IOC Report
DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe

loading gif

Files

File Path
Type
Category
Malicious
DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp87CB.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\LJAGvecDW.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_KN5M2K4GWI0PYGPD_7bface649acb4a5ac8b8c5eb3fa345c55bbcc55f_6ddcc831_e065b1b5-2f12-4cbf-afc1-37e3179d3098\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_LJAGvecDW.exe_832a725c84dc7e8e3d76e7274e65236eca5dcd_4d380c1c_19f9609d-8e2b-4b9e-a3c0-f528eeb6c484\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6D7D.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Apr 26 08:06:26 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER706C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER70BB.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER93E1.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Apr 26 08:06:36 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER96FF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER975D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\LJAGvecDW.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\boqXv.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dmpcqmml.uam.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ibdnocms.0e0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k512x23z.gbm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ovmymys3.fdz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uruf5iq5.hb1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_whjysj2c.rds.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xeqvqlsp.toa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yq5fpoaw.4fa.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA44C.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\LJAGvecDW.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
modified
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 18 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe
"C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LJAGvecDW.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmp87CB.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\LJAGvecDW.exe
C:\Users\user\AppData\Roaming\LJAGvecDW.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJAGvecDW" /XML "C:\Users\user\AppData\Local\Temp\tmpA44C.tmp"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6532 -s 1400
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 1760
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown
http://mail.clslk.com
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
mail.clslk.com
50.87.253.239
malicious

IPs

IP
Domain
Country
Malicious
50.87.253.239
mail.clslk.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
boqXv
\REGISTRY\A\{56e1a22a-9de3-4704-5f0e-5d05ff15f185}\Root\InventoryApplicationFile\dhl - overdue ac|db68514595b2b7ce
ProgramId
\REGISTRY\A\{56e1a22a-9de3-4704-5f0e-5d05ff15f185}\Root\InventoryApplicationFile\dhl - overdue ac|db68514595b2b7ce
FileId
\REGISTRY\A\{56e1a22a-9de3-4704-5f0e-5d05ff15f185}\Root\InventoryApplicationFile\dhl - overdue ac|db68514595b2b7ce
LowerCaseLongPath
\REGISTRY\A\{56e1a22a-9de3-4704-5f0e-5d05ff15f185}\Root\InventoryApplicationFile\dhl - overdue ac|db68514595b2b7ce
LongPathHash
\REGISTRY\A\{56e1a22a-9de3-4704-5f0e-5d05ff15f185}\Root\InventoryApplicationFile\dhl - overdue ac|db68514595b2b7ce
Name
\REGISTRY\A\{56e1a22a-9de3-4704-5f0e-5d05ff15f185}\Root\InventoryApplicationFile\dhl - overdue ac|db68514595b2b7ce
OriginalFileName
\REGISTRY\A\{56e1a22a-9de3-4704-5f0e-5d05ff15f185}\Root\InventoryApplicationFile\dhl - overdue ac|db68514595b2b7ce
Publisher
\REGISTRY\A\{56e1a22a-9de3-4704-5f0e-5d05ff15f185}\Root\InventoryApplicationFile\dhl - overdue ac|db68514595b2b7ce
Version
\REGISTRY\A\{56e1a22a-9de3-4704-5f0e-5d05ff15f185}\Root\InventoryApplicationFile\dhl - overdue ac|db68514595b2b7ce
BinFileVersion
\REGISTRY\A\{56e1a22a-9de3-4704-5f0e-5d05ff15f185}\Root\InventoryApplicationFile\dhl - overdue ac|db68514595b2b7ce
BinaryType
\REGISTRY\A\{56e1a22a-9de3-4704-5f0e-5d05ff15f185}\Root\InventoryApplicationFile\dhl - overdue ac|db68514595b2b7ce
ProductName
\REGISTRY\A\{56e1a22a-9de3-4704-5f0e-5d05ff15f185}\Root\InventoryApplicationFile\dhl - overdue ac|db68514595b2b7ce
ProductVersion
\REGISTRY\A\{56e1a22a-9de3-4704-5f0e-5d05ff15f185}\Root\InventoryApplicationFile\dhl - overdue ac|db68514595b2b7ce
LinkDate
\REGISTRY\A\{56e1a22a-9de3-4704-5f0e-5d05ff15f185}\Root\InventoryApplicationFile\dhl - overdue ac|db68514595b2b7ce
BinProductVersion
\REGISTRY\A\{56e1a22a-9de3-4704-5f0e-5d05ff15f185}\Root\InventoryApplicationFile\dhl - overdue ac|db68514595b2b7ce
AppxPackageFullName
\REGISTRY\A\{56e1a22a-9de3-4704-5f0e-5d05ff15f185}\Root\InventoryApplicationFile\dhl - overdue ac|db68514595b2b7ce
AppxPackageRelativeId
\REGISTRY\A\{56e1a22a-9de3-4704-5f0e-5d05ff15f185}\Root\InventoryApplicationFile\dhl - overdue ac|db68514595b2b7ce
Size
\REGISTRY\A\{56e1a22a-9de3-4704-5f0e-5d05ff15f185}\Root\InventoryApplicationFile\dhl - overdue ac|db68514595b2b7ce
Language
\REGISTRY\A\{56e1a22a-9de3-4704-5f0e-5d05ff15f185}\Root\InventoryApplicationFile\dhl - overdue ac|db68514595b2b7ce
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
2FA2000
trusted library allocation
page read and write
malicious
3A79000
trusted library allocation
page read and write
malicious
2F51000
trusted library allocation
page read and write
malicious
2FAA000
trusted library allocation
page read and write
malicious
2C8F000
trusted library allocation
page read and write
malicious
2C2C000
trusted library allocation
page read and write
malicious
2C97000
trusted library allocation
page read and write
malicious
4467000
trusted library allocation
page read and write
malicious
71F0000
trusted library section
page read and write
malicious
F24000
trusted library allocation
page read and write
BEF000
heap
page read and write
F84000
heap
page read and write
5060000
trusted library allocation
page read and write
431E000
trusted library allocation
page read and write
1227000
trusted library allocation
page execute and read and write
14DB000
trusted library allocation
page execute and read and write
12D5000
trusted library allocation
page execute and read and write
12A0000
trusted library allocation
page read and write
A52C000
stack
page read and write
12D0000
trusted library allocation
page read and write
685E000
stack
page read and write
59BF000
stack
page read and write
73E0000
trusted library allocation
page execute and read and write
6C02000
heap
page read and write
7C8000
heap
page read and write
580E000
stack
page read and write
7220000
trusted library section
page read and write
6257000
trusted library allocation
page read and write
58CF000
stack
page read and write
1225000
trusted library allocation
page execute and read and write
6520000
trusted library allocation
page execute and read and write
FBE000
stack
page read and write
FDD000
trusted library allocation
page execute and read and write
C7A000
heap
page read and write
1754000
trusted library allocation
page read and write
567E000
stack
page read and write
2535000
trusted library allocation
page read and write
2514000
trusted library allocation
page read and write
C59000
heap
page read and write
61EF000
stack
page read and write
5CEE000
stack
page read and write
4F30000
heap
page read and write
79FE000
stack
page read and write
A6B7000
trusted library allocation
page read and write
4ECE000
trusted library allocation
page read and write
6DF0000
heap
page read and write
5240000
heap
page read and write
A7A000
trusted library allocation
page execute and read and write
2A30000
trusted library allocation
page read and write
1645000
heap
page read and write
CD0000
trusted library allocation
page read and write
326E000
stack
page read and write
695E000
stack
page read and write
550F000
stack
page read and write
432E000
trusted library allocation
page read and write
58BF000
stack
page read and write
1450000
heap
page read and write
551B000
trusted library allocation
page read and write
1764000
trusted library allocation
page read and write
5542000
trusted library allocation
page read and write
419D000
trusted library allocation
page read and write
6C39000
heap
page read and write
6402000
heap
page read and write
CE7000
heap
page read and write
88D000
trusted library allocation
page execute and read and write
2D0B000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
6240000
trusted library allocation
page read and write
6380000
trusted library allocation
page read and write
17B0000
heap
page read and write
1240000
trusted library allocation
page read and write
F58000
heap
page read and write
59C0000
heap
page read and write
727E000
stack
page read and write
EB0000
heap
page read and write
73D0000
trusted library allocation
page read and write
52F1000
trusted library allocation
page read and write
BB0000
heap
page read and write
29CF000
unkown
page read and write
7CAF000
heap
page read and write
5A0F000
stack
page read and write
620000
unkown
page readonly
3321000
trusted library allocation
page read and write
596E000
stack
page read and write
2C7F000
stack
page read and write
10E0000
heap
page read and write
3180000
heap
page read and write
15A1000
heap
page read and write
700000
heap
page read and write
4D1E000
stack
page read and write
24EE000
trusted library allocation
page read and write
5290000
heap
page read and write
EC0000
heap
page read and write
C7D000
stack
page read and write
4F50000
heap
page read and write
144E000
stack
page read and write
2600000
trusted library allocation
page execute and read and write
14A3000
trusted library allocation
page execute and read and write
B9E000
stack
page read and write
2990000
trusted library allocation
page read and write
5282000
trusted library allocation
page read and write
1250000
heap
page read and write
1220000
trusted library allocation
page read and write
7020000
trusted library allocation
page execute and read and write
1240000
heap
page read and write
2830000
heap
page read and write
2D8E000
stack
page read and write
62EB000
stack
page read and write
14B4000
trusted library allocation
page read and write
12C6000
trusted library allocation
page execute and read and write
5514000
trusted library allocation
page read and write
FCD000
trusted library allocation
page execute and read and write
551E000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
12D7000
trusted library allocation
page execute and read and write
F50000
heap
page read and write
B490000
trusted library allocation
page read and write
14AD000
trusted library allocation
page execute and read and write
865E000
stack
page read and write
4ED1000
trusted library allocation
page read and write
5390000
heap
page execute and read and write
5243000
heap
page read and write
53AE000
stack
page read and write
289A000
stack
page read and write
4BD0000
trusted library section
page readonly
1694000
heap
page read and write
F90000
unkown
page readonly
285D000
stack
page read and write
54DC000
stack
page read and write
6DF0000
heap
page read and write
1740000
trusted library allocation
page read and write
175D000
trusted library allocation
page execute and read and write
63ED000
stack
page read and write
25F0000
trusted library allocation
page read and write
6384000
trusted library allocation
page read and write
12D2000
trusted library allocation
page read and write
84A0000
trusted library allocation
page read and write
6580000
trusted library allocation
page read and write
2AEA000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
EB0000
heap
page read and write
7BA000
stack
page read and write
10B0000
trusted library allocation
page execute and read and write
536D000
stack
page read and write
180E000
stack
page read and write
12A0000
heap
page read and write
190F000
stack
page read and write
649E000
stack
page read and write
5580000
heap
page execute and read and write
7502000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
2FA2000
trusted library allocation
page read and write
2E68000
trusted library allocation
page read and write
9CAF000
stack
page read and write
6407000
trusted library allocation
page read and write
A6E000
stack
page read and write
552A000
trusted library allocation
page read and write
5ACE000
stack
page read and write
FE0000
trusted library allocation
page read and write
2E5F000
stack
page read and write
6C24000
heap
page read and write
12C2000
trusted library allocation
page read and write
6B50000
trusted library allocation
page execute and read and write
586E000
stack
page read and write
64F0000
trusted library allocation
page read and write
7000000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
7010000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
1120000
heap
page read and write
5536000
trusted library allocation
page read and write
63F0000
heap
page read and write
6F00000
heap
page read and write
402C000
trusted library allocation
page read and write
2D50000
heap
page read and write
5030000
trusted library allocation
page read and write
24CC000
stack
page read and write
855E000
stack
page read and write
F30000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
2F40000
heap
page read and write
742000
heap
page read and write
153E000
stack
page read and write
3721000
trusted library allocation
page read and write
14A4000
trusted library allocation
page read and write
10F9000
stack
page read and write
4819000
stack
page read and write
3FB6000
trusted library allocation
page read and write
7350000
trusted library section
page read and write
190C000
stack
page read and write
9A2C000
stack
page read and write
1560000
trusted library allocation
page read and write
6398000
trusted library allocation
page read and write
870000
trusted library allocation
page read and write
4E70000
heap
page read and write
439B000
trusted library allocation
page read and write
24F1000
trusted library allocation
page read and write
2C5A000
heap
page read and write
2C50000
heap
page read and write
A82000
trusted library allocation
page read and write
6510000
trusted library allocation
page read and write
5522000
trusted library allocation
page read and write
BF1000
heap
page read and write
2530000
trusted library allocation
page read and write
2FA0000
trusted library allocation
page read and write
553D000
trusted library allocation
page read and write
1490000
trusted library allocation
page read and write
10D0000
trusted library allocation
page read and write
7E5000
heap
page read and write
AA73000
heap
page read and write
1568000
heap
page read and write
3C85000
trusted library allocation
page read and write
3C49000
trusted library allocation
page read and write
5516000
trusted library allocation
page read and write
4E60000
trusted library allocation
page execute and read and write
1378000
heap
page read and write
6670000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
5260000
heap
page execute and read and write
4E9E000
stack
page read and write
505E000
stack
page read and write
FC3000
trusted library allocation
page execute and read and write
FC4000
trusted library allocation
page read and write
1540000
trusted library allocation
page execute and read and write
25B0000
heap
page read and write
2610000
heap
page read and write
12A3000
trusted library allocation
page execute and read and write
622000
unkown
page readonly
5214000
trusted library allocation
page read and write
5271000
trusted library allocation
page read and write
6C3B000
heap
page read and write
43E000
remote allocation
page execute and read and write
7D7D000
stack
page read and write
665E000
stack
page read and write
12C0000
trusted library allocation
page read and write
4D30000
trusted library allocation
page execute and read and write
5276000
trusted library allocation
page read and write
AF0000
trusted library allocation
page execute and read and write
298F000
stack
page read and write
4ED6000
trusted library allocation
page read and write
4BCC000
stack
page read and write
6E0E000
heap
page read and write
FEA000
trusted library allocation
page execute and read and write
874000
trusted library allocation
page read and write
6DB0000
trusted library allocation
page execute and read and write
150E000
stack
page read and write
338E000
stack
page read and write
52D0000
trusted library allocation
page execute and read and write
651C000
trusted library allocation
page read and write
2B02000
trusted library allocation
page read and write
70A000
heap
page read and write
156F000
stack
page read and write
5390000
trusted library allocation
page read and write
27B2000
trusted library allocation
page read and write
C0F000
stack
page read and write
873000
trusted library allocation
page execute and read and write
14BD000
trusted library allocation
page execute and read and write
53A0000
trusted library allocation
page read and write
FF7000
trusted library allocation
page execute and read and write
A62C000
stack
page read and write
14B0000
trusted library allocation
page read and write
681E000
stack
page read and write
B00000
heap
page read and write
2995000
trusted library allocation
page read and write
437C000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
791000
heap
page read and write
6E00000
heap
page read and write
DBA000
stack
page read and write
F20000
trusted library allocation
page read and write
5B18000
trusted library allocation
page read and write
70EE000
stack
page read and write
F23000
trusted library allocation
page execute and read and write
4D9C000
stack
page read and write
71EE000
stack
page read and write
7FCB0000
trusted library allocation
page execute and read and write
78F0000
trusted library allocation
page execute and read and write
2C3F000
unkown
page read and write
4D45000
heap
page read and write
2FB6000
trusted library allocation
page read and write
2C3E000
stack
page read and write
6290000
heap
page read and write
5AAE000
stack
page read and write
172F000
stack
page read and write
F42000
trusted library allocation
page read and write
1370000
heap
page read and write
A76000
trusted library allocation
page execute and read and write
A8B000
trusted library allocation
page execute and read and write
ED5000
heap
page read and write
7231000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
B10000
heap
page read and write
2920000
heap
page read and write
525E000
stack
page read and write
FE2000
trusted library allocation
page read and write
FD3000
trusted library allocation
page read and write
A87000
trusted library allocation
page execute and read and write
3280000
heap
page execute and read and write
AA0000
trusted library allocation
page read and write
13A6000
heap
page read and write
1390000
heap
page read and write
5039000
trusted library allocation
page read and write
1677000
heap
page read and write
57CC000
stack
page read and write
2C1E000
stack
page read and write
7D9000
heap
page read and write
FE6000
trusted library allocation
page execute and read and write
6587000
trusted library allocation
page read and write
5216000
trusted library allocation
page read and write
1760000
trusted library allocation
page read and write
4391000
trusted library allocation
page read and write
17A0000
trusted library allocation
page read and write
B5E000
stack
page read and write
1787000
trusted library allocation
page execute and read and write
7290000
trusted library section
page read and write
2A71000
trusted library allocation
page read and write
10E8000
heap
page read and write
176D000
trusted library allocation
page execute and read and write
129E000
stack
page read and write
12A4000
trusted library allocation
page read and write
1910000
trusted library allocation
page execute and read and write
1639000
heap
page read and write
24FD000
trusted library allocation
page read and write
2F3C000
stack
page read and write
525E000
trusted library allocation
page read and write
3C21000
trusted library allocation
page read and write
98BE000
stack
page read and write
2B11000
trusted library allocation
page read and write
10AC000
stack
page read and write
5050000
trusted library allocation
page read and write
793000
heap
page read and write
5820000
heap
page execute and read and write
5040000
trusted library allocation
page execute and read and write
5D24000
heap
page read and write
25F9000
trusted library allocation
page read and write
25C0000
trusted library allocation
page execute and read and write
3F79000
trusted library allocation
page read and write
29F0000
heap
page read and write
1475000
heap
page read and write
5A4E000
stack
page read and write
F4A000
trusted library allocation
page execute and read and write
1550000
trusted library allocation
page read and write
2520000
trusted library allocation
page read and write
14C0000
heap
page read and write
5790000
trusted library allocation
page execute and read and write
7DF0000
trusted library allocation
page read and write
42A2000
trusted library allocation
page read and write
C15000
trusted library allocation
page read and write
2CA3000
trusted library allocation
page read and write
F2D000
trusted library allocation
page execute and read and write
AEE000
stack
page read and write
4D50000
heap
page read and write
4BE0000
heap
page read and write
291E000
unkown
page read and write
2580000
heap
page execute and read and write
9BAE000
stack
page read and write
F87000
heap
page read and write
29DE000
stack
page read and write
1014000
heap
page read and write
53DC000
stack
page read and write
4D20000
trusted library allocation
page read and write
14C5000
heap
page read and write
FD0000
trusted library allocation
page read and write
6F08000
heap
page read and write
5394000
trusted library allocation
page read and write
32CF000
stack
page read and write
7340000
trusted library allocation
page execute and read and write
727000
heap
page read and write
6EBF000
stack
page read and write
390000
heap
page read and write
6BC0000
heap
page read and write
F46000
trusted library allocation
page execute and read and write
2AF0000
heap
page read and write
3C29000
trusted library allocation
page read and write
1570000
heap
page read and write
12DB000
trusted library allocation
page execute and read and write
12AD000
trusted library allocation
page execute and read and write
FCE000
heap
page read and write
155C000
heap
page read and write
5B4F000
stack
page read and write
1350000
heap
page read and write
6D0000
unkown
page readonly
C10000
trusted library allocation
page read and write
2560000
trusted library allocation
page read and write
526A000
trusted library allocation
page read and write
6248000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
F3D000
trusted library allocation
page execute and read and write
72C0000
trusted library allocation
page read and write
1753000
trusted library allocation
page execute and read and write
32E0000
trusted library allocation
page read and write
BD7000
heap
page read and write
A70000
trusted library allocation
page read and write
FCA000
heap
page read and write
64F7000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
59AE000
stack
page read and write
63B0000
trusted library allocation
page execute and read and write
2D4E000
stack
page read and write
1538000
heap
page read and write
2A45000
trusted library allocation
page read and write
AFA000
stack
page read and write
53C3000
heap
page read and write
9B6E000
stack
page read and write
10C0000
trusted library allocation
page read and write
25FD000
trusted library allocation
page read and write
BBB000
heap
page read and write
32D0000
trusted library allocation
page read and write
6B40000
heap
page read and write
123C000
stack
page read and write
657D000
stack
page read and write
A2FE000
stack
page read and write
83E000
stack
page read and write
84AA000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
6BD8000
heap
page read and write
553E000
stack
page read and write
E7E000
stack
page read and write
4B60000
trusted library allocation
page read and write
279A000
trusted library allocation
page read and write
1610000
heap
page read and write
EA0000
trusted library allocation
page read and write
515F000
stack
page read and write
14B0000
heap
page read and write
24F6000
trusted library allocation
page read and write
C84000
heap
page read and write
F9A000
unkown
page readonly
1A2F000
stack
page read and write
78A000
stack
page read and write
27C1000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
29D0000
heap
page read and write
27BC000
trusted library allocation
page read and write
7C29000
heap
page read and write
5CF0000
heap
page read and write
106E000
stack
page read and write
29BB000
trusted library allocation
page read and write
4EDD000
trusted library allocation
page read and write
1027000
heap
page read and write
A1FE000
stack
page read and write
6260000
heap
page read and write
526E000
trusted library allocation
page read and write
52A0000
heap
page read and write
639C000
trusted library allocation
page read and write
2D12000
trusted library allocation
page read and write
84B0000
trusted library allocation
page execute and read and write
7FDF0000
trusted library allocation
page execute and read and write
669E000
stack
page read and write
A3FF000
stack
page read and write
6250000
trusted library allocation
page read and write
740000
heap
page read and write
6F95000
heap
page read and write
2DD0000
heap
page read and write
17D0000
heap
page read and write
FEE000
heap
page read and write
28D0000
heap
page read and write
ED0000
heap
page read and write
2C21000
trusted library allocation
page read and write
895000
heap
page read and write
3F51000
trusted library allocation
page read and write
C1F000
trusted library allocation
page read and write
3A0000
heap
page read and write
78C000
heap
page read and write
5435000
heap
page read and write
5AEE000
stack
page read and write
FFB000
trusted library allocation
page execute and read and write
5531000
trusted library allocation
page read and write
5300000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
890000
heap
page read and write
3729000
trusted library allocation
page read and write
CE0000
heap
page read and write
5510000
trusted library allocation
page read and write
1618000
heap
page read and write
2C40000
heap
page read and write
12BD000
trusted library allocation
page execute and read and write
7210000
trusted library allocation
page execute and read and write
12F9000
stack
page read and write
1920000
heap
page read and write
2AD6000
trusted library allocation
page read and write
1020000
heap
page execute and read and write
4EB4000
trusted library allocation
page read and write
140E000
stack
page read and write
5240000
trusted library section
page readonly
57BE000
stack
page read and write
32A000
stack
page read and write
3391000
trusted library allocation
page read and write
122B000
trusted library allocation
page execute and read and write
4394000
trusted library allocation
page read and write
2A58000
trusted library allocation
page read and write
298E000
unkown
page read and write
1339000
stack
page read and write
2C52000
trusted library allocation
page read and write
527D000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
1438000
heap
page read and write
590E000
stack
page read and write
63A0000
trusted library allocation
page execute and read and write
6F04000
heap
page read and write
4EB0000
trusted library allocation
page read and write
3EE000
stack
page read and write
56CC000
stack
page read and write
5430000
heap
page read and write
6B50000
heap
page read and write
A72000
trusted library allocation
page read and write
6500000
trusted library allocation
page read and write
2786000
trusted library allocation
page read and write
63FD000
stack
page read and write
42E0000
trusted library allocation
page read and write
5BEE000
stack
page read and write
F5C000
stack
page read and write
6AC0000
heap
page read and write
6C56000
heap
page read and write
1634000
heap
page read and write
5D00000
heap
page read and write
6880000
heap
page read and write
14F0000
trusted library allocation
page read and write
1245000
heap
page read and write
1780000
trusted library allocation
page read and write
29C0000
trusted library allocation
page read and write
1930000
heap
page read and write
279D000
trusted library allocation
page read and write
523E000
stack
page read and write
2510000
trusted library allocation
page read and write
1222000
trusted library allocation
page read and write
4D53000
heap
page read and write
41D8000
trusted library allocation
page read and write
64DE000
stack
page read and write
123E000
stack
page read and write
4BF0000
heap
page read and write
2AED000
trusted library allocation
page read and write
70E000
heap
page read and write
15BC000
stack
page read and write
1820000
heap
page read and write
4224000
trusted library allocation
page read and write
4359000
trusted library allocation
page read and write
1250000
heap
page read and write
4117000
trusted library allocation
page read and write
77D000
stack
page read and write
2A40000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
1290000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
541E000
stack
page read and write
6F10000
heap
page read and write
2DCF000
stack
page read and write
5B10000
trusted library allocation
page read and write
6BDC000
heap
page read and write
BF9000
stack
page read and write
51FE000
stack
page read and write
4321000
trusted library allocation
page read and write
7E0000
heap
page read and write
87D000
trusted library allocation
page execute and read and write
6CFE000
stack
page read and write
2D10000
trusted library allocation
page read and write
FD0000
heap
page read and write
181E000
stack
page read and write
2A60000
heap
page read and write
5262000
trusted library allocation
page read and write
CB0000
heap
page read and write
59D0000
heap
page read and write
12CA000
trusted library allocation
page execute and read and write
5A4E000
stack
page read and write
2516000
trusted library allocation
page read and write
322E000
stack
page read and write
548E000
stack
page read and write
53C0000
heap
page read and write
5900000
heap
page execute and read and write
6F7D000
heap
page read and write
4D40000
heap
page read and write
AF7000
stack
page read and write
14AE000
stack
page read and write
5A8E000
stack
page read and write
594E000
stack
page read and write
64E0000
trusted library allocation
page read and write
3310000
heap
page execute and read and write
661E000
stack
page read and write
5220000
trusted library allocation
page read and write
4EBE000
stack
page read and write
1448000
heap
page read and write
5590000
heap
page read and write
2F40000
heap
page execute and read and write
178B000
trusted library allocation
page execute and read and write
1470000
heap
page read and write
271F000
stack
page read and write
2DDB000
heap
page read and write
24D0000
trusted library allocation
page read and write
553F000
stack
page read and write
6530000
trusted library allocation
page execute and read and write
4BDF000
trusted library section
page readonly
B09B000
trusted library allocation
page read and write
51E0000
trusted library allocation
page execute and read and write
883000
trusted library allocation
page read and write
5B0E000
stack
page read and write
6390000
trusted library allocation
page read and write
1681000
heap
page read and write
563F000
stack
page read and write
6F74000
heap
page read and write
880000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
14D7000
trusted library allocation
page execute and read and write
4E5F000
trusted library allocation
page read and write
F92000
unkown
page readonly
1530000
heap
page read and write
5083000
heap
page read and write
1555000
heap
page read and write
4F50000
heap
page execute and read and write
577E000
stack
page read and write
13A3000
heap
page read and write
6F42000
heap
page read and write
FF2000
trusted library allocation
page read and write
504E000
stack
page read and write
6400000
trusted library allocation
page read and write
4F60000
trusted library allocation
page execute and read and write
5250000
heap
page read and write
12F0000
heap
page read and write
552E000
trusted library allocation
page read and write
BE4000
heap
page read and write
B00000
heap
page read and write
4E50000
trusted library allocation
page read and write
BBE000
heap
page read and write
2B0C000
trusted library allocation
page read and write
6890000
trusted library allocation
page execute and read and write
2721000
trusted library allocation
page read and write
64F0000
trusted library allocation
page read and write
5080000
heap
page read and write
14D0000
trusted library allocation
page read and write
3A71000
trusted library allocation
page read and write
2B10000
heap
page execute and read and write
2870000
heap
page read and write
4CDE000
stack
page read and write
5256000
trusted library allocation
page read and write
1910000
trusted library allocation
page execute and read and write
3F59000
trusted library allocation
page read and write
2C8D000
trusted library allocation
page read and write
860000
trusted library allocation
page read and write
1310000
trusted library allocation
page execute and read and write
9A6E000
stack
page read and write
51BB000
stack
page read and write
4B69000
stack
page read and write
FC0000
heap
page read and write
6F71000
heap
page read and write
1340000
heap
page read and write
6F7000
stack
page read and write
992B000
stack
page read and write
540E000
stack
page read and write
525B000
trusted library allocation
page read and write
7DBE000
stack
page read and write
E60000
heap
page read and write
563F000
stack
page read and write
There are 643 hidden memdumps, click here to show them.