IOC Report
Dhl-Awb 0865252 copy.exe

loading gif

Files

File Path
Type
Category
Malicious
Dhl-Awb 0865252 copy.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Dhl-Awb 0865252 copy.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\M66J6bJL8
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nlwtd1st.ptf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qsmjhytb.gcl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_stfz1vrw.hr1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ulgv3afq.pqz.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Dhl-Awb 0865252 copy.exe
"C:\Users\user\Desktop\Dhl-Awb 0865252 copy.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Dhl-Awb 0865252 copy.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Program Files (x86)\XBgKvIQFrovHTutzJcerXFcNqqxMkcgiDCsgSTMXpLyxUKpNiZmgrSMdfGcyOirzOmMKAdrrpZNOwpWk\kyiMYcMGDSlDbpzjCWbWMcLM.exe
"C:\Program Files (x86)\XBgKvIQFrovHTutzJcerXFcNqqxMkcgiDCsgSTMXpLyxUKpNiZmgrSMdfGcyOirzOmMKAdrrpZNOwpWk\kyiMYcMGDSlDbpzjCWbWMcLM.exe"
malicious
C:\Windows\SysWOW64\shutdown.exe
"C:\Windows\SysWOW64\shutdown.exe"
malicious
C:\Program Files (x86)\XBgKvIQFrovHTutzJcerXFcNqqxMkcgiDCsgSTMXpLyxUKpNiZmgrSMdfGcyOirzOmMKAdrrpZNOwpWk\kyiMYcMGDSlDbpzjCWbWMcLM.exe
"C:\Program Files (x86)\XBgKvIQFrovHTutzJcerXFcNqqxMkcgiDCsgSTMXpLyxUKpNiZmgrSMdfGcyOirzOmMKAdrrpZNOwpWk\kyiMYcMGDSlDbpzjCWbWMcLM.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.gaglianoart.com/tkc9/?841x=vt184X98OtQ0g&_vwlXV=oBKUUw+PclqsYqdEbKEtDVc/KDwoXvBo9DCIQrGFa5weHyD+5aoGXzWKFV94V9YGYodsnZaFejxXMPAHsIU+z85ddO8AZcXSXUhPW2rioxtiyDW4lIg6y/ts8OoE/eZmyRHUaj6EOYJE
199.59.243.225
malicious
http://www.miagronorte.com.ar/tkc9/?841x=vt184X98OtQ0g&_vwlXV=jqPrS3qTJTYQyqmIO2oWpvyY27IGuuAVZrk4CsYV4ggQpJ+Sx5jgDbQO/kTudxVD2P5+GF+5Rpgt0cv3wgHwIeUjeoNPKFTOlZjvghZGk1Gz0fMZGvYjZW3H9aCrqsEs2ZJyz2Rypk9D
200.58.112.243
malicious
http://www.gaglianoart.com/tkc9/
199.59.243.225
malicious
http://www.sacredcoven.video/tkc9/?_vwlXV=YCrPnyMK6N0xyWsUxbMCVm51Kr/VqTP9Vc/bNERWwPWSWPqcFUgEexJj0TZSGRta9epkHr3byMGCsT7E2VhvMhjbiZjKxfqWasqVt4+J8b4ItYUw6rfNer58xbkW0yWLnZZ/5+MZPYqk&841x=vt184X98OtQ0g
185.151.30.215
malicious
http://www.miagronorte.com.ar/tkc9/
200.58.112.243
malicious
http://www.sacredcoven.video/tkc9/
185.151.30.215
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.sacredcoven.video
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.badai77resmi.net/tkc9/?_vwlXV=I0Jr0RVqPQejCQdrgaLPMsULlzKKGbEqp1Zfy2JBtnoMUPjBPr4UJ6ld1D
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.sacredcoven.video
185.151.30.215
malicious
www.gaglianoart.com
199.59.243.225
malicious
badai77resmi.net
159.100.14.108
malicious
miagronorte.com.ar
200.58.112.243
malicious
www.blfyazilkd.net
unknown
malicious
www.prizesupermarket.com
unknown
malicious
www.badai77resmi.net
unknown
malicious
www.miagronorte.com.ar
unknown
malicious
www.bulkfun.top
203.161.46.103

IPs

IP
Domain
Country
Malicious
159.100.14.108
badai77resmi.net
Germany
malicious
200.58.112.243
miagronorte.com.ar
Argentina
malicious
185.151.30.215
www.sacredcoven.video
United Kingdom
malicious
199.59.243.225
www.gaglianoart.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
6230000
unkown
page execute and read and write
malicious
51C0000
trusted library section
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
5780000
system
page execute and read and write
malicious
2A71000
trusted library allocation
page read and write
malicious
2D30000
trusted library allocation
page read and write
malicious
2D6B000
trusted library allocation
page read and write
malicious
3610000
trusted library allocation
page read and write
malicious
1B70000
unclassified section
page execute and read and write
malicious
4DB0000
unclassified section
page execute and read and write
malicious
3280000
system
page execute and read and write
malicious
3760000
trusted library allocation
page read and write
malicious
12C0000
heap
page read and write
17AF000
stack
page read and write
11A0000
heap
page read and write
8540000
heap
page read and write
103C000
stack
page read and write
3A58000
unkown
page read and write
3661000
heap
page read and write
BB0000
trusted library allocation
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
4B7000
unkown
page readonly
3661000
heap
page read and write
2D90000
heap
page read and write
3661000
heap
page read and write
34F7000
heap
page read and write
39D0000
direct allocation
page execute and read and write
1B30000
direct allocation
page read and write
1AC95DB0000
trusted library allocation
page read and write
1BB0000
unclassified section
page execute and read and write
3661000
heap
page read and write
9F7E000
stack
page read and write
C82000
heap
page read and write
1231000
unkown
page readonly
11D0000
unkown
page readonly
1270000
unkown
page readonly
3661000
heap
page read and write
3661000
heap
page read and write
57FE000
system
page execute and read and write
3661000
heap
page read and write
3540000
heap
page read and write
34E3000
heap
page read and write
3661000
heap
page read and write
C80000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
1AC9445A000
heap
page read and write
3661000
heap
page read and write
106A000
stack
page read and write
1909000
direct allocation
page execute and read and write
3790000
heap
page read and write
34EA000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
845E000
stack
page read and write
1090000
trusted library allocation
page read and write
1AC94354000
system
page execute and read and write
3481000
heap
page read and write
1346000
heap
page read and write
3482000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
3525000
heap
page read and write
14AA6000
system
page read and write
1250000
unkown
page read and write
3661000
heap
page read and write
719B7FF000
stack
page read and write
C4E000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
3470000
heap
page read and write
3D22000
unclassified section
page read and write
3525000
heap
page read and write
3661000
heap
page read and write
3946000
heap
page read and write
87A000
stack
page read and write
C48000
heap
page read and write
4AE000
unkown
page readonly
3661000
heap
page read and write
DF0000
unkown
page readonly
3661000
heap
page read and write
3661000
heap
page read and write
2A10000
trusted library allocation
page read and write
976000
stack
page read and write
15F0000
unkown
page readonly
542E000
stack
page read and write
3661000
heap
page read and write
34E5000
heap
page read and write
647B000
unkown
page execute and read and write
10A0000
heap
page read and write
122E000
stack
page read and write
11B0000
unkown
page readonly
2F80000
unkown
page readonly
B90000
trusted library allocation
page read and write
5455000
heap
page read and write
103E000
stack
page read and write
156F000
stack
page read and write
10C7000
heap
page read and write
1000000
unkown
page readonly
39B0000
unclassified section
page execute and read and write
3661000
heap
page read and write
366D000
heap
page read and write
11C0000
unkown
page readonly
3650000
heap
page read and write
4430000
unkown
page execute and read and write
34ED000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
11D0000
heap
page read and write
BD7000
trusted library allocation
page execute and read and write
3661000
heap
page read and write
4B7000
unkown
page readonly
81F6000
heap
page read and write
5B00000
heap
page read and write
84DE000
stack
page read and write
88CE000
stack
page read and write
9BC0000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
2A2E000
trusted library allocation
page read and write
4A0000
unkown
page readonly
DE0000
unkown
page readonly
3661000
heap
page read and write
4A1000
unkown
page execute read
3AC7000
trusted library allocation
page read and write
3661000
heap
page read and write
348C000
heap
page read and write
10C0000
heap
page read and write
1220000
unkown
page read and write
1AC9445F000
heap
page read and write
3661000
heap
page read and write
32F4000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
3A79000
trusted library allocation
page read and write
11B0000
unkown
page readonly
197E000
direct allocation
page execute and read and write
2E70000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
842E000
stack
page read and write
34D1000
heap
page read and write
4DB5000
trusted library allocation
page read and write
3661000
heap
page read and write
35F0000
trusted library allocation
page read and write
1AC9447F000
heap
page read and write
81FC000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
BA0000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
397D000
stack
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
10B0000
trusted library allocation
page read and write
3478000
heap
page read and write
3D12000
direct allocation
page execute and read and write
1AC94450000
heap
page read and write
8191000
heap
page read and write
3661000
heap
page read and write
BC6000
trusted library allocation
page execute and read and write
1AC95F15000
trusted library allocation
page read and write
3661000
heap
page read and write
1230000
unkown
page read and write
37A0000
trusted library allocation
page read and write
F3E000
stack
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
5540000
trusted library allocation
page execute and read and write
11A0000
unkown
page readonly
3B6E000
direct allocation
page execute and read and write
81A0000
heap
page read and write
1000000
unkown
page readonly
3661000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
1010000
unkown
page readonly
1270000
unkown
page readonly
99CD000
stack
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
15F0000
unkown
page readonly
CE4000
heap
page read and write
819B000
heap
page read and write
3661000
heap
page read and write
353A000
heap
page read and write
1900000
unkown
page readonly
3661000
heap
page read and write
28ED000
stack
page read and write
3661000
heap
page read and write
1000000
unkown
page readonly
3661000
heap
page read and write
3487000
heap
page read and write
4F40000
heap
page read and write
3661000
heap
page read and write
81FF000
heap
page read and write
2D94000
heap
page read and write
1AC942C0000
system
page execute and read and write
3661000
heap
page read and write
57FC000
system
page execute and read and write
9ACE000
stack
page read and write
3661000
heap
page read and write
1AC9446C000
heap
page read and write
3661000
heap
page read and write
34F7000
heap
page read and write
9E7E000
stack
page read and write
719CFFF000
stack
page read and write
72FE000
stack
page read and write
3661000
heap
page read and write
841C000
stack
page read and write
1286000
heap
page read and write
3486000
heap
page read and write
3486000
heap
page read and write
851F000
stack
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
E3E000
stack
page read and write
3900000
trusted library allocation
page read and write
12D0000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
9E3F000
stack
page read and write
3661000
heap
page read and write
122E000
stack
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
C67000
heap
page read and write
3661000
heap
page read and write
2D94000
heap
page read and write
3661000
heap
page read and write
3E3C000
unclassified section
page read and write
6C0E000
heap
page read and write
11F0000
heap
page read and write
4DB0000
trusted library allocation
page read and write
5460000
trusted library section
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
4FFB000
unclassified section
page execute and read and write
3661000
heap
page read and write
34E5000
heap
page read and write
190D000
direct allocation
page execute and read and write
35F0000
heap
page read and write
8203000
heap
page read and write
3661000
heap
page read and write
BCA000
trusted library allocation
page execute and read and write
16AE000
stack
page read and write
1AC96000000
trusted library allocation
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
34E3000
heap
page read and write
3486000
heap
page read and write
3661000
heap
page read and write
8196000
heap
page read and write
3661000
heap
page read and write
6EE5D000
unkown
page read and write
1AC95F00000
trusted library allocation
page read and write
1240000
unkown
page read and write
348F000
heap
page read and write
12AE000
stack
page read and write
1570000
unkown
page readonly
A1FC000
stack
page read and write
5A9F000
stack
page read and write
3661000
heap
page read and write
1320000
heap
page read and write
3661000
heap
page read and write
57F0000
system
page execute and read and write
34E0000
heap
page read and write
4BBE000
unclassified section
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
34ED000
heap
page read and write
107A000
stack
page read and write
81A8000
heap
page read and write
38C6000
unkown
page read and write
B20000
heap
page read and write
640E000
unkown
page execute and read and write
12E0000
unkown
page read and write
11C0000
unkown
page readonly
5130000
heap
page execute and read and write
A0FC000
stack
page read and write
3661000
heap
page read and write
4E30000
trusted library allocation
page read and write
3DE2000
unclassified section
page read and write
43B0000
unclassified section
page execute and read and write
2A0C000
stack
page read and write
1AC960AF000
trusted library allocation
page read and write
3661000
heap
page read and write
5853000
system
page execute and read and write
1AC95D00000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
998E000
stack
page read and write
3481000
heap
page read and write
1280000
heap
page read and write
3661000
heap
page read and write
1AA6000
direct allocation
page execute and read and write
3661000
heap
page read and write
1AC95DA0000
heap
page read and write
2A1B000
trusted library allocation
page read and write
3661000
heap
page read and write
34D6000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
4DC0000
trusted library allocation
page read and write
3661000
heap
page read and write
3544000
heap
page read and write
9BEB000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
D3B000
heap
page read and write
B9D000
trusted library allocation
page execute and read and write
350D000
heap
page read and write
156F000
stack
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
39BE000
stack
page read and write
1AC943F0000
heap
page read and write
12A0000
heap
page read and write
3661000
heap
page read and write
347D000
heap
page read and write
4E3D000
trusted library allocation
page read and write
3661000
heap
page read and write
34EA000
heap
page read and write
3850000
trusted library allocation
page execute and read and write
354A000
heap
page read and write
2F40000
unkown
page readonly
11E0000
heap
page read and write
2D4E000
stack
page read and write
3072000
unkown
page read and write
394A000
heap
page read and write
34ED000
heap
page read and write
3661000
heap
page read and write
6C00000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
1377000
heap
page read and write
3661000
heap
page read and write
2A14000
trusted library allocation
page read and write
C40000
heap
page read and write
57D6000
system
page execute and read and write
BC2000
trusted library allocation
page read and write
3661000
heap
page read and write
1901000
unkown
page readonly
988E000
stack
page read and write
4A1000
unkown
page execute read
9D3E000
stack
page read and write
3661000
heap
page read and write
5120000
trusted library allocation
page execute and read and write
11E0000
heap
page read and write
3486000
heap
page read and write
3C9D000
direct allocation
page execute and read and write
11EE000
stack
page read and write
3661000
heap
page read and write
719AFFB000
stack
page read and write
1570000
unkown
page readonly
3661000
heap
page read and write
3661000
heap
page read and write
8212000
heap
page read and write
5830000
unkown
page execute and read and write
899F000
stack
page read and write
A0BF000
stack
page read and write
DE0000
unkown
page readonly
3661000
heap
page read and write
2A3D000
trusted library allocation
page read and write
3072000
unkown
page read and write
1AC94410000
heap
page read and write
3661000
heap
page read and write
2F30000
heap
page read and write
4A1000
unkown
page execute read
11B0000
unkown
page readonly
3506000
heap
page read and write
1AC96001000
trusted library allocation
page read and write
4B5000
unkown
page read and write
3661000
heap
page read and write
1AC95E00000
trusted library allocation
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
DF0000
unkown
page readonly
25B0000
unclassified section
page execute and read and write
8180000
trusted library allocation
page read and write
347B000
heap
page read and write
121E000
stack
page read and write
4DE0000
trusted library allocation
page read and write
1981000
unkown
page readonly
3B15000
trusted library allocation
page read and write
2F40000
unkown
page readonly
4F8E000
unclassified section
page execute and read and write
3661000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
1270000
heap
page read and write
1328000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
2E5E000
stack
page read and write
F10000
unkown
page read and write
3517000
heap
page read and write
12A8000
heap
page read and write
3661000
heap
page read and write
3A71000
trusted library allocation
page read and write
3661000
heap
page read and write
1328000
heap
page read and write
3661000
heap
page read and write
4EF0000
trusted library allocation
page execute and read and write
3300000
heap
page read and write
50D0000
trusted library allocation
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
6EE40000
unkown
page readonly
3661000
heap
page read and write
3486000
heap
page read and write
3661000
heap
page read and write
350D000
heap
page read and write
6EE5F000
unkown
page readonly
1250000
unkown
page read and write
3661000
heap
page read and write
2E8F000
stack
page read and write
2E70000
heap
page read and write
381D000
heap
page read and write
4E20000
heap
page read and write
3278000
stack
page read and write
3661000
heap
page read and write
2D90000
heap
page read and write
3661000
heap
page read and write
116D000
stack
page read and write
CAB000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
4AE000
unkown
page readonly
1A91000
direct allocation
page execute and read and write
3661000
heap
page read and write
2F34000
heap
page read and write
4A1000
unkown
page execute read
C3E000
stack
page read and write
A310000
trusted library allocation
page read and write
3661000
heap
page read and write
1AC95F21000
trusted library allocation
page read and write
3510000
heap
page read and write
81ED000
heap
page read and write
4F93000
heap
page read and write
2F80000
unkown
page readonly
3661000
heap
page read and write
A2FE000
stack
page read and write
3661000
heap
page read and write
1370000
heap
page read and write
1010000
unkown
page readonly
1250000
heap
page read and write
5100000
trusted library allocation
page read and write
83DC000
stack
page read and write
3661000
heap
page read and write
3F0E000
unkown
page read and write
530000
unkown
page readonly
12B0000
unkown
page readonly
57E0000
system
page execute and read and write
3661000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
1AC94356000
system
page execute and read and write
3661000
heap
page read and write
3661000
heap
page read and write
537D000
stack
page read and write
3661000
heap
page read and write
81A5000
heap
page read and write
11B0000
unkown
page readonly
2E1E000
stack
page read and write
8182000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
820C000
heap
page read and write
3661000
heap
page read and write
4B5000
unkown
page read and write
3661000
heap
page read and write
9FBE000
stack
page read and write
3661000
heap
page read and write
117D000
stack
page read and write
6EE41000
unkown
page execute read
3661000
heap
page read and write
3661000
heap
page read and write
1AC95F0F000
trusted library allocation
page read and write
BC0000
trusted library allocation
page read and write
3661000
heap
page read and write
1000000
unkown
page readonly
1AC960C4000
trusted library allocation
page read and write
12D0000
heap
page read and write
17E0000
direct allocation
page execute and read and write
7320000
trusted library allocation
page execute and read and write
4B5000
unkown
page read and write
2B0B000
trusted library allocation
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
4F90000
heap
page read and write
B94000
trusted library allocation
page read and write
81D9000
heap
page read and write
3C4E000
trusted library allocation
page read and write
106A000
stack
page read and write
2D60000
unkown
page read and write
1241000
unkown
page readonly
BD2000
trusted library allocation
page read and write
32F0000
heap
page read and write
1240000
unkown
page read and write
4A2C000
unclassified section
page read and write
3661000
heap
page read and write
1AAD000
direct allocation
page execute and read and write
3B63000
trusted library allocation
page read and write
3661000
heap
page read and write
820F000
heap
page read and write
318C000
unkown
page read and write
3661000
heap
page read and write
2A31000
trusted library allocation
page read and write
34E0000
heap
page read and write
3661000
heap
page read and write
4A0000
unkown
page readonly
2D70000
unkown
page read and write
32F4000
heap
page read and write
C75000
heap
page read and write
347B000
heap
page read and write
5B9F000
stack
page read and write
4F60000
trusted library allocation
page read and write
1250000
heap
page read and write
15EF000
stack
page read and write
1AC94481000
heap
page read and write
4B5000
unkown
page read and write
DF0000
unkown
page readonly
599C000
unkown
page read and write
2D50000
unkown
page read and write
348C000
heap
page read and write
3661000
heap
page read and write
12A8000
heap
page read and write
113B000
stack
page read and write
34EA000
heap
page read and write
3661000
heap
page read and write
BDB000
trusted library allocation
page execute and read and write
5450000
heap
page read and write
2A36000
trusted library allocation
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
1230000
unkown
page read and write
1B28000
direct allocation
page execute and read and write
3661000
heap
page read and write
3661000
heap
page read and write
81D4000
heap
page read and write
3661000
heap
page read and write
1231000
unkown
page readonly
3661000
heap
page read and write
3661000
heap
page read and write
34F7000
heap
page read and write
3500000
heap
page read and write
1280000
heap
page read and write
2A60000
heap
page execute and read and write
3661000
heap
page read and write
2A42000
trusted library allocation
page read and write
2D50000
unkown
page read and write
BF0000
trusted library allocation
page read and write
81B4000
heap
page read and write
34E0000
heap
page read and write
BB3000
trusted library allocation
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
34E5000
heap
page read and write
1AC94352000
system
page execute and read and write
719BFFE000
stack
page read and write
1470000
heap
page read and write
3661000
heap
page read and write
D36000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
3660000
heap
page read and write
3661000
heap
page read and write
4F30000
trusted library section
page readonly
849F000
stack
page read and write
2A50000
trusted library allocation
page read and write
4A0000
unkown
page readonly
28AE000
stack
page read and write
AFE000
stack
page read and write
2F7F000
stack
page read and write
CC9000
heap
page read and write
6FE0000
trusted library section
page read and write
3661000
heap
page read and write
1AC95F0A000
trusted library allocation
page read and write
3D7C000
unkown
page read and write
1AC9447A000
heap
page read and write
3517000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
323B000
stack
page read and write
895E000
stack
page read and write
4E40000
trusted library allocation
page execute and read and write
34E3000
heap
page read and write
3661000
heap
page read and write
14252000
system
page read and write
5440000
trusted library allocation
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
9D0000
heap
page read and write
B6E000
stack
page read and write
3661000
heap
page read and write
81CF000
heap
page read and write
51D0000
trusted library allocation
page read and write
1AC95F03000
trusted library allocation
page read and write
2DDC000
unkown
page read and write
1AC960CE000
trusted library allocation
page read and write
3132000
unkown
page read and write
6EE56000
unkown
page readonly
1080000
trusted library allocation
page execute and read and write
3661000
heap
page read and write
3661000
heap
page read and write
1AC960BE000
trusted library allocation
page read and write
11A0000
unkown
page readonly
3AFD000
direct allocation
page execute and read and write
1241000
unkown
page readonly
4708000
unclassified section
page read and write
3661000
heap
page read and write
4A0000
unkown
page readonly
5B10000
heap
page read and write
1320000
heap
page read and write
1230000
heap
page read and write
50CB000
stack
page read and write
B93000
trusted library allocation
page execute and read and write
3661000
heap
page read and write
3661000
heap
page read and write
B80000
trusted library allocation
page read and write
8190000
heap
page read and write
117D000
stack
page read and write
3661000
heap
page read and write
347D000
heap
page read and write
3900000
trusted library allocation
page read and write
3506000
heap
page read and write
2F34000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
11C0000
unkown
page readonly
3661000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
3CA1000
direct allocation
page execute and read and write
32F4000
heap
page read and write
11C0000
unkown
page readonly
3661000
heap
page read and write
2FB0000
unclassified section
page execute and read and write
3661000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
116D000
stack
page read and write
BBD000
trusted library allocation
page execute and read and write
3500000
heap
page read and write
4E30000
unkown
page execute and read and write
DF0000
unkown
page readonly
3661000
heap
page read and write
6720000
trusted library allocation
page read and write
3661000
heap
page read and write
107A000
stack
page read and write
1AC94481000
heap
page read and write
12A0000
heap
page read and write
166F000
stack
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
5110000
heap
page read and write
39BB000
heap
page read and write
12B0000
unkown
page readonly
12E0000
unkown
page read and write
3510000
heap
page read and write
532000
unkown
page readonly
3661000
heap
page read and write
8209000
heap
page read and write
4B7000
unkown
page readonly
355E000
heap
page read and write
1980000
unkown
page readonly
7086000
trusted library allocation
page read and write
3661000
heap
page read and write
2F30000
heap
page read and write
890F000
stack
page read and write
3661000
heap
page read and write
3460000
heap
page read and write
57D8000
system
page execute and read and write
3661000
heap
page read and write
719C7FE000
stack
page read and write
3661000
heap
page read and write
107C000
stack
page read and write
4AE000
unkown
page readonly
3A30000
unkown
page execute and read and write
9750000
heap
page read and write
3661000
heap
page read and write
3661000
heap
page read and write
5430000
trusted library allocation
page read and write
AB0000
heap
page read and write
11D0000
unkown
page readonly
3661000
heap
page read and write
1220000
unkown
page read and write
4576000
unclassified section
page read and write
4B7000
unkown
page readonly
3AF9000
direct allocation
page execute and read and write
4F50000
heap
page read and write
3661000
heap
page read and write
8290000
trusted library allocation
page read and write
81C9000
heap
page read and write
3661000
heap
page read and write
F0D000
unkown
page read and write
1AC95DB0000
trusted library allocation
page read and write
3900000
trusted library allocation
page read and write
4AE000
unkown
page readonly
3661000
heap
page read and write
14312000
system
page read and write
2B16000
trusted library allocation
page read and write
3661000
heap
page read and write
50F0000
trusted library section
page read and write
11D0000
heap
page read and write
4F10000
trusted library allocation
page read and write
3030000
unkown
page execute and read and write
There are 706 hidden memdumps, click here to show them.