IOC Report
Statement JULY #U007e SEP 2024 USD 19,055.00.exe

loading gif

Files

File Path
Type
Category
Malicious
Statement JULY #U007e SEP 2024 USD 19,055.00.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Adobe\adobe.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Adobe\adobe.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe
"C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe"
malicious
C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe
"C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe"
malicious
C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe
"C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe"
malicious
C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe
"C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe"
malicious
C:\Users\user\AppData\Roaming\Adobe\adobe.exe
"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
malicious
C:\Users\user\AppData\Roaming\Adobe\adobe.exe
"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
malicious
C:\Users\user\AppData\Roaming\Adobe\adobe.exe
"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
malicious
C:\Users\user\AppData\Roaming\Adobe\adobe.exe
"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
malicious
C:\Users\user\AppData\Roaming\Adobe\adobe.exe
"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
malicious

URLs

Name
IP
Malicious
https://api.ipify.org/
172.67.74.152
http://www.typography.netD
unknown
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
https://docs.mic
unknown
http://www.sajatypeworks.com~
unknown
http://www.tiro.com
unknown
http://www.fonts.com
unknown
http://en.wkH
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://s4.serv00.com
unknown
http://www.sajatypeworks.com
unknown
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s4.serv00.com
213.189.52.181
malicious
api.ipify.org
172.67.74.152

IPs

IP
Domain
Country
Malicious
213.189.52.181
s4.serv00.com
Poland
malicious
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement JULY #U007e SEP 2024 USD 19,055_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement JULY #U007e SEP 2024 USD 19,055_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement JULY #U007e SEP 2024 USD 19,055_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement JULY #U007e SEP 2024 USD 19,055_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement JULY #U007e SEP 2024 USD 19,055_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement JULY #U007e SEP 2024 USD 19,055_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement JULY #U007e SEP 2024 USD 19,055_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement JULY #U007e SEP 2024 USD 19,055_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement JULY #U007e SEP 2024 USD 19,055_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement JULY #U007e SEP 2024 USD 19,055_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement JULY #U007e SEP 2024 USD 19,055_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement JULY #U007e SEP 2024 USD 19,055_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement JULY #U007e SEP 2024 USD 19,055_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement JULY #U007e SEP 2024 USD 19,055_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
adobe
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adobe_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adobe_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adobe_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adobe_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adobe_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adobe_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adobe_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adobe_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adobe_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adobe_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adobe_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adobe_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adobe_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adobe_RASMANCS
FileDirectory
There are 20 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
302C000
trusted library allocation
page read and write
malicious
37C9000
trusted library allocation
page read and write
malicious
31F1000
trusted library allocation
page read and write
malicious
3001000
trusted library allocation
page read and write
malicious
321C000
trusted library allocation
page read and write
malicious
345C000
trusted library allocation
page read and write
malicious
3431000
trusted library allocation
page read and write
malicious
53A4000
trusted library allocation
page read and write
58C0000
heap
page read and write
4DA0000
trusted library section
page read and write
2D11000
trusted library allocation
page read and write
3120000
trusted library allocation
page read and write
6F0E000
stack
page read and write
574C000
stack
page read and write
53AE000
trusted library allocation
page read and write
12B5000
trusted library allocation
page execute and read and write
1339000
stack
page read and write
52C0000
trusted library allocation
page read and write
3180000
heap
page read and write
4B70000
heap
page read and write
400000
remote allocation
page execute and read and write
1170000
heap
page read and write
E90000
heap
page read and write
2C9D000
trusted library allocation
page read and write
8D3000
trusted library allocation
page execute and read and write
64EE000
stack
page read and write
264F000
stack
page read and write
6360000
heap
page read and write
1190000
heap
page read and write
1093000
heap
page read and write
6C32000
trusted library allocation
page read and write
1100000
heap
page read and write
71F0000
trusted library allocation
page read and write
8FA000
trusted library allocation
page execute and read and write
15B0000
trusted library allocation
page read and write
3000000
trusted library allocation
page read and write
FF0000
heap
page read and write
15B5000
trusted library allocation
page execute and read and write
6D40000
heap
page read and write
16E0000
heap
page read and write
529E000
stack
page read and write
27A0000
trusted library allocation
page read and write
5720000
trusted library allocation
page execute and read and write
1396000
heap
page read and write
139A000
heap
page read and write
6B40000
trusted library allocation
page execute and read and write
1737000
heap
page read and write
13EB000
heap
page read and write
588B000
stack
page read and write
1231000
heap
page read and write
3218000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
12F0000
heap
page read and write
111E000
stack
page read and write
2CED000
trusted library allocation
page read and write
5180000
heap
page read and write
31DC000
stack
page read and write
54B1000
trusted library allocation
page read and write
DB0000
heap
page read and write
4EDB000
stack
page read and write
6255000
heap
page read and write
52D0000
heap
page execute and read and write
3E79000
trusted library allocation
page read and write
6F62000
trusted library allocation
page read and write
5E78000
trusted library allocation
page read and write
6DBE000
stack
page read and write
101A000
heap
page read and write
6C80000
heap
page read and write
1325000
heap
page read and write
3028000
trusted library allocation
page read and write
1580000
trusted library allocation
page read and write
540E000
stack
page read and write
6E40000
trusted library allocation
page execute and read and write
5E30000
heap
page read and write
8D0000
trusted library allocation
page read and write
3EB8000
trusted library allocation
page read and write
5ACE000
stack
page read and write
D90000
trusted library allocation
page read and write
4F70000
heap
page read and write
3190000
heap
page execute and read and write
3218000
trusted library allocation
page read and write
6D57000
trusted library allocation
page read and write
7574000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
2C4E000
stack
page read and write
158D000
trusted library allocation
page execute and read and write
3010000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
6E20000
trusted library allocation
page execute and read and write
12B0000
trusted library allocation
page read and write
3AA000
stack
page read and write
1225000
heap
page read and write
5E85000
trusted library allocation
page read and write
710E000
stack
page read and write
54A2000
trusted library allocation
page read and write
41C9000
trusted library allocation
page read and write
71C0000
trusted library allocation
page read and write
68EB000
heap
page read and write
3462000
trusted library allocation
page read and write
6BEE000
stack
page read and write
A66000
heap
page read and write
69AE000
stack
page read and write
1490000
heap
page read and write
5390000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
3035000
trusted library allocation
page execute and read and write
622E000
stack
page read and write
14C5000
heap
page read and write
549B000
trusted library allocation
page read and write
9E0000
heap
page read and write
F87000
stack
page read and write
2FFD000
trusted library allocation
page read and write
6E3E000
stack
page read and write
2FEF000
stack
page read and write
F9F000
stack
page read and write
7590000
heap
page read and write
53E6000
trusted library allocation
page read and write
5482000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
3CC1000
trusted library allocation
page read and write
67BE000
stack
page read and write
278D000
trusted library allocation
page read and write
FCD000
trusted library allocation
page execute and read and write
8DD000
trusted library allocation
page execute and read and write
70CD000
stack
page read and write
5500000
heap
page read and write
15AA000
trusted library allocation
page execute and read and write
1404000
heap
page read and write
5E87000
trusted library allocation
page read and write
2BFE000
stack
page read and write
632B000
stack
page read and write
3E06000
trusted library allocation
page read and write
53B2000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
3037000
trusted library allocation
page execute and read and write
3050000
trusted library allocation
page read and write
3EBB000
trusted library allocation
page read and write
598F000
stack
page read and write
13A6000
heap
page read and write
1190000
trusted library allocation
page read and write
11A7000
heap
page read and write
31ED000
trusted library allocation
page read and write
68FB000
heap
page read and write
5720000
trusted library allocation
page read and write
138D000
heap
page read and write
6AE0000
trusted library allocation
page execute and read and write
5A05000
heap
page read and write
53C6000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
6393000
heap
page read and write
5E40000
heap
page read and write
543A000
trusted library section
page readonly
3020000
heap
page read and write
554F000
stack
page read and write
15DE000
stack
page read and write
DA7000
heap
page read and write
2E20000
heap
page execute and read and write
6F44000
trusted library allocation
page read and write
2C8E000
trusted library allocation
page read and write
4B05000
trusted library allocation
page read and write
6F7000
stack
page read and write
703E000
stack
page read and write
2CE9000
trusted library allocation
page read and write
5870000
heap
page execute and read and write
1183000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
6C6E000
stack
page read and write
584F000
stack
page read and write
3FD9000
trusted library allocation
page read and write
1196000
trusted library allocation
page execute and read and write
12ED000
heap
page read and write
12A0000
heap
page read and write
6AC5000
heap
page read and write
5640000
heap
page execute and read and write
6B10000
trusted library allocation
page read and write
159D000
trusted library allocation
page execute and read and write
DA0000
heap
page read and write
342D000
trusted library allocation
page read and write
9D0000
heap
page read and write
5776000
trusted library allocation
page read and write
15A2000
trusted library allocation
page read and write
27AF000
trusted library allocation
page read and write
2E56000
trusted library allocation
page read and write
6FFE000
stack
page read and write
129D000
trusted library allocation
page execute and read and write
7F740000
trusted library allocation
page execute and read and write
1727000
heap
page read and write
31A1000
trusted library allocation
page read and write
575D000
trusted library allocation
page read and write
3032000
trusted library allocation
page read and write
31E0000
trusted library allocation
page execute and read and write
83E000
stack
page read and write
14C0000
heap
page read and write
5ADC000
stack
page read and write
574E000
trusted library allocation
page read and write
6870000
heap
page read and write
302A000
trusted library allocation
page execute and read and write
2FF0000
trusted library allocation
page read and write
6E17000
trusted library allocation
page read and write
402D000
trusted library allocation
page read and write
68EF000
heap
page read and write
7F9A0000
trusted library allocation
page execute and read and write
2CB0000
heap
page execute and read and write
3476000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
5080000
heap
page read and write
5E70000
trusted library allocation
page read and write
2766000
trusted library allocation
page read and write
1195000
heap
page read and write
5120000
trusted library allocation
page read and write
2650000
heap
page read and write
137E000
heap
page read and write
54C2000
trusted library allocation
page read and write
11D0000
heap
page read and write
7210000
heap
page read and write
3472000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
2FB1000
trusted library allocation
page read and write
6B1B000
trusted library allocation
page read and write
1290000
trusted library allocation
page read and write
1125000
heap
page read and write
9A0000
trusted library allocation
page read and write
4DBE000
stack
page read and write
7F0000
heap
page read and write
3222000
trusted library allocation
page read and write
3032000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
6FED000
stack
page read and write
276B000
trusted library allocation
page read and write
710000
heap
page read and write
5774000
trusted library allocation
page read and write
71BE000
stack
page read and write
2C63000
heap
page read and write
33AD000
stack
page read and write
7F210000
trusted library allocation
page execute and read and write
2C76000
trusted library allocation
page read and write
97E000
stack
page read and write
3010000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
59CE000
stack
page read and write
6A40000
heap
page read and write
5745000
trusted library allocation
page read and write
300D000
trusted library allocation
page execute and read and write
728E000
stack
page read and write
41A1000
trusted library allocation
page read and write
6AAE000
stack
page read and write
5762000
trusted library allocation
page read and write
2C34000
trusted library allocation
page read and write
6EAE000
stack
page read and write
5160000
heap
page read and write
321A000
trusted library allocation
page read and write
8ED000
trusted library allocation
page execute and read and write
11A0000
heap
page read and write
1170000
trusted library allocation
page read and write
635E000
stack
page read and write
15BF000
stack
page read and write
FD0000
trusted library allocation
page read and write
3114000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
E70000
heap
page read and write
3456000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
3DCB000
trusted library allocation
page read and write
1584000
trusted library allocation
page read and write
53C1000
trusted library allocation
page read and write
5C0E000
stack
page read and write
30DE000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
12D7000
heap
page read and write
6CBE000
stack
page read and write
1058000
heap
page read and write
1360000
heap
page read and write
FF8000
heap
page read and write
2C4F000
trusted library allocation
page read and write
3D8F000
trusted library allocation
page read and write
33EC000
trusted library allocation
page read and write
5C3D000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
10D0000
heap
page read and write
6AD7000
trusted library allocation
page read and write
FC4000
trusted library allocation
page read and write
2EA0000
heap
page read and write
514E000
stack
page read and write
10D9000
heap
page read and write
6E10000
trusted library allocation
page read and write
11F7000
trusted library allocation
page execute and read and write
2C74000
trusted library allocation
page read and write
31D6000
trusted library allocation
page read and write
11B2000
trusted library allocation
page read and write
5B10000
heap
page read and write
163C000
stack
page read and write
30DB000
trusted library allocation
page read and write
3F7B000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
1210000
trusted library allocation
page read and write
6370000
heap
page read and write
30EE000
trusted library allocation
page read and write
588E000
stack
page read and write
13A4000
heap
page read and write
5E50000
heap
page read and write
6AAF000
stack
page read and write
6DC7000
trusted library allocation
page read and write
15FE000
stack
page read and write
6E30000
trusted library allocation
page execute and read and write
2C36000
trusted library allocation
page read and write
11BE000
stack
page read and write
118D000
trusted library allocation
page execute and read and write
1327000
heap
page read and write
2C82000
trusted library allocation
page read and write
12AA000
trusted library allocation
page execute and read and write
6DFF000
stack
page read and write
6D60000
trusted library allocation
page execute and read and write
5172000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
6250000
heap
page read and write
902000
trusted library allocation
page read and write
15E0000
trusted library allocation
page execute and read and write
6CEE000
stack
page read and write
15F7000
heap
page read and write
120E000
stack
page read and write
5B0E000
stack
page read and write
FDD000
trusted library allocation
page execute and read and write
3042000
trusted library allocation
page read and write
177E000
stack
page read and write
174E000
stack
page read and write
6AD0000
heap
page read and write
6F2B000
trusted library allocation
page read and write
682F000
stack
page read and write
2792000
trusted library allocation
page read and write
6A5D000
heap
page read and write
6C7E000
stack
page read and write
100E000
heap
page read and write
5170000
trusted library allocation
page read and write
9F2000
heap
page read and write
2DDE000
stack
page read and write
138E000
heap
page read and write
136E000
stack
page read and write
5503000
heap
page read and write
2E6F000
stack
page read and write
2C60000
heap
page read and write
15F0000
heap
page read and write
6E2E000
stack
page read and write
54D0000
heap
page read and write
5940000
heap
page read and write
30F1000
trusted library allocation
page read and write
58E0000
trusted library section
page readonly
6B8E000
stack
page read and write
4B80000
trusted library allocation
page read and write
2FE7000
trusted library allocation
page read and write
6D3D000
stack
page read and write
301D000
trusted library allocation
page execute and read and write
58E9000
trusted library section
page readonly
5405000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
43E1000
trusted library allocation
page read and write
1350000
heap
page read and write
6B7E000
stack
page read and write
6AC7000
trusted library allocation
page read and write
2FEF000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
2760000
trusted library allocation
page read and write
1039000
stack
page read and write
4C9E000
stack
page read and write
2E60000
heap
page read and write
9B0000
heap
page read and write
6A8E000
heap
page read and write
5710000
trusted library allocation
page read and write
5E8D000
trusted library allocation
page read and write
54BD000
trusted library allocation
page read and write
672E000
stack
page read and write
980000
trusted library allocation
page execute and read and write
11B7000
trusted library allocation
page execute and read and write
638F000
heap
page read and write
3200000
heap
page read and write
5740000
heap
page execute and read and write
6B0D000
trusted library allocation
page read and write
2D13000
trusted library allocation
page read and write
1720000
heap
page read and write
2C55000
trusted library allocation
page read and write
6F20000
trusted library allocation
page read and write
1230000
heap
page read and write
1284000
trusted library allocation
page read and write
4CA0000
heap
page read and write
6B00000
trusted library allocation
page read and write
2E64000
heap
page read and write
275E000
stack
page read and write
FD3000
trusted library allocation
page read and write
66BD000
stack
page read and write
129E000
stack
page read and write
565E000
stack
page read and write
2FF0000
trusted library allocation
page execute and read and write
5C28000
trusted library allocation
page read and write
4068000
trusted library allocation
page read and write
2C00000
trusted library allocation
page execute and read and write
5D5E000
stack
page read and write
5B20000
heap
page read and write
5400000
trusted library allocation
page read and write
3417000
trusted library allocation
page read and write
573E000
trusted library allocation
page read and write
12A7000
heap
page read and write
13DB000
heap
page read and write
2C20000
trusted library allocation
page read and write
3E71000
trusted library allocation
page read and write
1480000
heap
page read and write
FF0000
heap
page read and write
53AB000
trusted library allocation
page read and write
5A00000
heap
page read and write
2E30000
trusted library allocation
page read and write
31DF000
trusted library allocation
page read and write
3474000
trusted library allocation
page read and write
2786000
trusted library allocation
page read and write
66EE000
stack
page read and write
57DC000
stack
page read and write
507E000
stack
page read and write
54B6000
trusted library allocation
page read and write
1378000
heap
page read and write
2CC1000
trusted library allocation
page read and write
6CF7000
trusted library allocation
page read and write
2C0E000
stack
page read and write
3EFD000
trusted library allocation
page read and write
4EE0000
trusted library section
page readonly
89E000
stack
page read and write
707F000
stack
page read and write
E95000
heap
page read and write
7592000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
DFE000
stack
page read and write
309E000
stack
page read and write
CAE000
stack
page read and write
5780000
trusted library allocation
page read and write
5180000
trusted library allocation
page execute and read and write
12DF000
heap
page read and write
2C10000
trusted library allocation
page read and write
561C000
stack
page read and write
72B0000
trusted library allocation
page read and write
12B2000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
6AB8000
trusted library allocation
page read and write
5350000
heap
page read and write
123A000
stack
page read and write
2FAE000
stack
page read and write
718E000
stack
page read and write
53E4000
trusted library allocation
page read and write
53CD000
trusted library allocation
page read and write
990000
trusted library allocation
page read and write
907000
trusted library allocation
page execute and read and write
54AE000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
30FD000
trusted library allocation
page read and write
686E000
stack
page read and write
2764000
trusted library allocation
page read and write
444D000
trusted library allocation
page read and write
3E41000
trusted library allocation
page read and write
5670000
heap
page read and write
4B10000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
6E0D000
stack
page read and write
2BCE000
stack
page read and write
2C96000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
5E85000
heap
page read and write
5B3B000
heap
page read and write
1357000
heap
page read and write
90B000
trusted library allocation
page execute and read and write
FE6000
trusted library allocation
page execute and read and write
33E1000
trusted library allocation
page read and write
54FE000
stack
page read and write
5410000
trusted library allocation
page read and write
1173000
trusted library allocation
page execute and read and write
1280000
trusted library allocation
page read and write
6070000
heap
page read and write
1174000
trusted library allocation
page read and write
27C1000
trusted library allocation
page read and write
138A000
heap
page read and write
2A0000
unkown
page readonly
11F2000
trusted library allocation
page read and write
9E5000
heap
page read and write
E60000
heap
page read and write
6AF2000
heap
page read and write
4E00000
heap
page execute and read and write
11F0000
heap
page read and write
3046000
trusted library allocation
page read and write
30F6000
trusted library allocation
page read and write
1730000
heap
page read and write
10F9000
stack
page read and write
131A000
heap
page read and write
130E000
heap
page read and write
7350000
heap
page read and write
140E000
heap
page read and write
4409000
trusted library allocation
page read and write
303B000
trusted library allocation
page execute and read and write
3026000
trusted library allocation
page execute and read and write
5190000
heap
page read and write
6B90000
trusted library allocation
page read and write
58D4000
heap
page read and write
5770000
trusted library allocation
page read and write
6C14000
trusted library allocation
page read and write
72D0000
heap
page read and write
7200000
trusted library allocation
page execute and read and write
3E7D000
trusted library allocation
page read and write
33B0000
heap
page read and write
12BB000
trusted library allocation
page execute and read and write
352D000
trusted library allocation
page read and write
850000
heap
page read and write
5730000
trusted library allocation
page read and write
6AB0000
heap
page read and write
304E000
trusted library allocation
page read and write
68B4000
heap
page read and write
37C1000
trusted library allocation
page read and write
4B82000
trusted library allocation
page read and write
2D6E000
stack
page read and write
3F3F000
trusted library allocation
page read and write
686D000
stack
page read and write
4CA3000
heap
page read and write
1590000
trusted library allocation
page read and write
9BA000
heap
page read and write
3216000
trusted library allocation
page read and write
15BB000
trusted library allocation
page execute and read and write
71CB000
trusted library allocation
page read and write
5E80000
trusted library allocation
page read and write
30E2000
trusted library allocation
page read and write
5950000
heap
page read and write
6AC3000
heap
page read and write
58DB000
stack
page read and write
4B00000
trusted library allocation
page read and write
573B000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
5B0E000
stack
page read and write
5680000
heap
page execute and read and write
1370000
heap
page read and write
4B90000
trusted library allocation
page execute and read and write
65ED000
stack
page read and write
12A6000
trusted library allocation
page execute and read and write
3FB6000
trusted library allocation
page read and write
1120000
heap
page read and write
3160000
heap
page read and write
E0E000
stack
page read and write
6ECE000
stack
page read and write
4DF0000
trusted library allocation
page read and write
676E000
stack
page read and write
5370000
trusted library allocation
page execute and read and write
53FF000
trusted library allocation
page read and write
5630000
heap
page read and write
117D000
trusted library allocation
page execute and read and write
2781000
trusted library allocation
page read and write
58D0000
heap
page read and write
6AC0000
trusted library allocation
page read and write
BAF000
stack
page read and write
15A6000
trusted library allocation
page execute and read and write
15D0000
trusted library allocation
page read and write
2772000
trusted library allocation
page read and write
143F000
heap
page read and write
5440000
heap
page read and write
58F0000
heap
page read and write
11E0000
trusted library allocation
page read and write
1157000
heap
page read and write
6C2E000
stack
page read and write
598F000
stack
page read and write
2C60000
heap
page read and write
3FF1000
trusted library allocation
page read and write
1283000
trusted library allocation
page execute and read and write
11F8000
heap
page read and write
5470000
heap
page read and write
5490000
trusted library allocation
page execute and read and write
5480000
trusted library allocation
page read and write
420D000
trusted library allocation
page read and write
33D0000
heap
page execute and read and write
646D000
stack
page read and write
5690000
heap
page read and write
5490000
trusted library allocation
page read and write
2CEB000
trusted library allocation
page read and write
4E80000
trusted library allocation
page execute and read and write
FEA000
trusted library allocation
page execute and read and write
2C50000
trusted library allocation
page read and write
3164000
heap
page read and write
2CF3000
trusted library allocation
page read and write
10C9000
heap
page read and write
560C000
stack
page read and write
55DB000
stack
page read and write
5E6B000
heap
page read and write
125E000
stack
page read and write
2C7B000
trusted library allocation
page read and write
6E6E000
stack
page read and write
53A0000
trusted library allocation
page read and write
3D4D000
trusted library allocation
page read and write
1224000
heap
page read and write
53BE000
trusted library allocation
page read and write
2E1C000
stack
page read and write
345A000
trusted library allocation
page read and write
3FB1000
trusted library allocation
page read and write
53A6000
trusted library allocation
page read and write
1027000
heap
page read and write
E8A000
stack
page read and write
1270000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
1394000
heap
page read and write
3CC9000
trusted library allocation
page read and write
5C20000
trusted library allocation
page read and write
12F8000
heap
page read and write
70BD000
stack
page read and write
31F0000
trusted library allocation
page read and write
12D0000
heap
page read and write
58E0000
heap
page read and write
578E000
stack
page read and write
12B7000
trusted library allocation
page execute and read and write
930000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
401C000
trusted library allocation
page read and write
1138000
stack
page read and write
500E000
stack
page read and write
6C70000
trusted library allocation
page execute and read and write
16DE000
stack
page read and write
1583000
trusted library allocation
page execute and read and write
D49000
stack
page read and write
8F6000
trusted library allocation
page execute and read and write
5810000
heap
page read and write
119A000
trusted library allocation
page execute and read and write
5BDE000
stack
page read and write
8D4000
trusted library allocation
page read and write
6EEC000
stack
page read and write
1368000
heap
page read and write
3D0B000
trusted library allocation
page read and write
11EF000
stack
page read and write
910000
heap
page read and write
6AC4000
heap
page read and write
11B0000
trusted library allocation
page read and write
72C0000
trusted library allocation
page execute and read and write
11C0000
heap
page read and write
11BB000
trusted library allocation
page execute and read and write
1150000
heap
page read and write
14AE000
stack
page read and write
8C0000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
714F000
stack
page read and write
53BA000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
CF7000
stack
page read and write
128D000
trusted library allocation
page execute and read and write
5B8D000
stack
page read and write
2C91000
trusted library allocation
page read and write
69AE000
stack
page read and write
D8D000
stack
page read and write
7640000
heap
page read and write
2FF1000
trusted library allocation
page read and write
3038000
trusted library allocation
page read and write
2A2000
unkown
page readonly
3022000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
8E3000
trusted library allocation
page read and write
319E000
stack
page read and write
2C50000
heap
page execute and read and write
5900000
heap
page read and write
5742000
trusted library allocation
page read and write
316000
unkown
page readonly
3003000
trusted library allocation
page execute and read and write
E4E000
stack
page read and write
9BE000
heap
page read and write
636E000
stack
page read and write
1180000
trusted library allocation
page read and write
3004000
trusted library allocation
page read and write
638B000
heap
page read and write
FC3000
trusted library allocation
page execute and read and write
1220000
heap
page read and write
5E35000
heap
page read and write
13EF000
stack
page read and write
1364000
heap
page read and write
12A2000
trusted library allocation
page read and write
5430000
trusted library section
page readonly
15B2000
trusted library allocation
page read and write
11FE000
heap
page read and write
27B0000
heap
page execute and read and write
277E000
trusted library allocation
page read and write
11FB000
trusted library allocation
page execute and read and write
302A000
trusted library allocation
page read and write
5410000
trusted library allocation
page execute and read and write
696E000
stack
page read and write
5751000
trusted library allocation
page read and write
2E54000
trusted library allocation
page read and write
1120000
heap
page read and write
12A0000
trusted library allocation
page read and write
1640000
heap
page read and write
5660000
heap
page read and write
3000000
trusted library allocation
page read and write
341F000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
96A000
stack
page read and write
2E71000
trusted library allocation
page read and write
15B7000
trusted library allocation
page execute and read and write
There are 684 hidden memdumps, click here to show them.