IOC Report
Send for Peter Bayliss.msg

loading gif

Files

File Path
Type
Category
Malicious
Send for Peter Bayliss.msg
CDFV2 Microsoft Outlook Message
initial sample
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0786087c3c360803_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0998db3a32ab3f41_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0ace9ee3d914a5c0_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0f25049d69125b1e_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\230e5fe3e6f82b2c_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2798067b152b83c7_0
data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2a426f11fd8ebe18_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4a0e94571d979b3c_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4ca3cb58378aaa3f_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\560e9c8bff5008d8_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\56c4cd218555ae2b_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\64766d63a539c3ca_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6fb6d030c4ebbc21_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\7120c35b509b0fae_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\71febec55d5c75cd_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\72d9f526d2e2e7c8_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\78bff3512887b83d_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\86b8040b7132b608_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c159cc5880890bc_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c84d92a9dbce3e0_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8e417e79df3bf0e9_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\91cec06bb2836fa5_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\927a1596c37ebe5e_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\92c56fa2a6c4d5ba_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\946896ee27df7947_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\983b7a3da8f39a46_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\aba6710fde0876af_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\b6d5deb4812ac6e9_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bba29d2e6197e2f4_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\cf3e34002cde7e9c_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d449e58cb15daaf1_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\e58e492b0f04240a_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f0cf6dfa8a1afa3d_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f941376b2efdd6e6_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f971b7eda7fa05c3_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fd17b2d8331c91e8_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\febb41df4ea2b63a_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index~RF4da3ea.TMP (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-221129154453Z-191.bmp
PC bitmap, Windows 3.x format, 117 x -152 x 32, cbSize 71190, bits offset 54
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt21.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt16.lst.7052
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt21.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AcroFnt21.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AdobeFnt16.lst.7052
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Reader\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Reader\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Reader\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Reader\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Reader\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Reader\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache.bin
data
dropped
C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_13929_20386-20221129T1644340163-6624.etl
data
dropped
There are 47 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE
C:\Program Files\Microsoft Office\Root\Office16\OUTLOOK.EXE" /f "C:\Users\user\Desktop\Send for Peter Bayliss.msg
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\R172JYD4\Peter Bayliss 273238652.pdf
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\CrashPersistence\OUTLOOK\6624
0
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
CantBootResolution
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
ProfileBeingOpened
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
SessionId
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
BootDiagnosticsLogFile
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Diagnostics
OutlookBootFlag
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsData
CantBootResolution
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsData
BootDiagnosticsLogFile
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Logging\SavedData
SavedProfile_OUTLOOK_v1
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\GracefulExit\OUTLOOK\6624
0
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ClientTelemetry\Sampling
6
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Logging
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F00000000100000000F01FEC\Usage
OutlookMAPI2
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\CrashPersistence\OUTLOOK\6624
0
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2978C7F000
stack
page read and write
2361D697000
heap
page read and write
2361D649000
heap
page read and write
2100BF78000
heap
page read and write
2978DFE000
stack
page read and write
2100C02A000
heap
page read and write
20825790000
heap
page read and write
2361D63F000
heap
page read and write
1E174650000
heap
page read and write
2BB44C00000
heap
page read and write
2BB44B60000
heap
page read and write
2978D7D000
stack
page read and write
DDD5E7E000
stack
page read and write
1BC88A4F000
heap
page read and write
2361D68D000
heap
page read and write
2100C86A000
heap
page read and write
297897D000
stack
page read and write
208250CF000
heap
page read and write
297907A000
stack
page read and write
5C747FF000
stack
page read and write
2100BFFA000
heap
page read and write
2100BF30000
heap
page read and write
2361D66D000
heap
page read and write
2100C04D000
heap
page read and write
2361D664000
heap
page read and write
20825040000
heap
page read and write
F329AFE000
stack
page read and write
2361D647000
heap
page read and write
DDD5B7C000
stack
page read and write
2361D658000
heap
page read and write
2361D666000
heap
page read and write
2361D65D000
heap
page read and write
2100C00E000
heap
page read and write
2100C861000
heap
page read and write
1BC88A02000
heap
page read and write
20825874000
heap
page read and write
2BB45330000
trusted library allocation
page read and write
2100C034000
heap
page read and write
2100C027000
heap
page read and write
2100C004000
heap
page read and write
5B5887E000
stack
page read and write
208250F6000
heap
page read and write
2100BFB3000
heap
page read and write
20825882000
heap
page read and write
1BC88940000
heap
page read and write
2100CB57000
heap
page read and write
CE8B2F7000
stack
page read and write
2100BFE7000
heap
page read and write
2361D663000
heap
page read and write
2100C039000
heap
page read and write
2361D673000
heap
page read and write
5C74CFF000
stack
page read and write
20825074000
heap
page read and write
1BC88950000
heap
page read and write
CE8B478000
stack
page read and write
20824FB0000
heap
page read and write
2361D654000
heap
page read and write
2100CA0A000
heap
page read and write
2361D62B000
heap
page read and write
2100BFF3000
heap
page read and write
2BB44D02000
heap
page read and write
2100BFA3000
heap
page read and write
20825049000
heap
page read and write
2100BFF0000
heap
page read and write
2361D5A0000
trusted library allocation
page read and write
2100CA05000
heap
page read and write
DDD5D7E000
stack
page read and write
20825730000
heap
page read and write
2361D702000
heap
page read and write
F329A7E000
stack
page read and write
2100C87A000
heap
page read and write
2BB44BD0000
heap
page read and write
2100BFC0000
heap
page read and write
2100BFD6000
heap
page read and write
2100BFFA000
heap
page read and write
2100BF83000
heap
page read and write
1E17487E000
heap
page read and write
2361D66F000
heap
page read and write
F3297FC000
stack
page read and write
2100C039000
heap
page read and write
2100BFE2000
heap
page read and write
CE8B37F000
stack
page read and write
2100C015000
heap
page read and write
2361D687000
heap
page read and write
F329F7F000
stack
page read and write
2100C004000
heap
page read and write
2100C040000
heap
page read and write
F329E7E000
stack
page read and write
1E17485B000
heap
page read and write
2361D68E000
heap
page read and write
2082576F000
heap
page read and write
CE8B77D000
stack
page read and write
2100BF9C000
heap
page read and write
CE8ACDB000
stack
page read and write
2361D691000
heap
page read and write
DDD5EF9000
stack
page read and write
20825830000
heap
page read and write
1E174800000
heap
page read and write
DDD5DFD000
stack
page read and write
2100CA07000
heap
page read and write
2361D68B000
heap
page read and write
2100C86E000
heap
page read and write
2100C043000
heap
page read and write
2100C012000
heap
page read and write
5B58A7E000
stack
page read and write
2100BFDC000
heap
page read and write
1E174813000
heap
page read and write
2361D64B000
heap
page read and write
2361D641000
heap
page read and write
20825864000
heap
page read and write
2100C046000
heap
page read and write
2082510A000
heap
page read and write
20825128000
heap
page read and write
2361D642000
heap
page read and write
2361D67B000
heap
page read and write
2100C002000
heap
page read and write
5B58AFE000
stack
page read and write
2361D613000
heap
page read and write
2100C860000
heap
page read and write
2100BFFC000
heap
page read and write
1BC88B02000
heap
page read and write
2100BF95000
heap
page read and write
2100CA03000
heap
page read and write
2100BFDF000
heap
page read and write
2BB44B70000
heap
page read and write
2100BFC6000
heap
page read and write
2100C03A000
heap
page read and write
1E174640000
heap
page read and write
2361D510000
heap
page read and write
20825831000
heap
page read and write
2100C883000
heap
page read and write
2BB44C9A000
heap
page read and write
2100BFCE000
heap
page read and write
CE8B1FE000
stack
page read and write
2100BF91000
heap
page read and write
2100BFFD000
heap
page read and write
2100BF6F000
heap
page read and write
2978AFE000
stack
page read and write
CE8B57C000
stack
page read and write
2100C03C000
heap
page read and write
2100C04D000
heap
page read and write
2100BDB0000
heap
page read and write
5C74BFD000
stack
page read and write
5C749FC000
stack
page read and write
2100C039000
heap
page read and write
2BB44C8E000
heap
page read and write
CE8B67E000
stack
page read and write
2100BFB3000
heap
page read and write
2100C02C000
heap
page read and write
DDD5BF9000
stack
page read and write
2100C03C000
heap
page read and write
2BB45360000
trusted library allocation
page read and write
2100C016000
heap
page read and write
5C74AFE000
stack
page read and write
2100BFF7000
heap
page read and write
2100CB5B000
heap
page read and write
2100BFF0000
heap
page read and write
2100C00B000
heap
page read and write
2100BFF0000
heap
page read and write
2361D662000
heap
page read and write
2100BF6A000
heap
page read and write
1E174802000
heap
page read and write
5C746FB000
stack
page read and write
1BC88A00000
heap
page read and write
2100CA04000
heap
page read and write
F329C7E000
stack
page read and write
2100BFEC000
heap
page read and write
20825128000
heap
page read and write
20825855000
heap
page read and write
2082513E000
heap
page read and write
2100BFF7000
heap
page read and write
2100C014000
heap
page read and write
2100BFC8000
heap
page read and write
2100C027000
heap
page read and write
2100BFE9000
heap
page read and write
2100BFFD000
heap
page read and write
DDD587D000
stack
page read and write
2100BFF7000
heap
page read and write
2100BFBA000
heap
page read and write
2100C861000
heap
page read and write
2361D65E000
heap
page read and write
2100BFBE000
heap
page read and write
2BB44C44000
heap
page read and write
1E174846000
heap
page read and write
2100C980000
heap
page read and write
20825230000
trusted library allocation
page read and write
2BB45402000
trusted library allocation
page read and write
2100BFD3000
heap
page read and write
2361DE02000
trusted library allocation
page read and write
2100C04D000
heap
page read and write
1BC88A2B000
heap
page read and write
2100C883000
heap
page read and write
2100CB5E000
heap
page read and write
297867B000
stack
page read and write
1BC88A6D000
heap
page read and write
2100C024000
heap
page read and write
2100CA07000
heap
page read and write
1BC889D0000
trusted library allocation
page read and write
2100BFEC000
heap
page read and write
2978A7E000
stack
page read and write
F329D7E000
stack
page read and write
2100C01E000
heap
page read and write
2100BF35000
heap
page read and write
2100CB61000
heap
page read and write
2100C029000
heap
page read and write
2100BFFA000
heap
page read and write
2100C01C000
heap
page read and write
2100BFD8000
heap
page read and write
20825010000
heap
page read and write
2100C01F000
heap
page read and write
DDD5C7E000
stack
page read and write
2100BFAB000
heap
page read and write
5B585BE000
stack
page read and write
2100BFAB000
heap
page read and write
1E1746A0000
heap
page read and write
2100CB50000
heap
page read and write
1BC88A66000
heap
page read and write
2100CA0B000
heap
page read and write
20825872000
heap
page read and write
2082506A000
heap
page read and write
2100BFC0000
heap
page read and write
2100CA0E000
heap
page read and write
2100BFD2000
heap
page read and write
20825854000
heap
page read and write
2100BFEC000
heap
page read and write
2100BF9E000
heap
page read and write
20825879000
heap
page read and write
2100CA02000
heap
page read and write
2100C012000
heap
page read and write
1E175002000
trusted library allocation
page read and write
2361D600000
heap
page read and write
2BB44C75000
heap
page read and write
DDD5CFE000
stack
page read and write
2100BF96000
heap
page read and write
2100C015000
heap
page read and write
2BB44D00000
heap
page read and write
2100BFFA000
heap
page read and write
1E174879000
heap
page read and write
2100BFBB000
heap
page read and write
2100BFE2000
heap
page read and write
2100BEF0000
heap
page read and write
DDD5AFE000
stack
page read and write
2100BFEA000
heap
page read and write
2100C043000
heap
page read and write
2BB44C13000
heap
page read and write
2082576D000
heap
page read and write
2361D675000
heap
page read and write
1BC88A5C000
heap
page read and write
2100C002000
heap
page read and write
2100BFDC000
heap
page read and write
20825210000
heap
page read and write
2361D671000
heap
page read and write
1E174902000
heap
page read and write
2100C017000
heap
page read and write
2978B7E000
stack
page read and write
1E17486C000
heap
page read and write
1BC88A69000
heap
page read and write
2100C04D000
heap
page read and write
2100C02C000
heap
page read and write
2100CA0A000
heap
page read and write
2100C043000
heap
page read and write
2100C02C000
heap
page read and write
208250EE000
heap
page read and write
208252C0000
heap
page read and write
2100BED0000
heap
page read and write
1E174871000
heap
page read and write
208250E3000
heap
page read and write
20825844000
heap
page read and write
2100CA00000
heap
page read and write
20825888000
heap
page read and write
20825831000
heap
page read and write
2100BFCB000
heap
page read and write
2361D570000
heap
page read and write
2100BF9E000
heap
page read and write
2100BF50000
heap
page read and write
2100C043000
heap
page read and write
208257F8000
heap
page read and write
2100C046000
heap
page read and write
2100C86F000
heap
page read and write
2100C012000
heap
page read and write
2100C02C000
heap
page read and write
208250D1000
heap
page read and write
CE8B3FE000
stack
page read and write
2100C002000
heap
page read and write
2361D682000
heap
page read and write
1E174877000
heap
page read and write
DDD5F7F000
stack
page read and write
2100C00A000
heap
page read and write
2361D500000
heap
page read and write
5B589FC000
stack
page read and write
5B588FB000
stack
page read and write
2978EFE000
stack
page read and write
2361D628000
heap
page read and write
2361D685000
heap
page read and write
2100BFA3000
heap
page read and write
1E1747A0000
trusted library allocation
page read and write
2100CB59000
heap
page read and write
2100BFDC000
heap
page read and write
5B5897E000
stack
page read and write
5C742CB000
stack
page read and write
5C748FE000
stack
page read and write
2100C01C000
heap
page read and write
2100C01D000
heap
page read and write
2100C024000
heap
page read and write
2BB44C2B000
heap
page read and write
2100C873000
heap
page read and write
2100BF9E000
heap
page read and write
2100C00E000
heap
page read and write
2361D693000
heap
page read and write
2100CB64000
heap
page read and write
2100BFF5000
heap
page read and write
2100BFCA000
heap
page read and write
2100CB66000
heap
page read and write
20825774000
heap
page read and write
1BC89202000
trusted library allocation
page read and write
2361D626000
heap
page read and write
1E17485D000
heap
page read and write
2082508F000
heap
page read and write
2361D68B000
heap
page read and write
2978FFD000
stack
page read and write
1BC88A13000
heap
page read and write
2100C00D000
heap
page read and write
2100C034000
heap
page read and write
CE8B0FE000
stack
page read and write
1BC88A43000
heap
page read and write
2100BF58000
heap
page read and write
1BC889A0000
heap
page read and write
2100C031000
heap
page read and write
1E17482B000
heap
page read and write
2361D69B000
heap
page read and write
2100BF89000
heap
page read and write
2100C007000
heap
page read and write
DDD5A7E000
stack
page read and write
2361D66C000
heap
page read and write
2100BFCC000
heap
page read and write
2100CA0A000
heap
page read and write
2100C046000
heap
page read and write
2100C002000
heap
page read and write
1E174913000
heap
page read and write
2100BFF3000
heap
page read and write
2BB44D13000
heap
page read and write
2361D680000
heap
page read and write
2100C006000
heap
page read and write
2100BFAE000
heap
page read and write
208252C5000
heap
page read and write
5B58537000
stack
page read and write
2361D66B000
heap
page read and write
2100CB5C000
heap
page read and write
There are 338 hidden memdumps, click here to show them.