IOC Report
Orden de compra 0001-00255454.xlam.xlsx

loading gif

Files

File Path
Type
Category
Malicious
Orden de compra 0001-00255454.xlam.xlsx
Microsoft Excel 2007+
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\T76434567000[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\directory\name.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
data
dropped
malicious
C:\Users\user\AppData\Roaming\negrett.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\T76434567000[1].htm
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\atule
ASCII text, with very long lines (29744), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\aut187.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut1C6.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut3C55.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut3C94.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut761A.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut77DF.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nonhazardousness
data
dropped
C:\Users\user\AppData\Local\Temp\~$imgs.xlsx
data
dropped
C:\Users\user\Desktop\~$Orden de compra 0001-00255454.xlam.xls
data
dropped
C:\Users\user\Desktop\~$Orden de compra 0001-00255454.xlam.xlsx
data
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Users\user\AppData\Roaming\negrett.exe
C:\Users\user\AppData\Roaming\negrett.exe
malicious
C:\Users\user\AppData\Local\directory\name.exe
C:\Users\user\AppData\Roaming\negrett.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
C:\Users\user\AppData\Roaming\negrett.exe
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious

URLs

Name
IP
Malicious
http://baitalasma.com/T76434567000.exe
38.242.255.115
malicious
https://baitalasma.com/T76434567000.exe
38.242.255.115
malicious
http://crl.entrust.net/server1.crl0
unknown
http://ocsp.entrust.net03
unknown
https://baitalasma.com/T7643
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
http://checkip.dyndns.org
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
https://reallyfreegeoip.org/xml/81.181.54.1044
unknown
https://reallyfreegeoip.org/xml/81.181.54.104
172.67.177.134
http://checkip.dyndns.org/
158.101.44.242
https://baitalasma.com/T76434567000.exeate
unknown
https://baitalasma.com/T76434567000.exe~x
unknown
http://checkip.dyndns.org/q
unknown
https://scratchdreams.tk
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org
unknown
https://scratchdreams.tk/_send_.php?TS
unknown
http://checkip.dyndns.com
unknown
http://baitalasma.com/T76434567000.exej
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.comodo.com/CPS0
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://baitalasma.com/T76434567000.exeqqC:
unknown
https://baitalasma.com/
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 18 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
baitalasma.com
38.242.255.115
malicious
reallyfreegeoip.org
172.67.177.134
checkip.dyndns.com
158.101.44.242
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
38.242.255.115
baitalasma.com
United States
malicious
104.21.67.152
unknown
United States
158.101.44.242
checkip.dyndns.com
United States
172.67.177.134
reallyfreegeoip.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
tu#
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
&z#
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 23 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
system
page execute and read and write
malicious
7D0000
direct allocation
page read and write
malicious
665000
heap
page read and write
malicious
259A000
trusted library allocation
page read and write
malicious
C30000
trusted library section
page read and write
malicious
3411000
trusted library allocation
page read and write
malicious
560000
direct allocation
page read and write
malicious
2462000
trusted library allocation
page read and write
malicious
239A000
trusted library allocation
page read and write
malicious
820000
trusted library section
page read and write
malicious
24C5000
trusted library allocation
page read and write
malicious
A32000
heap
page read and write
2441000
trusted library allocation
page read and write
246D000
trusted library allocation
page read and write
5E7000
heap
page read and write
603000
heap
page read and write
2CD0000
direct allocation
page read and write
EED000
direct allocation
page read and write
592E000
stack
page read and write
3530000
heap
page read and write
61FE000
stack
page read and write
24ED000
trusted library allocation
page read and write
12AD000
direct allocation
page read and write
2367000
trusted library allocation
page read and write
EEA000
direct allocation
page read and write
2DC4000
direct allocation
page read and write
13F2000
unkown
page readonly
2CD0000
direct allocation
page read and write
A60000
trusted library allocation
page read and write
7A8F000
stack
page read and write
5A4000
heap
page read and write
2E30000
direct allocation
page read and write
2B60000
direct allocation
page read and write
2556000
trusted library allocation
page read and write
2DC1000
direct allocation
page read and write
9E8000
heap
page read and write
13CC000
unkown
page readonly
2C67000
direct allocation
page read and write
2C64000
direct allocation
page read and write
552E000
stack
page read and write
6EF000
stack
page read and write
1002000
heap
page read and write
24C1000
trusted library allocation
page read and write
2ACB000
heap
page read and write
2596000
trusted library allocation
page read and write
A6B000
heap
page read and write
3C20000
trusted library allocation
page read and write
4F80000
heap
page read and write
11D0000
direct allocation
page read and write
53F000
heap
page read and write
10C4000
unkown
page readonly
160000
trusted library allocation
page read and write
464E000
stack
page read and write
3F0000
heap
page read and write
55AE000
stack
page read and write
2C50000
direct allocation
page read and write
2471000
trusted library allocation
page read and write
BD2000
unkown
page readonly
270000
trusted library allocation
page read and write
2DC1000
direct allocation
page read and write
8AA000
heap
page read and write
2630000
heap
page read and write
2CC0000
direct allocation
page read and write
3C20000
trusted library allocation
page read and write
3C6000
heap
page read and write
13FC000
unkown
page read and write
2B70000
direct allocation
page read and write
81C000
heap
page read and write
2B70000
direct allocation
page read and write
19A000
trusted library allocation
page execute and read and write
2E30000
direct allocation
page read and write
5AC000
heap
page read and write
4E30000
heap
page read and write
73BD000
heap
page read and write
170000
trusted library allocation
page read and write
3A1000
heap
page read and write
382000
heap
page read and write
2DB0000
direct allocation
page read and write
5C8000
heap
page read and write
640000
heap
page read and write
81A000
heap
page read and write
44EE000
stack
page read and write
2C64000
direct allocation
page read and write
B5E000
stack
page read and write
610000
heap
page read and write
1E2F000
stack
page read and write
EEA000
direct allocation
page read and write
7B1E000
stack
page read and write
2DD0000
direct allocation
page read and write
3A1000
heap
page read and write
2428000
trusted library allocation
page read and write
51F000
stack
page read and write
2371000
trusted library allocation
page read and write
4E8D000
heap
page read and write
2460000
trusted library allocation
page read and write
3A1000
heap
page read and write
8F6000
heap
page read and write
2C61000
direct allocation
page read and write
7DE0000
heap
page read and write
5B7000
heap
page read and write
352F000
stack
page read and write
390000
trusted library allocation
page execute and read and write
25F7000
trusted library allocation
page read and write
5EAE000
stack
page read and write
2430000
trusted library allocation
page read and write
DFD000
heap
page read and write
B94000
heap
page read and write
2373000
trusted library allocation
page read and write
DCE000
stack
page read and write
57DE000
stack
page read and write
2B70000
direct allocation
page read and write
C71000
heap
page read and write
2C50000
direct allocation
page read and write
2356000
trusted library allocation
page read and write
BE0000
unkown
page write copy
235C000
trusted library allocation
page read and write
358000
heap
page read and write
860000
heap
page read and write
51A000
heap
page read and write
270000
trusted library allocation
page read and write
E8C000
heap
page read and write
750000
trusted library allocation
page execute and read and write
2C61000
direct allocation
page read and write
580000
heap
page read and write
DD4000
heap
page read and write
510000
heap
page read and write
29D2000
heap
page read and write
361000
heap
page read and write
20000
heap
page read and write
B60000
heap
page execute and read and write
2479000
trusted library allocation
page read and write
349F000
trusted library allocation
page read and write
D20000
trusted library allocation
page execute and read and write
5B7000
heap
page read and write
2360000
trusted library allocation
page read and write
2507000
trusted library allocation
page read and write
12AA000
direct allocation
page read and write
2CC0000
direct allocation
page read and write
2447000
trusted library allocation
page read and write
B11000
unkown
page execute read
1FDF000
stack
page read and write
3A9000
heap
page read and write
2521000
trusted library allocation
page read and write
6C0000
heap
page read and write
3C20000
trusted library allocation
page read and write
514D000
stack
page read and write
180000
trusted library allocation
page read and write
62A000
heap
page read and write
380000
trusted library allocation
page read and write
2CD0000
direct allocation
page read and write
3C20000
trusted library allocation
page read and write
840000
heap
page read and write
498E000
stack
page read and write
67F000
stack
page read and write
3379000
trusted library allocation
page read and write
A10000
heap
page read and write
EEA000
direct allocation
page read and write
7EC0000
heap
page read and write
1013000
heap
page read and write
4CD000
stack
page read and write
236E000
stack
page read and write
606000
heap
page read and write
381000
heap
page read and write
243B000
trusted library allocation
page read and write
542D000
stack
page read and write
5BD000
heap
page read and write
73A0000
heap
page read and write
2DC4000
direct allocation
page read and write
5B1E000
stack
page read and write
24CF000
stack
page read and write
2DC4000
direct allocation
page read and write
2542000
trusted library allocation
page read and write
AC4000
heap
page read and write
6CC000
stack
page read and write
12AD000
direct allocation
page read and write
BAC000
unkown
page readonly
E8B000
heap
page read and write
361000
heap
page read and write
6AF000
stack
page read and write
DB6000
heap
page read and write
12AA000
direct allocation
page read and write
82A000
heap
page read and write
798F000
stack
page read and write
2CD0000
direct allocation
page read and write
180000
direct allocation
page read and write
F80000
heap
page read and write
140000
trusted library section
page read and write
12AD000
direct allocation
page read and write
B20000
trusted library allocation
page execute and read and write
3C20000
trusted library allocation
page read and write
396000
trusted library allocation
page execute and read and write
2310000
trusted library allocation
page read and write
739D000
stack
page read and write
AEB000
heap
page read and write
442D000
heap
page read and write
2DB0000
direct allocation
page read and write
2417000
trusted library allocation
page read and write
600E000
stack
page read and write
550E000
stack
page read and write
75CE000
stack
page read and write
A21000
heap
page read and write
51BE000
stack
page read and write
10E2000
heap
page read and write
436000
heap
page read and write
4F7E000
stack
page read and write
885000
heap
page read and write
1404000
unkown
page readonly
52AE000
stack
page read and write
11D0000
direct allocation
page read and write
2DD0000
direct allocation
page read and write
6C0000
heap
page read and write
4390000
heap
page read and write
2E30000
direct allocation
page read and write
10C0000
heap
page read and write
7B20000
remote allocation
page read and write
2502000
heap
page read and write
2A6E000
stack
page read and write
38B000
heap
page read and write
26C0000
heap
page read and write
1012000
heap
page read and write
2AC4000
heap
page read and write
AA000
stack
page read and write
2354000
trusted library allocation
page read and write
5B20000
heap
page read and write
C70000
heap
page read and write
2DB0000
direct allocation
page read and write
10BC000
unkown
page read and write
4FFE000
stack
page read and write
43B000
system
page execute and read and write
2C61000
direct allocation
page read and write
280000
trusted library allocation
page read and write
7B60000
heap
page read and write
12AD000
direct allocation
page read and write
794C000
stack
page read and write
FF1000
unkown
page execute read
2C61000
direct allocation
page read and write
392F000
stack
page read and write
25F3000
trusted library allocation
page read and write
10B2000
unkown
page readonly
606000
heap
page read and write
39A000
trusted library allocation
page execute and read and write
108C000
unkown
page readonly
5C6E000
stack
page read and write
7C6F000
stack
page read and write
2C70000
direct allocation
page read and write
2B60000
direct allocation
page read and write
2DD0000
direct allocation
page read and write
12AA000
direct allocation
page read and write
FF0000
unkown
page readonly
4360000
trusted library allocation
page read and write
3C20000
trusted library allocation
page read and write
13CC000
unkown
page readonly
1A5000
trusted library allocation
page execute and read and write
24E0000
heap
page read and write
2CC0000
direct allocation
page read and write
2434000
trusted library allocation
page read and write
2CC0000
direct allocation
page read and write
110000
heap
page read and write
392000
trusted library allocation
page read and write
608000
heap
page read and write
2DC1000
direct allocation
page read and write
7F4000
heap
page read and write
3DF000
stack
page read and write
90F000
heap
page read and write
922000
heap
page read and write
11D0000
direct allocation
page read and write
865000
heap
page read and write
2C64000
direct allocation
page read and write
FF0000
unkown
page readonly
2433000
trusted library allocation
page read and write
233F000
stack
page read and write
2C64000
direct allocation
page read and write
2400000
heap
page read and write
3A9000
heap
page read and write
3D0000
trusted library allocation
page execute and read and write
27A000
stack
page read and write
10000
heap
page read and write
2480000
heap
page read and write
6BF000
stack
page read and write
DB7000
heap
page read and write
AB5000
heap
page read and write
10000
heap
page read and write
1EA000
stack
page read and write
2C70000
direct allocation
page read and write
2C70000
direct allocation
page read and write
7D80000
heap
page read and write
3C20000
trusted library allocation
page read and write
235000
stack
page read and write
26C4000
heap
page read and write
2424000
trusted library allocation
page read and write
8CA000
heap
page read and write
17D000
trusted library allocation
page execute and read and write
57F000
heap
page read and write
4F80000
heap
page read and write
10C4000
heap
page read and write
3F7000
heap
page read and write
390000
trusted library allocation
page read and write
7EDB000
heap
page read and write
2CD0000
direct allocation
page read and write
1A7000
trusted library allocation
page execute and read and write
11D0000
direct allocation
page read and write
7E6000
heap
page read and write
3A1000
heap
page read and write
A77000
trusted library allocation
page read and write
241C000
trusted library allocation
page read and write
7DC0000
heap
page read and write
2C67000
direct allocation
page read and write
2C67000
direct allocation
page read and write
557000
heap
page read and write
A32000
heap
page read and write
2634000
heap
page read and write
10C4000
unkown
page readonly
3C20000
trusted library allocation
page read and write
2B60000
direct allocation
page read and write
590E000
stack
page read and write
2436000
trusted library allocation
page read and write
3C20000
trusted library allocation
page read and write
A6B000
heap
page read and write
A94000
heap
page read and write
578E000
stack
page read and write
2592000
trusted library allocation
page read and write
2352000
trusted library allocation
page read and write
C82000
heap
page read and write
81B000
heap
page read and write
A31000
heap
page read and write
EAB000
heap
page read and write
EED000
direct allocation
page read and write
2528000
trusted library allocation
page read and write
3A2000
trusted library allocation
page read and write
5A97000
heap
page read and write
18A000
stack
page read and write
235E000
trusted library allocation
page read and write
251B000
trusted library allocation
page read and write
AE0000
heap
page read and write
38B000
heap
page read and write
2B70000
direct allocation
page read and write
10BC000
unkown
page write copy
C61000
heap
page read and write
436F000
trusted library allocation
page read and write
241F000
trusted library allocation
page read and write
383000
heap
page read and write
AB2000
heap
page read and write
29B0000
heap
page read and write
A90000
heap
page read and write
260000
trusted library allocation
page read and write
578E000
stack
page read and write
243D000
trusted library allocation
page read and write
2504000
trusted library allocation
page read and write
381000
heap
page read and write
80C000
heap
page read and write
2CD0000
direct allocation
page read and write
274000
trusted library allocation
page read and write
273000
trusted library allocation
page execute and read and write
4E7E000
stack
page read and write
3C20000
trusted library allocation
page read and write
760C000
stack
page read and write
5C4000
heap
page read and write
AEA000
heap
page read and write
1013000
heap
page read and write
361000
heap
page read and write
2C67000
direct allocation
page read and write
597000
heap
page read and write
E2E000
stack
page read and write | page guard
378000
stack
page read and write
260A000
trusted library allocation
page read and write
BDC000
unkown
page read and write
2DC7000
direct allocation
page read and write
5872000
heap
page read and write
2532000
trusted library allocation
page read and write
242C000
trusted library allocation
page read and write
9B5000
heap
page read and write
3C20000
trusted library allocation
page read and write
E10000
direct allocation
page read and write
B0A000
heap
page read and write
7DE1000
heap
page read and write
E0B000
heap
page read and write
BDC000
unkown
page write copy
BA0000
trusted library allocation
page execute and read and write
10C0000
unkown
page write copy
361000
heap
page read and write
1F0000
heap
page read and write
A21000
heap
page read and write
E0B000
heap
page read and write
2DC4000
direct allocation
page read and write
3C20000
trusted library allocation
page read and write
24FB000
trusted library allocation
page read and write
244E000
trusted library allocation
page read and write
E10000
direct allocation
page read and write
10000
heap
page read and write
AA0000
heap
page execute and read and write
A5C000
heap
page read and write
5A3E000
stack
page read and write
81C000
heap
page read and write
27000
heap
page read and write
7ACF000
stack
page read and write
C70000
heap
page read and write
69C000
stack
page read and write
55D0000
heap
page read and write
41F000
system
page execute and read and write
C2E000
stack
page read and write
13F2000
unkown
page readonly
10000
heap
page read and write
82B000
heap
page read and write
2C64000
direct allocation
page read and write
7550000
heap
page read and write
3AB000
trusted library allocation
page execute and read and write
2C61000
direct allocation
page read and write
EEA000
direct allocation
page read and write
400000
heap
page read and write
24EA000
trusted library allocation
page read and write
2546000
trusted library allocation
page read and write
1E70000
heap
page read and write
2CD0000
direct allocation
page read and write
2DC4000
direct allocation
page read and write
13FC000
unkown
page write copy
2422000
trusted library allocation
page read and write
DB0000
heap
page read and write
5D1E000
stack
page read and write
5B3B000
heap
page read and write
7D7000
heap
page read and write
4FF000
stack
page read and write
2DD0000
direct allocation
page read and write
767000
heap
page read and write
3C20000
trusted library allocation
page read and write
E0C000
heap
page read and write
EEA000
direct allocation
page read and write
140000
heap
page read and write
2C70000
direct allocation
page read and write
2B70000
direct allocation
page read and write
BC0000
heap
page read and write
573E000
stack
page read and write | page guard
7610000
heap
page read and write
50C000
stack
page read and write
3C20000
trusted library allocation
page read and write
C81000
heap
page read and write
A5C000
heap
page read and write
2464000
trusted library allocation
page read and write
2CD0000
direct allocation
page read and write
52EE000
stack
page read and write
422000
system
page execute and read and write
B90000
heap
page read and write
B30000
heap
page execute and read and write
2DC1000
direct allocation
page read and write
2CD0000
direct allocation
page read and write
2AC8000
heap
page read and write
8B5000
heap
page read and write
FF1000
unkown
page execute read
3C8000
heap
page read and write
1190000
heap
page read and write
2DC7000
direct allocation
page read and write
820000
direct allocation
page read and write
526E000
stack
page read and write
BD2000
unkown
page readonly
2CD0000
direct allocation
page read and write
3C20000
trusted library allocation
page read and write
558E000
stack
page read and write
190000
trusted library allocation
page read and write
2C64000
direct allocation
page read and write
EED000
direct allocation
page read and write
287000
trusted library allocation
page read and write
3341000
trusted library allocation
page read and write
12AD000
direct allocation
page read and write
2E30000
direct allocation
page read and write
1330000
unkown
page readonly
3E9E000
direct allocation
page read and write
5A58000
heap
page read and write
B10000
unkown
page readonly
174000
trusted library allocation
page read and write
1DE5000
heap
page read and write
3A0000
heap
page read and write
4510000
heap
page read and write
EED000
direct allocation
page read and write
387000
stack
page read and write
B11000
unkown
page execute read
2DC7000
direct allocation
page read and write
573000
heap
page read and write
2DC1000
direct allocation
page read and write
11E000
heap
page read and write
401E000
stack
page read and write
237E000
trusted library allocation
page read and write
583E000
stack
page read and write
10000
heap
page read and write
2341000
trusted library allocation
page read and write
5C4000
heap
page read and write
DFD000
heap
page read and write
57CE000
stack
page read and write
504E000
stack
page read and write
4AC0000
heap
page execute and read and write
2398000
trusted library allocation
page read and write
5A79000
heap
page read and write
196000
trusted library allocation
page execute and read and write
760000
heap
page read and write
173000
trusted library allocation
page execute and read and write
34F000
heap
page read and write
2613000
trusted library allocation
page read and write
1E0000
heap
page read and write
3C8000
heap
page read and write
2C61000
direct allocation
page read and write
A80000
trusted library allocation
page execute and read and write
253E000
trusted library allocation
page read and write
2CD0000
direct allocation
page read and write
25D6000
trusted library allocation
page read and write
1D0000
trusted library allocation
page execute and read and write
55E2000
heap
page read and write
2C50000
direct allocation
page read and write
242A000
trusted library allocation
page read and write
2504000
trusted library allocation
page read and write
567F000
stack
page read and write
11D0000
direct allocation
page read and write
11C000
heap
page read and write
575000
heap
page read and write
190000
direct allocation
page execute and read and write
10B2000
unkown
page readonly
3E0000
trusted library allocation
page read and write
276F000
stack
page read and write
1015000
heap
page read and write
2E30000
direct allocation
page read and write
7ECD000
heap
page read and write
2DD0000
direct allocation
page read and write
236B000
trusted library allocation
page read and write
6210000
heap
page read and write
237B000
trusted library allocation
page read and write
1404000
unkown
page readonly
349E000
direct allocation
page read and write
2C70000
direct allocation
page read and write
2DD0000
direct allocation
page read and write
DFD000
heap
page read and write
1AB000
trusted library allocation
page execute and read and write
230000
trusted library section
page read and write
244B000
trusted library allocation
page read and write
A90000
trusted library allocation
page read and write
5C7000
heap
page read and write
38B000
heap
page read and write
2526000
trusted library allocation
page read and write
573F000
stack
page read and write
EED000
direct allocation
page read and write
1E1B000
heap
page read and write
4E2E000
stack
page read and write
260000
trusted library allocation
page read and write
4E38000
heap
page read and write
575000
heap
page read and write
2443000
trusted library allocation
page read and write
E56000
heap
page read and write
38B000
heap
page read and write
2DC7000
direct allocation
page read and write
4518000
heap
page read and write
C71000
heap
page read and write
27D000
trusted library allocation
page execute and read and write
35C000
heap
page read and write
4410000
heap
page read and write
12AA000
direct allocation
page read and write
DED000
heap
page read and write
2CC0000
direct allocation
page read and write
236D000
trusted library allocation
page read and write
33AF000
trusted library allocation
page read and write
2CC0000
direct allocation
page read and write
2475000
trusted library allocation
page read and write
10000
heap
page read and write
33E000
heap
page read and write
28D000
trusted library allocation
page execute and read and write
7D6F000
stack
page read and write
1DE0000
heap
page read and write
2426000
trusted library allocation
page read and write
1FC0000
heap
page read and write
BE4000
unkown
page readonly
235A000
trusted library allocation
page read and write
C82000
heap
page read and write
875000
heap
page read and write
2411000
trusted library allocation
page read and write
60F000
heap
page read and write
DB0000
heap
page read and write
2458000
trusted library allocation
page read and write
2424000
trusted library allocation
page read and write
114000
heap
page read and write
24F2000
trusted library allocation
page read and write
C61000
heap
page read and write
E65000
heap
page read and write
BE4000
unkown
page readonly
1331000
unkown
page execute read
33CF000
trusted library allocation
page read and write
5B0000
heap
page read and write
43C000
system
page execute and read and write
426000
system
page execute and read and write
2C70000
direct allocation
page read and write
386000
heap
page read and write
23B000
stack
page read and write
2E30000
direct allocation
page read and write
242E000
trusted library allocation
page read and write
8AB000
heap
page read and write
2392000
trusted library allocation
page read and write
29D0000
direct allocation
page read and write
3D6F000
stack
page read and write
110000
direct allocation
page execute and read and write
60D000
stack
page read and write
784E000
stack
page read and write
1002000
heap
page read and write
3A5000
trusted library allocation
page execute and read and write
2390000
trusted library allocation
page read and write
3C8000
heap
page read and write
E75000
heap
page read and write
510E000
stack
page read and write
E10000
direct allocation
page read and write
A5C000
heap
page read and write
3A9000
heap
page read and write
867000
heap
page read and write
6BF000
stack
page read and write
A17000
heap
page read and write
2DC7000
direct allocation
page read and write
24F5000
trusted library allocation
page read and write
EED000
direct allocation
page read and write
C82000
heap
page read and write
938000
heap
page read and write
1A2000
trusted library allocation
page read and write
532E000
stack
page read and write
4E70000
heap
page read and write
5A40000
heap
page read and write
A4C000
heap
page read and write
29B4000
heap
page read and write
18D000
trusted library allocation
page execute and read and write
A70000
trusted library allocation
page read and write
7500000
heap
page read and write
7B20000
remote allocation
page read and write
8A7000
heap
page read and write
2CD0000
direct allocation
page read and write
2B60000
direct allocation
page read and write
5860000
heap
page read and write
3C20000
trusted library allocation
page read and write
E46000
heap
page read and write
6DF000
stack
page read and write
1330000
unkown
page readonly
7E0000
heap
page read and write
D40000
heap
page execute and read and write
2DC4000
direct allocation
page read and write
60F0000
heap
page read and write
24E4000
heap
page read and write
B10000
unkown
page readonly
7D0000
heap
page read and write
81C000
heap
page read and write
3A9000
heap
page read and write
550000
direct allocation
page execute and read and write
C82000
heap
page read and write
3C8000
heap
page read and write
11D0000
direct allocation
page read and write
2377000
trusted library allocation
page read and write
E10000
direct allocation
page read and write
68F000
stack
page read and write
2DB0000
direct allocation
page read and write
3C6000
heap
page read and write
2AAE000
stack
page read and write
5F1F000
stack
page read and write
436C000
trusted library allocation
page read and write
564E000
stack
page read and write
52F000
stack
page read and write
2DC7000
direct allocation
page read and write
2C50000
direct allocation
page read and write
307000
heap
page read and write
4DEE000
stack
page read and write
2AC0000
heap
page read and write
514E000
stack
page read and write
BB0000
trusted library allocation
page read and write
2534000
trusted library allocation
page read and write
2611000
trusted library allocation
page read and write
4ABF000
stack
page read and write
253F000
trusted library allocation
page read and write
C71000
heap
page read and write
894000
heap
page read and write
E2F000
stack
page read and write
2C50000
direct allocation
page read and write
3C6000
heap
page read and write
34A000
heap
page read and write
2B60000
direct allocation
page read and write
2DB0000
direct allocation
page read and write
517000
heap
page read and write
2C50000
direct allocation
page read and write
2365000
trusted library allocation
page read and write
2660000
heap
page read and write
10000
heap
page read and write
2435000
trusted library allocation
page read and write
57F000
heap
page read and write
884000
heap
page read and write
89000
stack
page read and write
4A8F000
stack
page read and write
50E000
stack
page read and write
2DC1000
direct allocation
page read and write
240000
heap
page read and write
24B6000
heap
page read and write
BAC000
unkown
page readonly
3A7000
trusted library allocation
page execute and read and write
816000
heap
page read and write
CA0000
heap
page execute and read and write
1C0000
heap
page read and write
108C000
unkown
page readonly
C71000
heap
page read and write
2C67000
direct allocation
page read and write
5CAE000
stack
page read and write
73DF000
heap
page read and write
609E000
stack
page read and write
606000
heap
page read and write
25EC000
trusted library allocation
page read and write
1400000
unkown
page write copy
61D000
heap
page read and write
26E2000
heap
page read and write
E10000
direct allocation
page read and write
2C67000
direct allocation
page read and write
2358000
trusted library allocation
page read and write
5AC000
heap
page read and write
1012000
heap
page read and write
2484000
trusted library allocation
page read and write
2DB0000
direct allocation
page read and write
2A91000
direct allocation
page read and write
254A000
trusted library allocation
page read and write
EEA000
direct allocation
page read and write
5590000
heap
page read and write
550000
heap
page read and write
2B60000
direct allocation
page read and write
534000
heap
page read and write
23CD000
stack
page read and write
192000
trusted library allocation
page read and write
13A000
stack
page read and write
3C20000
trusted library allocation
page read and write
73CF000
heap
page read and write
AA5000
heap
page read and write
810000
heap
page read and write
2363000
trusted library allocation
page read and write
497E000
stack
page read and write
3C20000
trusted library allocation
page read and write
3C1D000
stack
page read and write
2539000
trusted library allocation
page read and write
3C8000
heap
page read and write
8E0000
heap
page read and write
234C000
trusted library allocation
page read and write
E10000
direct allocation
page read and write
BB2000
heap
page read and write
82A000
heap
page read and write
2B70000
direct allocation
page read and write
573000
heap
page read and write
A34000
heap
page read and write
2604000
trusted library allocation
page read and write
1F7F000
stack
page read and write
6AF000
stack
page read and write
E0D000
stack
page read and write
9A000
stack
page read and write
2417000
trusted library allocation
page read and write
2347000
trusted library allocation
page read and write
A31000
heap
page read and write
4E1E000
stack
page read and write
61AF000
stack
page read and write
300000
heap
page read and write
1FD0000
direct allocation
page read and write
12AA000
direct allocation
page read and write
2437000
trusted library allocation
page read and write
4EF000
stack
page read and write
2A9E000
direct allocation
page read and write
381000
heap
page read and write
240000
heap
page read and write
241C000
trusted library allocation
page read and write
3C6000
heap
page read and write
1331000
unkown
page execute read
2542000
trusted library allocation
page read and write
73E4000
heap
page read and write
3545000
heap
page read and write
There are 751 hidden memdumps, click here to show them.