IOC Report
Supplier Order Scan 0001293039493.exe

loading gif

Files

File Path
Type
Category
Malicious
Supplier Order Scan 0001293039493.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\directory\name.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Aaberg
ASCII text, with very long lines (29744), with no line terminators
modified
C:\Users\user\AppData\Local\Temp\aut17A9.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut17F8.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autAD8.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autBB4.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autC785.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autC7D5.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autE1B3.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autE212.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autF7FC.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autF85A.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\camellin
data
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Supplier Order Scan 0001293039493.exe
"C:\Users\user\Desktop\Supplier Order Scan 0001293039493.exe"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\Desktop\Supplier Order Scan 0001293039493.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\Supplier Order Scan 0001293039493.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.13.205
https://api.telegram.org/bot6598056807:AAEJNVpW5jLTQx4-KLaAAUiX0mRFbdRCujw/sendDocument
149.154.167.220
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
https://api.telegram.org
unknown
https://api.ipify.org/t
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://api.telegram.org/bot6598056807:AAEJNVpW5jLTQx4-KLaAAUiX0mRFbdRCujw/
unknown

Domains

Name
IP
Malicious
api.ipify.org
104.26.13.205
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2E2B000
trusted library allocation
page read and write
malicious
304F000
trusted library allocation
page read and write
malicious
2E1F000
trusted library allocation
page read and write
malicious
3470000
direct allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
2DF4000
trusted library allocation
page read and write
malicious
3024000
trusted library allocation
page read and write
malicious
5360000
trusted library section
page read and write
malicious
3B20000
direct allocation
page read and write
malicious
2250000
direct allocation
page read and write
malicious
3DA1000
trusted library allocation
page read and write
malicious
305B000
trusted library allocation
page read and write
malicious
52E0000
trusted library section
page read and write
malicious
F00000
direct allocation
page read and write
malicious
2970000
heap
page read and write
malicious
3D10000
direct allocation
page read and write
2CBC000
stack
page read and write
2E1D000
trusted library allocation
page read and write
2B7E000
trusted library allocation
page read and write
7BF000
stack
page read and write
3EFE000
direct allocation
page read and write
1063000
unkown
page write copy
46AE000
direct allocation
page read and write
3049000
trusted library allocation
page read and write
5F02000
heap
page read and write
569E000
trusted library allocation
page read and write
E54000
heap
page read and write
15A1000
heap
page read and write
DB3000
heap
page read and write
15E2000
heap
page read and write
6760000
trusted library allocation
page read and write
1A29000
heap
page read and write
4074000
trusted library allocation
page read and write
22A0000
heap
page read and write
219F000
stack
page read and write
19ED000
heap
page read and write
55FD000
trusted library allocation
page read and write
3E51000
trusted library allocation
page read and write
4639000
direct allocation
page read and write
4370000
direct allocation
page read and write
E0D000
heap
page read and write
3E39000
direct allocation
page read and write
116B000
heap
page read and write
56B0000
heap
page read and write
3BCD000
direct allocation
page read and write
4370000
direct allocation
page read and write
3CE3000
direct allocation
page read and write
2FE0000
trusted library allocation
page read and write
119A000
heap
page read and write
3B70000
direct allocation
page read and write
FA1000
unkown
page execute read
15CD000
heap
page read and write
11C1000
heap
page read and write
6900000
trusted library allocation
page read and write
B3F000
unkown
page write copy
11C1000
heap
page read and write
1044000
trusted library allocation
page read and write
2ADC000
stack
page read and write
CF0000
heap
page read and write
4510000
direct allocation
page read and write
5460000
heap
page execute and read and write
1276000
heap
page read and write
105F000
unkown
page write copy
463D000
direct allocation
page read and write
1ADB000
heap
page read and write
2E3C000
trusted library allocation
page read and write
3993000
direct allocation
page read and write
6EBE000
stack
page read and write
19A8000
heap
page read and write
2F80000
trusted library allocation
page read and write
15A1000
heap
page read and write
FA0000
unkown
page readonly
4510000
direct allocation
page read and write
FA0000
unkown
page readonly
6E0F000
heap
page read and write
122C000
heap
page read and write
40D1000
trusted library allocation
page read and write
697E000
unkown
page read and write
5602000
trusted library allocation
page read and write
FED000
heap
page read and write
2AF0000
trusted library allocation
page read and write
4370000
direct allocation
page read and write
D6E000
stack
page read and write
BDB000
stack
page read and write
3E89000
direct allocation
page read and write
F50000
heap
page read and write
11AF000
heap
page read and write
FA0000
unkown
page readonly
69DD000
stack
page read and write
6930000
trusted library allocation
page execute and read and write
ED5000
heap
page read and write
6AD0000
trusted library allocation
page execute and read and write
17CF000
stack
page read and write
11B2000
heap
page read and write
E0F000
heap
page read and write
6750000
trusted library allocation
page read and write
1068000
unkown
page readonly
5AF4000
heap
page read and write
1FC43ACA000
heap
page read and write
1080000
heap
page read and write
6764000
trusted library allocation
page read and write
4639000
direct allocation
page read and write
EF8000
stack
page read and write
11AE000
heap
page read and write
1193000
heap
page read and write
446000
system
page execute and read and write
19D3000
heap
page read and write
E11000
heap
page read and write
2CC6000
heap
page read and write
B0F000
unkown
page readonly
2AE0000
trusted library allocation
page execute and read and write
5FBC000
heap
page read and write
1588000
heap
page read and write
1269000
heap
page read and write
148F000
stack
page read and write
E7C000
heap
page read and write
1A19000
heap
page read and write
DC0000
heap
page read and write
FA1000
unkown
page execute read
306C000
trusted library allocation
page read and write
3520000
heap
page read and write
810000
heap
page read and write
3AA0000
direct allocation
page read and write
3870000
direct allocation
page read and write
3E8D000
direct allocation
page read and write
2B70000
trusted library allocation
page read and write
1299000
heap
page read and write
3BC0000
direct allocation
page read and write
3EAE000
direct allocation
page read and write
3A10000
direct allocation
page read and write
53D0000
heap
page read and write
3D10000
direct allocation
page read and write
EF0000
direct allocation
page execute and read and write
304D000
trusted library allocation
page read and write
68E0000
trusted library allocation
page execute and read and write
6B1E000
unkown
page read and write
1FC43A93000
heap
page read and write
11C1000
heap
page read and write
11C1000
heap
page read and write
10FA000
heap
page read and write
8EA000
stack
page read and write
F66000
trusted library allocation
page execute and read and write
11AC000
heap
page read and write
119A000
heap
page read and write
1275000
heap
page read and write
D10000
heap
page read and write
1068000
unkown
page readonly
2EE5000
trusted library allocation
page read and write
DCF000
heap
page read and write
116B000
heap
page read and write
3E39000
direct allocation
page read and write
64CD000
stack
page read and write
6880000
trusted library allocation
page execute and read and write
1AA000
stack
page read and write
3E68000
trusted library allocation
page read and write
3C20000
heap
page read and write
3115000
trusted library allocation
page read and write
10F0000
heap
page read and write
3E89000
direct allocation
page read and write
F80000
heap
page read and write
3A23000
direct allocation
page read and write
5454000
trusted library allocation
page read and write
A6336FF000
stack
page read and write
5E9000
stack
page read and write
3EFE000
direct allocation
page read and write
C70000
heap
page read and write
5AA000
stack
page read and write
660E000
stack
page read and write
15CD000
heap
page read and write
6790000
trusted library allocation
page read and write
4493000
direct allocation
page read and write
C60000
heap
page read and write
8F0000
heap
page read and write
3440000
direct allocation
page read and write
F7E000
stack
page read and write
3EFE000
direct allocation
page read and write
C10000
heap
page read and write
7DB000
stack
page read and write
5EC0000
heap
page read and write
1055000
unkown
page readonly
DDF000
heap
page read and write
2B20000
heap
page read and write
6770000
trusted library allocation
page read and write
1FC43950000
heap
page read and write
15A1000
heap
page read and write
6E07000
heap
page read and write
3FF5000
trusted library allocation
page read and write
BFC000
stack
page read and write
3503000
direct allocation
page read and write
11D0000
heap
page read and write
19A0000
heap
page read and write
55F6000
trusted library allocation
page read and write
1FC43BE0000
heap
page read and write
3F03000
direct allocation
page read and write
5350000
heap
page execute and read and write
111E000
heap
page read and write
6B3E000
stack
page read and write
55EE000
trusted library allocation
page read and write
560C000
stack
page read and write
1077000
trusted library allocation
page execute and read and write
4639000
direct allocation
page read and write
11DB000
heap
page read and write
15B0000
heap
page read and write
6780000
heap
page read and write
3B3D000
direct allocation
page read and write
2ED7000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
6927000
trusted library allocation
page read and write
D14000
heap
page read and write
DFF000
heap
page read and write
1FC43C05000
heap
page read and write
11C1000
heap
page read and write
3BC9000
direct allocation
page read and write
FE0000
heap
page read and write
2F70000
trusted library allocation
page execute and read and write
2B9D000
trusted library allocation
page read and write
F34000
trusted library allocation
page read and write
11EF000
heap
page read and write
46AE000
direct allocation
page read and write
102F000
unkown
page readonly
3080000
heap
page read and write
3C93000
direct allocation
page read and write
1170000
heap
page read and write
2C70000
trusted library allocation
page read and write
1A9D000
heap
page read and write
DFC000
heap
page read and write
3EAE000
direct allocation
page read and write
463D000
direct allocation
page read and write
2D9E000
stack
page read and write
1ACB000
heap
page read and write
55DB000
trusted library allocation
page read and write
6DE0000
heap
page read and write
1066000
trusted library allocation
page execute and read and write
3460000
direct allocation
page execute and read and write
616E000
stack
page read and write
57EC000
stack
page read and write
5303000
direct allocation
page read and write
5B27000
heap
page read and write
EC6000
heap
page read and write
2FD1000
trusted library allocation
page read and write
6DDF000
stack
page read and write
10C8000
heap
page read and write
8F5000
heap
page read and write
F6A000
trusted library allocation
page execute and read and write
2B96000
trusted library allocation
page read and write
125B000
heap
page read and write
ED6000
heap
page read and write
3B39000
direct allocation
page read and write
B48000
unkown
page readonly
3053000
trusted library allocation
page read and write
1068000
unkown
page readonly
1130000
heap
page read and write
2ED8000
trusted library allocation
page read and write
11E9000
heap
page read and write
14AB000
stack
page read and write
195E000
stack
page read and write
2B7B000
trusted library allocation
page read and write
6703000
direct allocation
page read and write
55DE000
trusted library allocation
page read and write
463D000
direct allocation
page read and write
F30000
trusted library allocation
page read and write
1550000
heap
page read and write
105D000
trusted library allocation
page execute and read and write
102F000
unkown
page readonly
5B60000
heap
page read and write
3E3D000
direct allocation
page read and write
2D80000
heap
page read and write
1D2E000
stack
page read and write
11C1000
heap
page read and write
E0F000
heap
page read and write
62AD000
stack
page read and write
B48000
unkown
page readonly
3BC0000
direct allocation
page read and write
DFC000
heap
page read and write
4370000
direct allocation
page read and write
2FA0000
trusted library allocation
page read and write
E7C000
heap
page read and write
1068000
unkown
page readonly
7220000
heap
page read and write
A81000
unkown
page execute read
3993000
direct allocation
page read and write
11DB000
heap
page read and write
BCE000
stack
page read and write
F30000
heap
page read and write
E0F000
heap
page read and write
5B5D000
trusted library allocation
page read and write
F77000
trusted library allocation
page execute and read and write
8EA000
stack
page read and write
118F000
heap
page read and write
F7B000
trusted library allocation
page execute and read and write
4639000
direct allocation
page read and write
DEF000
heap
page read and write
107B000
trusted library allocation
page execute and read and write
116E000
heap
page read and write
1D5E000
stack
page read and write
190E000
stack
page read and write
11EF000
heap
page read and write
9903000
direct allocation
page read and write
10FC000
heap
page read and write
125B000
heap
page read and write
402F000
stack
page read and write
1AAB000
heap
page read and write
19D6000
heap
page read and write
46AE000
direct allocation
page read and write
1055000
unkown
page readonly
105F000
unkown
page read and write
E20000
heap
page read and write
3524000
heap
page read and write
192E000
stack
page read and write
FA0000
unkown
page readonly
11F0000
heap
page read and write
7F5E0000
trusted library allocation
page execute and read and write
9E0000
heap
page read and write
4510000
direct allocation
page read and write
3C93000
direct allocation
page read and write
17FC000
stack
page read and write
30A0000
heap
page read and write
DAE000
stack
page read and write
119F000
heap
page read and write
E0F000
heap
page read and write
7103000
direct allocation
page read and write
120D000
heap
page read and write
FA0000
unkown
page readonly
1138000
heap
page read and write
DF0000
heap
page read and write
46AE000
direct allocation
page read and write
3D10000
direct allocation
page read and write
F90000
heap
page read and write
4639000
direct allocation
page read and write
105E000
heap
page read and write
1980000
heap
page read and write
1055000
unkown
page readonly
3E8D000
direct allocation
page read and write
1A2F000
heap
page read and write
3A23000
direct allocation
page read and write
19DD000
heap
page read and write
33F0000
direct allocation
page read and write
DC0000
heap
page read and write
15E3000
heap
page read and write
1FC43A38000
heap
page read and write
687E000
stack
page read and write
1068000
unkown
page readonly
D88000
heap
page read and write
C50000
heap
page read and write
7F560000
trusted library allocation
page execute and read and write
2A9E000
stack
page read and write
1A2F000
heap
page read and write
214E000
stack
page read and write
195E000
stack
page read and write
3BAE000
direct allocation
page read and write
149F000
stack
page read and write
15E2000
heap
page read and write
1075000
trusted library allocation
page execute and read and write
17BF000
stack
page read and write
55D0000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
11EF000
heap
page read and write
1A2F000
heap
page read and write
57AE000
stack
page read and write
FA0000
trusted library allocation
page read and write
1AE5000
heap
page read and write
119F000
heap
page read and write
4370000
direct allocation
page read and write
1A30000
heap
page read and write
DB2000
heap
page read and write
1055000
unkown
page readonly
4370000
direct allocation
page read and write
F20000
trusted library allocation
page read and write
1072000
trusted library allocation
page read and write
D80000
heap
page read and write
DE0000
heap
page read and write
E6A000
heap
page read and write
11EF000
heap
page read and write
1160000
heap
page read and write
1269000
heap
page read and write
F33000
trusted library allocation
page execute and read and write
58ED000
stack
page read and write
11BA000
heap
page read and write
2BA2000
trusted library allocation
page read and write
3C3E000
direct allocation
page read and write
2E23000
trusted library allocation
page read and write
3900000
direct allocation
page read and write
D40000
heap
page read and write
19ED000
heap
page read and write
A70000
heap
page read and write
68F7000
trusted library allocation
page read and write
1FC43B30000
heap
page read and write
D90000
heap
page read and write
6757000
trusted library allocation
page read and write
CA0000
heap
page read and write
106A000
trusted library allocation
page execute and read and write
ED6000
heap
page read and write
3B3D000
direct allocation
page read and write
561F000
trusted library allocation
page read and write
1ACB000
heap
page read and write
D6E000
stack
page read and write
3E39000
direct allocation
page read and write
60BE000
stack
page read and write
6904000
trusted library allocation
page read and write
11B0000
heap
page read and write
6890000
trusted library allocation
page read and write
2BC8000
trusted library allocation
page read and write
11C2000
heap
page read and write
EC6000
heap
page read and write
676E000
stack
page read and write
A633BFE000
stack
page read and write
1043000
trusted library allocation
page execute and read and write
10A0000
trusted library allocation
page read and write
15E2000
heap
page read and write
1A96000
heap
page read and write
2BB0000
heap
page read and write
1063000
unkown
page write copy
4639000
direct allocation
page read and write
30BB000
trusted library allocation
page read and write
422000
system
page execute and read and write
68FD000
trusted library allocation
page read and write
A6333FE000
stack
page read and write
138E000
stack
page read and write
2DF0000
trusted library allocation
page read and write
3C93000
direct allocation
page read and write
A81000
unkown
page execute read
5A50000
heap
page read and write
1FC43C00000
heap
page read and write
2EE9000
trusted library allocation
page read and write
4E9E000
stack
page read and write
2DEC000
trusted library allocation
page read and write
5AC4000
heap
page read and write
126A000
heap
page read and write
6920000
trusted library allocation
page read and write
11BE000
heap
page read and write
1068000
unkown
page readonly
5D03000
direct allocation
page read and write
D60000
direct allocation
page execute and read and write
15A1000
heap
page read and write
3B39000
direct allocation
page read and write
DDF000
heap
page read and write
666D000
stack
page read and write
9E8000
stack
page read and write
2DA1000
trusted library allocation
page read and write
61FC000
stack
page read and write
550C000
stack
page read and write
102F000
unkown
page readonly
2ECE000
stack
page read and write
6740000
trusted library allocation
page execute and read and write
3103000
trusted library allocation
page read and write
165B000
heap
page read and write
DD0000
heap
page read and write
626E000
stack
page read and write
1A2F000
heap
page read and write
14BF000
stack
page read and write
1063000
unkown
page write copy
DCE000
stack
page read and write
68F0000
trusted library allocation
page read and write
1180000
heap
page read and write
A80000
unkown
page readonly
1055000
unkown
page readonly
1068000
unkown
page readonly
19D2000
heap
page read and write
3E89000
direct allocation
page read and write
105F000
unkown
page read and write
19EC000
heap
page read and write
DBE000
stack
page read and write
4493000
direct allocation
page read and write
3013000
trusted library allocation
page read and write
FA0000
unkown
page readonly
BDB000
stack
page read and write
30A4000
heap
page read and write
102F000
unkown
page readonly
5B70000
trusted library allocation
page execute and read and write
11AE000
heap
page read and write
15DB000
heap
page read and write
FA1000
unkown
page execute read
3057000
trusted library allocation
page read and write
1FC43A30000
heap
page read and write
FA1000
unkown
page execute read
A6335FE000
stack
page read and write
E0F000
heap
page read and write
1055000
unkown
page readonly
5A54000
heap
page read and write
65CF000
stack
page read and write
5900000
heap
page read and write
1FC43A65000
heap
page read and write
FA1000
unkown
page execute read
2F26000
trusted library allocation
page read and write
670E000
stack
page read and write
19DD000
heap
page read and write
FA0000
unkown
page readonly
4510000
direct allocation
page read and write
1A2F000
heap
page read and write
6797000
trusted library allocation
page read and write
A633AFE000
stack
page read and write
5B50000
trusted library allocation
page read and write
4493000
direct allocation
page read and write
BCA000
stack
page read and write
E0F000
heap
page read and write
11BB000
heap
page read and write
8F03000
direct allocation
page read and write
3870000
direct allocation
page read and write
7CF000
stack
page read and write
7B03000
direct allocation
page read and write
2DE3000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
58EC000
stack
page read and write
F43000
trusted library allocation
page read and write
105F000
unkown
page read and write
1180000
heap
page read and write
DDF000
heap
page read and write
11EF000
heap
page read and write
52DE000
stack
page read and write
3D60000
direct allocation
page read and write
119F000
heap
page read and write
6AB0000
heap
page read and write
2CF0000
heap
page read and write
14CC000
stack
page read and write
1000000
heap
page read and write
980000
heap
page read and write
1163000
heap
page read and write
1FC43C0E000
heap
page read and write
4510000
direct allocation
page read and write
1180000
heap
page read and write
99D000
stack
page read and write
3E3D000
direct allocation
page read and write
4510000
direct allocation
page read and write
11EF000
heap
page read and write
7000000
heap
page read and write
5B13000
heap
page read and write
46AE000
direct allocation
page read and write
2CC0000
heap
page read and write
A80000
unkown
page readonly
1A2F000
heap
page read and write
6C1F000
stack
page read and write
DBA000
heap
page read and write
123C000
heap
page read and write
6C9E000
stack
page read and write
DBA000
heap
page read and write
E0F000
heap
page read and write
2B82000
trusted library allocation
page read and write
1A19000
heap
page read and write
1062000
trusted library allocation
page read and write
19EC000
heap
page read and write
2C30000
heap
page read and write
11C1000
heap
page read and write
2A54000
heap
page read and write
10B0000
heap
page read and write
11C1000
heap
page read and write
B3F000
unkown
page read and write
7330000
heap
page read and write
5B4E000
heap
page read and write
463D000
direct allocation
page read and write
5EC4000
heap
page read and write
2B6E000
stack
page read and write
DCF000
heap
page read and write
4493000
direct allocation
page read and write
E0F000
heap
page read and write
623E000
stack
page read and write
15E2000
heap
page read and write
11EF000
heap
page read and write
2A50000
heap
page read and write
2C60000
trusted library allocation
page read and write
E50000
heap
page read and write
1289000
heap
page read and write
1AE5000
heap
page read and write
113C000
heap
page read and write
1AAC000
heap
page read and write
1055000
unkown
page readonly
105F000
unkown
page write copy
2C34000
heap
page read and write
1060000
trusted library allocation
page read and write
EEE000
stack
page read and write
6A7E000
stack
page read and write
FE0000
heap
page read and write
DD0000
heap
page read and write
58AE000
stack
page read and write
ED5000
heap
page read and write
7FD000
stack
page read and write
2220000
heap
page read and write
1055000
unkown
page readonly
4098000
trusted library allocation
page read and write
167A000
heap
page read and write
10C0000
heap
page read and write
2EEE000
trusted library allocation
page read and write
3900000
direct allocation
page read and write
594E000
stack
page read and write
2E27000
trusted library allocation
page read and write
3C24000
heap
page read and write
1164000
heap
page read and write
DC0000
heap
page read and write
2B10000
trusted library allocation
page read and write
1068000
unkown
page readonly
6340000
trusted library allocation
page execute and read and write
B0F000
unkown
page readonly
1A9C000
heap
page read and write
11EF000
heap
page read and write
1585000
heap
page read and write
F62000
trusted library allocation
page read and write
BCE000
stack
page read and write
DB0000
heap
page read and write
FDE000
stack
page read and write
8503000
direct allocation
page read and write
3107000
trusted library allocation
page read and write
1048000
heap
page read and write
11CF000
heap
page read and write
11DB000
heap
page read and write
5A92000
heap
page read and write
5690000
trusted library allocation
page read and write
1289000
heap
page read and write
11C1000
heap
page read and write
104D000
trusted library allocation
page execute and read and write
DFF000
heap
page read and write
58FD000
trusted library allocation
page read and write
A632F7A000
stack
page read and write
164B000
heap
page read and write
15CD000
heap
page read and write
11EF000
heap
page read and write
1168000
heap
page read and write
5F2C000
heap
page read and write
1FC43B50000
heap
page read and write
1276000
heap
page read and write
A633CFB000
stack
page read and write
15C0000
heap
page read and write
3EA0000
trusted library allocation
page read and write
15E2000
heap
page read and write
3FD1000
trusted library allocation
page read and write
1A2F000
heap
page read and write
102F000
unkown
page readonly
D50000
direct allocation
page execute and read and write
1ADB000
heap
page read and write
55F1000
trusted library allocation
page read and write
BBE000
stack
page read and write
1A27000
heap
page read and write
E40000
heap
page read and write
F3D000
trusted library allocation
page execute and read and write
19B8000
heap
page read and write
E5B000
heap
page read and write
F40000
trusted library allocation
page read and write
1558000
heap
page read and write
294E000
stack
page read and write
15CD000
heap
page read and write
F72000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
DD1000
heap
page read and write
FA1000
unkown
page execute read
FA1000
unkown
page execute read
3B70000
direct allocation
page read and write
17DB000
stack
page read and write
11AC000
heap
page read and write
11EB000
heap
page read and write
1D4E000
stack
page read and write
34F5000
direct allocation
page read and write
B35000
unkown
page readonly
2E1B000
trusted library allocation
page read and write
3B70000
direct allocation
page read and write
11C0000
heap
page read and write
B43000
unkown
page write copy
A6338FD000
stack
page read and write
FEA000
heap
page read and write
566E000
stack
page read and write
C5E000
stack
page read and write
1010000
trusted library section
page read and write
11C1000
heap
page read and write
6A80000
trusted library allocation
page read and write
463D000
direct allocation
page read and write
5B4C000
heap
page read and write
633D000
stack
page read and write
1584000
heap
page read and write
11EF000
heap
page read and write
301C000
trusted library allocation
page read and write
6917000
trusted library allocation
page read and write
3BC0000
direct allocation
page read and write
C50000
heap
page read and write
DFC000
heap
page read and write
64EB000
stack
page read and write
DE5000
heap
page read and write
DD0000
heap
page read and write
15DD000
heap
page read and write
DD0000
trusted library section
page read and write
6A1F000
stack
page read and write
544E000
stack
page read and write
1A0D000
heap
page read and write
19EE000
heap
page read and write
F10000
trusted library section
page read and write
4025000
trusted library allocation
page read and write
4903000
direct allocation
page read and write
F80000
heap
page read and write
1591000
heap
page read and write
6A30000
trusted library allocation
page read and write
6CDE000
stack
page read and write
11BF000
heap
page read and write
9DE000
stack
page read and write
B35000
unkown
page readonly
6940000
trusted library allocation
page execute and read and write
1299000
heap
page read and write
105F000
unkown
page write copy
556F000
stack
page read and write
F57000
heap
page read and write
BEF000
stack
page read and write
310D000
trusted library allocation
page read and write
105F000
unkown
page read and write
3020000
trusted library allocation
page read and write
2FB0000
heap
page execute and read and write
1070000
trusted library allocation
page read and write
5456000
trusted library allocation
page read and write
63EE000
stack
page read and write
60FE000
stack
page read and write
7010000
trusted library allocation
page read and write
3BAE000
direct allocation
page read and write
A6332FE000
stack
page read and write
7020000
trusted library allocation
page execute and read and write
19ED000
heap
page read and write
11AF000
heap
page read and write
15E2000
heap
page read and write
15E0000
heap
page read and write
5610000
trusted library allocation
page read and write
BBF000
stack
page read and write
3C3E000
direct allocation
page read and write
1A2D000
heap
page read and write
DFF000
heap
page read and write
15E2000
heap
page read and write
125A000
heap
page read and write
1063000
unkown
page write copy
1020000
trusted library section
page read and write
EF0000
heap
page read and write
2E8B000
trusted library allocation
page read and write
2FC0000
heap
page read and write
3AA0000
direct allocation
page read and write
55E2000
trusted library allocation
page read and write
ED6000
heap
page read and write
2C90000
heap
page execute and read and write
102F000
unkown
page readonly
3CE3000
direct allocation
page read and write
DE0000
heap
page read and write
2B8E000
trusted library allocation
page read and write
6A20000
trusted library allocation
page read and write
3119000
trusted library allocation
page read and write
11AF000
heap
page read and write
5A4F000
stack
page read and write
F75000
trusted library allocation
page execute and read and write
19DD000
heap
page read and write
E0F000
heap
page read and write
3D60000
direct allocation
page read and write
3A10000
direct allocation
page read and write
F4D000
trusted library allocation
page execute and read and write
1180000
heap
page read and write
50CE000
stack
page read and write
D70000
heap
page read and write
105F000
unkown
page write copy
68AE000
stack
page read and write
19FC000
heap
page read and write
4493000
direct allocation
page read and write
A6339FE000
stack
page read and write
950000
heap
page read and write
1053000
trusted library allocation
page read and write
1180000
heap
page read and write
FA1000
unkown
page execute read
2240000
direct allocation
page execute and read and write
3EAE000
direct allocation
page read and write
4493000
direct allocation
page read and write
11AC000
heap
page read and write
BFC000
stack
page read and write
6E7E000
stack
page read and write
3E8D000
direct allocation
page read and write
1050000
trusted library allocation
page read and write
46AE000
direct allocation
page read and write
3E3D000
direct allocation
page read and write
FB0000
heap
page read and write
FB8000
heap
page read and write
2D30000
heap
page read and write
6C40000
heap
page read and write
463D000
direct allocation
page read and write
DEF000
heap
page read and write
53B0000
trusted library allocation
page read and write
3BC9000
direct allocation
page read and write
5F8E000
heap
page read and write
6910000
trusted library allocation
page read and write
3B40000
direct allocation
page read and write
1192000
heap
page read and write
683D000
stack
page read and write
15E2000
heap
page read and write
2C2E000
stack
page read and write
67A0000
trusted library allocation
page execute and read and write
2B91000
trusted library allocation
page read and write
E0F000
heap
page read and write
E0F000
heap
page read and write
1159000
stack
page read and write
3BCD000
direct allocation
page read and write
12A4000
heap
page read and write
11C1000
heap
page read and write
2ED3000
trusted library allocation
page read and write
67AE000
stack
page read and write
2C7E000
stack
page read and write
FA0000
unkown
page readonly
102F000
unkown
page readonly
BEF000
stack
page read and write
1130000
heap
page read and write
6C5E000
stack
page read and write
11AC000
heap
page read and write
1A19000
heap
page read and write
6AC0000
trusted library allocation
page read and write
63AE000
stack
page read and write
6C3F000
stack
page read and write
15A1000
heap
page read and write
102F000
unkown
page readonly
3CE3000
direct allocation
page read and write
576F000
stack
page read and write
11C1000
heap
page read and write
3D60000
direct allocation
page read and write
1005000
heap
page read and write
D70000
heap
page read and write
There are 799 hidden memdumps, click here to show them.