IOC Report
QUOTATION_APRQTRA031244#U00b7PDF.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
QUOTATION_APRQTRA031244#U00b7PDF.scr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage user DataBase, version 0x620, checksum 0x5f3c1cc4, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\QUOTATION_APRQTRA031244#U00b7PDF.scr.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4czr4rc3.sms.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cgdkc3bu.gyo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oqg0abk2.hdp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wvhppwqi.1nz.ps1
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QUOTATION_APRQTRA031244#U00b7PDF.scr.exe
"C:\Users\user\Desktop\QUOTATION_APRQTRA031244#U00b7PDF.scr.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"Powershell.exe" ??????????-??????????E??????????x??????????e??????????c??????????u??????????t??????????i??????????o??????????n??????????P??????????o??????????l??????????i??????????c??????????y?????????? ??????????B??????????y??????????p??????????a??????????s??????????s?????????? ??????????-??????????c??????????o??????????m??????????m??????????a??????????n??????????d ?????????C?????????o?????????p?????????y?????????-?????????I?????????t?????????e?????????m 'C:\Users\user\Desktop\QUOTATION_APRQTRA031244#U00b7PDF.scr.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ESET.exe'
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://g.live.com/odclientsettings/ProdV21C:
unknown
http://crl.ver)
unknown
https://github.com/sam210723/goesrecv-monitor/releases/latest
unknown
http://go.micros
unknown
https://github.com/Pester/Pester
unknown
https://go.microsoft.UEV.psd1id
unknown
https://g.live.com/odclientsettings/Prod1C:
unknown
https://aka.ms/pscore6lB
unknown
https://vksdr.com/goesrecv-monitor
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://ip-api.com
unknown
https://go.microsoft.U
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 15 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
36F9000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
68BE000
stack
page read and write
FAF2A7E000
stack
page read and write
7F288000
trusted library allocation
page execute and read and write
5330000
heap
page read and write
708B000
heap
page read and write
6A3D000
stack
page read and write
A6A000
trusted library allocation
page execute and read and write
8370000
trusted library allocation
page read and write
6C1A000
stack
page read and write
2D1E000
stack
page read and write
9B6000
heap
page read and write
7E10000
heap
page read and write
FAF09FD000
stack
page read and write
26C0000
trusted library allocation
page read and write
2B6E000
stack
page read and write
4A30000
trusted library allocation
page read and write
2DB7000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
85D000
trusted library allocation
page execute and read and write
20D000
unkown
page readonly
636D000
stack
page read and write
72CE000
stack
page read and write
ADE000
stack
page read and write
2500000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
538000
stack
page read and write
7370000
trusted library allocation
page read and write
461E000
stack
page read and write
2F4118DF000
heap
page read and write
728E000
stack
page read and write
2F40CC90000
trusted library allocation
page read and write
65C7000
trusted library allocation
page read and write
2D75000
trusted library allocation
page read and write
706D000
heap
page read and write
58DE000
stack
page read and write
2F40D5A0000
trusted library allocation
page read and write
2F40C9D0000
trusted library allocation
page read and write
2F4117A0000
remote allocation
page read and write
BA7000
heap
page read and write
8400000
trusted library allocation
page read and write
24E0000
trusted library allocation
page execute and read and write
2F411760000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
7217000
trusted library allocation
page read and write
C1F000
stack
page read and write
6FEB000
heap
page read and write
5210000
trusted library allocation
page read and write
5FA2000
heap
page read and write
F7B000
heap
page read and write
7EAD000
stack
page read and write
46F2000
trusted library allocation
page read and write
2F412000000
heap
page read and write
777E000
stack
page read and write
2F40C150000
trusted library allocation
page read and write
84D000
trusted library allocation
page execute and read and write
117E000
stack
page read and write
B0C000
heap
page read and write
98E000
stack
page read and write
6AFE000
stack
page read and write
7059000
heap
page read and write
86E000
heap
page read and write
2F411600000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
51C0000
trusted library allocation
page read and write
7F60000
heap
page read and write
2F411730000
trusted library allocation
page read and write
2F411853000
heap
page read and write
7F50000
heap
page read and write
990000
heap
page read and write
F6E000
stack
page read and write
6FC0000
heap
page read and write
103D000
heap
page read and write
FAF24FE000
unkown
page readonly
2F40CB1A000
heap
page read and write
20A000
unkown
page readonly
4BB3000
heap
page read and write
4BB0000
heap
page read and write
2F40CB00000
heap
page read and write
A20000
trusted library allocation
page read and write
2D30000
heap
page execute and read and write
24F0000
trusted library allocation
page read and write
1236000
trusted library allocation
page execute and read and write
52EE000
stack
page read and write
6F1E000
stack
page read and write
FAF0FF9000
stack
page read and write
8211000
trusted library allocation
page read and write
FAF087B000
stack
page read and write
6A20000
heap
page read and write
2C10000
heap
page read and write
5840000
trusted library allocation
page read and write
2F4116D0000
trusted library allocation
page read and write
4A62000
trusted library allocation
page read and write
26CF000
trusted library allocation
page read and write
6D20000
heap
page read and write
6FB0000
heap
page execute and read and write
A66000
trusted library allocation
page execute and read and write
9F7000
heap
page read and write
BBF000
heap
page read and write
7E40000
trusted library allocation
page read and write
2F40D120000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
7360000
trusted library allocation
page execute and read and write
1213000
trusted library allocation
page execute and read and write
1260000
trusted library allocation
page read and write
2E37000
trusted library allocation
page read and write
2510000
heap
page read and write
563F000
stack
page read and write
573F000
stack
page read and write
2F40CB13000
heap
page read and write
AE0000
heap
page read and write
51DE000
trusted library allocation
page read and write
2F411750000
trusted library allocation
page read and write
FAF23FC000
stack
page read and write
507C000
stack
page read and write
4AD0000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
868000
heap
page read and write
7E30000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
7FBD000
heap
page read and write
2F40C302000
heap
page read and write
2F40C2FF000
heap
page read and write
2F4118C0000
heap
page read and write
5955000
heap
page read and write
2F40C329000
heap
page read and write
4691000
trusted library allocation
page read and write
5838000
trusted library allocation
page read and write
2F40C272000
heap
page read and write
A70000
trusted library allocation
page read and write
AAA000
stack
page read and write
51EE000
trusted library allocation
page read and write
84EE000
stack
page read and write
2F40C2A1000
heap
page read and write
4B95000
trusted library allocation
page read and write
763E000
stack
page read and write
7F40000
trusted library allocation
page read and write
4ECE000
stack
page read and write
5214000
trusted library allocation
page read and write
2F41181E000
heap
page read and write
FB6000
heap
page read and write
B92000
heap
page read and write
5FD6000
heap
page read and write
FAF0AFE000
unkown
page readonly
65B0000
trusted library allocation
page read and write
8004000
heap
page read and write
6ADD000
stack
page read and write
50C0000
trusted library allocation
page read and write
2F4118E2000
heap
page read and write
740000
heap
page read and write
5920000
heap
page read and write
818E000
stack
page read and write
2F40C306000
heap
page read and write
91F000
heap
page read and write
A60000
trusted library allocation
page read and write
4DB0000
trusted library section
page readonly
7B6000
heap
page read and write
553C000
stack
page read and write
2F41190A000
heap
page read and write
B19000
heap
page read and write
7FCD000
heap
page read and write
2F4116E0000
trusted library allocation
page read and write
527C000
stack
page read and write
4A3B000
trusted library allocation
page read and write
10EF000
stack
page read and write
1280000
heap
page read and write
843000
trusted library allocation
page execute and read and write
2F4116F0000
trusted library allocation
page read and write
6A2E000
heap
page read and write
FAF14FE000
unkown
page readonly
E20000
heap
page read and write
4D6E000
stack
page read and write
1200000
trusted library allocation
page read and write
7F20000
trusted library allocation
page read and write
4D7C000
stack
page read and write
6B9F000
stack
page read and write
2E33000
trusted library allocation
page read and write
65D0000
trusted library allocation
page read and write
36F1000
trusted library allocation
page read and write
5090000
heap
page read and write
6E5E000
stack
page read and write
7032000
heap
page read and write
5334000
heap
page read and write
4680000
heap
page execute and read and write
2F4118FA000
heap
page read and write
4AC0000
heap
page read and write
24DE000
stack
page read and write
5910000
heap
page read and write
2F4117A0000
remote allocation
page read and write
4590000
heap
page execute and read and write
2F41180E000
heap
page read and write
65F0000
trusted library allocation
page read and write
A34000
trusted library allocation
page read and write
6A0E000
stack
page read and write
7220000
trusted library allocation
page read and write
2F40C302000
heap
page read and write
A3D000
trusted library allocation
page execute and read and write
F70000
heap
page read and write
75FE000
stack
page read and write
2F4116F0000
trusted library allocation
page read and write
2F411644000
trusted library allocation
page read and write
4A3E000
trusted library allocation
page read and write
581D000
stack
page read and write
1214000
trusted library allocation
page read and write
9D0000
heap
page read and write
83FE000
stack
page read and write
2F40C240000
heap
page read and write
C8C000
stack
page read and write
2F40C020000
heap
page read and write
2F41182B000
heap
page read and write
1B0000
unkown
page readonly
2F4118F3000
heap
page read and write
5220000
trusted library allocation
page read and write
A33000
trusted library allocation
page execute and read and write
2F40C313000
heap
page read and write
2F40C29F000
heap
page read and write
6600000
trusted library allocation
page read and write
26BB000
stack
page read and write
56B9000
trusted library allocation
page read and write
2F40C213000
heap
page read and write
787F000
stack
page read and write
73A0000
trusted library allocation
page read and write
2F4115E0000
trusted library allocation
page read and write
904000
heap
page read and write
51F6000
trusted library allocation
page read and write
51E2000
trusted library allocation
page read and write
2F40CA15000
heap
page read and write
2F40CA02000
heap
page read and write
4C91000
trusted library allocation
page read and write
4E45000
trusted library allocation
page read and write
2F40C9E0000
trusted library allocation
page read and write
2F411640000
trusted library allocation
page read and write
693E000
stack
page read and write
2FA000
stack
page read and write
2F40CB5A000
heap
page read and write
2F411740000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
4CB0000
heap
page execute and read and write
455E000
stack
page read and write
2E1D000
trusted library allocation
page read and write
4D90000
trusted library allocation
page execute and read and write
2E02000
trusted library allocation
page read and write
2F411C70000
trusted library allocation
page read and write
FAF0EFE000
unkown
page readonly
FAF0CFE000
unkown
page readonly
90E000
stack
page read and write
1286000
heap
page read and write
734D000
stack
page read and write
1247000
trusted library allocation
page execute and read and write
2F40C040000
heap
page read and write
10F0000
heap
page read and write
51FD000
trusted library allocation
page read and write
26E0000
heap
page execute and read and write
6630000
heap
page read and write
FAF13FB000
stack
page read and write
2F411902000
heap
page read and write
6BFF000
stack
page read and write
A90000
trusted library allocation
page read and write
5831000
trusted library allocation
page read and write
5B0000
heap
page read and write
2F4118E9000
heap
page read and write
4A90000
trusted library allocation
page read and write
71C0000
trusted library allocation
page execute and read and write
2B78000
trusted library allocation
page read and write
7EF0000
heap
page read and write
2F411620000
trusted library allocation
page read and write
C3F000
stack
page read and write
5930000
heap
page read and write
2F4115F0000
trusted library allocation
page read and write
70D1000
heap
page read and write
6CDE000
stack
page read and write
C38000
trusted library allocation
page read and write
7FE3000
heap
page read and write
4A70000
trusted library allocation
page read and write
BA8000
stack
page read and write
660000
heap
page read and write
8014000
heap
page read and write
81C0000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page execute and read and write
8DD000
heap
page read and write
2F40CF40000
trusted library allocation
page read and write
5280000
heap
page execute and read and write
2F4117A0000
remote allocation
page read and write
2F4118FE000
heap
page read and write
FAF0DFE000
stack
page read and write
7F270000
trusted library allocation
page execute and read and write
7420000
trusted library allocation
page read and write
A5F000
stack
page read and write
721A000
trusted library allocation
page read and write
4A51000
trusted library allocation
page read and write
730E000
stack
page read and write
A90000
trusted library allocation
page read and write
9B8000
heap
page read and write
7F74000
heap
page read and write
7430000
trusted library allocation
page read and write
2F40C2FF000
heap
page read and write
A59000
trusted library allocation
page read and write
4A4E000
trusted library allocation
page read and write
2F411BE0000
trusted library allocation
page read and write
7210000
trusted library allocation
page read and write
2F40C317000
heap
page read and write
1242000
trusted library allocation
page read and write
6A4E000
stack
page read and write
2F41185E000
heap
page read and write
2F41188B000
heap
page read and write
2F411750000
trusted library allocation
page read and write
61E0000
heap
page read and write
5080000
heap
page read and write
6C5E000
stack
page read and write
A75000
trusted library allocation
page execute and read and write
B27000
heap
page read and write
3D69000
trusted library allocation
page read and write
9F0000
heap
page read and write
1070000
heap
page read and write
7122000
trusted library allocation
page read and write
65C0000
trusted library allocation
page read and write
A6A000
trusted library allocation
page execute and read and write
2F411700000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
1055000
heap
page read and write
800000
heap
page read and write
26D5000
trusted library allocation
page read and write
2E4B000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
45DF000
stack
page read and write
687D000
stack
page read and write
7B0000
heap
page read and write
2E45000
trusted library allocation
page read and write
CCD000
stack
page read and write
2F411630000
trusted library allocation
page read and write
2F4118B9000
heap
page read and write
2F40C2BD000
heap
page read and write
2F40C25B000
heap
page read and write
1270000
trusted library allocation
page execute and read and write
4E7D000
stack
page read and write
6E9F000
stack
page read and write
B1C000
stack
page read and write
2F411600000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
2F40CA00000
heap
page read and write
51DB000
trusted library allocation
page read and write
7F6C000
heap
page read and write
2F4116D0000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
850000
trusted library allocation
page read and write
A47000
heap
page read and write
844000
trusted library allocation
page read and write
65E0000
trusted library allocation
page execute and read and write
7410000
trusted library allocation
page read and write
8A2000
heap
page read and write
2DFE000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
6640000
trusted library allocation
page execute and read and write
2F40C200000
heap
page read and write
73F0000
trusted library allocation
page read and write
BF5000
heap
page read and write
73D0000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
6EDE000
stack
page read and write
FA9000
heap
page read and write
A77000
trusted library allocation
page execute and read and write
5699000
trusted library allocation
page read and write
2F40CB1A000
heap
page read and write
800F000
heap
page read and write
2F40C1E1000
trusted library allocation
page read and write
720E000
stack
page read and write
2F411900000
heap
page read and write
4DC0000
heap
page read and write
2F411910000
heap
page read and write
ADE000
stack
page read and write
FAF0BF7000
stack
page read and write
7EEE000
stack
page read and write
1240000
trusted library allocation
page read and write
465E000
stack
page read and write
8E0000
heap
page read and write
123A000
trusted library allocation
page execute and read and write
7061000
heap
page read and write
1232000
trusted library allocation
page read and write
4E72000
trusted library allocation
page read and write
2B2E000
stack
page read and write
4A5D000
trusted library allocation
page read and write
4F30000
heap
page read and write
CE0000
trusted library allocation
page read and write
6C9B000
stack
page read and write
7069000
heap
page read and write
2F41165E000
trusted library allocation
page read and write
A72000
trusted library allocation
page read and write
BF0000
heap
page read and write
887000
heap
page read and write
5FC0000
heap
page read and write
4ED0000
trusted library section
page read and write
2F40C2AF000
heap
page read and write
7350000
trusted library allocation
page read and write
26F1000
trusted library allocation
page read and write
CD0000
trusted library allocation
page execute and read and write
56F4000
trusted library allocation
page read and write
122D000
trusted library allocation
page execute and read and write
FAF10FE000
unkown
page readonly
A72000
trusted library allocation
page read and write
2DBD000
trusted library allocation
page read and write
A50000
trusted library allocation
page read and write
7F350000
trusted library allocation
page execute and read and write
2F411601000
trusted library allocation
page read and write
4D70000
trusted library allocation
page read and write
A7B000
trusted library allocation
page execute and read and write
7085000
heap
page read and write
47E6000
trusted library allocation
page read and write
AE7000
heap
page read and write
7E20000
trusted library allocation
page execute and read and write
7F86000
heap
page read and write
2F411630000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
5340000
heap
page read and write
2F40CB02000
heap
page read and write
860000
heap
page read and write
6650000
trusted library allocation
page read and write
121D000
trusted library allocation
page execute and read and write
707D000
heap
page read and write
7F10000
heap
page read and write
2F40C120000
heap
page read and write
2F40C27C000
heap
page read and write
1B2000
unkown
page readonly
5FD000
stack
page read and write
94E000
stack
page read and write
853000
trusted library allocation
page read and write
2F40C294000
heap
page read and write
3F7000
stack
page read and write
3D41000
trusted library allocation
page read and write
65DA000
trusted library allocation
page read and write
773F000
stack
page read and write
2F41184D000
heap
page read and write
2F40C277000
heap
page read and write
1210000
trusted library allocation
page read and write
7E3D000
trusted library allocation
page read and write
2F411800000
heap
page read and write
2F40C22B000
heap
page read and write
4F91000
heap
page read and write
B20000
heap
page read and write
2D41000
trusted library allocation
page read and write
7F32000
trusted library allocation
page read and write
F00000
heap
page read and write
6D1A000
stack
page read and write
2F40C28F000
heap
page read and write
FAF2AFE000
unkown
page readonly
840000
trusted library allocation
page read and write
68F0000
heap
page read and write
73B0000
trusted library allocation
page read and write
5202000
trusted library allocation
page read and write
2F411602000
trusted library allocation
page read and write
2F411B70000
trusted library allocation
page read and write
4A56000
trusted library allocation
page read and write
2F40CB04000
heap
page read and write
2F411840000
heap
page read and write
3DA5000
trusted library allocation
page read and write
9B0000
heap
page read and write
8EE000
heap
page read and write
FB3000
heap
page read and write
2F4116F0000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
5FA0000
heap
page read and write
78E000
stack
page read and write
6B1B000
stack
page read and write
CF0000
heap
page read and write
50A0000
trusted library allocation
page read and write
51F1000
trusted library allocation
page read and write
2F40C28D000
heap
page read and write
6BDE000
stack
page read and write
5915000
heap
page read and write
6B5E000
stack
page read and write
4A34000
trusted library allocation
page read and write
B30000
heap
page read and write
646E000
stack
page read and write
4FC000
stack
page read and write
2F411860000
heap
page read and write
124B000
trusted library allocation
page execute and read and write
7FDD000
heap
page read and write
C20000
heap
page readonly
113E000
stack
page read and write
7000000
heap
page read and write
5FF2000
heap
page read and write
A40000
heap
page read and write
4D80000
trusted library section
page read and write
5820000
trusted library allocation
page read and write
7FE000
stack
page read and write
81B0000
trusted library allocation
page execute and read and write
4595000
heap
page execute and read and write
There are 479 hidden memdumps, click here to show them.