE7000
trusted library allocation
page read and write
228E6F0E000
trusted library allocation
page read and write
228E7390000
trusted library allocation
page read and write
228E7221000
trusted library allocation
page read and write
228E72A4000
trusted library allocation
page read and write
228E724D000
trusted library allocation
page read and write
228E7452000
trusted library allocation
page read and write
19050E4D000
trusted library allocation
page read and write
228E6F24000
trusted library allocation
page read and write
228E6ED5000
trusted library allocation
page read and write
228E72D5000
trusted library allocation
page read and write
228E73FD000
trusted library allocation
page read and write
DA647FE000
stack
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
228FF3E7000
heap
page read and write
22880480000
heap
page read and write
228E6E8D000
trusted library allocation
page read and write
228E5040000
heap
page read and write
19050DDC000
trusted library allocation
page read and write
228E6F9F000
trusted library allocation
page read and write
228E7337000
trusted library allocation
page read and write
228E719C000
trusted library allocation
page read and write
228E7012000
trusted library allocation
page read and write
DA65BF4000
stack
page read and write
228E5043000
heap
page read and write
228E6F7B000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
19050B50000
heap
page read and write
7FFD9B92D000
trusted library allocation
page execute and read and write
228E7319000
trusted library allocation
page read and write
228E6CCE000
trusted library allocation
page read and write
228E71EA000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
228E71FB000
trusted library allocation
page read and write
1904EF50000
direct allocation
page read and write
228E7271000
trusted library allocation
page read and write
228E6C61000
trusted library allocation
page read and write
22880110000
trusted library section
page read and write
19050EA8000
trusted library allocation
page read and write
228E6EEA000
trusted library allocation
page read and write
228E721F000
trusted library allocation
page read and write
228E71C8000
trusted library allocation
page read and write
228E6F3F000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
228E7339000
trusted library allocation
page read and write
228E6FE9000
trusted library allocation
page read and write
DA6313E000
stack
page read and write
7FFD9B930000
trusted library allocation
page read and write
228E741F000
trusted library allocation
page read and write
7FFD9BA23000
trusted library allocation
page read and write
19050F5D000
trusted library allocation
page read and write
228E7007000
trusted library allocation
page read and write
228E7348000
trusted library allocation
page read and write
228E6FBB000
trusted library allocation
page read and write
228E6FA3000
trusted library allocation
page read and write
228E72DC000
trusted library allocation
page read and write
228E71EE000
trusted library allocation
page read and write
19050BED000
heap
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
228E731D000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
228E4E30000
unkown
page readonly
19050E26000
trusted library allocation
page read and write
228E4E34000
unkown
page readonly
228E4E83000
unkown
page readonly
228E7328000
trusted library allocation
page read and write
228E6F08000
trusted library allocation
page read and write
228E6FD6000
trusted library allocation
page read and write
7FFD9BA54000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
228E735D000
trusted library allocation
page read and write
19050EA4000
trusted library allocation
page read and write
228E6C90000
trusted library allocation
page read and write
228E71A4000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page execute and read and write
19050E32000
trusted library allocation
page read and write
228E5140000
heap
page read and write
7FFD9BA72000
trusted library allocation
page read and write
19050DCE000
trusted library allocation
page read and write
228E6EDD000
trusted library allocation
page read and write
228E71C4000
trusted library allocation
page read and write
228E736C000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
228E71CC000
trusted library allocation
page read and write
DA64BFC000
stack
page read and write
228E4E32000
unkown
page readonly
228E734C000
trusted library allocation
page read and write
228E5445000
heap
page read and write
228E72F5000
trusted library allocation
page read and write
228E71CA000
trusted library allocation
page read and write
228E4E51000
unkown
page readonly
461B1FE000
stack
page read and write
228E7193000
trusted library allocation
page read and write
228E6F32000
trusted library allocation
page read and write
19050FB0000
trusted library allocation
page read and write
228E72C4000
trusted library allocation
page read and write
19060D14000
trusted library allocation
page read and write
228E5074000
heap
page read and write
228E7014000
trusted library allocation
page read and write
228E71DF000
trusted library allocation
page read and write
DA667FD000
stack
page read and write
228E7450000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
228E6FF4000
trusted library allocation
page read and write
19050D7E000
trusted library allocation
page read and write
228E7421000
trusted library allocation
page read and write
228E6EA9000
trusted library allocation
page read and write
228E51A0000
trusted library allocation
page read and write
228E6FFA000
trusted library allocation
page read and write
19050BEB000
heap
page read and write
228E6FF8000
trusted library allocation
page read and write
228E71E8000
trusted library allocation
page read and write
228E6FC3000
trusted library allocation
page read and write
228E72B7000
trusted library allocation
page read and write
228E6F30000
trusted library allocation
page read and write
228E73BD000
trusted library allocation
page read and write
228E6F7F000
trusted library allocation
page read and write
228E7182000
trusted library allocation
page read and write
228FF3EB000
heap
page read and write
19050AA0000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page execute and read and write
461CE7E000
stack
page read and write
DA657FF000
stack
page read and write
7FFD9B782000
trusted library allocation
page read and write
228E51B0000
heap
page execute and read and write
228E7293000
trusted library allocation
page read and write
DA64FFE000
stack
page read and write
228E5295000
heap
page read and write
228E6ECC000
trusted library allocation
page read and write
228E71B7000
trusted library allocation
page read and write
228E73AA000
trusted library allocation
page read and write
228E7434000
trusted library allocation
page read and write
228E7423000
trusted library allocation
page read and write
461A9FF000
stack
page read and write
228E6FE3000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
228E723E000
trusted library allocation
page read and write
7FFD9B923000
trusted library allocation
page read and write
228E7009000
trusted library allocation
page read and write
228F6C31000
trusted library allocation
page read and write
228E6EC6000
trusted library allocation
page read and write
228E72D9000
trusted library allocation
page read and write
228E51C3000
trusted library allocation
page read and write
19050B03000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page read and write
DA65FFE000
stack
page read and write
228E743D000
trusted library allocation
page read and write
461CA3E000
stack
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B950000
trusted library allocation
page read and write
228E7379000
trusted library allocation
page read and write
19050940000
heap
page read and write
1904EFA0000
trusted library section
page read and write
19069613000
heap
page read and write
228E6FA1000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
228E6F6C000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
228E7454000
trusted library allocation
page read and write
228E506B000
heap
page read and write
228E723A000
trusted library allocation
page read and write
228E73F9000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
228E6EB9000
trusted library allocation
page read and write
7FFD9B938000
trusted library allocation
page execute and read and write
228E73B7000
trusted library allocation
page read and write
22880000000
heap
page execute and read and write
228E6F8C000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
228FF49A000
heap
page read and write
228E70FA000
trusted library allocation
page read and write
228E740E000
trusted library allocation
page read and write
228E6EBB000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
7FFD9BA10000
trusted library allocation
page read and write
228E736E000
trusted library allocation
page read and write
228E73B5000
trusted library allocation
page read and write
1904EF20000
heap
page read and write
228E6F8E000
trusted library allocation
page read and write
228F6C81000
trusted library allocation
page read and write
228FF620000
trusted library section
page read and write
228E721D000
trusted library allocation
page read and write
1904EEC0000
remote allocation
page execute and read and write
228E735B000
trusted library allocation
page read and write
228E7188000
trusted library allocation
page read and write
228E6FA6000
trusted library allocation
page read and write
7FFD9BA27000
trusted library allocation
page read and write
1904EF00000
heap
page read and write
228FF437000
heap
page read and write
228FF490000
heap
page read and write
228E73E0000
trusted library allocation
page read and write
7FFD9B936000
trusted library allocation
page execute and read and write
1904EFB8000
heap
page read and write
461CA7E000
stack
page read and write
228E6EA2000
trusted library allocation
page read and write
7FFD9BB3A000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
228E740C000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
228E72C2000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
228E72D3000
trusted library allocation
page read and write
228E6CF9000
trusted library allocation
page read and write
228E7197000
trusted library allocation
page read and write
461B5FE000
stack
page read and write
19050BCD000
heap
page read and write
228E6C7A000
trusted library allocation
page read and write
228E741D000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page execute and read and write
228E72E8000
trusted library allocation
page read and write
228E6EA6000
trusted library allocation
page read and write
19050BD3000
heap
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
228E73CA000
trusted library allocation
page read and write
228E7240000
trusted library allocation
page read and write
228E71B9000
trusted library allocation
page read and write
228E73FB000
trusted library allocation
page read and write
228E737D000
trusted library allocation
page read and write
228F708A000
trusted library allocation
page read and write
19060D39000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FF478B70000
trusted library allocation
page execute and read and write
228E720A000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
19050AC0000
trusted library allocation
page read and write
228E6FE5000
trusted library allocation
page read and write
228E6F71000
trusted library allocation
page read and write
228E72F7000
trusted library allocation
page read and write
19050B00000
trusted library allocation
page read and write
228E7304000
trusted library allocation
page read and write
228E6F7D000
trusted library allocation
page read and write
228FF4AC000
heap
page read and write
7FFD9B795000
trusted library allocation
page read and write
228E720C000
trusted library allocation
page read and write
228E6FEB000
trusted library allocation
page read and write
19050E2E000
trusted library allocation
page read and write
19060C81000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
228FF439000
heap
page read and write
228FF3D0000
heap
page execute and read and write
228E6EA4000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
228E744E000
trusted library allocation
page read and write
228E7201000
trusted library allocation
page read and write
228E7346000
trusted library allocation
page read and write
228E6CD4000
trusted library allocation
page read and write
228E7333000
trusted library allocation
page read and write
7FFD9B97B000
trusted library allocation
page read and write
228FEC50000
trusted library allocation
page read and write
228E7456000
trusted library allocation
page read and write
228FF3D4000
heap
page execute and read and write
19060D2F000
trusted library allocation
page read and write
19050F52000
trusted library allocation
page read and write
228E6E76000
trusted library allocation
page read and write
228E71DB000
trusted library allocation
page read and write
228E73B9000
trusted library allocation
page read and write
DA673FD000
stack
page read and write
461C5FE000
stack
page read and write
7FFD9BB20000
trusted library allocation
page read and write
228E71AA000
trusted library allocation
page read and write
228E6FF6000
trusted library allocation
page read and write
228E6EFB000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
19050960000
trusted library allocation
page read and write
228E6EC4000
trusted library allocation
page read and write
228E6F6E000
trusted library allocation
page read and write
228E6FC5000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
19050F57000
trusted library allocation
page read and write
228E500C000
heap
page read and write
228E6E7A000
trusted library allocation
page read and write
228E7282000
trusted library allocation
page read and write
DA66BF9000
stack
page read and write
228E6FD2000
trusted library allocation
page read and write
228E7410000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
228E726F000
trusted library allocation
page read and write
228E728F000
trusted library allocation
page read and write
19050935000
heap
page read and write
7FFD9B782000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
7FFD9B9E0000
trusted library allocation
page read and write
228E5180000
trusted library allocation
page read and write
7FFD9B955000
trusted library allocation
page read and write
DA677FC000
stack
page read and write
19050F75000
trusted library allocation
page read and write
19050DE0000
trusted library allocation
page read and write
228E6F2E000
trusted library allocation
page read and write
461C1FF000
stack
page read and write
228E51C0000
trusted library allocation
page read and write
228E7302000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
228E724B000
trusted library allocation
page read and write
228E6F1B000
trusted library allocation
page read and write
1904EF25000
heap
page read and write
19050F70000
trusted library allocation
page read and write
228E6FB2000
trusted library allocation
page read and write
228F6F2C000
trusted library allocation
page read and write
228E738E000
trusted library allocation
page read and write
DA637ED000
stack
page read and write
228E71EC000
trusted library allocation
page read and write
228E502B000
heap
page read and write
228E73C6000
trusted library allocation
page read and write
228E7199000
trusted library allocation
page read and write
228E7195000
trusted library allocation
page read and write
19050C70000
heap
page execute and read and write
7FFD9B794000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
228E718A000
trusted library allocation
page read and write
228E724F000
trusted library allocation
page read and write
228E6FC1000
trusted library allocation
page read and write
228E734F000
trusted library allocation
page read and write
228E6F4A000
trusted library allocation
page read and write
228E72D7000
trusted library allocation
page read and write
228E6ED9000
trusted library allocation
page read and write
228E7285000
trusted library allocation
page read and write
228E6EFE000
trusted library allocation
page read and write
1904EF80000
heap
page read and write
22880380000
trusted library section
page read and write
7FFD9BA20000
trusted library allocation
page read and write
228E7253000
trusted library allocation
page read and write
228E7362000
trusted library allocation
page read and write
228E72B9000
trusted library allocation
page read and write
228E6F11000
trusted library allocation
page read and write
228E73D9000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
1904EFEF000
heap
page read and write
228E71D5000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
19050E1E000
trusted library allocation
page read and write
19050930000
heap
page read and write
228E7400000
trusted library allocation
page read and write
19050BD0000
heap
page read and write
19050E74000
trusted library allocation
page read and write
228E6F92000
trusted library allocation
page read and write
228E6EF5000
trusted library allocation
page read and write
228E6F1D000
trusted library allocation
page read and write
228E73CF000
trusted library allocation
page read and write
228E73CC000
trusted library allocation
page read and write
228E72FA000
trusted library allocation
page read and write
228E727C000
trusted library allocation
page read and write
228E735F000
trusted library allocation
page read and write
228E6ED7000
trusted library allocation
page read and write
228E71DD000
trusted library allocation
page read and write
228E73F7000
trusted library allocation
page read and write
DA683FF000
stack
page read and write
461BDFD000
stack
page read and write
7FFD9BB10000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page execute and read and write
7FFD9B940000
trusted library allocation
page read and write
19050E22000
trusted library allocation
page read and write
228E7308000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
228E7262000
trusted library allocation
page read and write
228E6C8C000
trusted library allocation
page read and write
19050F79000
trusted library allocation
page read and write
228E6CC4000
trusted library allocation
page read and write
228E6F9D000
trusted library allocation
page read and write
19050DB6000
trusted library allocation
page read and write
228E738C000
trusted library allocation
page read and write
19050C50000
heap
page execute and read and write
228E733C000
trusted library allocation
page read and write
DA630FF000
stack
page read and write
228E72F3000
trusted library allocation
page read and write
228E6EB1000
trusted library allocation
page read and write
19069A50000
heap
page read and write
DA63FFE000
stack
page read and write
19050E36000
trusted library allocation
page read and write
DA653FE000
stack
page read and write
228E6FBD000
trusted library allocation
page read and write
228E51E0000
trusted library allocation
page read and write
228E5000000
heap
page read and write
228E7295000
trusted library allocation
page read and write
19060D0F000
trusted library allocation
page read and write
19050FAA000
trusted library allocation
page read and write
228E72C6000
trusted library allocation
page read and write
228E5290000
heap
page read and write
228E6C81000
trusted library allocation
page read and write
19050D96000
trusted library allocation
page read and write
228E7298000
trusted library allocation
page read and write
228FF3E0000
heap
page read and write
228E6A6F000
heap
page read and write
228E6F6A000
trusted library allocation
page read and write
228E7370000
trusted library allocation
page read and write
228E7359000
trusted library allocation
page read and write
228E73EE000
trusted library allocation
page read and write
1904EF30000
heap
page read and write
228E6FF2000
trusted library allocation
page read and write
7FF4A44F0000
trusted library allocation
page execute and read and write
228E7223000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
228E6E78000
trusted library allocation
page read and write
7FFD9BB42000
trusted library allocation
page read and write
228E6F2A000
trusted library allocation
page read and write
228E721B000
trusted library allocation
page read and write
There are 510 hidden memdumps, click here to show them.