IOC Report
New order.bat.exe

loading gif

Files

File Path
Type
Category
Malicious
New order.bat.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp6538.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\ydjgrBUVZiNXwd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New order.bat.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ydjgrBUVZiNXwd.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0fl35ose.2ln.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3wu0c25i.nhe.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dwlx05wb.phq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ffqznhss.s3q.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jt4cpbef.0xy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l1uzm32d.ivv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ruqwh3r0.krv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xgphgiuu.ray.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp714E.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\ydjgrBUVZiNXwd.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\New order.bat.exe
C:\Users\user\Desktop\New order.bat.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\New order.bat.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ydjgrBUVZiNXwd.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ydjgrBUVZiNXwd" /XML "C:\Users\user\AppData\Local\Temp\tmp6538.tmp
malicious
C:\Users\user\Desktop\New order.bat.exe
C:\Users\user\Desktop\New order.bat.exe
malicious
C:\Users\user\AppData\Roaming\ydjgrBUVZiNXwd.exe
C:\Users\user\AppData\Roaming\ydjgrBUVZiNXwd.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ydjgrBUVZiNXwd" /XML "C:\Users\user\AppData\Local\Temp\tmp714E.tmp
malicious
C:\Users\user\AppData\Roaming\ydjgrBUVZiNXwd.exe
C:\Users\user\AppData\Roaming\ydjgrBUVZiNXwd.exe
malicious
C:\Users\user\AppData\Roaming\ydjgrBUVZiNXwd.exe
C:\Users\user\AppData\Roaming\ydjgrBUVZiNXwd.exe
malicious
C:\Users\user\AppData\Roaming\ydjgrBUVZiNXwd.exe
C:\Users\user\AppData\Roaming\ydjgrBUVZiNXwd.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.12.205
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://account.dyn.com/
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://api.ipify.org/t
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://api.ipify.org
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://mail.elec-qatar.com
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.elec-qatar.com
50.87.139.143
malicious
api.ipify.org
104.26.12.205

IPs

IP
Domain
Country
Malicious
50.87.139.143
mail.elec-qatar.com
United States
malicious
104.26.12.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New order_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New order_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New order_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New order_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New order_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New order_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New order_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New order_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New order_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New order_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New order_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New order_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New order_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New order_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ydjgrBUVZiNXwd_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ydjgrBUVZiNXwd_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ydjgrBUVZiNXwd_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ydjgrBUVZiNXwd_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ydjgrBUVZiNXwd_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ydjgrBUVZiNXwd_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ydjgrBUVZiNXwd_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ydjgrBUVZiNXwd_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ydjgrBUVZiNXwd_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ydjgrBUVZiNXwd_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ydjgrBUVZiNXwd_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ydjgrBUVZiNXwd_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ydjgrBUVZiNXwd_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ydjgrBUVZiNXwd_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2DB1000
trusted library allocation
page read and write
malicious
2821000
trusted library allocation
page read and write
malicious
3247000
trusted library allocation
page read and write
malicious
3221000
trusted library allocation
page read and write
malicious
7770000
trusted library section
page read and write
malicious
3DF3000
trusted library allocation
page read and write
malicious
2862000
trusted library allocation
page read and write
malicious
4A5B000
trusted library allocation
page read and write
malicious
40CE000
trusted library allocation
page read and write
malicious
3DB9000
trusted library allocation
page read and write
malicious
2DF2000
trusted library allocation
page read and write
malicious
3497000
trusted library allocation
page read and write
malicious
3471000
trusted library allocation
page read and write
malicious
429000
remote allocation
page execute and read and write
malicious
7730000
trusted library section
page read and write
malicious
CA4000
heap
page read and write
4DE0000
trusted library allocation
page execute and read and write
CE2000
heap
page read and write
EFE000
stack
page read and write
403000
remote allocation
page execute and read and write
4DC0000
heap
page read and write
5302000
trusted library allocation
page read and write
1484000
heap
page read and write
3250000
heap
page read and write
4D40000
trusted library allocation
page read and write
3AD9000
trusted library allocation
page read and write
76ED000
stack
page read and write
1445000
trusted library allocation
page execute and read and write
6D38000
trusted library allocation
page read and write
3400000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
1450000
heap
page read and write
7750000
trusted library allocation
page read and write
684F000
stack
page read and write
9E7E000
stack
page read and write
6E98000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
5260000
heap
page read and write
27B0000
trusted library allocation
page read and write
1690000
heap
page read and write
52F6000
trusted library allocation
page read and write
A9A000
stack
page read and write
6F07000
trusted library allocation
page read and write
40B000
remote allocation
page execute and read and write
6D0E000
stack
page read and write
1387000
heap
page read and write
E5A000
heap
page read and write
596E000
trusted library allocation
page read and write
4E43000
heap
page read and write
4DB8000
trusted library allocation
page read and write
A20E000
stack
page read and write
3821000
trusted library allocation
page read and write
56E1000
trusted library allocation
page read and write
6AB0000
heap
page read and write
1970000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
709E000
stack
page read and write
952000
unkown
page readonly
11E0000
heap
page read and write
4D4B000
trusted library allocation
page read and write
1470000
heap
page execute and read and write
AEAC000
stack
page read and write
6EB7000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
6B22000
heap
page read and write
A180000
trusted library allocation
page execute and read and write
C56000
trusted library allocation
page execute and read and write
40C000
remote allocation
page execute and read and write
31CF000
unkown
page read and write
1410000
trusted library allocation
page read and write
11E7000
heap
page read and write
1414000
trusted library allocation
page read and write
96FE000
stack
page read and write
55C0000
heap
page execute and read and write
33F0000
trusted library allocation
page read and write
30A0000
heap
page read and write
3967000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
99BE000
stack
page read and write
A39E000
stack
page read and write
ED9000
heap
page read and write
C40000
trusted library allocation
page read and write
6B77000
heap
page read and write
10F0000
trusted library allocation
page read and write
3456000
trusted library allocation
page read and write
F03000
heap
page read and write
10CE000
stack
page read and write
7B5E000
stack
page read and write
143A000
trusted library allocation
page execute and read and write
1400000
trusted library allocation
page read and write
18AF000
stack
page read and write
C97000
heap
page read and write
1458000
heap
page read and write
6AE0000
heap
page read and write
A86D000
stack
page read and write
DCE000
stack
page read and write
2C30000
heap
page read and write
6EB0000
trusted library allocation
page read and write
11BE000
stack
page read and write
18EE000
stack
page read and write
6B83000
heap
page read and write
E4E000
stack
page read and write
56D2000
trusted library allocation
page read and write
3C4F000
trusted library allocation
page read and write
418000
remote allocation
page execute and read and write
3180000
heap
page read and write
41D1000
trusted library allocation
page read and write
43A000
remote allocation
page execute and read and write
5714000
trusted library allocation
page read and write
4D6D000
trusted library allocation
page read and write
7120000
heap
page read and write
1440000
trusted library allocation
page read and write
5020000
heap
page read and write
4F8C000
stack
page read and write
1990000
trusted library allocation
page read and write
6FF0000
trusted library allocation
page read and write
2DFA000
stack
page read and write
73B0000
trusted library allocation
page execute and read and write
C2D000
trusted library allocation
page execute and read and write
43E000
remote allocation
page execute and read and write
4E10000
trusted library allocation
page execute and read and write
70AE000
stack
page read and write
14BE000
stack
page read and write
7678000
heap
page read and write
1790000
heap
page execute and read and write
4E8B000
stack
page read and write
4D61000
trusted library allocation
page read and write
D62000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
15AA000
heap
page read and write
5730000
trusted library allocation
page read and write
58C0000
heap
page read and write
448E000
trusted library allocation
page read and write
7012000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
56F2000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
7760000
trusted library section
page read and write
1AC7000
heap
page read and write
E90000
heap
page read and write
6A22000
heap
page read and write
69B2000
heap
page read and write
3843000
trusted library allocation
page read and write
5992000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
4828000
trusted library allocation
page read and write
E85000
heap
page read and write
AB5000
heap
page read and write
5335000
trusted library allocation
page read and write
DD0000
trusted library allocation
page execute and read and write
11C0000
heap
page read and write
34B8000
trusted library allocation
page read and write
197D000
trusted library allocation
page execute and read and write
14CD000
heap
page read and write
8F7000
stack
page read and write
1AC0000
heap
page read and write
4E30000
trusted library section
page readonly
4DD2000
trusted library allocation
page read and write
5C2C000
stack
page read and write
428000
remote allocation
page execute and read and write
AB0E000
stack
page read and write
1360000
heap
page read and write
6F20000
trusted library allocation
page execute and read and write
346D000
trusted library allocation
page read and write
3A52000
trusted library allocation
page read and write
5986000
trusted library allocation
page read and write
A9CE000
stack
page read and write
3AF9000
trusted library allocation
page read and write
1413000
trusted library allocation
page read and write
52EE000
trusted library allocation
page read and write
69B0000
heap
page read and write
1100000
heap
page read and write
40E000
remote allocation
page execute and read and write
C80000
heap
page read and write
AB0000
heap
page read and write
6D9D000
stack
page read and write
73F0000
heap
page read and write
5310000
trusted library allocation
page read and write
5860000
heap
page read and write
6D50000
trusted library allocation
page read and write
142A000
trusted library allocation
page execute and read and write
5247000
trusted library allocation
page read and write
3C48000
trusted library allocation
page read and write
9FBE000
stack
page read and write
1500000
heap
page read and write
7100000
trusted library allocation
page read and write
423F000
trusted library allocation
page read and write
6D1F000
stack
page read and write
52FD000
trusted library allocation
page read and write
9C40000
heap
page read and write
A3AE000
stack
page read and write
111A000
stack
page read and write
5720000
heap
page read and write
2DBD000
stack
page read and write
51D8000
trusted library allocation
page read and write
D1B000
heap
page read and write
19C0000
heap
page execute and read and write
C5A000
trusted library allocation
page execute and read and write
1450000
trusted library allocation
page read and write
56CE000
trusted library allocation
page read and write
10E0000
trusted library allocation
page read and write
6AB4000
heap
page read and write
E93000
heap
page read and write
400000
remote allocation
page execute and read and write
D03000
heap
page read and write
7110000
trusted library allocation
page execute and read and write
14D0000
heap
page read and write
2EFE000
stack
page read and write
34B6000
trusted library allocation
page read and write
34B4000
trusted library allocation
page read and write
162C000
heap
page read and write
69E0000
heap
page read and write
4DD0000
trusted library allocation
page read and write
57A0000
heap
page read and write
28E8000
trusted library allocation
page read and write
171E000
stack
page read and write
9AFE000
stack
page read and write
58C5000
heap
page read and write
439000
remote allocation
page execute and read and write
1570000
trusted library allocation
page read and write
6D4D000
trusted library allocation
page read and write
3090000
trusted library allocation
page read and write
14C0000
heap
page read and write
1436000
trusted library allocation
page execute and read and write
320F000
trusted library allocation
page read and write
AACE000
stack
page read and write
33B0000
trusted library allocation
page execute and read and write
5A30000
trusted library allocation
page read and write
E78000
heap
page read and write
AAE000
stack
page read and write
570D000
stack
page read and write
71AF000
stack
page read and write
325A000
trusted library allocation
page read and write
336F000
stack
page read and write
6EBB000
trusted library allocation
page read and write
9EBE000
stack
page read and write
27A6000
trusted library allocation
page read and write
2A7C000
trusted library allocation
page read and write
1487000
heap
page read and write
1170000
heap
page read and write
40A000
remote allocation
page execute and read and write
53C0000
trusted library allocation
page execute and read and write
27D0000
heap
page execute and read and write
5960000
trusted library allocation
page read and write
4D66000
trusted library allocation
page read and write
4449000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
300C000
trusted library allocation
page read and write
9C3D000
stack
page read and write
6D7E000
stack
page read and write
3829000
trusted library allocation
page read and write
2F3E000
stack
page read and write
1695000
heap
page read and write
308C000
stack
page read and write
7780000
trusted library allocation
page execute and read and write
33F4000
trusted library allocation
page read and write
6FFF000
stack
page read and write
1580000
heap
page read and write
660E000
stack
page read and write
27C0000
trusted library allocation
page read and write
1432000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page execute and read and write
940000
heap
page read and write
6B7A000
heap
page read and write
A740000
heap
page read and write
6AD0000
heap
page read and write
14E4000
heap
page read and write
5716000
trusted library allocation
page read and write
DF7000
heap
page read and write
147A000
heap
page read and write
4D44000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
69CE000
stack
page read and write
7870000
trusted library allocation
page execute and read and write
30C0000
heap
page read and write
1442000
trusted library allocation
page read and write
7F610000
trusted library allocation
page execute and read and write
5750000
heap
page read and write
32EB000
heap
page read and write
CF3000
heap
page read and write
3DB1000
trusted library allocation
page read and write
326A000
trusted library allocation
page read and write
2800000
heap
page execute and read and write
6E90000
trusted library allocation
page read and write
5483000
heap
page read and write
33E0000
heap
page execute and read and write
5981000
trusted library allocation
page read and write
6DA7000
trusted library allocation
page read and write
17EE000
stack
page read and write
C6E000
heap
page read and write
C30000
heap
page read and write
1380000
heap
page read and write
1430000
trusted library allocation
page read and write
6990000
heap
page read and write
A1CE000
stack
page read and write
27C5000
trusted library allocation
page read and write
56ED000
trusted library allocation
page read and write
705D000
stack
page read and write
763B000
heap
page read and write
6D57000
trusted library allocation
page read and write
701B000
trusted library allocation
page read and write
4421000
trusted library allocation
page read and write
199B000
trusted library allocation
page execute and read and write
7790000
trusted library allocation
page read and write
2C10000
heap
page read and write
F70000
heap
page read and write
523E000
stack
page read and write
1310000
heap
page read and write
7010000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
186E000
stack
page read and write
A4EE000
stack
page read and write
1995000
trusted library allocation
page execute and read and write
D67000
trusted library allocation
page execute and read and write
6C90000
trusted library allocation
page read and write
6A19000
heap
page read and write
5320000
trusted library allocation
page read and write
10F3000
trusted library allocation
page execute and read and write
53A0000
heap
page read and write
1611000
heap
page read and write
1432000
trusted library allocation
page read and write
1426000
trusted library allocation
page execute and read and write
5974000
trusted library allocation
page read and write
6E7F000
stack
page read and write
950000
unkown
page readonly
6BC0000
trusted library allocation
page read and write
7400000
heap
page read and write
12F8000
stack
page read and write
C68000
heap
page read and write
7630000
heap
page read and write
4E34000
trusted library section
page readonly
1420000
trusted library allocation
page read and write
1422000
trusted library allocation
page read and write
52F1000
trusted library allocation
page read and write
6C99000
trusted library allocation
page read and write
4D72000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
A3DE000
stack
page read and write
1680000
trusted library allocation
page read and write
6AC9000
heap
page read and write
27A0000
trusted library allocation
page read and write
31CE000
stack
page read and write
143B000
trusted library allocation
page execute and read and write
C43000
trusted library allocation
page read and write
560C000
stack
page read and write
5750000
heap
page read and write
2885000
trusted library allocation
page read and write
19B0000
trusted library allocation
page read and write
1997000
trusted library allocation
page execute and read and write
2CBB000
heap
page read and write
6B90000
heap
page read and write
7C5F000
stack
page read and write
44CB000
trusted library allocation
page read and write
C24000
trusted library allocation
page read and write
C23000
trusted library allocation
page execute and read and write
1437000
trusted library allocation
page execute and read and write
52DB000
trusted library allocation
page read and write
1588000
heap
page read and write
1460000
trusted library allocation
page execute and read and write
596B000
trusted library allocation
page read and write
1684000
trusted library allocation
page read and write
140E000
stack
page read and write
501B000
stack
page read and write
99FE000
stack
page read and write
E50000
heap
page read and write
551D000
stack
page read and write
40D000
remote allocation
page execute and read and write
5590000
trusted library allocation
page execute and read and write
1390000
heap
page read and write
53D0000
trusted library allocation
page read and write
324F000
stack
page read and write
A730000
heap
page read and write
7000000
trusted library allocation
page execute and read and write
F0B000
heap
page read and write
1410000
trusted library allocation
page read and write
2EBF000
unkown
page read and write
34AA000
trusted library allocation
page read and write
2810000
heap
page read and write
5250000
heap
page read and write
14C6000
heap
page read and write
1730000
trusted library allocation
page read and write
3C0D000
trusted library allocation
page read and write
A15B000
stack
page read and write
6EB0000
trusted library allocation
page read and write
5769000
heap
page read and write
9D7E000
stack
page read and write
3264000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page execute and read and write
A62D000
stack
page read and write
ADAC000
stack
page read and write
177E000
stack
page read and write
CFF000
heap
page read and write
AEEE000
stack
page read and write
34BA000
trusted library allocation
page read and write
3500000
heap
page read and write
417000
remote allocation
page execute and read and write
FB9000
stack
page read and write
E5E000
heap
page read and write
A72D000
stack
page read and write
3110000
heap
page read and write
5700000
heap
page execute and read and write
A25C000
stack
page read and write
C60000
heap
page read and write
597E000
trusted library allocation
page read and write
A20000
heap
page read and write
6BB0000
trusted library allocation
page execute and read and write
6FBD000
stack
page read and write
6B67000
heap
page read and write
1AB0000
heap
page read and write
198A000
trusted library allocation
page execute and read and write
33AC000
stack
page read and write
D80000
trusted library allocation
page read and write
1507000
heap
page read and write
6CA0000
trusted library allocation
page execute and read and write
5480000
heap
page read and write
5740000
heap
page read and write
E00000
heap
page read and write
C20000
trusted library allocation
page read and write
49FC000
stack
page read and write
31D1000
trusted library allocation
page read and write
BD0000
heap
page read and write
1992000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
2CB0000
heap
page read and write
71FE000
unkown
page read and write
D6B000
trusted library allocation
page execute and read and write
33C0000
trusted library allocation
page read and write
A6E000
stack
page read and write
C10000
trusted library allocation
page read and write
6D30000
heap
page read and write
72FE000
stack
page read and write
3CCB000
trusted library allocation
page read and write
5B2C000
stack
page read and write
56C0000
trusted library allocation
page read and write
120E000
stack
page read and write
141D000
trusted library allocation
page execute and read and write
3E5B000
trusted library allocation
page read and write
4E40000
heap
page read and write
41F9000
trusted library allocation
page read and write
2C7E000
unkown
page read and write
70DE000
stack
page read and write
4D5E000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
B97000
stack
page read and write
2DAE000
stack
page read and write
DF0000
heap
page read and write
6C1E000
stack
page read and write
6AF4000
heap
page read and write
32E0000
heap
page read and write
3060000
heap
page read and write
7400000
heap
page read and write
5BEF000
unkown
page read and write
5710000
heap
page read and write
135E000
stack
page read and write
6E5E000
stack
page read and write
536E000
stack
page read and write
6D30000
trusted library allocation
page read and write
75EE000
stack
page read and write
5D4F000
unkown
page read and write
5470000
trusted library allocation
page read and write
7860000
trusted library allocation
page read and write
F21000
heap
page read and write
5240000
trusted library allocation
page read and write
1982000
trusted library allocation
page read and write
15BC000
heap
page read and write
15B9000
heap
page read and write
130E000
stack
page read and write
F75000
heap
page read and write
48FC000
stack
page read and write
153E000
stack
page read and write
141D000
trusted library allocation
page execute and read and write
762E000
stack
page read and write
A170000
trusted library allocation
page read and write
56E6000
trusted library allocation
page read and write
168D000
trusted library allocation
page execute and read and write
3EF7000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
73C0000
heap
page read and write
108E000
stack
page read and write
1447000
trusted library allocation
page execute and read and write
321D000
trusted library allocation
page read and write
320E000
stack
page read and write
A4AE000
stack
page read and write
AFEE000
stack
page read and write
750E000
stack
page read and write
73A0000
trusted library allocation
page read and write
3410000
heap
page read and write
296D000
stack
page read and write
598D000
trusted library allocation
page read and write
345F000
trusted library allocation
page read and write
7AA0000
trusted library section
page read and write
2C20000
heap
page read and write
1420000
trusted library allocation
page read and write
1683000
trusted library allocation
page execute and read and write
5ACC000
stack
page read and write
BF0000
heap
page read and write
52D4000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
98BE000
stack
page read and write
5EA000
stack
page read and write
734E000
stack
page read and write
C4D000
trusted library allocation
page execute and read and write
3206000
trusted library allocation
page read and write
6D48000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
1980000
trusted library allocation
page read and write
4089000
trusted library allocation
page read and write
1395000
heap
page read and write
3FE2000
trusted library allocation
page read and write
409000
remote allocation
page execute and read and write
5270000
heap
page read and write
6C0E000
stack
page read and write
A29E000
stack
page read and write
670F000
stack
page read and write
3B56000
trusted library allocation
page read and write
6F8E000
stack
page read and write
1780000
trusted library allocation
page execute and read and write
1986000
trusted library allocation
page execute and read and write
674E000
stack
page read and write
317E000
unkown
page read and write
1540000
heap
page read and write
5070000
heap
page read and write
4D80000
trusted library allocation
page read and write
1A0E000
stack
page read and write
144B000
trusted library allocation
page execute and read and write
AC0E000
stack
page read and write
578E000
heap
page read and write
6E9E000
stack
page read and write
786A000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
29A9000
stack
page read and write
6DC0000
trusted library allocation
page execute and read and write
7EE50000
trusted library allocation
page execute and read and write
A4DE000
stack
page read and write
14F0000
trusted library allocation
page read and write
752E000
stack
page read and write
CA2000
heap
page read and write
5724000
heap
page read and write
10F4000
trusted library allocation
page read and write
3B3F000
trusted library allocation
page read and write
96BE000
stack
page read and write
A5EF000
stack
page read and write
10FD000
trusted library allocation
page execute and read and write
6DA0000
trusted library allocation
page read and write
1607000
heap
page read and write
56DE000
trusted library allocation
page read and write
6AEA000
heap
page read and write
73D0000
heap
page read and write
53B2000
trusted library allocation
page read and write
3EA9000
trusted library allocation
page read and write
56CB000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
3421000
trusted library allocation
page read and write
142D000
trusted library allocation
page execute and read and write
C52000
trusted library allocation
page read and write
1AB4000
heap
page read and write
279E000
stack
page read and write
573E000
trusted library allocation
page read and write
A96E000
stack
page read and write
2E6F000
trusted library allocation
page read and write
1413000
trusted library allocation
page execute and read and write
13A0000
heap
page read and write
517E000
stack
page read and write
6ABE000
heap
page read and write
6DB0000
trusted library allocation
page read and write
7850000
trusted library allocation
page read and write
5760000
heap
page read and write
3863000
trusted library allocation
page read and write
17A0000
heap
page read and write
146F000
heap
page read and write
1A18000
trusted library allocation
page read and write
3BD2000
trusted library allocation
page read and write
55B0000
trusted library section
page readonly
6ACE000
stack
page read and write
2E15000
trusted library allocation
page read and write
BBE000
stack
page read and write
5030000
heap
page read and write
9B3D000
stack
page read and write
5720000
heap
page read and write
59CC000
stack
page read and write
6EAD000
trusted library allocation
page read and write
5255000
heap
page read and write
14F9000
stack
page read and write
6D43000
trusted library allocation
page read and write
There are 575 hidden memdumps, click here to show them.