IOC Report
Bank TT slip.xlsx

loading gif

Files

File Path
Type
Category
Malicious
Bank TT slip.xlsx
CDFV2 Encrypted
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\SOA[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
downloaded
malicious
C:\Users\user\Desktop\~$Bank TT slip.xlsx
data
dropped
malicious
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\System32\drivers\etc\hosts
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\18D80E7.png
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\194FA29.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 160x160, frames 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3095CF2A.png
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\317DF694.png
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\63404123.png
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A240C8.png
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C1A95BC.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 160x160, frames 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D45E828D.png
PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DE3E0A16.png
PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FD51471F.png
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\~DF7445FC000D331A6E.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFBAFAEA404D417564.TMP
CDFV2 Encrypted
dropped
C:\Users\user\AppData\Local\Temp\~DFC691B0AA0E02487B.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFDAC05FDF80BA3ECF.TMP
data
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Users\Public\vbc.exe
"C:\Users\Public\vbc.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
{path}
malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding

URLs

Name
IP
Malicious
http://172.245.27.27/SOA.exe
172.245.27.27
malicious
Http://172.245.27.27/SOA.exeK
unknown
malicious
http://172.245.27.27/SOA.exeX
unknown
malicious
http://172.245.27.27/SOA.exehhC:
unknown
malicious
Http://172.245.27.27/SOA.exej
unknown
malicious
http://172.245.27.27/SOA.exeB
unknown
malicious
http://127.0.0.1:HTTP/1.1
unknown
http://DynDns.comDynDNS
unknown
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
unknown
https://api.telegram.org/bot2134979594:AAFk4QkrlHlt2a-q-EhIoHZBbzxSH0QxiBI/
unknown
https://api.ipify.org%GETMozilla/5.0
unknown
http://bLHfhV.com
unknown
https://api.telegram.org/bot2134979594:AAFk4QkrlHlt2a-q-EhIoHZBbzxSH0QxiBI/sendDocumentdocument-----
unknown
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
172.245.27.27
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
l>0
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\66D63
66D63
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
?j0
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\6BCAB
6BCAB
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\6DAF4
6DAF4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\6BCAB
6BCAB
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\GDIPlus
FontCachePath
There are 31 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
27E1000
trusted library allocation
page read and write
malicious
341F000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
57BF000
stack
page read and write
493000
heap
page read and write
682F000
trusted library allocation
page read and write
67DE000
trusted library allocation
page read and write
545000
trusted library allocation
page read and write
F1F000
stack
page read and write
8D2000
unkown
page execute read
645B000
trusted library allocation
page read and write
4FA6000
trusted library allocation
page read and write
132000
trusted library allocation
page read and write
7090000
trusted library allocation
page read and write
12C0000
heap
page execute and read and write
37E9000
trusted library allocation
page read and write
57E000
stack
page read and write
395000
trusted library allocation
page read and write
536E000
stack
page read and write
4E0000
trusted library allocation
page read and write
5E0000
trusted library allocation
page read and write
5B3000
trusted library allocation
page read and write
4F92000
trusted library allocation
page read and write
646F000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
57E0000
heap
page read and write
5390000
heap
page read and write
24DF000
stack
page read and write
390000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
11D000
trusted library allocation
page execute and read and write
6DB5000
trusted library allocation
page read and write
675E000
trusted library allocation
page read and write
23FE000
stack
page read and write | page guard
6B44000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
62BF000
trusted library allocation
page read and write
55FD000
stack
page read and write
6D2C000
trusted library allocation
page read and write
4F92000
trusted library allocation
page read and write
65D6000
trusted library allocation
page read and write
3B0000
trusted library allocation
page read and write
4FD6000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
110000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
64AA000
trusted library allocation
page read and write
626B000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
540000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
67C6000
trusted library allocation
page read and write
69B8000
trusted library allocation
page read and write
8D2000
unkown
page execute read
710F000
trusted library allocation
page read and write
3C0000
trusted library allocation
page read and write
494000
heap
page read and write
3C0000
trusted library allocation
page read and write
173000
trusted library allocation
page read and write
CD0000
heap
page execute and read and write
6812000
trusted library allocation
page read and write
6938000
trusted library allocation
page read and write
395000
trusted library allocation
page read and write
63F0000
trusted library allocation
page read and write
310000
heap
page read and write
3DD000
stack
page read and write
DDE000
stack
page read and write
65A5000
trusted library allocation
page read and write
54B2000
heap
page read and write
F1E000
stack
page read and write | page guard
5A0000
trusted library allocation
page read and write
553F000
stack
page read and write
6B73000
trusted library allocation
page read and write
2C0000
heap
page read and write
182000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
6570000
trusted library allocation
page read and write
6BB5000
trusted library allocation
page read and write
110000
trusted library allocation
page read and write
4F69000
trusted library allocation
page read and write
395000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
6B7B000
trusted library allocation
page read and write
5A0000
trusted library allocation
page read and write
69FE000
trusted library allocation
page read and write
6A59000
trusted library allocation
page read and write
395000
trusted library allocation
page read and write
4B3F000
stack
page read and write
4F84000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
546E000
stack
page read and write
10B000
stack
page read and write
7C0000
heap
page execute and read and write
4D7000
heap
page read and write
45CE000
stack
page read and write
5110000
trusted library section
page read and write
76F0000
trusted library allocation
page read and write
18A000
stack
page read and write
395000
trusted library allocation
page read and write
192000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
395000
trusted library allocation
page read and write
531E000
stack
page read and write
390000
trusted library allocation
page read and write
673A000
trusted library allocation
page read and write
6A0000
heap
page read and write
38B1000
trusted library allocation
page read and write
5D0000
trusted library allocation
page read and write
5DC000
heap
page read and write
4FAD000
trusted library allocation
page read and write
584E000
stack
page read and write
390000
trusted library allocation
page read and write
535000
heap
page read and write
3680000
trusted library allocation
page read and write
48E000
heap
page read and write
3566000
trusted library allocation
page read and write
7E0000
trusted library section
page read and write
C4000
trusted library allocation
page read and write
395000
trusted library allocation
page read and write
5A0000
trusted library allocation
page read and write
357E000
stack
page read and write
50C0000
heap
page read and write
540000
trusted library allocation
page read and write
525F000
stack
page read and write
820000
heap
page execute and read and write
7014000
trusted library allocation
page read and write
6C79000
trusted library allocation
page read and write
620E000
stack
page read and write
4FD6000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
590000
trusted library allocation
page read and write
290000
trusted library allocation
page read and write
7702000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
395000
trusted library allocation
page read and write
540000
trusted library allocation
page read and write
6C4D000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
3401000
trusted library allocation
page read and write
67E5000
trusted library allocation
page read and write
F6E000
stack
page read and write
66AE000
trusted library allocation
page read and write
6781000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
70A1000
trusted library allocation
page read and write
573D000
stack
page read and write
367F000
stack
page read and write
5A0000
trusted library allocation
page read and write
550000
heap
page read and write
4C30000
heap
page read and write
68C0000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
4F83000
trusted library allocation
page read and write
4EFD000
trusted library allocation
page read and write
410000
heap
page read and write
5960000
heap
page read and write
6947000
trusted library allocation
page read and write
1DE0000
heap
page read and write
37E1000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
62D3000
trusted library allocation
page read and write
122000
trusted library allocation
page read and write
703A000
trusted library allocation
page read and write
228C000
stack
page read and write
300000
trusted library allocation
page read and write
126E000
stack
page read and write
4F4D000
trusted library allocation
page read and write
7D9000
heap
page read and write
58EF000
stack
page read and write
197000
trusted library allocation
page execute and read and write
390000
trusted library allocation
page read and write
53BF000
stack
page read and write
6B85000
trusted library allocation
page read and write
2E4000
heap
page read and write
2AD0000
heap
page read and write
1FCE000
stack
page read and write
540000
trusted library allocation
page read and write
5E94000
trusted library allocation
page read and write
3B0000
trusted library allocation
page read and write
12A000
trusted library allocation
page execute and read and write
4BC4000
heap
page read and write
187000
trusted library allocation
page execute and read and write
6B92000
trusted library allocation
page read and write
69CC000
trusted library allocation
page read and write
2D1000
trusted library allocation
page read and write
609E000
stack
page read and write
395000
trusted library allocation
page read and write
49DF000
stack
page read and write
395000
trusted library allocation
page read and write
113000
trusted library allocation
page read and write
4FC2000
trusted library allocation
page read and write
2882000
trusted library allocation
page read and write
4F6D000
trusted library allocation
page read and write
653A000
trusted library allocation
page read and write
57DE000
stack
page read and write
B0000
trusted library allocation
page read and write
563E000
stack
page read and write
545000
heap
page read and write
99E000
unkown
page readonly
67D1000
trusted library allocation
page read and write
630E000
trusted library allocation
page read and write
5540000
heap
page read and write
4F67000
trusted library allocation
page read and write
3B0000
trusted library allocation
page read and write
23FF000
stack
page read and write
6D79000
trusted library allocation
page read and write
53C000
stack
page read and write
5E91000
trusted library allocation
page read and write
6C45000
trusted library allocation
page read and write
6541000
trusted library allocation
page read and write
25DF000
stack
page read and write
3E0000
trusted library allocation
page read and write
54BE000
stack
page read and write
68CE000
trusted library allocation
page read and write
6832000
trusted library allocation
page read and write
121F000
stack
page read and write
4FBF000
trusted library allocation
page read and write
4FF0000
heap
page execute and read and write
64FD000
trusted library allocation
page read and write
6C42000
trusted library allocation
page read and write
66C2000
trusted library allocation
page read and write
398000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
540000
trusted library allocation
page read and write
7050000
trusted library allocation
page read and write
2060000
heap
page read and write
666C000
trusted library allocation
page read and write
6A91000
trusted library allocation
page read and write
5E98000
trusted library allocation
page read and write
4FD4000
trusted library allocation
page read and write
52BD000
stack
page read and write
6C17000
trusted library allocation
page read and write
6C37000
trusted library allocation
page read and write
6759000
trusted library allocation
page read and write
395000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
6751000
trusted library allocation
page read and write
6BC8000
trusted library allocation
page read and write
3409000
trusted library allocation
page read and write
563C000
stack
page read and write
54FC000
stack
page read and write
395000
trusted library allocation
page read and write
137000
trusted library allocation
page execute and read and write
395000
trusted library allocation
page read and write
3FD000
stack
page read and write
540000
trusted library allocation
page read and write
2A0000
heap
page read and write
6BC0000
trusted library allocation
page read and write
3C0000
trusted library allocation
page read and write
4FCF000
trusted library allocation
page read and write
1CE0000
trusted library allocation
page read and write
659D000
trusted library allocation
page read and write
320000
heap
page read and write
62CE000
trusted library allocation
page read and write
51CD000
stack
page read and write
4400000
trusted library allocation
page read and write
765B000
trusted library allocation
page read and write
6B94000
trusted library allocation
page read and write
200000
heap
page read and write
64BE000
trusted library allocation
page read and write
4BC0000
heap
page read and write
3F4000
heap
page read and write
B5D000
stack
page read and write
10000
heap
page read and write
4FC2000
trusted library allocation
page read and write
540000
trusted library allocation
page read and write
67A5000
trusted library allocation
page read and write
8D0000
unkown
page readonly
99E000
unkown
page readonly
5E94000
trusted library allocation
page read and write
2C7000
heap
page read and write
6666000
trusted library allocation
page read and write
6BD6000
trusted library allocation
page read and write
540000
trusted library allocation
page read and write
52BE000
stack
page read and write
6819000
trusted library allocation
page read and write
7057000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
267000
stack
page read and write
720000
heap
page read and write
5F8D000
stack
page read and write
6746000
trusted library allocation
page read and write
577F000
stack
page read and write
665F000
trusted library allocation
page read and write
65DD000
trusted library allocation
page read and write
CD000
trusted library allocation
page execute and read and write
6C0B000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
6C03000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
2ADB000
heap
page read and write
6C3D000
trusted library allocation
page read and write
6825000
trusted library allocation
page read and write
76E5000
trusted library allocation
page read and write
2AAF000
stack
page read and write
540000
trusted library allocation
page read and write
7706000
trusted library allocation
page read and write
395000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
41C000
heap
page read and write
653C000
trusted library allocation
page read and write
4F92000
trusted library allocation
page read and write
366000
heap
page read and write
16D000
trusted library allocation
page execute and read and write
5E98000
trusted library allocation
page read and write
6889000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
2872000
trusted library allocation
page read and write
518E000
stack
page read and write
5ADC000
stack
page read and write
1D9C000
stack
page read and write
540000
trusted library allocation
page read and write
10000
heap
page read and write
687A000
trusted library allocation
page read and write
6975000
trusted library allocation
page read and write
679E000
trusted library allocation
page read and write
1DF0000
direct allocation
page read and write
6786000
trusted library allocation
page read and write
4BD000
heap
page read and write
5A76000
trusted library allocation
page read and write
6321000
trusted library allocation
page read and write
67D4000
trusted library allocation
page read and write
3D0000
heap
page read and write
4F50000
heap
page read and write
6757000
trusted library allocation
page read and write
5E0000
trusted library allocation
page read and write
6AEB000
trusted library allocation
page read and write
6C58000
trusted library allocation
page read and write
35B000
heap
page read and write
2AD8000
heap
page read and write
5E0000
trusted library allocation
page read and write
164000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
6577000
trusted library allocation
page read and write
4F4C000
stack
page read and write
2837000
trusted library allocation
page read and write
570000
trusted library allocation
page execute and read and write
651A000
trusted library allocation
page read and write
495000
heap
page read and write
1F48000
trusted library allocation
page read and write
66AC000
trusted library allocation
page read and write
4F24000
trusted library allocation
page read and write
5A0000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
610000
heap
page read and write
390000
trusted library allocation
page read and write
6F66000
trusted library allocation
page read and write
58E000
stack
page read and write
7C0000
trusted library allocation
page execute and read and write
300000
trusted library allocation
page read and write
1DB0000
heap
page read and write
7065000
trusted library allocation
page read and write
761D000
trusted library allocation
page read and write
6988000
trusted library allocation
page read and write
5D0000
heap
page read and write
2F0000
trusted library allocation
page read and write
3D7000
heap
page read and write
390000
trusted library allocation
page read and write
286A000
trusted library allocation
page read and write
4F4C000
trusted library allocation
page read and write
2401000
trusted library allocation
page read and write
361000
heap
page read and write
4D0000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
6BBE000
trusted library allocation
page read and write
4F83000
trusted library allocation
page read and write
5495000
heap
page read and write
395000
trusted library allocation
page read and write
590000
trusted library allocation
page read and write
C3000
trusted library allocation
page execute and read and write
395000
trusted library allocation
page read and write
BCE000
stack
page read and write
633E000
trusted library allocation
page read and write
6551000
trusted library allocation
page read and write
6C96000
trusted library allocation
page read and write
5E0000
trusted library allocation
page read and write
573E000
stack
page read and write
15A000
stack
page read and write
163000
trusted library allocation
page execute and read and write
3C0000
trusted library allocation
page read and write
3A0000
trusted library section
page read and write
7EF30000
trusted library allocation
page execute and read and write
6A12000
trusted library allocation
page read and write
673E000
trusted library allocation
page read and write
89000
stack
page read and write
53D0000
trusted library allocation
page read and write
675B000
trusted library allocation
page read and write
4C34000
heap
page read and write
39B000
trusted library allocation
page read and write
67EC000
trusted library allocation
page read and write
3E0000
trusted library allocation
page read and write
540000
trusted library allocation
page read and write
353D000
stack
page read and write
6090000
trusted library allocation
page read and write
470000
heap
page read and write
22C0000
heap
page read and write
513E000
stack
page read and write
6600000
trusted library allocation
page read and write
2BF000
stack
page read and write
6090000
trusted library allocation
page read and write
6548000
trusted library allocation
page read and write
4BE2000
heap
page read and write
390000
trusted library allocation
page read and write
67CC000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
6BF8000
trusted library allocation
page read and write
54ED000
trusted library allocation
page read and write
395000
trusted library allocation
page read and write
10000
heap
page read and write
4FA6000
trusted library allocation
page read and write
17D000
trusted library allocation
page execute and read and write
1DD0000
trusted library section
page readonly
6C7B000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
659F000
trusted library allocation
page read and write
2694000
trusted library allocation
page read and write
6743000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
398000
trusted library allocation
page read and write
67C8000
trusted library allocation
page read and write
6797000
trusted library allocation
page read and write
395000
trusted library allocation
page read and write
D4E000
stack
page read and write
5F0000
heap
page read and write
127000
trusted library allocation
page execute and read and write
690B000
trusted library allocation
page read and write
639E000
trusted library allocation
page read and write
4B0000
heap
page read and write
5490000
heap
page read and write
21BE000
stack
page read and write
477000
heap
page read and write
4F48000
trusted library allocation
page read and write
4F67000
trusted library allocation
page read and write
D11E000
stack
page read and write
170000
trusted library allocation
page read and write
270000
trusted library allocation
page read and write
7D0000
heap
page read and write
6E1A000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
395000
trusted library allocation
page read and write
2AD4000
heap
page read and write
395000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
10FE000
stack
page read and write
4FD6000
trusted library allocation
page read and write
6C81000
trusted library allocation
page read and write
395000
trusted library allocation
page read and write
395000
trusted library allocation
page read and write
1F7E000
stack
page read and write
6545000
trusted library allocation
page read and write
66B9000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
13B000
trusted library allocation
page execute and read and write
6605000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
67E7000
trusted library allocation
page read and write
678D000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
5B0000
trusted library allocation
page read and write
39F000
heap
page read and write
6C83000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
4FC2000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
680F000
trusted library allocation
page read and write
22C4000
heap
page read and write
68FC000
trusted library allocation
page read and write
74FA000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
4F4C000
trusted library allocation
page read and write
53D000
stack
page read and write
8D0000
unkown
page readonly
6C8B000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
656A000
trusted library allocation
page read and write
678A000
trusted library allocation
page read and write
39B000
heap
page read and write
3E0000
trusted library allocation
page read and write
2C7000
stack
page read and write
64F9000
trusted library allocation
page read and write
63EE000
trusted library allocation
page read and write
5180000
heap
page read and write
6B7E000
trusted library allocation
page read and write
66C7000
trusted library allocation
page read and write
6432000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
65DA000
trusted library allocation
page read and write
517E000
stack
page read and write
860000
trusted library allocation
page read and write
5E0000
trusted library allocation
page read and write
395000
trusted library allocation
page read and write
4C52000
heap
page read and write
2E0000
trusted library allocation
page execute and read and write
8CE000
stack
page read and write
668F000
trusted library allocation
page read and write
297A000
trusted library allocation
page read and write
4FA6000
trusted library allocation
page read and write
540000
trusted library allocation
page read and write
48DE000
stack
page read and write
6C00000
trusted library allocation
page read and write
3B0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
395000
trusted library allocation
page read and write
5B7000
heap
page read and write
5E90000
trusted library allocation
page read and write
4C1E000
stack
page read and write
62A7000
trusted library allocation
page read and write
63B2000
trusted library allocation
page read and write
280000
trusted library allocation
page execute and read and write
5C0000
trusted library allocation
page read and write
18A000
trusted library allocation
page execute and read and write
6515000
trusted library allocation
page read and write
2951000
trusted library allocation
page read and write
67CE000
trusted library allocation
page read and write
3C0000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
7EF40000
trusted library allocation
page execute and read and write
390000
trusted library allocation
page read and write
22E2000
heap
page read and write
54D0000
trusted library allocation
page read and write
19B000
trusted library allocation
page execute and read and write
65D0000
trusted library allocation
page read and write
6654000
trusted library allocation
page read and write
6BD4000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
6C3A000
trusted library allocation
page read and write
5B0000
heap
page read and write
3A0000
trusted library allocation
page read and write
6251000
trusted library allocation
page read and write
65A3000
trusted library allocation
page read and write
6817000
trusted library allocation
page read and write
682B000
trusted library allocation
page read and write
6DF5000
trusted library allocation
page read and write
395000
trusted library allocation
page read and write
29AF000
stack
page read and write
109E000
stack
page read and write
395000
trusted library allocation
page read and write
620000
heap
page read and write
601E000
stack
page read and write
390000
trusted library allocation
page read and write
5F7000
heap
page read and write
540000
trusted library allocation
page read and write
6574000
trusted library allocation
page read and write
6402000
trusted library allocation
page read and write
5E8F000
stack
page read and write
4F48000
trusted library allocation
page read and write
384000
heap
page read and write
1DD4000
trusted library section
page readonly
21C0000
heap
page execute and read and write
76EA000
trusted library allocation
page read and write
742E000
trusted library allocation
page read and write
There are 548 hidden memdumps, click here to show them.