Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Documents Of DHL -BL- AWB- 8976453410.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Documents Of DHL_a717dd2ed6cc9cb1daf8a386d324cb1affad1e_f07a7b38_8172a8de-ac37-4d37-8223-7185386ef586\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF70B.tmp.dmp
|
Mini DuMP crash report, 16 streams, Thu May 23 18:23:44 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF910.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF97E.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ane3hooy.1ak.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eqfjvflz.3vv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i5rtcrf1.lba.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x1kfvewo.hf4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Documents Of DHL -BL- AWB- 8976453410.exe
|
"C:\Users\user\Desktop\Documents Of DHL -BL- AWB- 8976453410.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Documents
Of DHL -BL- AWB- 8976453410.exe" -Force
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 3812 -s 1324
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.telegram.org/bot6814314158:AAEkRl6H9QdGzzoVC6YfWI-wFLiqXO8LEls/sendDocument
|
149.154.167.220
|
||
https://api.telegram.org
|
unknown
|
||
https://api.telegram.org/bot6814314158:AAEkRl6H9QdGzzoVC6YfWI-wFLiqXO8LEls/
|
unknown
|
||
https://api.ipify.org/
|
172.67.74.152
|
||
https://api.ipify.org
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://api.telegram.org
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
api.telegram.org
|
149.154.167.220
|
||
api.ipify.org
|
172.67.74.152
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
172.67.74.152
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
EnableLUA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance
|
Enabled
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
FileDirectory
|
||
\REGISTRY\A\{e5e93249-4a50-765d-1454-a27525b9adbc}\Root\InventoryApplicationFile\documents of dhl|3c12d9b5b13a6e4a
|
ProgramId
|
||
\REGISTRY\A\{e5e93249-4a50-765d-1454-a27525b9adbc}\Root\InventoryApplicationFile\documents of dhl|3c12d9b5b13a6e4a
|
FileId
|
||
\REGISTRY\A\{e5e93249-4a50-765d-1454-a27525b9adbc}\Root\InventoryApplicationFile\documents of dhl|3c12d9b5b13a6e4a
|
LowerCaseLongPath
|
||
\REGISTRY\A\{e5e93249-4a50-765d-1454-a27525b9adbc}\Root\InventoryApplicationFile\documents of dhl|3c12d9b5b13a6e4a
|
LongPathHash
|
||
\REGISTRY\A\{e5e93249-4a50-765d-1454-a27525b9adbc}\Root\InventoryApplicationFile\documents of dhl|3c12d9b5b13a6e4a
|
Name
|
||
\REGISTRY\A\{e5e93249-4a50-765d-1454-a27525b9adbc}\Root\InventoryApplicationFile\documents of dhl|3c12d9b5b13a6e4a
|
OriginalFileName
|
||
\REGISTRY\A\{e5e93249-4a50-765d-1454-a27525b9adbc}\Root\InventoryApplicationFile\documents of dhl|3c12d9b5b13a6e4a
|
Publisher
|
||
\REGISTRY\A\{e5e93249-4a50-765d-1454-a27525b9adbc}\Root\InventoryApplicationFile\documents of dhl|3c12d9b5b13a6e4a
|
Version
|
||
\REGISTRY\A\{e5e93249-4a50-765d-1454-a27525b9adbc}\Root\InventoryApplicationFile\documents of dhl|3c12d9b5b13a6e4a
|
BinFileVersion
|
||
\REGISTRY\A\{e5e93249-4a50-765d-1454-a27525b9adbc}\Root\InventoryApplicationFile\documents of dhl|3c12d9b5b13a6e4a
|
BinaryType
|
||
\REGISTRY\A\{e5e93249-4a50-765d-1454-a27525b9adbc}\Root\InventoryApplicationFile\documents of dhl|3c12d9b5b13a6e4a
|
ProductName
|
||
\REGISTRY\A\{e5e93249-4a50-765d-1454-a27525b9adbc}\Root\InventoryApplicationFile\documents of dhl|3c12d9b5b13a6e4a
|
ProductVersion
|
||
\REGISTRY\A\{e5e93249-4a50-765d-1454-a27525b9adbc}\Root\InventoryApplicationFile\documents of dhl|3c12d9b5b13a6e4a
|
LinkDate
|
||
\REGISTRY\A\{e5e93249-4a50-765d-1454-a27525b9adbc}\Root\InventoryApplicationFile\documents of dhl|3c12d9b5b13a6e4a
|
BinProductVersion
|
||
\REGISTRY\A\{e5e93249-4a50-765d-1454-a27525b9adbc}\Root\InventoryApplicationFile\documents of dhl|3c12d9b5b13a6e4a
|
AppxPackageFullName
|
||
\REGISTRY\A\{e5e93249-4a50-765d-1454-a27525b9adbc}\Root\InventoryApplicationFile\documents of dhl|3c12d9b5b13a6e4a
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{e5e93249-4a50-765d-1454-a27525b9adbc}\Root\InventoryApplicationFile\documents of dhl|3c12d9b5b13a6e4a
|
Size
|
||
\REGISTRY\A\{e5e93249-4a50-765d-1454-a27525b9adbc}\Root\InventoryApplicationFile\documents of dhl|3c12d9b5b13a6e4a
|
Language
|
||
\REGISTRY\A\{e5e93249-4a50-765d-1454-a27525b9adbc}\Root\InventoryApplicationFile\documents of dhl|3c12d9b5b13a6e4a
|
Usn
|
There are 26 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
220398D1000
|
trusted library allocation
|
page read and write
|
||
32A8000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
22049842000
|
trusted library allocation
|
page read and write
|
||
22037C31000
|
heap
|
page read and write
|
||
3150000
|
heap
|
page execute and read and write
|
||
154E000
|
stack
|
page read and write
|
||
22037E80000
|
heap
|
page execute and read and write
|
||
7FFAACE00000
|
trusted library allocation
|
page read and write
|
||
74EC000
|
stack
|
page read and write
|
||
780D000
|
stack
|
page read and write
|
||
15AA000
|
trusted library allocation
|
page execute and read and write
|
||
22037C1A000
|
heap
|
page read and write
|
||
15B7000
|
trusted library allocation
|
page execute and read and write
|
||
70D0000
|
heap
|
page read and write
|
||
770A000
|
heap
|
page read and write
|
||
4583000
|
trusted library allocation
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
7FFAACC6C000
|
trusted library allocation
|
page execute and read and write
|
||
33FB000
|
trusted library allocation
|
page read and write
|
||
32EF000
|
trusted library allocation
|
page read and write
|
||
5880000
|
heap
|
page read and write
|
||
42D1EFF000
|
stack
|
page read and write
|
||
5DB0000
|
trusted library allocation
|
page read and write
|
||
454D000
|
trusted library allocation
|
page read and write
|
||
E3C3000
|
trusted library allocation
|
page read and write
|
||
22037EA0000
|
heap
|
page execute and read and write
|
||
7FFAACC66000
|
trusted library allocation
|
page read and write
|
||
E3D7000
|
trusted library allocation
|
page read and write
|
||
667E000
|
heap
|
page read and write
|
||
42D1CFD000
|
stack
|
page read and write
|
||
6DFF000
|
stack
|
page read and write
|
||
32CE000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
heap
|
page read and write
|
||
42D1DFE000
|
stack
|
page read and write
|
||
42D19FE000
|
stack
|
page read and write
|
||
7FFAACC96000
|
trusted library allocation
|
page execute and read and write
|
||
3261000
|
trusted library allocation
|
page read and write
|
||
22038080000
|
heap
|
page read and write
|
||
342C000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page execute and read and write
|
||
840F000
|
stack
|
page read and write
|
||
7FFB1E3A0000
|
unkown
|
page readonly
|
||
E39B000
|
trusted library allocation
|
page read and write
|
||
325C000
|
stack
|
page read and write
|
||
22037F25000
|
heap
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
7FFB1E3A1000
|
unkown
|
page execute read
|
||
71C0000
|
heap
|
page read and write
|
||
42D20FE000
|
stack
|
page read and write
|
||
348F000
|
trusted library allocation
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page read and write
|
||
7FFAACDD5000
|
trusted library allocation
|
page read and write
|
||
1379000
|
stack
|
page read and write
|
||
E391000
|
trusted library allocation
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB3000
|
trusted library allocation
|
page execute and read and write
|
||
22037E00000
|
heap
|
page read and write
|
||
36BA000
|
trusted library allocation
|
page read and write
|
||
329C000
|
trusted library allocation
|
page read and write
|
||
32F7000
|
trusted library allocation
|
page read and write
|
||
57C6000
|
trusted library allocation
|
page read and write
|
||
5CBE000
|
stack
|
page read and write
|
||
22051FF0000
|
trusted library section
|
page read and write
|
||
22052096000
|
heap
|
page read and write
|
||
7FFAACBD4000
|
trusted library allocation
|
page read and write
|
||
158D000
|
trusted library allocation
|
page execute and read and write
|
||
67DD000
|
stack
|
page read and write
|
||
1890000
|
trusted library allocation
|
page read and write
|
||
7FFAACBC2000
|
trusted library allocation
|
page read and write
|
||
71CB000
|
heap
|
page read and write
|
||
348D000
|
trusted library allocation
|
page read and write
|
||
6CF7000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
C8EE000
|
trusted library allocation
|
page read and write
|
||
6D50000
|
trusted library allocation
|
page execute and read and write
|
||
42E9000
|
trusted library allocation
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
7FFAACD70000
|
trusted library allocation
|
page read and write
|
||
7FFB1E3C5000
|
unkown
|
page readonly
|
||
584C000
|
stack
|
page read and write
|
||
E3BE000
|
trusted library allocation
|
page read and write
|
||
1583000
|
trusted library allocation
|
page execute and read and write
|
||
22039C09000
|
trusted library allocation
|
page read and write
|
||
4329000
|
trusted library allocation
|
page read and write
|
||
70C0000
|
trusted library allocation
|
page execute and read and write
|
||
E387000
|
trusted library allocation
|
page read and write
|
||
543E000
|
stack
|
page read and write
|
||
3298000
|
trusted library allocation
|
page read and write
|
||
57CD000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
7FFAACBDB000
|
trusted library allocation
|
page execute and read and write
|
||
22037DE0000
|
heap
|
page read and write
|
||
42D25FB000
|
stack
|
page read and write
|
||
65DB000
|
stack
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
22039914000
|
trusted library allocation
|
page read and write
|
||
22037C34000
|
heap
|
page read and write
|
||
18A0000
|
heap
|
page read and write
|
||
726F000
|
heap
|
page read and write
|
||
64DE000
|
stack
|
page read and write
|
||
6D60000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACC60000
|
trusted library allocation
|
page read and write
|
||
6CE0000
|
trusted library allocation
|
page read and write
|
||
65E0000
|
heap
|
page read and write
|
||
6689000
|
heap
|
page read and write
|
||
22037BD0000
|
heap
|
page read and write
|
||
220520FE000
|
heap
|
page read and write
|
||
7FFAACE10000
|
trusted library allocation
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
E3A0000
|
trusted library allocation
|
page read and write
|
||
365A000
|
trusted library allocation
|
page read and write
|
||
7264000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
330F000
|
trusted library allocation
|
page read and write
|
||
3322000
|
trusted library allocation
|
page read and write
|
||
7700000
|
heap
|
page read and write
|
||
6B5E000
|
stack
|
page read and write
|
||
7FFAACDB0000
|
trusted library allocation
|
page read and write
|
||
42D1BFE000
|
stack
|
page read and write
|
||
71EE000
|
heap
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
42C9000
|
trusted library allocation
|
page read and write
|
||
15D0000
|
trusted library allocation
|
page read and write
|
||
1590000
|
trusted library allocation
|
page read and write
|
||
E385000
|
trusted library allocation
|
page read and write
|
||
4289000
|
trusted library allocation
|
page read and write
|
||
7FFAACDD0000
|
trusted library allocation
|
page read and write
|
||
66A3000
|
heap
|
page read and write
|
||
1584000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB4000
|
trusted library allocation
|
page read and write
|
||
43EA000
|
trusted library allocation
|
page read and write
|
||
452D000
|
trusted library allocation
|
page read and write
|
||
57D2000
|
trusted library allocation
|
page read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
E3D2000
|
trusted library allocation
|
page read and write
|
||
7FFAACD90000
|
trusted library allocation
|
page read and write
|
||
5BCD000
|
stack
|
page read and write
|
||
22051860000
|
trusted library allocation
|
page read and write
|
||
7FFAACBCD000
|
trusted library allocation
|
page execute and read and write
|
||
7F9E0000
|
trusted library allocation
|
page execute and read and write
|
||
71FC000
|
heap
|
page read and write
|
||
57C1000
|
trusted library allocation
|
page read and write
|
||
7FFB1E3B6000
|
unkown
|
page readonly
|
||
44AD000
|
trusted library allocation
|
page read and write
|
||
6CD8000
|
trusted library allocation
|
page read and write
|
||
5DA0000
|
trusted library allocation
|
page read and write
|
||
6616000
|
heap
|
page read and write
|
||
22037F20000
|
heap
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page read and write
|
||
22037EB0000
|
trusted library section
|
page read and write
|
||
6BBE000
|
stack
|
page read and write
|
||
313B000
|
stack
|
page read and write
|
||
220398B5000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
stack
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
C8E6000
|
trusted library allocation
|
page read and write
|
||
14F5000
|
heap
|
page read and write
|
||
3140000
|
trusted library allocation
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page read and write
|
||
18A6000
|
heap
|
page read and write
|
||
32A0000
|
trusted library allocation
|
page read and write
|
||
E3AA000
|
trusted library allocation
|
page read and write
|
||
7640000
|
heap
|
page read and write
|
||
33A6000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
220520DB000
|
heap
|
page read and write
|
||
42D23FD000
|
stack
|
page read and write
|
||
7222000
|
heap
|
page read and write
|
||
B010000
|
trusted library allocation
|
page read and write
|
||
43AA000
|
trusted library allocation
|
page read and write
|
||
6CED000
|
trusted library allocation
|
page read and write
|
||
22037EF0000
|
heap
|
page read and write
|
||
16CD000
|
heap
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page execute and read and write
|
||
36BC000
|
trusted library allocation
|
page read and write
|
||
163D000
|
heap
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
7FFAACCD0000
|
trusted library allocation
|
page execute and read and write
|
||
E38C000
|
trusted library allocation
|
page read and write
|
||
159D000
|
trusted library allocation
|
page execute and read and write
|
||
E3A5000
|
trusted library allocation
|
page read and write
|
||
7FFAACE30000
|
trusted library allocation
|
page read and write
|
||
220520E1000
|
heap
|
page read and write
|
||
5D8B000
|
stack
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
22037E73000
|
trusted library allocation
|
page read and write
|
||
42D1FFE000
|
stack
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
3307000
|
trusted library allocation
|
page read and write
|
||
45E4000
|
trusted library allocation
|
page read and write
|
||
33C2000
|
trusted library allocation
|
page read and write
|
||
16D2000
|
heap
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
22052111000
|
heap
|
page read and write
|
||
15A2000
|
trusted library allocation
|
page read and write
|
||
2204983D000
|
trusted library allocation
|
page read and write
|
||
22037C5E000
|
heap
|
page read and write
|
||
65E2000
|
heap
|
page read and write
|
||
7FFB1E3C0000
|
unkown
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
703C000
|
stack
|
page read and write
|
||
15A6000
|
trusted library allocation
|
page execute and read and write
|
||
22037B40000
|
unkown
|
page readonly
|
||
2F7C000
|
unkown
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
14E7000
|
heap
|
page read and write
|
||
7FFAACDD8000
|
trusted library allocation
|
page read and write
|
||
22049838000
|
trusted library allocation
|
page read and write
|
||
5870000
|
heap
|
page read and write
|
||
42D24FE000
|
stack
|
page read and write
|
||
4369000
|
trusted library allocation
|
page read and write
|
||
32F3000
|
trusted library allocation
|
page read and write
|
||
533C000
|
stack
|
page read and write
|
||
22037DC0000
|
heap
|
page read and write
|
||
E3C8000
|
trusted library allocation
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
3303000
|
trusted library allocation
|
page read and write
|
||
57AB000
|
trusted library allocation
|
page read and write
|
||
830B000
|
stack
|
page read and write
|
||
15A0000
|
trusted library allocation
|
page read and write
|
||
57AE000
|
trusted library allocation
|
page read and write
|
||
3401000
|
trusted library allocation
|
page read and write
|
||
4261000
|
trusted library allocation
|
page read and write
|
||
722C000
|
heap
|
page read and write
|
||
5874000
|
heap
|
page read and write
|
||
7FFB1E3C2000
|
unkown
|
page readonly
|
||
667C000
|
heap
|
page read and write
|
||
C8E9000
|
trusted library allocation
|
page read and write
|
||
22052107000
|
heap
|
page read and write
|
||
15BB000
|
trusted library allocation
|
page execute and read and write
|
||
16D0000
|
heap
|
page read and write
|
||
5E2D000
|
stack
|
page read and write
|
||
5C7E000
|
stack
|
page read and write
|
||
8720000
|
heap
|
page read and write
|
||
5860000
|
heap
|
page execute and read and write
|
||
42D18F2000
|
stack
|
page read and write
|
||
127A000
|
stack
|
page read and write
|
||
440000
|
remote allocation
|
page execute and read and write
|
||
7226000
|
heap
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
6A5E000
|
stack
|
page read and write
|
||
7FFAACE20000
|
trusted library allocation
|
page read and write
|
||
70B0000
|
trusted library allocation
|
page read and write
|
||
7FFAACE34000
|
trusted library allocation
|
page read and write
|
||
32FF000
|
trusted library allocation
|
page read and write
|
||
22037E60000
|
trusted library allocation
|
page read and write
|
||
6600000
|
heap
|
page read and write
|
||
7FFAACD95000
|
trusted library allocation
|
page read and write
|
||
E3AF000
|
trusted library allocation
|
page read and write
|
||
22039831000
|
trusted library allocation
|
page read and write
|
||
42D1AFE000
|
stack
|
page read and write
|
||
22038085000
|
heap
|
page read and write
|
||
15B5000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACDF7000
|
trusted library allocation
|
page read and write
|
||
8710000
|
heap
|
page read and write
|
||
22037C1C000
|
heap
|
page read and write
|
||
22049831000
|
trusted library allocation
|
page read and write
|
||
7FFAACBBD000
|
trusted library allocation
|
page execute and read and write
|
||
22037E70000
|
trusted library allocation
|
page read and write
|
||
330B000
|
trusted library allocation
|
page read and write
|
||
7FFAACC0C000
|
trusted library allocation
|
page execute and read and write
|
||
22052090000
|
heap
|
page read and write
|
||
E3B9000
|
trusted library allocation
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
7FFAACDE0000
|
trusted library allocation
|
page execute and read and write
|
||
57B2000
|
trusted library allocation
|
page read and write
|
||
22037B42000
|
unkown
|
page readonly
|
||
5A7C000
|
stack
|
page read and write
|
||
E3DC000
|
trusted library allocation
|
page read and write
|
||
662A000
|
heap
|
page read and write
|
||
6F00000
|
heap
|
page read and write
|
||
2F3C000
|
stack
|
page read and write
|
||
22052098000
|
heap
|
page read and write
|
||
32FB000
|
trusted library allocation
|
page read and write
|
||
6A1F000
|
stack
|
page read and write
|
||
6D3E000
|
stack
|
page read and write
|
||
32A4000
|
trusted library allocation
|
page read and write
|
||
75EC000
|
stack
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page execute and read and write
|
||
220522D0000
|
heap
|
page read and write
|
||
7FFAACDC0000
|
trusted library allocation
|
page read and write
|
||
22037BF0000
|
heap
|
page read and write
|
||
22037BFC000
|
heap
|
page read and write
|
||
E3B4000
|
trusted library allocation
|
page read and write
|
||
5268000
|
trusted library allocation
|
page read and write
|
||
7080000
|
trusted library allocation
|
page read and write
|
||
160B000
|
heap
|
page read and write
|
||
5780000
|
heap
|
page read and write
|
||
7FFAACDA0000
|
trusted library allocation
|
page read and write
|
||
7FFAACC70000
|
trusted library allocation
|
page execute and read and write
|
||
E396000
|
trusted library allocation
|
page read and write
|
||
7FFAACBDD000
|
trusted library allocation
|
page execute and read and write
|
||
15B0000
|
trusted library allocation
|
page read and write
|
||
7280000
|
heap
|
page read and write
|
||
7FFAACD7C000
|
trusted library allocation
|
page read and write
|
||
7FFAACBC9000
|
trusted library allocation
|
page read and write
|
||
7FFAACDF0000
|
trusted library allocation
|
page read and write
|
||
44ED000
|
trusted library allocation
|
page read and write
|
||
6E40000
|
trusted library allocation
|
page read and write
|
||
446D000
|
trusted library allocation
|
page read and write
|
||
7FFAACBC0000
|
trusted library allocation
|
page read and write
|
||
22037E40000
|
trusted library allocation
|
page read and write
|
||
22037C12000
|
heap
|
page read and write
|
||
6CBE000
|
stack
|
page read and write
|
||
15B2000
|
trusted library allocation
|
page read and write
|
||
57BE000
|
trusted library allocation
|
page read and write
|
||
7FF41D150000
|
trusted library allocation
|
page execute and read and write
|
||
E3CD000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
442C000
|
trusted library allocation
|
page read and write
|
There are 307 hidden memdumps, click here to show them.