Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ORDERCONFIRMATION_00001679918.xlsx
|
CDFV2 Encrypted
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
downloaded
|
||
C:\Users\user\AppData\Local\Temp\nsd99E0.tmp\hmrrcvb.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\~$ORDERCONFIRMATION_00001679918.xlsx
|
data
|
dropped
|
||
C:\Users\Public\vbc.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1692293F.jpeg
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, progressive, precision 8, 509x209,
frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1C3144A5.png
|
PNG image data, 484 x 544, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\286302FB.jpeg
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 686x220,
frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\36E70CB6.jpeg
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 686x220,
frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\608AFF49.png
|
PNG image data, 684 x 477, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\69023234.jpeg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\727091C1.jpeg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C3F73A62.png
|
PNG image data, 684 x 477, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CABA28C0.jpeg
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, progressive, precision 8, 509x209,
frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E1B73268.png
|
PNG image data, 484 x 544, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F76D3143.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\9rvscd0j0b4n1ow
|
data
|
dropped
|
There are 7 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
|
||
C:\Users\Public\vbc.exe
|
'C:\Users\Public\vbc.exe'
|
||
C:\Users\Public\vbc.exe
|
'C:\Users\Public\vbc.exe'
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://23.94.159.204/poc/vbc.exe
|
23.94.159.204
|
||
http://www.%s.comPA
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://www.day.com/dam/1.0
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
23.94.159.204
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
nj,
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
|
MTTT
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
|
ReviewToken
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2E6A7
|
2E6A7
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
VBAFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
}o,
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\32CBB
|
32CBB
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\3426D
|
3426D
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 2
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 3
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 6
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 7
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 8
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 9
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 10
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 11
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 12
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 13
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 14
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 15
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 16
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 17
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 18
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 19
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 20
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 21
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
|
LastPurgeTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
EXCELFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\32CBB
|
32CBB
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
|
EquationEditorFilesIntl_1033
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
There are 30 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
277A000
|
unkown
|
page read and write
|
||
7EFE0000
|
unkown image
|
page readonly
|
||
407000
|
unkown image
|
page readonly
|
||
E8A0000
|
unkown
|
page read and write
|
||
E8A0000
|
unkown
|
page read and write
|
||
7EFC2000
|
unkown image
|
page readonly
|
||
E82A000
|
unkown
|
page read and write
|
||
E750000
|
unkown
|
page read and write
|
||
E9A1000
|
unkown
|
page read and write
|
||
E9B0000
|
unkown
|
page read and write
|
||
3DE000
|
unkown
|
page read and write
|
||
EA10000
|
unkown
|
page read and write
|
||
D60000
|
unkown image
|
page readonly
|
||
E82A000
|
unkown
|
page read and write
|
||
E9A1000
|
unkown
|
page read and write
|
||
2770000
|
unkown
|
page read and write
|
||
73061000
|
unkown image
|
page execute read
|
||
2770000
|
unkown
|
page read and write
|
||
7EFD0000
|
unkown image
|
page readonly
|
||
E8B0000
|
unkown
|
page read and write
|
||
EA10000
|
unkown
|
page read and write
|
||
300000
|
unkown image
|
page readonly
|
||
4F1000
|
heap default
|
page read and write
|
||
E9B0000
|
unkown
|
page read and write
|
||
E8B0000
|
unkown
|
page read and write
|
||
1D8000
|
unkown
|
page execute and read and write
|
||
7FFFFFC2000
|
unkown image
|
page readonly
|
||
73060000
|
unkown image
|
page readonly
|
||
E9A7000
|
unkown
|
page read and write
|
||
190000
|
unkown image
|
page readonly
|
||
1D5000
|
unkown
|
page execute and read and write
|
||
E750000
|
unkown
|
page read and write
|
||
E9A4000
|
unkown
|
page read and write
|
||
27AD000
|
unkown
|
page read and write
|
||
160000
|
unkown image
|
page read and write
|
||
EA10000
|
unkown
|
page read and write
|
||
800000
|
heap default
|
page read and write
|
||
7FFFFFD0000
|
unkown image
|
page readonly
|
||
1D8000
|
unkown
|
page readonly
|
||
4D4000
|
heap default
|
page read and write
|
||
7FFFFFB2000
|
unkown image
|
page readonly
|
||
3F0000
|
heap private
|
page read and write
|
||
276F000
|
unkown
|
page read and write
|
||
7EFC0000
|
unkown image
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
E82D000
|
unkown
|
page read and write
|
||
7EFB2000
|
unkown image
|
page readonly
|
||
7EFB2000
|
unkown image
|
page readonly
|
||
1A0000
|
unkown image
|
page readonly
|
||
E8B0000
|
unkown
|
page read and write
|
||
7EFC0000
|
unkown image
|
page readonly
|
||
E82D000
|
unkown
|
page read and write
|
||
7EFC2000
|
unkown image
|
page readonly
|
||
409000
|
unkown image
|
page write copy
|
||
490000
|
unkown image
|
page readonly
|
||
E750000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
E9A4000
|
unkown
|
page read and write
|
||
440000
|
unkown image
|
page readonly
|
||
E82A000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page read and write
|
||
EA10000
|
unkown
|
page read and write
|
||
5E0000
|
heap default
|
page read and write
|
||
E8A0000
|
unkown
|
page read and write
|
||
E9A4000
|
unkown
|
page read and write
|
||
E8B0000
|
unkown
|
page read and write
|
||
EA10000
|
unkown
|
page read and write
|
||
73069000
|
unkown image
|
page readonly
|
||
E9A4000
|
unkown
|
page read and write
|
||
437000
|
unkown image
|
page readonly
|
||
7EFC0000
|
unkown image
|
page readonly
|
||
401000
|
unkown image
|
page execute read
|
||
397000
|
unkown
|
page read and write
|
||
E8A0000
|
unkown
|
page read and write
|
||
2D0000
|
unkown image
|
page read and write
|
||
E9A7000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
E750000
|
unkown
|
page read and write
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
E8A0000
|
unkown
|
page read and write
|
||
7EFC0000
|
unkown image
|
page readonly
|
||
390000
|
heap private
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
3CB000
|
unkown
|
page read and write
|
||
E82A000
|
unkown
|
page read and write
|
||
128F000
|
unkown
|
page read and write
|
||
7EFE0000
|
unkown image
|
page readonly
|
||
660000
|
unkown image
|
page readonly
|
||
E8B0000
|
unkown
|
page read and write
|
||
21C0000
|
unkown image
|
page readonly
|
||
E8A0000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
E9A7000
|
unkown
|
page read and write
|
||
BD0000
|
unkown image
|
page readonly
|
||
E9A4000
|
unkown
|
page read and write
|
||
E9A7000
|
unkown
|
page read and write
|
||
300000
|
heap private
|
page read and write
|
||
14A000
|
unkown
|
page read and write
|
||
7EFD0000
|
unkown image
|
page readonly
|
||
E9A7000
|
unkown
|
page read and write
|
||
900000
|
unkown image
|
page readonly
|
||
EA10000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
E9A1000
|
unkown
|
page read and write
|
||
E9A4000
|
unkown
|
page read and write
|
||
2770000
|
unkown
|
page read and write
|
||
E82A000
|
unkown
|
page read and write
|
||
E9B0000
|
unkown
|
page read and write
|
||
430000
|
unkown
|
page read and write
|
||
150000
|
unkown image
|
page readonly
|
||
E9A7000
|
unkown
|
page read and write
|
||
E9B0000
|
unkown
|
page read and write
|
||
E82D000
|
unkown
|
page read and write
|
||
7EFD0000
|
unkown image
|
page readonly
|
||
E82D000
|
unkown
|
page read and write
|
||
E9B0000
|
unkown
|
page read and write
|
||
7EFB0000
|
unkown image
|
page readonly
|
||
21D000
|
unkown
|
page read and write
|
||
407000
|
unkown image
|
page readonly
|
||
E8A0000
|
unkown
|
page read and write
|
||
E9A7000
|
unkown
|
page read and write
|
||
E82D000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
E9A7000
|
unkown
|
page read and write
|
||
7306B000
|
unkown image
|
page execute and read and write
|
||
E8B0000
|
unkown
|
page read and write
|
||
EA10000
|
unkown
|
page read and write
|
||
407000
|
unkown image
|
page readonly
|
||
409000
|
unkown image
|
page read and write
|
||
E8B0000
|
unkown
|
page read and write
|
||
4B0000
|
heap default
|
page read and write
|
||
7EFB0000
|
unkown image
|
page readonly
|
||
E9A1000
|
unkown
|
page read and write
|
||
E990000
|
unkown
|
page read and write
|
||
5B0000
|
unkown image
|
page readonly
|
||
3CA000
|
unkown
|
page read and write
|
||
20C0000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
E9B0000
|
unkown
|
page read and write
|
||
7FFFFFB2000
|
unkown image
|
page readonly
|
||
7FFFFFC0000
|
unkown image
|
page readonly
|
||
352000
|
heap private
|
page read and write
|
||
E82D000
|
unkown
|
page read and write
|
||
434000
|
unkown image
|
page read and write
|
||
EA10000
|
unkown
|
page read and write
|
||
E82A000
|
unkown
|
page read and write
|
||
E750000
|
unkown
|
page read and write
|
||
E82A000
|
unkown
|
page read and write
|
||
807000
|
heap default
|
page read and write
|
||
E9B0000
|
unkown
|
page read and write
|
||
2C0000
|
unkown image
|
page readonly
|
||
407000
|
unkown image
|
page readonly
|
||
E82A000
|
unkown
|
page read and write
|
||
E750000
|
unkown
|
page read and write
|
||
7FFFFFB0000
|
unkown image
|
page readonly
|
||
E8A0000
|
unkown
|
page read and write
|
||
7FFFFFC0000
|
unkown image
|
page readonly
|
||
409000
|
unkown image
|
page write copy
|
||
437000
|
unkown image
|
page readonly
|
||
E990000
|
unkown
|
page read and write
|
||
2880000
|
heap private
|
page read and write
|
||
E9A4000
|
unkown
|
page read and write
|
||
504000
|
heap default
|
page read and write
|
||
39D000
|
unkown
|
page read and write
|
||
E750000
|
unkown
|
page read and write
|
||
190000
|
unkown image
|
page readonly
|
||
437000
|
unkown image
|
page readonly
|
||
10000
|
unkown image
|
page read and write
|
||
36D000
|
heap default
|
page read and write
|
||
1CD0000
|
unkown image
|
page readonly
|
||
1D5000
|
unkown
|
page execute and read and write
|
||
27C0000
|
heap private
|
page read and write
|
||
E9A7000
|
unkown
|
page read and write
|
||
7306E000
|
unkown image
|
page readonly
|
||
21D000
|
unkown
|
page read and write
|
||
E990000
|
unkown
|
page read and write
|
||
437000
|
unkown image
|
page readonly
|
||
E9A4000
|
unkown
|
page read and write
|
||
E8B0000
|
unkown
|
page read and write
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
E990000
|
unkown
|
page read and write
|
||
E750000
|
unkown
|
page read and write
|
||
E9B0000
|
unkown
|
page read and write
|
||
18B000
|
unkown
|
page read and write
|
||
337000
|
heap default
|
page read and write
|
||
466000
|
unkown
|
page read and write
|
||
BC0000
|
unkown image
|
page readonly
|
||
E82D000
|
unkown
|
page read and write
|
||
7EFB2000
|
unkown image
|
page readonly
|
||
E9A4000
|
unkown
|
page read and write
|
||
E9A1000
|
unkown
|
page read and write
|
||
47E000
|
unkown
|
page read and write
|
||
3A3000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
73060000
|
unkown image
|
page readonly
|
||
407000
|
unkown image
|
page readonly
|
||
E990000
|
unkown
|
page read and write
|
||
E82D000
|
unkown
|
page read and write
|
||
7FFFFFD0000
|
unkown image
|
page readonly
|
||
E9A1000
|
unkown
|
page read and write
|
||
7FFFFFC2000
|
unkown image
|
page readonly
|
||
E9A4000
|
unkown
|
page read and write
|
||
8B000
|
unkown
|
page read and write
|
||
E990000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
E9A7000
|
unkown
|
page read and write
|
||
40000
|
unkown image
|
page readonly
|
||
7EFB2000
|
unkown image
|
page readonly
|
||
EA10000
|
unkown
|
page read and write
|
||
1C9000
|
unkown
|
page execute and read and write
|
||
E9A1000
|
unkown
|
page read and write
|
||
7EFE0000
|
unkown image
|
page readonly
|
||
7EFB2000
|
unkown image
|
page readonly
|
||
E8B0000
|
unkown
|
page read and write
|
||
7306A000
|
unkown image
|
page execute and write copy
|
||
42C000
|
unkown image
|
page read and write
|
||
2770000
|
unkown
|
page read and write
|
||
7FFFFFB0000
|
unkown image
|
page readonly
|
||
E8A0000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
334000
|
heap private
|
page read and write
|
||
7EFC2000
|
unkown image
|
page readonly
|
||
190000
|
unkown image
|
page readonly
|
||
7EFB0000
|
unkown image
|
page readonly
|
||
2AE000
|
unkown
|
page read and write
|
||
E750000
|
unkown
|
page read and write
|
||
E82A000
|
unkown
|
page read and write
|
||
E20000
|
unkown image
|
page readonly
|
||
7EFB0000
|
unkown image
|
page readonly
|
||
409000
|
unkown image
|
page write copy
|
||
E8A0000
|
unkown
|
page read and write
|
||
E82A000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
304000
|
heap private
|
page read and write
|
||
E82D000
|
unkown
|
page read and write
|
||
E8B0000
|
unkown
|
page read and write
|
||
1A0000
|
unkown image
|
page readonly
|
||
7EFC2000
|
unkown image
|
page readonly
|
||
E82A000
|
unkown
|
page read and write
|
||
38F000
|
unkown
|
page read and write
|
||
7306D000
|
unkown image
|
page execute and write copy
|
||
7EFB0000
|
unkown image
|
page readonly
|
||
EA10000
|
unkown
|
page read and write
|
||
7EFC2000
|
unkown image
|
page readonly
|
||
266F000
|
unkown
|
page read and write
|
||
31E000
|
unkown
|
page read and write
|
||
376000
|
heap default
|
page read and write
|
||
E990000
|
unkown
|
page read and write
|
||
5EF000
|
unkown
|
page read and write
|
||
E990000
|
unkown
|
page read and write
|
||
437000
|
unkown image
|
page readonly
|
||
E9B0000
|
unkown
|
page read and write
|
||
12E0000
|
heap private
|
page read and write
|
||
30000
|
unkown image
|
page readonly
|
||
409000
|
unkown image
|
page write copy
|
||
4B7000
|
heap default
|
page read and write
|
||
E9B0000
|
unkown
|
page read and write
|
||
393000
|
heap default
|
page read and write
|
||
E82D000
|
unkown
|
page read and write
|
||
7EFD0000
|
unkown image
|
page readonly
|
||
730000
|
unkown image
|
page readonly
|
||
A40000
|
unkown image
|
page readonly
|
||
10000
|
unkown image
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
7EFD0000
|
unkown image
|
page readonly
|
||
740000
|
unkown image
|
page readonly
|
||
E8A0000
|
unkown
|
page read and write
|
||
10000
|
unkown image
|
page read and write
|
||
E9A4000
|
unkown
|
page read and write
|
||
E990000
|
unkown
|
page read and write
|
||
E9A1000
|
unkown
|
page read and write
|
||
E9A1000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
824000
|
heap default
|
page read and write
|
||
E9A1000
|
unkown
|
page read and write
|
||
E990000
|
unkown
|
page read and write
|
||
E9B0000
|
unkown
|
page read and write
|
||
E8B0000
|
unkown
|
page read and write
|
||
E9A7000
|
unkown
|
page read and write
|
||
E82D000
|
unkown
|
page read and write
|
||
E750000
|
unkown
|
page read and write
|
||
1C1000
|
unkown
|
page execute read
|
||
7EFC0000
|
unkown image
|
page readonly
|
||
E990000
|
unkown
|
page read and write
|
||
330000
|
heap private
|
page read and write
|
||
5C0000
|
unkown image
|
page readonly
|
||
39C000
|
heap default
|
page read and write
|
||
1A0000
|
unkown image
|
page readonly
|
||
330000
|
heap default
|
page read and write
|
||
E9A1000
|
unkown
|
page read and write
|
||
EA10000
|
unkown
|
page read and write
|
||
E750000
|
unkown
|
page read and write
|
||
230000
|
heap default
|
page read and write
|
There are 284 hidden memdumps, click here to show them.