IOC Report
Doc via Dhl.exe

loading gif

Files

File Path
Type
Category
Malicious
Doc via Dhl.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp1E38.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\JORnjCnA.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Doc via Dhl.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\JORnjCnA.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2bitxifn.g3e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ecb2ofno.zpd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f5z0lehx.opo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g4ogpiim.rlh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jzqeco5c.vap.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kge4iziw.0nt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uc5fwhmb.prb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v4etozyz.noo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp2DD8.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\JORnjCnA.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Doc via Dhl.exe
"C:\Users\user\Desktop\Doc via Dhl.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Doc via Dhl.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\JORnjCnA.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JORnjCnA" /XML "C:\Users\user\AppData\Local\Temp\tmp1E38.tmp"
malicious
C:\Users\user\Desktop\Doc via Dhl.exe
"C:\Users\user\Desktop\Doc via Dhl.exe"
malicious
C:\Users\user\AppData\Roaming\JORnjCnA.exe
C:\Users\user\AppData\Roaming\JORnjCnA.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JORnjCnA" /XML "C:\Users\user\AppData\Local\Temp\tmp2DD8.tmp"
malicious
C:\Users\user\AppData\Roaming\JORnjCnA.exe
"C:\Users\user\AppData\Roaming\JORnjCnA.exe"
malicious
C:\Users\user\AppData\Roaming\JORnjCnA.exe
"C:\Users\user\AppData\Roaming\JORnjCnA.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://ip-api.com/line/?fields=hostingAR9#
unknown
https://account.dyn.com/
unknown
http://tempuri.org/DataSet1.xsd)Microsoft
unknown
http://us2.smtp.mailhostbox.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
us2.smtp.mailhostbox.com
208.91.199.223
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
208.91.198.143
unknown
United States
208.95.112.1
ip-api.com
United States
208.91.199.225
unknown
United States
208.91.199.223
us2.smtp.mailhostbox.com
United States
208.91.199.224
unknown
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Doc via Dhl_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Doc via Dhl_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Doc via Dhl_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Doc via Dhl_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Doc via Dhl_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Doc via Dhl_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Doc via Dhl_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Doc via Dhl_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Doc via Dhl_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Doc via Dhl_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Doc via Dhl_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Doc via Dhl_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Doc via Dhl_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Doc via Dhl_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JORnjCnA_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JORnjCnA_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JORnjCnA_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JORnjCnA_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JORnjCnA_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JORnjCnA_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JORnjCnA_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JORnjCnA_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JORnjCnA_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JORnjCnA_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JORnjCnA_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JORnjCnA_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JORnjCnA_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JORnjCnA_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3378000
trusted library allocation
page read and write
malicious
3391000
trusted library allocation
page read and write
malicious
33B7000
trusted library allocation
page read and write
malicious
3353000
trusted library allocation
page read and write
malicious
37D8000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
4AA9000
trusted library allocation
page read and write
malicious
17B0000
trusted library allocation
page read and write
5CCE000
stack
page read and write
6D9E000
stack
page read and write
162D000
heap
page read and write
2FBD000
stack
page read and write
5781000
trusted library allocation
page read and write
1578000
heap
page read and write
4CEB000
trusted library allocation
page read and write
C20000
heap
page execute and read and write
4C1B000
trusted library allocation
page read and write
3731000
trusted library allocation
page read and write
1783000
trusted library allocation
page execute and read and write
57A6000
trusted library allocation
page read and write
F70000
heap
page read and write
78B0000
trusted library allocation
page read and write
88FD000
stack
page read and write
6B60000
heap
page read and write
6DF0000
trusted library allocation
page execute and read and write
2A20000
trusted library allocation
page read and write
120F000
stack
page read and write
459A000
trusted library allocation
page read and write
83E3000
trusted library allocation
page read and write
2A13000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
35AF000
stack
page read and write
52A0000
trusted library section
page read and write
537F000
stack
page read and write
50C6000
trusted library allocation
page read and write
B33000
heap
page read and write
5B48000
heap
page read and write
15A0000
trusted library allocation
page read and write
6CBE000
stack
page read and write
8320000
heap
page read and write
10C0000
trusted library allocation
page read and write
4C3D000
trusted library allocation
page read and write
3C29000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
16B0000
trusted library allocation
page read and write
E4E000
stack
page read and write
17A6000
trusted library allocation
page execute and read and write
717E000
stack
page read and write
50E5000
trusted library allocation
page read and write
6C9E000
stack
page read and write
81C0000
trusted library allocation
page execute and read and write
A33000
trusted library allocation
page read and write
3210000
heap
page read and write
5800000
heap
page read and write
59FE000
stack
page read and write
6DED000
trusted library allocation
page read and write
52C0000
heap
page execute and read and write
16A5000
heap
page read and write
577E000
trusted library allocation
page read and write
3223000
heap
page read and write
31E0000
trusted library allocation
page read and write
308B000
trusted library allocation
page execute and read and write
5772000
trusted library allocation
page read and write
48CC000
stack
page read and write
356E000
stack
page read and write
5170000
trusted library allocation
page execute and read and write
3320000
heap
page read and write
31F0000
trusted library allocation
page read and write
31F4000
trusted library allocation
page read and write
8B4E000
stack
page read and write
178D000
trusted library allocation
page execute and read and write
8900000
heap
page read and write
1770000
trusted library allocation
page read and write
B73000
heap
page read and write
5B09000
heap
page read and write
42F1000
trusted library allocation
page read and write
64FE000
stack
page read and write
68FE000
stack
page read and write
C1C000
stack
page read and write
8640000
trusted library allocation
page execute and read and write
50AB000
trusted library allocation
page read and write
C4DB000
stack
page read and write
3270000
heap
page read and write
10ED000
trusted library allocation
page execute and read and write
181E000
stack
page read and write
3361000
trusted library allocation
page read and write
578D000
trusted library allocation
page read and write
13E5000
heap
page read and write
29D0000
trusted library allocation
page read and write
2C10000
heap
page execute and read and write
4ED0000
trusted library allocation
page read and write
6610000
heap
page read and write
1678000
heap
page read and write
2A1E000
stack
page read and write
8BE000
stack
page read and write
1830000
heap
page read and write
44D9000
trusted library allocation
page read and write
1490000
heap
page read and write
74B0000
heap
page read and write
930000
heap
page read and write
2AC0000
trusted library allocation
page execute and read and write
57BA000
trusted library allocation
page read and write
5766000
trusted library allocation
page read and write
2731000
trusted library allocation
page read and write
17B5000
trusted library allocation
page execute and read and write
6A5E000
stack
page read and write
40AA000
trusted library allocation
page read and write
3321000
trusted library allocation
page read and write
4C65000
trusted library allocation
page read and write
4685000
trusted library allocation
page read and write
A24000
trusted library allocation
page read and write
5280000
heap
page read and write
57C6000
trusted library allocation
page read and write
1239000
stack
page read and write
6CD0000
heap
page read and write
C460000
heap
page read and write
3180000
heap
page read and write
3200000
trusted library allocation
page read and write
591C000
stack
page read and write
2761000
trusted library allocation
page read and write
7E0000
unkown
page readonly
577A000
trusted library allocation
page read and write
8650000
trusted library allocation
page read and write
179D000
trusted library allocation
page execute and read and write
72BE000
stack
page read and write
A52000
trusted library allocation
page read and write
5223000
heap
page read and write
A4A000
trusted library allocation
page execute and read and write
2C0F000
trusted library allocation
page read and write
2ABE000
stack
page read and write
5450000
trusted library section
page read and write
1075000
heap
page read and write
1837000
heap
page read and write
4361000
trusted library allocation
page read and write
3610000
heap
page read and write
1100000
heap
page read and write
17AA000
trusted library allocation
page execute and read and write
2C5A000
trusted library allocation
page read and write
3054000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
30EE000
stack
page read and write
10E0000
trusted library allocation
page read and write
10D4000
trusted library allocation
page read and write
31EC000
stack
page read and write
5A7C000
stack
page read and write
4C10000
trusted library allocation
page read and write
2EEB000
heap
page read and write
645E000
stack
page read and write
6DA0000
heap
page read and write
16F0000
heap
page read and write
3190000
trusted library allocation
page execute and read and write
AE2000
heap
page read and write
3799000
trusted library allocation
page read and write
1550000
heap
page read and write
5760000
trusted library allocation
page read and write
5CFE000
stack
page read and write
5B7C000
stack
page read and write
5B1B000
heap
page read and write
2AE0000
heap
page read and write
4DD3000
heap
page read and write
2E60000
heap
page read and write
6DB7000
trusted library allocation
page read and write
3376000
trusted library allocation
page read and write
6018000
heap
page read and write
10F0000
trusted library allocation
page read and write
57A4000
trusted library allocation
page read and write
8FD000
stack
page read and write
6D04000
heap
page read and write
595E000
stack
page read and write
30A0000
trusted library allocation
page read and write
29B2000
trusted library allocation
page read and write
31D0000
heap
page read and write
30E8000
trusted library allocation
page read and write
15B8000
heap
page read and write
3085000
trusted library allocation
page execute and read and write
4388000
trusted library allocation
page read and write
617E000
stack
page read and write
3060000
trusted library allocation
page read and write
A90000
trusted library allocation
page execute and read and write
6A3E000
stack
page read and write
6A7E000
stack
page read and write
A20000
trusted library allocation
page read and write
842E000
stack
page read and write
50C1000
trusted library allocation
page read and write
4C90000
trusted library allocation
page read and write
2C00000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
655E000
stack
page read and write
7FD00000
trusted library allocation
page execute and read and write
9790000
trusted library allocation
page read and write
2D00000
heap
page read and write
E6E000
stack
page read and write
5162000
trusted library allocation
page read and write
9798000
trusted library allocation
page read and write
81D0000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
57E0000
heap
page execute and read and write
5DFE000
stack
page read and write
6E40000
heap
page read and write
523E000
stack
page read and write
125A000
stack
page read and write
6DE0000
trusted library allocation
page read and write
FA0000
heap
page read and write
E70000
trusted library allocation
page read and write
335F000
stack
page read and write
5B2D000
heap
page read and write
10DD000
trusted library allocation
page execute and read and write
3327000
heap
page read and write
6B7D000
heap
page read and write
C720000
trusted library allocation
page read and write
77AE000
stack
page read and write
73BE000
stack
page read and write
10F2000
trusted library allocation
page read and write
5CB1000
trusted library allocation
page read and write
1760000
heap
page read and write
10D0000
trusted library allocation
page read and write
AAE000
heap
page read and write
5D0E000
stack
page read and write
4C2E000
trusted library allocation
page read and write
2EE0000
heap
page read and write
3779000
trusted library allocation
page read and write
10E3000
trusted library allocation
page read and write
2CE0000
heap
page read and write
5FD0000
heap
page read and write
13B0000
heap
page read and write
A2D000
trusted library allocation
page execute and read and write
67FD000
stack
page read and write
AA0000
heap
page read and write
4885000
trusted library allocation
page read and write
6DCD000
trusted library allocation
page read and write
331E000
stack
page read and write
5260000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
3260000
heap
page read and write
14E5000
heap
page read and write
3C21000
trusted library allocation
page read and write
337E000
trusted library allocation
page read and write
16A2000
heap
page read and write
4C5F000
trusted library allocation
page read and write
3C89000
trusted library allocation
page read and write
476D000
stack
page read and write
762C000
stack
page read and write
6DB0000
trusted library allocation
page read and write
55FE000
stack
page read and write
1690000
heap
page read and write
A23000
trusted library allocation
page execute and read and write
4C14000
trusted library allocation
page read and write
57F3000
heap
page read and write
57D1000
trusted library allocation
page read and write
860000
heap
page read and write
29B7000
trusted library allocation
page execute and read and write
15F1000
heap
page read and write
33B5000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
5E8E000
stack
page read and write
513E000
stack
page read and write
C50000
trusted library allocation
page read and write
6B7F000
stack
page read and write
A40000
trusted library allocation
page read and write
27B2000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
352F000
unkown
page read and write
C71E000
stack
page read and write
7F580000
trusted library allocation
page execute and read and write
B52000
heap
page read and write
57CD000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
5FFE000
heap
page read and write
8B70000
trusted library section
page read and write
2A29000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
50A4000
trusted library allocation
page read and write
1820000
trusted library allocation
page execute and read and write
693D000
stack
page read and write
17B7000
trusted library allocation
page execute and read and write
2BEE000
stack
page read and write
A57000
trusted library allocation
page execute and read and write
6F7F000
stack
page read and write
5B00000
heap
page read and write
6BAE000
heap
page read and write
4C70000
trusted library allocation
page read and write
33BD000
trusted library allocation
page read and write
1784000
trusted library allocation
page read and write
17A0000
trusted library allocation
page read and write
50D2000
trusted library allocation
page read and write
9E0000
heap
page read and write
4770000
trusted library allocation
page execute and read and write
4321000
trusted library allocation
page read and write
306D000
trusted library allocation
page execute and read and write
57BE000
trusted library allocation
page read and write
4F5E000
stack
page read and write
2C21000
trusted library allocation
page read and write
AD4000
heap
page read and write
4C31000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
5F7000
stack
page read and write
1582000
heap
page read and write
1530000
heap
page read and write
4D5C000
stack
page read and write
822B000
stack
page read and write
573E000
stack
page read and write
97A000
stack
page read and write
6DF0000
trusted library allocation
page read and write
32A0000
heap
page read and write
AAA000
heap
page read and write
1497000
heap
page read and write
6E15000
trusted library allocation
page read and write
541E000
stack
page read and write
1650000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
50CD000
trusted library allocation
page read and write
FB0000
heap
page read and write
1780000
trusted library allocation
page read and write
3072000
trusted library allocation
page read and write
17BB000
trusted library allocation
page execute and read and write
870000
heap
page read and write
1648000
heap
page read and write
5230000
trusted library allocation
page read and write
17A2000
trusted library allocation
page read and write
1558000
heap
page read and write
6D02000
heap
page read and write
5270000
trusted library allocation
page execute and read and write
63FE000
stack
page read and write
5980000
heap
page execute and read and write
57A6000
trusted library allocation
page read and write
10D3000
trusted library allocation
page execute and read and write
691E000
stack
page read and write
57AB000
trusted library allocation
page read and write
31A0000
heap
page execute and read and write
67DE000
stack
page read and write
C35E000
stack
page read and write
4ED6000
trusted library allocation
page read and write
5CCE000
stack
page read and write
3082000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
FE4000
heap
page read and write
3076000
trusted library allocation
page execute and read and write
3220000
heap
page read and write
4DD0000
heap
page read and write
8AFE000
stack
page read and write
15E7000
heap
page read and write
2BF0000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
1750000
heap
page read and write
6B5E000
stack
page read and write
703D000
stack
page read and write
FEF000
heap
page read and write
2FFA000
stack
page read and write
6BBE000
stack
page read and write
50BE000
trusted library allocation
page read and write
4DA0000
trusted library allocation
page execute and read and write
1570000
heap
page read and write
6E00000
trusted library allocation
page read and write
A80000
heap
page read and write
5D0E000
stack
page read and write
3250000
heap
page execute and read and write
301F000
stack
page read and write
17D0000
trusted library allocation
page read and write
10F6000
trusted library allocation
page execute and read and write
4349000
trusted library allocation
page read and write
5786000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
87F0000
heap
page read and write
15E5000
heap
page read and write
2E5F000
unkown
page read and write
14C0000
heap
page read and write
1585000
heap
page read and write
102A000
heap
page read and write
4DB0000
trusted library allocation
page read and write
457B000
trusted library allocation
page read and write
E0E000
stack
page read and write
14A0000
heap
page read and write
A70000
trusted library allocation
page read and write
2805000
trusted library allocation
page read and write
1359000
stack
page read and write
6DC0000
heap
page read and write
57F0000
heap
page read and write
4C5B000
stack
page read and write
2C9A000
stack
page read and write
6014000
heap
page read and write
57B0000
trusted library allocation
page read and write
6DD7000
trusted library allocation
page read and write
CF7000
stack
page read and write
576B000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page execute and read and write
A3D000
trusted library allocation
page execute and read and write
4437000
trusted library allocation
page read and write
FBE000
heap
page read and write
FF1000
heap
page read and write
400000
remote allocation
page execute and read and write
A5B000
trusted library allocation
page execute and read and write
15BE000
heap
page read and write
2E1E000
unkown
page read and write
32ED000
unkown
page read and write
57AE000
trusted library allocation
page read and write
E80000
heap
page read and write
2C5D000
stack
page read and write
5150000
heap
page read and write
627E000
stack
page read and write
1537000
heap
page read and write
E55000
heap
page read and write
87AE000
stack
page read and write
527E000
stack
page read and write
15E9000
heap
page read and write
68DE000
stack
page read and write
5ECE000
stack
page read and write
776F000
stack
page read and write
57C1000
trusted library allocation
page read and write
3053000
trusted library allocation
page execute and read and write
D6F000
stack
page read and write
2A6D000
stack
page read and write
13E0000
heap
page read and write
53FE000
stack
page read and write
31D0000
trusted library allocation
page read and write
14B7000
heap
page read and write
766E000
stack
page read and write
4F1E000
stack
page read and write
43C7000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
5D4E000
stack
page read and write
935000
heap
page read and write
14E0000
heap
page read and write
6D0C000
heap
page read and write
545D000
stack
page read and write
5FCE000
stack
page read and write
AE0000
heap
page read and write
1339000
stack
page read and write
307A000
trusted library allocation
page execute and read and write
A46000
trusted library allocation
page execute and read and write
15FF000
heap
page read and write
6F9F000
stack
page read and write
34CE000
trusted library allocation
page read and write
305D000
trusted library allocation
page execute and read and write
2AD0000
trusted library allocation
page read and write
4C42000
trusted library allocation
page read and write
7E2000
unkown
page readonly
86AC000
stack
page read and write
F5E000
stack
page read and write
6E5D000
stack
page read and write
1390000
heap
page read and write
57C0000
trusted library section
page read and write
516B000
trusted library allocation
page read and write
10FA000
trusted library allocation
page execute and read and write
1790000
trusted library allocation
page read and write
4243000
trusted library allocation
page read and write
29BB000
trusted library allocation
page execute and read and write
16C0000
trusted library allocation
page execute and read and write
272E000
stack
page read and write
6E10000
trusted library allocation
page read and write
2E78000
trusted library allocation
page read and write
30F8000
trusted library allocation
page read and write
4CE0000
trusted library allocation
page read and write
7F8F0000
trusted library allocation
page execute and read and write
14B0000
heap
page read and write
E89000
heap
page read and write
275D000
trusted library allocation
page read and write
6BBB000
heap
page read and write
C21E000
stack
page read and write
1660000
trusted library allocation
page execute and read and write
29B0000
trusted library allocation
page read and write
E76000
trusted library allocation
page read and write
2ECE000
stack
page read and write
8E2000
unkown
page readonly
1109000
heap
page read and write
BDE000
stack
page read and write
5BCC000
stack
page read and write
78AE000
stack
page read and write
5BCE000
stack
page read and write
6D16000
heap
page read and write
5CB4000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
4C36000
trusted library allocation
page read and write
6E60000
heap
page read and write
4C60000
trusted library allocation
page read and write
7F410000
trusted library allocation
page execute and read and write
4CD0000
heap
page read and write
C30000
heap
page read and write
543E000
stack
page read and write
4FA000
stack
page read and write
727E000
stack
page read and write
57B2000
trusted library allocation
page read and write
4389000
trusted library allocation
page read and write
6E3D000
stack
page read and write
4F90000
heap
page read and write
4CF0000
heap
page execute and read and write
B38000
heap
page read and write
4F70000
trusted library allocation
page execute and read and write
E50000
heap
page read and write
5D4D000
stack
page read and write
4395000
trusted library allocation
page read and write
E74000
trusted library allocation
page read and write
752C000
stack
page read and write
6CC0000
heap
page read and write
57E0000
heap
page read and write
5220000
heap
page read and write
5110000
trusted library allocation
page read and write
3739000
trusted library allocation
page read and write
3087000
trusted library allocation
page execute and read and write
C25E000
stack
page read and write
C61D000
stack
page read and write
5AFE000
stack
page read and write
4F60000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
C5DC000
stack
page read and write
ABF000
heap
page read and write
7F63000
trusted library allocation
page read and write
6DF5000
trusted library allocation
page read and write
56FE000
stack
page read and write
7040000
heap
page read and write
2A70000
trusted library allocation
page execute and read and write
50F0000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
3200000
trusted library allocation
page read and write
17B2000
trusted library allocation
page read and write
6A1E000
stack
page read and write
5FE3000
heap
page read and write
FCF000
heap
page read and write
9F0000
heap
page read and write
576E000
trusted library allocation
page read and write
4CE2000
trusted library allocation
page read and write
15B0000
heap
page read and write
4195000
trusted library allocation
page read and write
A42000
trusted library allocation
page read and write
31CC000
stack
page read and write
C60000
heap
page read and write
There are 518 hidden memdumps, click here to show them.