IOC Report
DHL_CBJ520818836689.exe

loading gif

Files

File Path
Type
Category
Malicious
DHL_CBJ520818836689.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DHL_CBJ520818836689.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpF480.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\NUIrgpbyGwup.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\NUIrgpbyGwup.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NUIrgpbyGwup.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\boqXv.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1oqqzedb.fmq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_glwj0bdw.hzh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ivaa1yns.bqr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_moyvxsmo.iwb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nrksxopq.q21.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pkjoqh33.5zo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yl1zogya.jfv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ytrqmasb.0t4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp578.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
modified
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DHL_CBJ520818836689.exe
"C:\Users\user\Desktop\DHL_CBJ520818836689.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL_CBJ520818836689.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NUIrgpbyGwup.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NUIrgpbyGwup" /XML "C:\Users\user\AppData\Local\Temp\tmpF480.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\NUIrgpbyGwup.exe
C:\Users\user\AppData\Roaming\NUIrgpbyGwup.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NUIrgpbyGwup" /XML "C:\Users\user\AppData\Local\Temp\tmp578.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://account.dyn.com/
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://mail.azmaplast.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.azmaplast.com
193.141.65.39
malicious

IPs

IP
Domain
Country
Malicious
193.141.65.39
mail.azmaplast.com
Iran (ISLAMIC Republic Of)
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
boqXv

Memdumps

Base Address
Regiontype
Protect
Malicious
2BE9000
trusted library allocation
page read and write
malicious
409B000
trusted library allocation
page read and write
malicious
2B7C000
trusted library allocation
page read and write
malicious
31D2000
trusted library allocation
page read and write
malicious
3181000
trusted library allocation
page read and write
malicious
2BE1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
4461000
trusted library allocation
page read and write
malicious
112D000
trusted library allocation
page execute and read and write
8CC000
stack
page read and write
1240000
trusted library allocation
page read and write
2D00000
heap
page read and write
16BE000
stack
page read and write
676E000
stack
page read and write
8F2000
trusted library allocation
page read and write
6C6E000
stack
page read and write
696E000
stack
page read and write
5100000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
2588000
trusted library allocation
page read and write
51DF000
stack
page read and write
51F4000
trusted library section
page readonly
A48000
heap
page read and write
34E9000
trusted library allocation
page read and write
17BF000
stack
page read and write
7880000
heap
page read and write
50DE000
stack
page read and write
5D5000
heap
page read and write
2DBA000
heap
page read and write
7500000
heap
page read and write
12000
unkown
page readonly
8AE000
stack
page read and write
6081000
heap
page read and write
4D10000
heap
page read and write
3B71000
trusted library allocation
page read and write
716E000
stack
page read and write
13F0000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
E0D000
heap
page read and write
7180000
trusted library allocation
page execute and read and write
9D0000
heap
page read and write
4643000
trusted library allocation
page read and write
662C000
trusted library allocation
page read and write
D2D000
trusted library allocation
page execute and read and write
8E6000
trusted library allocation
page execute and read and write
F03000
heap
page read and write
10E0000
heap
page read and write
1147000
trusted library allocation
page execute and read and write
5C8000
heap
page read and write
2D4E000
unkown
page read and write
5CAE000
stack
page read and write
57FE000
stack
page read and write
5BD0000
heap
page read and write
7AEE000
stack
page read and write
5200000
heap
page read and write
4BB0000
trusted library allocation
page read and write
2B21000
trusted library allocation
page read and write
51E0000
heap
page execute and read and write
C75000
heap
page read and write
C80000
heap
page read and write
5110000
heap
page execute and read and write
2470000
trusted library allocation
page read and write
645E000
stack
page read and write
532E000
stack
page read and write
F40000
heap
page read and write
31D0000
trusted library allocation
page read and write
11EE000
stack
page read and write
10C4000
trusted library allocation
page read and write
2D0E000
unkown
page read and write
2DB0000
heap
page read and write
62A0000
trusted library allocation
page read and write
DCC000
heap
page read and write
45DC000
stack
page read and write
148E000
stack
page read and write
2B81000
trusted library allocation
page read and write
A70000
heap
page execute and read and write
49D0000
trusted library section
page readonly
29F0000
heap
page read and write
2B60000
heap
page execute and read and write
43E000
remote allocation
page execute and read and write
5220000
trusted library allocation
page execute and read and write
73FE000
stack
page read and write
86E000
stack
page read and write
4E3E000
stack
page read and write
50D0000
trusted library allocation
page read and write
9B0000
heap
page read and write
1230000
trusted library allocation
page read and write
4B90000
heap
page read and write
4F3E000
stack
page read and write
CBC0000
heap
page read and write
FC9000
stack
page read and write
3155000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
2FDE000
stack
page read and write
2B50000
heap
page read and write
4565000
trusted library allocation
page read and write
A52000
heap
page read and write
6640000
trusted library allocation
page execute and read and write
69A0000
trusted library allocation
page read and write
2AFE000
stack
page read and write
2D8F000
unkown
page read and write
6AAE000
stack
page read and write
2C6D000
trusted library allocation
page read and write
1190000
trusted library allocation
page read and write
C5D000
trusted library allocation
page execute and read and write
7FAF000
stack
page read and write
1090000
trusted library allocation
page read and write
244B000
trusted library allocation
page read and write
50C0000
trusted library allocation
page execute and read and write
51FE000
stack
page read and write
555E000
stack
page read and write
EBE000
stack
page read and write
2B71000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
7D2C000
stack
page read and write
6150000
trusted library allocation
page read and write
1013000
trusted library allocation
page execute and read and write
D50000
heap
page read and write
137E000
stack
page read and write
23FF000
stack
page read and write
69B0000
trusted library allocation
page read and write
3020000
heap
page read and write
6A10000
trusted library allocation
page execute and read and write
2B0C000
stack
page read and write
104E000
stack
page read and write
65DD000
stack
page read and write
12CE000
stack
page read and write
61C7000
trusted library allocation
page read and write
6432000
heap
page read and write
7510000
heap
page read and write
1420000
trusted library allocation
page read and write
6CA0000
trusted library section
page read and write
D8A000
heap
page read and write
2B53000
heap
page read and write
5515000
heap
page read and write
127E000
stack
page read and write
DB5000
heap
page read and write
29CE000
stack
page read and write
C30000
heap
page read and write
6038000
heap
page read and write
1416000
trusted library allocation
page execute and read and write
6790000
heap
page read and write
1124000
trusted library allocation
page read and write
4D0D000
stack
page read and write
1422000
trusted library allocation
page read and write
55CE000
stack
page read and write
A38000
heap
page read and write
15B6000
heap
page read and write
2C5D000
stack
page read and write
4BC000
stack
page read and write
F10000
trusted library allocation
page read and write
C7E000
stack
page read and write
C30000
trusted library allocation
page read and write
2B00000
trusted library allocation
page read and write
5188000
trusted library allocation
page read and write
2B1E000
trusted library allocation
page read and write
C70000
heap
page read and write
245E000
trusted library allocation
page read and write
8CD000
trusted library allocation
page execute and read and write
30E4000
trusted library allocation
page read and write
6030000
heap
page read and write
2B26000
trusted library allocation
page read and write
29E0000
heap
page read and write
1490000
trusted library allocation
page execute and read and write
272F000
trusted library allocation
page read and write
7C2B000
stack
page read and write
49E0000
heap
page read and write
2C9A000
stack
page read and write
B20000
trusted library allocation
page execute and read and write
49F0000
heap
page read and write
C7B000
trusted library allocation
page execute and read and write
1045000
trusted library allocation
page execute and read and write
EC0000
heap
page read and write
7F260000
trusted library allocation
page execute and read and write
1380000
heap
page read and write
D1DE000
stack
page read and write
51F0000
trusted library section
page readonly
1060000
heap
page read and write
500000
heap
page read and write
8BA000
stack
page read and write
2B2E000
trusted library allocation
page read and write
63DB000
stack
page read and write
8FB000
trusted library allocation
page execute and read and write
D32000
trusted library allocation
page read and write
29FC000
stack
page read and write
1070000
trusted library allocation
page execute and read and write
1042000
trusted library allocation
page read and write
114B000
trusted library allocation
page execute and read and write
11A0000
heap
page read and write
D2DF000
stack
page read and write
D10000
trusted library allocation
page read and write
B57000
heap
page read and write
3B61000
trusted library allocation
page read and write
DC0000
heap
page read and write
34E1000
trusted library allocation
page read and write
2B0B000
trusted library allocation
page read and write
30C0000
heap
page read and write
701E000
stack
page read and write
10DF000
stack
page read and write
1250000
heap
page read and write
2490000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
4D60000
heap
page read and write
6AEE000
stack
page read and write
668E000
stack
page read and write
292D000
stack
page read and write
2A50000
heap
page execute and read and write
29B0000
heap
page execute and read and write
2D4E000
unkown
page read and write
159C000
heap
page read and write
13E0000
trusted library allocation
page read and write
717E000
stack
page read and write
57BC000
stack
page read and write
CE5000
heap
page read and write
CCFD000
stack
page read and write
13FD000
trusted library allocation
page execute and read and write
6A6F000
stack
page read and write
D31C000
stack
page read and write
4B78000
trusted library allocation
page read and write
1036000
trusted library allocation
page execute and read and write
39C1000
trusted library allocation
page read and write
6D9E000
stack
page read and write
6140000
trusted library allocation
page read and write
2B70000
heap
page execute and read and write
74FE000
stack
page read and write
3134000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
41A9000
trusted library allocation
page read and write
B8DD000
stack
page read and write
10B0000
trusted library allocation
page read and write
7D6E000
stack
page read and write
D41C000
stack
page read and write
2B10000
trusted library allocation
page read and write
2B31000
trusted library allocation
page read and write
3BA9000
trusted library allocation
page read and write
606E000
heap
page read and write
2466000
trusted library allocation
page read and write
BCDE000
stack
page read and write
6CC0000
heap
page read and write
C97E000
stack
page read and write
D70000
trusted library allocation
page execute and read and write
8E2000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
19A000
stack
page read and write
D2000
unkown
page readonly
24D0000
heap
page read and write
6048000
heap
page read and write
2BC4000
trusted library allocation
page read and write
2B36000
trusted library allocation
page read and write
F18000
heap
page read and write
629E000
stack
page read and write
D20000
trusted library allocation
page read and write
692E000
stack
page read and write
43DA000
trusted library allocation
page read and write
7884000
heap
page read and write
2B42000
trusted library allocation
page read and write
3B79000
trusted library allocation
page read and write
49F3000
heap
page read and write
14B0000
trusted library allocation
page read and write
7E6E000
stack
page read and write
6600000
trusted library allocation
page read and write
30E6000
trusted library allocation
page read and write
D75000
heap
page read and write
4D20000
heap
page read and write
5898000
trusted library allocation
page read and write
8F7000
trusted library allocation
page execute and read and write
63F000
heap
page read and write
D4B000
trusted library allocation
page execute and read and write
5D2E000
stack
page read and write
17FC000
stack
page read and write
546E000
stack
page read and write
587E000
stack
page read and write
1196000
trusted library allocation
page read and write
1400000
trusted library allocation
page read and write
D8E000
heap
page read and write
69FE000
stack
page read and write
727F000
stack
page read and write
D47000
trusted library allocation
page execute and read and write
1257000
heap
page read and write
49C5000
heap
page read and write
2B1E000
trusted library allocation
page read and write
59D000
stack
page read and write
116E000
stack
page read and write
3030000
heap
page read and write
510000
heap
page read and write
8C3000
trusted library allocation
page execute and read and write
29D0000
heap
page read and write
F54000
heap
page read and write
3149000
trusted library allocation
page read and write
D1D000
trusted library allocation
page execute and read and write
61C0000
trusted library allocation
page read and write
465F000
trusted library allocation
page read and write
787E000
stack
page read and write
122B000
stack
page read and write
50BF000
stack
page read and write
102D000
trusted library allocation
page execute and read and write
10C0000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
C30000
heap
page read and write
243C000
stack
page read and write
830000
unkown
page readonly
7190000
trusted library allocation
page read and write
86E000
stack
page read and write
3170000
heap
page read and write
3BDA000
trusted library allocation
page read and write
50E6000
trusted library allocation
page read and write
1194000
trusted library allocation
page read and write
141A000
trusted library allocation
page execute and read and write
5120000
heap
page read and write
CF0000
heap
page read and write
3B99000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1180000
trusted library allocation
page read and write
6560000
trusted library allocation
page read and write
31DA000
trusted library allocation
page read and write
49A0000
heap
page read and write
73BE000
stack
page read and write
405B000
trusted library allocation
page read and write
6137000
trusted library allocation
page read and write
625F000
stack
page read and write
8C0000
trusted library allocation
page read and write
6960000
trusted library allocation
page execute and read and write
545E000
stack
page read and write
2B16000
trusted library allocation
page read and write
4187000
trusted library allocation
page read and write
3124000
trusted library allocation
page read and write
D36000
trusted library allocation
page execute and read and write
D0A0000
heap
page read and write
8DD000
trusted library allocation
page execute and read and write
CBE000
stack
page read and write
2BDF000
trusted library allocation
page read and write
296A000
stack
page read and write
24C0000
trusted library allocation
page read and write
14F5000
heap
page read and write
2DCC000
heap
page read and write
62B0000
trusted library allocation
page read and write
3B81000
trusted library allocation
page read and write
4980000
trusted library allocation
page read and write
CC0000
heap
page read and write
2B3D000
trusted library allocation
page read and write
E1B000
heap
page read and write
CABD000
stack
page read and write
D60000
trusted library allocation
page read and write
2440000
trusted library allocation
page read and write
4D0D000
stack
page read and write
A1F000
stack
page read and write
6770000
heap
page read and write
2782000
trusted library allocation
page read and write
4986000
trusted library allocation
page read and write
CE3E000
stack
page read and write
559E000
stack
page read and write
4CFD000
stack
page read and write
4D4E000
heap
page read and write
78B3000
heap
page read and write
4F70000
heap
page execute and read and write
D5A000
heap
page read and write
5BC0000
heap
page read and write
C0E000
stack
page read and write
301F000
stack
page read and write
D13000
trusted library allocation
page execute and read and write
E6D000
heap
page read and write
11A0000
heap
page read and write
2DB8000
heap
page read and write
BCF000
stack
page read and write
5270000
heap
page execute and read and write
7EAE000
stack
page read and write
DC3000
heap
page read and write
1114000
trusted library allocation
page read and write
CA0000
trusted library allocation
page execute and read and write
50A0000
heap
page read and write
12E5000
heap
page read and write
2461000
trusted library allocation
page read and write
9CA000
stack
page read and write
5510000
heap
page read and write
4FBE000
stack
page read and write
541E000
stack
page read and write
8D0000
trusted library allocation
page read and write
CBBD000
stack
page read and write
1810000
heap
page read and write
536E000
stack
page read and write
2B61000
trusted library allocation
page read and write
5AE000
heap
page read and write
D42000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
C54000
trusted library allocation
page read and write
531C000
stack
page read and write
A6E000
stack
page read and write
D80000
heap
page read and write
1047000
trusted library allocation
page execute and read and write
29C1000
trusted library allocation
page read and write
6042000
heap
page read and write
5B9000
stack
page read and write
D55E000
stack
page read and write
8E0000
trusted library allocation
page read and write
2B2A000
trusted library allocation
page read and write
D64000
heap
page read and write
1060000
trusted library allocation
page read and write
4602000
trusted library allocation
page read and write
2DCD000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
9EE000
heap
page read and write
4F7000
stack
page read and write
31E2000
trusted library allocation
page read and write
5060000
trusted library allocation
page read and write
E7F000
stack
page read and write
4E90000
heap
page read and write
D67000
heap
page read and write
522E000
stack
page read and write
10A0000
heap
page read and write
EE8000
heap
page read and write
1113000
trusted library allocation
page execute and read and write
5A8000
heap
page read and write
6582000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
1230000
heap
page read and write
1032000
trusted library allocation
page read and write
13A0000
heap
page read and write
55F0000
trusted library allocation
page execute and read and write
4D1C000
stack
page read and write
8D5000
heap
page read and write
C44000
trusted library allocation
page read and write
1170000
heap
page read and write
4970000
trusted library allocation
page read and write
672E000
stack
page read and write
5230000
trusted library allocation
page read and write
3B89000
trusted library allocation
page read and write
50FE000
stack
page read and write
4960000
trusted library allocation
page execute and read and write
CA7E000
stack
page read and write
41EB000
trusted library allocation
page read and write
2BF6000
trusted library allocation
page read and write
B50000
heap
page read and write
1100000
trusted library allocation
page read and write
14C0000
heap
page read and write
546E000
stack
page read and write
4ABE000
stack
page read and write
7EE70000
trusted library allocation
page execute and read and write
CDFE000
stack
page read and write
A20000
trusted library allocation
page read and write
1080000
heap
page read and write
C50000
trusted library allocation
page read and write
67A0000
trusted library allocation
page execute and read and write
104B000
trusted library allocation
page execute and read and write
8C4000
trusted library allocation
page read and write
5210000
heap
page read and write
24E1000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
103A000
trusted library allocation
page execute and read and write
4E9E000
heap
page read and write
ECF000
stack
page read and write
DFE000
heap
page read and write
832000
unkown
page readonly
5BAF000
stack
page read and write
6D5E000
stack
page read and write
7120000
trusted library allocation
page read and write
6130000
trusted library allocation
page read and write
69B5000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
D45D000
stack
page read and write
6160000
trusted library allocation
page execute and read and write
78A2000
heap
page read and write
6607000
trusted library allocation
page read and write
2B5F000
stack
page read and write
8EA000
trusted library allocation
page execute and read and write
910000
heap
page read and write
5CEE000
stack
page read and write
F0E000
stack
page read and write
4BBE000
stack
page read and write
6033000
heap
page read and write
1014000
trusted library allocation
page read and write
531E000
stack
page read and write
14A0000
heap
page read and write
DCF000
stack
page read and write
2D8E000
stack
page read and write
28EF000
stack
page read and write
3110000
heap
page execute and read and write
1190000
trusted library allocation
page read and write
583E000
stack
page read and write
5108000
trusted library allocation
page read and write
58A0000
heap
page execute and read and write
E72000
heap
page read and write
1427000
trusted library allocation
page execute and read and write
1412000
trusted library allocation
page read and write
1390000
trusted library allocation
page execute and read and write
B40000
trusted library allocation
page read and write
50B0000
heap
page read and write
24A0000
trusted library allocation
page read and write
EE0000
heap
page read and write
54F5000
trusted library allocation
page read and write
51EC000
stack
page read and write
777E000
stack
page read and write
2472000
trusted library allocation
page read and write
1280000
heap
page read and write
63E0000
heap
page read and write
49C0000
heap
page read and write
2EEF000
stack
page read and write
27CC000
stack
page read and write
820000
heap
page read and write
5890000
trusted library allocation
page read and write
D14000
trusted library allocation
page read and write
1800000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
2CD0000
heap
page read and write
101D000
trusted library allocation
page execute and read and write
1410000
trusted library allocation
page read and write
3D3A000
trusted library allocation
page read and write
1425000
trusted library allocation
page execute and read and write
A56000
heap
page read and write
9B9000
stack
page read and write
61BD000
stack
page read and write
C20000
heap
page read and write
45E2000
trusted library allocation
page read and write
46DB000
trusted library allocation
page read and write
2D90000
heap
page read and write
CF3E000
stack
page read and write
5A0000
heap
page read and write
54F0000
trusted library allocation
page read and write
640B000
heap
page read and write
773E000
stack
page read and write
4C0B000
stack
page read and write
5CAF000
stack
page read and write
D30000
heap
page read and write
1030000
trusted library allocation
page read and write
5660000
heap
page read and write
10D0000
trusted library allocation
page read and write
A05000
heap
page read and write
2DB0000
heap
page read and write
8AE000
stack
page read and write
4D64000
heap
page read and write
4BA0000
trusted library allocation
page execute and read and write
50EE000
stack
page read and write
9B7000
stack
page read and write
8D0000
heap
page read and write
142B000
trusted library allocation
page execute and read and write
BADE000
stack
page read and write
13F4000
trusted library allocation
page read and write
6DEC000
trusted library allocation
page read and write
9D8000
heap
page read and write
4181000
trusted library allocation
page read and write
5770000
heap
page read and write
83A000
unkown
page readonly
6158000
trusted library allocation
page read and write
6071000
heap
page read and write
1040000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
C77000
trusted library allocation
page execute and read and write
9F3000
heap
page read and write
711F000
stack
page read and write
14EA000
heap
page read and write
508C000
stack
page read and write
155E000
heap
page read and write
1120000
trusted library allocation
page read and write
BDDD000
stack
page read and write
12E0000
heap
page read and write
5E2000
heap
page read and write
7BEE000
stack
page read and write
4BFE000
stack
page read and write
4BC0000
heap
page execute and read and write
27D0000
trusted library allocation
page execute and read and write
246D000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
D4E000
stack
page read and write
763E000
stack
page read and write
4950000
heap
page read and write
27E0000
heap
page read and write
6620000
trusted library allocation
page read and write
D38000
heap
page read and write
10000
unkown
page readonly
D0D9000
heap
page read and write
1010000
trusted library allocation
page read and write
BBDE000
stack
page read and write
7120000
trusted library section
page read and write
8B9000
stack
page read and write
111D000
trusted library allocation
page execute and read and write
3BC1000
trusted library allocation
page read and write
CD0000
heap
page read and write
159A000
heap
page read and write
2480000
trusted library allocation
page read and write
A88000
trusted library allocation
page read and write
158C000
heap
page read and write
4189000
trusted library allocation
page read and write
5AAE000
stack
page read and write
C43000
trusted library allocation
page execute and read and write
14C8000
heap
page read and write
14F8000
heap
page read and write
1170000
trusted library allocation
page execute and read and write
30E0000
trusted library allocation
page read and write
D3A000
trusted library allocation
page execute and read and write
550000
heap
page read and write
59AC000
stack
page read and write
D70000
heap
page read and write
8B0000
heap
page read and write
ECB000
stack
page read and write
2B2D000
trusted library allocation
page read and write
2B22000
trusted library allocation
page read and write
6D6E000
stack
page read and write
EFE000
heap
page read and write
9F9000
heap
page read and write
30BF000
stack
page read and write
5600000
trusted library allocation
page read and write
D0A8000
heap
page read and write
1083000
heap
page read and write
C87E000
stack
page read and write
C4D000
trusted library allocation
page execute and read and write
2B1B000
trusted library allocation
page read and write
CE0000
heap
page read and write
8B0000
trusted library allocation
page read and write
615C000
trusted library allocation
page read and write
C20000
heap
page read and write
13F3000
trusted library allocation
page execute and read and write
6170000
trusted library allocation
page execute and read and write
2ACE000
stack
page read and write
7125000
trusted library allocation
page read and write
D0BB000
heap
page read and write
There are 604 hidden memdumps, click here to show them.