IOC Report
QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe
"C:\Users\user\Desktop\QUOTATION_NOVQTRA071244#U00b7PDF.scr.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://filetransfer.io/data-package/u7ghXEYp/download
188.114.96.3
https://filetransfer.io/data-package/u7ghXEYp/download
188.114.96.3
http://checkip.dyndns.org/
193.122.130.0
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://s24.filetransfer.io/storage/download/72vwG3nYeuAb
188.114.96.3
https://github.com/mgravell/protobuf-netJ
unknown
https://reallyfreegeoip.org/xml/8.46.123.75p
unknown
http://crl.micros1
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://checkip.dyndns.org/q
unknown
http://reallyfreegeoip.org
unknown
https://filetransfer.io
unknown
https://github.com/mgravell/protobuf-net
unknown
https://reallyfreegeoip.org
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.com
unknown
http://filetransfer.io
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://s24.filetransfer.io
unknown
https://reallyfreegeoip.org/xml/8.46.123.75
188.114.97.3
https://reallyfreegeoip.org/xml/
unknown
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s24.filetransfer.io
188.114.96.3
filetransfer.io
188.114.96.3
reallyfreegeoip.org
188.114.97.3
checkip.dyndns.com
193.122.130.0
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
188.114.97.3
reallyfreegeoip.org
European Union
188.114.96.3
s24.filetransfer.io
European Union
193.122.130.0
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244#U00b7PDF_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244#U00b7PDF_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244#U00b7PDF_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244#U00b7PDF_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244#U00b7PDF_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244#U00b7PDF_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244#U00b7PDF_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244#U00b7PDF_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244#U00b7PDF_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244#U00b7PDF_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244#U00b7PDF_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244#U00b7PDF_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244#U00b7PDF_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\QUOTATION_NOVQTRA071244#U00b7PDF_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
FileDirectory
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1195ECF0000
trusted library allocation
page read and write
malicious
1F59FBCB000
trusted library allocation
page read and write
malicious
1F5AF989000
trusted library allocation
page read and write
malicious
1F59E080000
trusted library section
page read and write
malicious
1196ECC7000
trusted library allocation
page read and write
malicious
119775B0000
trusted library section
page read and write
malicious
1F59F981000
trusted library allocation
page read and write
malicious
1F59FB32000
trusted library allocation
page read and write
521B87E000
stack
page read and write
1F59DE50000
heap
page read and write
1F59FB2A000
trusted library allocation
page read and write
1195CF81000
heap
page read and write
521BC7E000
stack
page read and write
1F59FBA5000
trusted library allocation
page read and write
1F59DEBE000
heap
page read and write
1195CF7E000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
1F59FBB7000
trusted library allocation
page read and write
7FF848E33000
trusted library allocation
page read and write
1195F216000
trusted library allocation
page read and write
1195EE33000
trusted library allocation
page read and write
7FF848FB4000
trusted library allocation
page execute and read and write
1195F171000
trusted library allocation
page read and write
1195F12B000
trusted library allocation
page read and write
1195EC43000
trusted library allocation
page read and write
7FF848FB8000
trusted library allocation
page execute and read and write
1195EE60000
trusted library allocation
page read and write
1195F22B000
trusted library allocation
page read and write
1195F186000
trusted library allocation
page read and write
1195D043000
trusted library allocation
page read and write
1195EF8C000
trusted library allocation
page read and write
7FF848FB6000
trusted library allocation
page execute and read and write
1195EE14000
trusted library allocation
page read and write
E389FF000
stack
page read and write
E395F4000
stack
page read and write
1195F20B000
trusted library allocation
page read and write
1195F2D5000
trusted library allocation
page read and write
7FF848EE0000
trusted library allocation
page execute and read and write
1195EF61000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
521ABFE000
stack
page read and write
1F59DEBC000
heap
page read and write
E3A9FE000
stack
page read and write
7FF848ED0000
trusted library allocation
page read and write
7FF8490A7000
trusted library allocation
page read and write
1195F313000
trusted library allocation
page read and write
1195F083000
trusted library allocation
page read and write
7FF8491C0000
trusted library allocation
page read and write
1195EEF5000
trusted library allocation
page read and write
1195F311000
trusted library allocation
page read and write
1195F1A0000
trusted library allocation
page read and write
1195F177000
trusted library allocation
page read and write
1195EEAA000
trusted library allocation
page read and write
1195F395000
trusted library allocation
page read and write
1195EC01000
trusted library allocation
page read and write
1F59FC6E000
trusted library allocation
page read and write
1195EF5F000
trusted library allocation
page read and write
1F59DFA0000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page execute and read and write
521CCBE000
stack
page read and write
1195EE88000
trusted library allocation
page read and write
1195F149000
trusted library allocation
page read and write
1195EE42000
trusted library allocation
page read and write
7FF8491D0000
trusted library allocation
page read and write
1195F308000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
1195EF48000
trusted library allocation
page read and write
1195F38F000
trusted library allocation
page read and write
1196F00A000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
1195F2D3000
trusted library allocation
page read and write
1195F28D000
trusted library allocation
page read and write
1195EF5D000
trusted library allocation
page read and write
1195EEC4000
trusted library allocation
page read and write
1195F14D000
trusted library allocation
page read and write
1F59FCE9000
trusted library allocation
page read and write
1195F15C000
trusted library allocation
page read and write
1195EF9F000
trusted library allocation
page read and write
119778A0000
heap
page read and write
1195EE03000
trusted library allocation
page read and write
1195EEB7000
trusted library allocation
page read and write
1195EF4E000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
1195F260000
trusted library allocation
page read and write
1F59FC72000
trusted library allocation
page read and write
1195F291000
trusted library allocation
page read and write
1F5B82DE000
heap
page read and write
11976BD0000
trusted library allocation
page read and write
1195F289000
trusted library allocation
page read and write
1195F199000
trusted library allocation
page read and write
1195F1AA000
trusted library allocation
page read and write
1195EF0D000
trusted library allocation
page read and write
1195EF4C000
trusted library allocation
page read and write
1195EEC6000
trusted library allocation
page read and write
1195EE82000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page execute and read and write
7FF848E04000
trusted library allocation
page read and write
1195EF72000
trusted library allocation
page read and write
7FF8490C9000
trusted library allocation
page read and write
7FF848EB6000
trusted library allocation
page read and write
1195EEC8000
trusted library allocation
page read and write
1195F2C0000
trusted library allocation
page read and write
1195F182000
trusted library allocation
page read and write
1195F302000
trusted library allocation
page read and write
1195F209000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
1195EF7D000
trusted library allocation
page read and write
E3A1FD000
stack
page read and write
7FF848E24000
trusted library allocation
page read and write
1F59E000000
trusted library allocation
page read and write
1F5AFA43000
trusted library allocation
page read and write
1F59FC60000
trusted library allocation
page read and write
1F59FB1A000
trusted library allocation
page read and write
1195EE9B000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
1F59FB1E000
trusted library allocation
page read and write
1195F1E7000
trusted library allocation
page read and write
1195EF84000
trusted library allocation
page read and write
1195F33C000
trusted library allocation
page read and write
1197747A000
heap
page read and write
1195F319000
trusted library allocation
page read and write
1195EC79000
trusted library allocation
page read and write
1195EF3B000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
1195EF70000
trusted library allocation
page read and write
1195F160000
trusted library allocation
page read and write
1195F3C4000
trusted library allocation
page read and write
1195F2E6000
trusted library allocation
page read and write
1195F2A2000
trusted library allocation
page read and write
1195CD15000
unkown
page readonly
1195F164000
trusted library allocation
page read and write
1F59DFE0000
trusted library section
page read and write
1195EE93000
trusted library allocation
page read and write
1195F22F000
trusted library allocation
page read and write
1195EF28000
trusted library allocation
page read and write
52195EE000
stack
page read and write
1195F1C1000
trusted library allocation
page read and write
1195EF59000
trusted library allocation
page read and write
1195EF46000
trusted library allocation
page read and write
1195D040000
trusted library allocation
page read and write
E379FE000
stack
page read and write
1195EF08000
trusted library allocation
page read and write
1F59FAB2000
trusted library allocation
page read and write
1195F36F000
trusted library allocation
page read and write
1F59FACA000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
1F5B8913000
heap
page read and write
1F59E0F0000
heap
page read and write
1195EF2A000
trusted library allocation
page read and write
521C07D000
stack
page read and write
E375ED000
stack
page read and write
1F5AF9B4000
trusted library allocation
page read and write
1F59FAE0000
trusted library allocation
page read and write
1195F33E000
trusted library allocation
page read and write
1195EE62000
trusted library allocation
page read and write
1196EBA1000
trusted library allocation
page read and write
1195F29A000
trusted library allocation
page read and write
1195F37C000
trusted library allocation
page read and write
1F59FC9E000
trusted library allocation
page read and write
1195F391000
trusted library allocation
page read and write
1F59FCB0000
trusted library allocation
page read and write
1195F34D000
trusted library allocation
page read and write
1195EEAC000
trusted library allocation
page read and write
7FF849132000
trusted library allocation
page read and write
1195EEA6000
trusted library allocation
page read and write
1F5AFA12000
trusted library allocation
page read and write
1195F380000
trusted library allocation
page read and write
521C47F000
stack
page read and write
1195F300000
trusted library allocation
page read and write
1195F29E000
trusted library allocation
page read and write
1195F205000
trusted library allocation
page read and write
1F59DFC0000
heap
page read and write
1195EE4F000
trusted library allocation
page read and write
1195EE99000
trusted library allocation
page read and write
1195F1C7000
trusted library allocation
page read and write
1195EF5B000
trusted library allocation
page read and write
1195F3DB000
trusted library allocation
page read and write
1195F229000
trusted library allocation
page read and write
1195EF1B000
trusted library allocation
page read and write
1195F2F5000
trusted library allocation
page read and write
1195F262000
trusted library allocation
page read and write
1195F340000
trusted library allocation
page read and write
119773FA000
heap
page read and write
1F5B8910000
heap
page read and write
1195F11A000
trusted library allocation
page read and write
1195F2E4000
trusted library allocation
page read and write
1195F2F3000
trusted library allocation
page read and write
1195F1A4000
trusted library allocation
page read and write
1F5AFA37000
trusted library allocation
page read and write
E3B5FC000
stack
page read and write
1195F1DA000
trusted library allocation
page read and write
1196EEAE000
trusted library allocation
page read and write
7FF8490D4000
trusted library allocation
page read and write
1195EB30000
trusted library section
page read and write
1195F21E000
trusted library allocation
page read and write
1195F173000
trusted library allocation
page read and write
1F59FAD7000
trusted library allocation
page read and write
1195EE7E000
trusted library allocation
page read and write
E36F2E000
stack
page read and write
1195EE97000
trusted library allocation
page read and write
1195F14F000
trusted library allocation
page read and write
1195F218000
trusted library allocation
page read and write
1195F399000
trusted library allocation
page read and write
1195F34F000
trusted library allocation
page read and write
1195D0E0000
heap
page read and write
1F59FCA4000
trusted library allocation
page read and write
1195F278000
trusted library allocation
page read and write
1195F3A6000
trusted library allocation
page read and write
1195F393000
trusted library allocation
page read and write
1F59F970000
heap
page read and write
1F59DF50000
heap
page read and write
1F59FA82000
trusted library allocation
page read and write
1195EC4F000
trusted library allocation
page read and write
1195D200000
heap
page read and write
7FF848E44000
trusted library allocation
page read and write
1196EBB1000
trusted library allocation
page read and write
1195CF86000
heap
page read and write
1F59FB22000
trusted library allocation
page read and write
1195F27C000
trusted library allocation
page read and write
1195CCB2000
unkown
page readonly
1195EE56000
trusted library allocation
page read and write
1195EEB5000
trusted library allocation
page read and write
1195EE09000
trusted library allocation
page read and write
1195EE75000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page execute and read and write
1195F04A000
trusted library allocation
page read and write
1195EE31000
trusted library allocation
page read and write
521D0BE000
stack
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
1195EEF7000
trusted library allocation
page read and write
1195EEB3000
trusted library allocation
page read and write
E381FE000
stack
page read and write
7FF849000000
trusted library allocation
page read and write
1195EF7F000
trusted library allocation
page read and write
1F59E040000
heap
page execute and read and write
1195EE2B000
trusted library allocation
page read and write
7FF8491F0000
trusted library allocation
page read and write
1195F109000
trusted library allocation
page read and write
1195F21C000
trusted library allocation
page read and write
521A3FE000
stack
page read and write
1F59FB70000
trusted library allocation
page read and write
7FF848FD5000
trusted library allocation
page read and write
1F59DE90000
heap
page read and write
1195EF30000
trusted library allocation
page read and write
1195F10F000
trusted library allocation
page read and write
E399FE000
stack
page read and write
1195F193000
trusted library allocation
page read and write
1F59E025000
heap
page read and write
1195EBA1000
trusted library allocation
page read and write
1195EF81000
trusted library allocation
page read and write
1195CF54000
heap
page read and write
1F5B8290000
heap
page read and write
7FF4228F0000
trusted library allocation
page execute and read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF848FC0000
trusted library allocation
page read and write
E36EEE000
stack
page read and write
1195F23C000
trusted library allocation
page read and write
1195EBFA000
trusted library allocation
page read and write
E39DFE000
stack
page read and write
1195F2E2000
trusted library allocation
page read and write
1195F382000
trusted library allocation
page read and write
1195F2BC000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
1195EEB9000
trusted library allocation
page read and write
1195F362000
trusted library allocation
page read and write
1195F1C5000
trusted library allocation
page read and write
1F59DE7D000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
E37DFE000
stack
page read and write
7FF848FF0000
trusted library allocation
page read and write
1195F3AA000
trusted library allocation
page read and write
1196EC01000
trusted library allocation
page read and write
1195EECA000
trusted library allocation
page read and write
1195F1A2000
trusted library allocation
page read and write
1195EEF3000
trusted library allocation
page read and write
7FF848E02000
trusted library allocation
page read and write
1195EF6C000
trusted library allocation
page read and write
1F59DE58000
heap
page read and write
7FF848FAD000
trusted library allocation
page execute and read and write
119773A0000
heap
page read and write
1F59E0F5000
heap
page read and write
1F59DD60000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
1195F397000
trusted library allocation
page read and write
1195F27A000
trusted library allocation
page read and write
1195F249000
trusted library allocation
page read and write
1195CF1C000
heap
page read and write
E3A5F9000
stack
page read and write
1195EE12000
trusted library allocation
page read and write
1195F162000
trusted library allocation
page read and write
1195F2DE000
trusted library allocation
page read and write
1195F1A8000
trusted library allocation
page read and write
521B07E000
stack
page read and write
1195F2CB000
trusted library allocation
page read and write
1195EE45000
trusted library allocation
page read and write
521CC7E000
stack
page read and write
1195F1C9000
trusted library allocation
page read and write
1195F2AD000
trusted library allocation
page read and write
1195F207000
trusted library allocation
page read and write
1197748F000
heap
page read and write
1195F1D6000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
1195EC0C000
trusted library allocation
page read and write
7FF848E15000
trusted library allocation
page read and write
11977466000
heap
page read and write
1195EF6E000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
1F59FC56000
trusted library allocation
page read and write
521C87E000
stack
page read and write
1195D0E5000
heap
page read and write
1195EF92000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
1195EF4A000
trusted library allocation
page read and write
1F59FC50000
trusted library allocation
page read and write
7FF849210000
trusted library allocation
page read and write
1F59E060000
trusted library allocation
page read and write
1195D150000
heap
page execute and read and write
1195EE95000
trusted library allocation
page read and write
1195EE19000
trusted library allocation
page read and write
7FF848FA3000
trusted library allocation
page read and write
119773F8000
heap
page read and write
1F5B83E0000
heap
page read and write
1195EECC000
trusted library allocation
page read and write
7FF849202000
trusted library allocation
page read and write
1195F10D000
trusted library allocation
page read and write
1195F175000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
1195EE84000
trusted library allocation
page read and write
1195CF10000
heap
page read and write
1195F28B000
trusted library allocation
page read and write
1195EDFA000
trusted library allocation
page read and write
1195CEC0000
heap
page read and write
1195F3D3000
trusted library allocation
page read and write
1F59FAD3000
trusted library allocation
page read and write
1F59FB5D000
trusted library allocation
page read and write
1F59FC4B000
trusted library allocation
page read and write
1F59FCAA000
trusted library allocation
page read and write
1F59E020000
heap
page read and write
1195F1D2000
trusted library allocation
page read and write
1F59E0B0000
heap
page execute and read and write
1F5B82E0000
heap
page read and write
1195F122000
trusted library allocation
page read and write
1195EE73000
trusted library allocation
page read and write
1F59FC69000
trusted library allocation
page read and write
1195EF90000
trusted library allocation
page read and write
1195EE64000
trusted library allocation
page read and write
1195F3AC000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
1195EE86000
trusted library allocation
page read and write
7FF848FB2000
trusted library allocation
page read and write
1F59E050000
trusted library allocation
page read and write
1F59E0C0000
trusted library allocation
page read and write
1195EF06000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page execute and read and write
1195F342000
trusted library allocation
page read and write
1195CE80000
heap
page read and write
1195D084000
heap
page execute and read and write
1195F355000
trusted library allocation
page read and write
7FF8490CD000
trusted library allocation
page read and write
1F5B8362000
heap
page read and write
1195F367000
trusted library allocation
page read and write
1F59DD20000
remote allocation
page execute and read and write
1F59FA92000
trusted library allocation
page read and write
1195EF2E000
trusted library allocation
page read and write
1195D060000
trusted library allocation
page read and write
1195EF2C000
trusted library allocation
page read and write
1195CF56000
heap
page read and write
1195F37E000
trusted library allocation
page read and write
1F59FB2E000
trusted library allocation
page read and write
1195EC10000
trusted library allocation
page read and write
1F5AF9B2000
trusted library allocation
page read and write
7FF8490A3000
trusted library allocation
page read and write
E3ADFD000
stack
page read and write
1195F353000
trusted library allocation
page read and write
7FF84910E000
trusted library allocation
page read and write
1195F1A6000
trusted library allocation
page read and write
1195F364000
trusted library allocation
page read and write
1195F1C3000
trusted library allocation
page read and write
1F59FBA1000
trusted library allocation
page read and write
5219FF2000
stack
page read and write
1195EE91000
trusted library allocation
page read and write
1195EEA4000
trusted library allocation
page read and write
7FF8491F6000
trusted library allocation
page read and write
7FF84903B000
trusted library allocation
page read and write
521AFFD000
stack
page read and write
1195F25C000
trusted library allocation
page read and write
1195F3A4000
trusted library allocation
page read and write
1F5AF981000
trusted library allocation
page read and write
1195F386000
trusted library allocation
page read and write
1195F3D9000
trusted library allocation
page read and write
1195F153000
trusted library allocation
page read and write
E391FE000
stack
page read and write
7FF849070000
trusted library allocation
page execute and read and write
7FF848E4B000
trusted library allocation
page execute and read and write
1195F2D1000
trusted library allocation
page read and write
1195E9B7000
heap
page read and write
1195EE6F000
trusted library allocation
page read and write
1195F2C2000
trusted library allocation
page read and write
1F59F8E0000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
1195CCE3000
unkown
page readonly
7FF8491FA000
trusted library allocation
page read and write
521B47E000
stack
page read and write
7FF8490B0000
trusted library allocation
page read and write
1F59FADB000
trusted library allocation
page read and write
1195F16F000
trusted library allocation
page read and write
1195EF1E000
trusted library allocation
page read and write
1F59FB26000
trusted library allocation
page read and write
1F59E0C3000
trusted library allocation
page read and write
1195EF9D000
trusted library allocation
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
E38DFE000
stack
page read and write
7FF848FD0000
trusted library allocation
page read and write
7FF848E3B000
trusted library allocation
page read and write
1195F11C000
trusted library allocation
page read and write
7FF8491E0000
trusted library allocation
page read and write
1195F27E000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page read and write
1195F10B000
trusted library allocation
page read and write
1195EC54000
trusted library allocation
page read and write
1195F384000
trusted library allocation
page read and write
1195CCB0000
unkown
page readonly
1F59DF47000
heap
page read and write
1195F3B5000
trusted library allocation
page read and write
1195EF04000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
1195F2F1000
trusted library allocation
page read and write
1195EE40000
trusted library allocation
page read and write
1F59E030000
trusted library allocation
page read and write
1195D080000
heap
page execute and read and write
7FF4228D0000
trusted library allocation
page execute and read and write
1195F351000
trusted library allocation
page read and write
7FF4228E0000
trusted library allocation
page execute and read and write
1195CDA0000
heap
page read and write
1F5B8359000
heap
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
1195F231000
trusted library allocation
page read and write
1195F3B9000
trusted library allocation
page read and write
1195F32F000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
1195F317000
trusted library allocation
page read and write
1195F30F000
trusted library allocation
page read and write
1195D190000
heap
page read and write
1195EE4D000
trusted library allocation
page read and write
1195F25A000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
1195F151000
trusted library allocation
page read and write
1F5B82B0000
heap
page read and write
1195F2B8000
trusted library allocation
page read and write
1195F3D7000
trusted library allocation
page read and write
1F59FB49000
trusted library allocation
page read and write
1195F3D5000
trusted library allocation
page read and write
1195F240000
trusted library allocation
page read and write
11977630000
heap
page read and write
E3BDFE000
stack
page read and write
1195EB90000
heap
page execute and read and write
7FF848EC0000
trusted library allocation
page execute and read and write
1195F23E000
trusted library allocation
page read and write
1195F12F000
trusted library allocation
page read and write
1195EE01000
trusted library allocation
page read and write
1195EBE2000
trusted library allocation
page read and write
1195F11E000
trusted library allocation
page read and write
1195F2BE000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
1195F25E000
trusted library allocation
page read and write
7FF848E4D000
trusted library allocation
page execute and read and write
7FF849060000
trusted library allocation
page execute and read and write
E385FD000
stack
page read and write
1195F120000
trusted library allocation
page read and write
1195F2E0000
trusted library allocation
page read and write
1195F315000
trusted library allocation
page read and write
1195D030000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
1195EF15000
trusted library allocation
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
1195CEA0000
heap
page read and write
1195F35E000
trusted library allocation
page read and write
1195F2E8000
trusted library allocation
page read and write
1195F332000
trusted library allocation
page read and write
1195F1D8000
trusted library allocation
page read and write
1195F166000
trusted library allocation
page read and write
1195F21A000
trusted library allocation
page read and write
1195F191000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1195EC14000
trusted library allocation
page read and write
1195D1A0000
trusted library section
page read and write
1195EE3C000
trusted library allocation
page read and write
1195F2CF000
trusted library allocation
page read and write
1195D010000
trusted library allocation
page read and write
1195F2CD000
trusted library allocation
page read and write
1195F280000
trusted library allocation
page read and write
1195F1D4000
trusted library allocation
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
1195F3A8000
trusted library allocation
page read and write
7FF4289B0000
trusted library allocation
page execute and read and write
1195D205000
heap
page read and write
11977491000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
1195EE80000
trusted library allocation
page read and write
1195F24B000
trusted library allocation
page read and write
1195EE2F000
trusted library allocation
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
1195F22D000
trusted library allocation
page read and write
1195EE16000
trusted library allocation
page read and write
1F59FB84000
trusted library allocation
page read and write
1195F179000
trusted library allocation
page read and write
1F5B8342000
heap
page read and write
1195EE10000
trusted library allocation
page read and write
1195EC49000
trusted library allocation
page read and write
1F59DF70000
direct allocation
page read and write
1196EC78000
trusted library allocation
page read and write
1195F28F000
trusted library allocation
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
1F5AFA2E000
trusted library allocation
page read and write
1195F184000
trusted library allocation
page read and write
119774A0000
trusted library section
page read and write
1F59DE92000
heap
page read and write
1195EF17000
trusted library allocation
page read and write
1195F15E000
trusted library allocation
page read and write
There are 514 hidden memdumps, click here to show them.