IOC Report
DETAILS 25922194612.xls

loading gif

Files

File Path
Type
Category
Malicious
DETAILS 25922194612.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: Dream, Last Saved By: TYHRETH, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Fri May 20 07:48:11 2022, Security: 0
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\1Cb5zOjLgWGDemz55C5[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
downloaded
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\T35PENELLOsp[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
downloaded
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\4HWP0KQI[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
downloaded
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Jf8[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
downloaded
malicious
C:\Users\user\Desktop\DETAILS 25922194612.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: Dream, Last Saved By: TYHRETH, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Fri May 20 07:48:11 2022, Security: 0
dropped
malicious
C:\Users\user\uxevr1.ocx
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\uxevr2.ocx
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\uxevr3.ocx
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\uxevr4.ocx
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\Ejpzh\qlDqXeGagKnBKzd.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\FiPeSYwmr\Wuiko.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\KuSAkvGE\rWFJGQNl.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\PLVmoWLosZJQb\bTjwWDTWvnC.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61480 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Temp\CabEE4E.tmp
Microsoft Cabinet archive data, 61480 bytes, 1 file
dropped
C:\Users\user\AppData\Local\Temp\TarEE4F.tmp
data
modified
C:\Users\user\AppData\Local\Temp\~DFFD13BCD3EE2F686F.TMP
data
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\uxevr1.ocx
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\KuSAkvGE\rWFJGQNl.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\uxevr2.ocx
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\Ejpzh\qlDqXeGagKnBKzd.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\uxevr3.ocx
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\FiPeSYwmr\Wuiko.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\uxevr4.ocx
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PLVmoWLosZJQb\bTjwWDTWvnC.dll"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup

URLs

Name
IP
Malicious
http://learnviaonline.com/wp-admin/qGb/
103.171.181.223
malicious
http://milanstaffing.com/images/D4TRnDubF/
107.189.3.39
malicious
http://kolejleri.com/wp-admin/REvup/
85.114.142.153
malicious
https://165.22.73.229:8080/.t
unknown
https://165.22.73.229:8080/L
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
https://165.22.73.229:8080/h
unknown
http://crl.entrust.net/server1.crl0
unknown
https://165.22.73.229/l
unknown
http://ocsp.entrust.net03
unknown
https://165.22.73.229:8080/
unknown
https://165.22.73.229/
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
https://165.22.73.229/5v
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
https://165.22.73.229/KP
unknown
http://ocsp.entrust.net0D
unknown
https://secure.comodo.com/CPS0
unknown
https://165.22.73.229/=v
unknown
https://165.22.73.229:8080/1o
unknown
http://crl.entrust.net/2048ca.crl0
unknown
There are 11 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
kolejleri.com
85.114.142.153
malicious
milanstaffing.com
107.189.3.39
learnviaonline.com
103.171.181.223
stainedglassexpress.com
66.71.247.68
windowsupdatebg.s.llnwi.net
95.140.230.192

IPs

IP
Domain
Country
Malicious
85.114.142.153
kolejleri.com
Germany
malicious
165.22.73.229
unknown
United States
malicious
103.171.181.223
learnviaonline.com
unknown
107.189.3.39
milanstaffing.com
United States
66.71.247.68
stainedglassexpress.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
"|.
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\66C98
66C98
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
$4/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
180001000
direct allocation
page execute read
malicious
2C0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
3E0000
direct allocation
page execute and read and write
malicious
2C0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
150000
direct allocation
page execute and read and write
malicious
1D0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
300000
direct allocation
page execute and read and write
malicious
2D0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
220000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
5D4000
heap
page read and write
476000
heap
page read and write
10000
heap
page read and write
339000
heap
page read and write
38A000
heap
page read and write
268E000
stack
page read and write
2FCE000
heap
page read and write
39A000
heap
page read and write
7FEF755F000
unkown
page readonly
A5F000
stack
page read and write
2BA0000
heap
page read and write
24E000
heap
page read and write
1B0000
direct allocation
page execute and read and write
464000
heap
page read and write
280000
remote allocation
page read and write
18E000
heap
page read and write
2BA9000
heap
page read and write
7FEF9D4F000
unkown
page readonly
3090000
heap
page read and write
3C8000
heap
page read and write
247000
heap
page read and write
3B6000
heap
page read and write
7FEF9D4B000
unkown
page read and write
7FEF70EB000
unkown
page read and write
118000
heap
page read and write
27F0000
heap
page read and write
3F4000
heap
page read and write
35B0000
heap
page read and write
2BAE000
stack
page read and write
3701000
heap
page read and write
41C000
heap
page read and write
538000
heap
page read and write
31E000
heap
page read and write
2E0000
heap
page read and write
37C5000
heap
page read and write
2130000
heap
page read and write
5F0000
heap
page read and write
7FEF70EF000
unkown
page readonly
21E5000
heap
page read and write
2EE4000
heap
page read and write
21A5000
heap
page read and write
2ACD000
heap
page read and write
510000
heap
page read and write
180030000
direct allocation
page readonly
4D0000
heap
page read and write
180000000
direct allocation
page read and write
7FEF9D20000
unkown
page readonly
7FEF9D42000
unkown
page readonly
42A000
heap
page read and write
29DE000
stack
page read and write
2B0B000
stack
page read and write
40E000
heap
page read and write
2C7B000
stack
page read and write
760000
heap
page read and write
3D6000
heap
page read and write
2F44000
heap
page read and write
4DB000
heap
page read and write
21DB000
heap
page read and write
128000
heap
page read and write
2C8E000
stack
page read and write
31C000
heap
page read and write
21CF000
stack
page read and write
2FB4000
heap
page read and write
2A60000
heap
page read and write
504000
heap
page read and write
343000
heap
page read and write
1B6000
heap
page read and write
662000
heap
page read and write
383000
heap
page read and write
37E000
heap
page read and write
2DCE000
stack
page read and write
28DE000
stack
page read and write
518000
heap
page read and write
26BF000
stack
page read and write
3DF000
heap
page read and write
291F000
heap
page read and write
440000
heap
page read and write
180000000
direct allocation
page read and write
44B000
heap
page read and write
2F9F000
heap
page read and write
10000
heap
page read and write
2C6000
heap
page read and write
2D8F000
stack
page read and write
2FE000
heap
page read and write
2D3000
heap
page read and write
2135000
heap
page read and write
500000
heap
page read and write
2382000
heap
page read and write
399000
heap
page read and write
377C000
heap
page read and write
2F6B000
heap
page read and write
330000
heap
page read and write
1F0000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
2380000
heap
page read and write
20C5000
heap
page read and write
354000
heap
page read and write
2FB4000
heap
page read and write
180030000
direct allocation
page readonly
3736000
heap
page read and write
2B60000
heap
page read and write
37C5000
heap
page read and write
22EF000
stack
page read and write
2C0000
heap
page read and write
7FEF74F2000
unkown
page readonly
7FEF9D21000
unkown
page execute read
2F31000
heap
page read and write
419000
heap
page read and write
350000
heap
page read and write
2D5E000
stack
page read and write
21E0000
heap
page read and write
2F99000
heap
page read and write
6D5000
heap
page read and write
4D1000
heap
page read and write
7FEF755F000
unkown
page readonly
393000
heap
page read and write
B8000
stack
page read and write
46C000
heap
page read and write
2130000
heap
page read and write
324000
heap
page read and write
2EEE000
stack
page read and write
16B000
heap
page read and write
2D92000
heap
page read and write
6B4000
heap
page read and write
620000
heap
page read and write
120000
heap
page read and write
220000
trusted library allocation
page read and write
180030000
direct allocation
page readonly
243F000
stack
page read and write
158000
stack
page read and write
157000
heap
page read and write
377E000
heap
page read and write
383000
heap
page read and write
2CDF000
unkown
page read and write
2D9F000
heap
page read and write
2D30000
heap
page read and write
246000
heap
page read and write
140000
direct allocation
page execute and read and write
22FB000
stack
page read and write
5F4000
heap
page read and write
2DA000
heap
page read and write
337000
heap
page read and write
4E0000
heap
page read and write
2F9F000
heap
page read and write
180030000
direct allocation
page readonly
2FA7000
heap
page read and write
466000
heap
page read and write
625000
heap
page read and write
2FCE000
heap
page read and write
640000
heap
page read and write
10000
heap
page read and write
534000
heap
page read and write
2135000
heap
page read and write
233E000
stack
page read and write
3ED000
heap
page read and write
E0000
heap
page read and write
7FEF70C0000
unkown
page readonly
18002E000
direct allocation
page readonly
2EF0000
heap
page read and write
3C5000
heap
page read and write
518000
heap
page read and write
7FEF70E2000
unkown
page readonly
3D8000
heap
page read and write
28E0000
heap
page read and write
7FEF755B000
unkown
page read and write
210000
heap
page read and write
18002F000
direct allocation
page read and write
2DBB000
heap
page read and write
276D000
stack
page read and write
2F9F000
heap
page read and write
2FAA000
heap
page read and write
2CC0000
heap
page read and write
2B1C000
stack
page read and write
36F000
heap
page read and write
258000
heap
page read and write
2EE8000
heap
page read and write
215000
heap
page read and write
138000
stack
page read and write
2EE0000
heap
page read and write
225000
heap
page read and write
224F000
stack
page read and write
22FF000
stack
page read and write
27EE000
stack
page read and write
262000
heap
page read and write
7FEF70C1000
unkown
page execute read
7FEF7552000
unkown
page readonly
660000
heap
page read and write
130000
direct allocation
page execute and read and write
2EF9000
heap
page read and write
21F0000
heap
page read and write
170000
heap
page read and write
433000
heap
page read and write
2FB4000
heap
page read and write
198000
stack
page read and write
2A4B000
stack
page read and write
530000
heap
page read and write
280000
heap
page read and write
377C000
heap
page read and write
43B000
heap
page read and write
13D000
heap
page read and write
377E000
heap
page read and write
4B2000
heap
page read and write
144000
heap
page read and write
2BCC000
stack
page read and write
2B9E000
stack
page read and write
2F9F000
heap
page read and write
4C0000
heap
page read and write
18002E000
direct allocation
page readonly
7FEF7530000
unkown
page readonly
2FBD000
heap
page read and write
346000
heap
page read and write
7FEF7552000
unkown
page readonly
31C000
heap
page read and write
31E000
heap
page read and write
18002E000
direct allocation
page readonly
576000
heap
page read and write
37C000
heap
page read and write
180030000
direct allocation
page readonly
7FEF7530000
unkown
page readonly
5F0000
remote allocation
page read and write
166000
heap
page read and write
35C0000
heap
page read and write
2310000
heap
page read and write
2E60000
heap
page read and write
3A0000
heap
page read and write
3C0000
heap
page read and write
268000
stack
page read and write
339000
heap
page read and write
764000
heap
page read and write
7FEF74D1000
unkown
page execute read
2F0000
heap
page read and write
3E9000
heap
page read and write
3E0000
heap
page read and write
2A4C000
stack
page read and write
7FEF74D0000
unkown
page readonly
280000
remote allocation
page read and write
22FC000
stack
page read and write
7FEF9D21000
unkown
page execute read
10000
heap
page read and write
2C0000
direct allocation
page execute and read and write
210000
heap
page read and write
270000
remote allocation
page read and write
2F2000
heap
page read and write
516000
heap
page read and write
2B0000
direct allocation
page execute and read and write
5F0000
remote allocation
page read and write
1E5000
heap
page read and write
18002F000
direct allocation
page read and write
2C0000
heap
page read and write
2809000
heap
page read and write
216B000
heap
page read and write
310000
heap
page read and write
CD000
stack
page read and write
470000
heap
page read and write
2710000
heap
page read and write
2D6B000
stack
page read and write
460000
heap
page read and write
6AE000
stack
page read and write
7FEF74FF000
unkown
page readonly
15D000
heap
page read and write
430000
heap
page read and write
2CE4000
heap
page read and write
40E000
heap
page read and write
7FEF70EF000
unkown
page readonly
644000
heap
page read and write
270000
remote allocation
page read and write
32E000
heap
page read and write
27EE000
stack
page read and write
18002F000
direct allocation
page read and write
18002E000
direct allocation
page readonly
180000000
direct allocation
page read and write
394000
heap
page read and write
128000
stack
page read and write
29F9000
heap
page read and write
3F6000
heap
page read and write
180000000
direct allocation
page read and write
7FEF9D42000
unkown
page readonly
18002E000
direct allocation
page readonly
5D0000
heap
page read and write
2FB4000
heap
page read and write
10000
heap
page read and write
2E40000
heap
page read and write
216B000
heap
page read and write
346000
heap
page read and write
59D000
heap
page read and write
316000
heap
page read and write
324000
heap
page read and write
680000
heap
page read and write
7FEF7531000
unkown
page execute read
3700000
heap
page read and write
2B0000
heap
page read and write
272D000
stack
page read and write
528000
heap
page read and write
4C3000
heap
page read and write
2CF9000
heap
page read and write
127000
heap
page read and write
7FEF70EB000
unkown
page read and write
223F000
stack
page read and write
3EC000
heap
page read and write
1AA000
heap
page read and write
3FB000
heap
page read and write
7FEF755B000
unkown
page read and write
354000
heap
page read and write
140000
direct allocation
page execute and read and write
1A0000
heap
page read and write
2E5F000
stack
page read and write
21F5000
heap
page read and write
2D86000
heap
page read and write
41E000
heap
page read and write
3090000
heap
page read and write
180030000
direct allocation
page readonly
43A000
heap
page read and write
3757000
heap
page read and write
546000
heap
page read and write
36E000
heap
page read and write
3B9000
heap
page read and write
2FCF000
heap
page read and write
222D000
stack
page read and write
2CAF000
stack
page read and write
23B0000
heap
page read and write
2FAA000
heap
page read and write
2D8E000
stack
page read and write
23B000
heap
page read and write
33D000
heap
page read and write
7FEF70C1000
unkown
page execute read
222B000
heap
page read and write
2D32000
heap
page read and write
295F000
stack
page read and write
2D32000
heap
page read and write
2FA2000
heap
page read and write
180000
heap
page read and write
2B6C000
stack
page read and write
245000
heap
page read and write
3290000
heap
page read and write
3492000
heap
page read and write
348F000
unkown
page read and write
7FEF74F2000
unkown
page readonly
340000
heap
page read and write
1CA000
heap
page read and write
29F0000
heap
page read and write
3E7000
heap
page read and write
2780000
heap
page read and write
3F0000
heap
page read and write
343000
heap
page read and write
18002F000
direct allocation
page read and write
27F9000
heap
page read and write
516000
heap
page read and write
29F0000
heap
page read and write
2360000
heap
page read and write
7FEF7531000
unkown
page execute read
36E000
heap
page read and write
385000
heap
page read and write
2FAA000
heap
page read and write
4F6000
heap
page read and write
320000
trusted library allocation
page read and write
180030000
direct allocation
page readonly
287000
heap
page read and write
2730000
heap
page read and write
4DC000
stack
page read and write
2FAE000
heap
page read and write
47C000
heap
page read and write
10000
heap
page read and write
3490000
heap
page read and write
1C3000
heap
page read and write
2AB1000
heap
page read and write
3E3000
heap
page read and write
7FEF74FF000
unkown
page readonly
2A2F000
heap
page read and write
37A5000
heap
page read and write
180000000
direct allocation
page read and write
25EE000
stack
page read and write
10000
heap
page read and write
598000
heap
page read and write
35C000
heap
page read and write
4A2000
heap
page read and write
33D000
heap
page read and write
1E0000
heap
page read and write
2F99000
heap
page read and write
150000
heap
page read and write
51D000
heap
page read and write
380000
heap
page read and write
208000
heap
page read and write
2CC8000
heap
page read and write
2FAA000
heap
page read and write
310000
trusted library allocation
page read and write
313000
heap
page read and write
34B0000
heap
page read and write
37A5000
heap
page read and write
180000000
direct allocation
page read and write
292E000
stack
page read and write
5EE000
stack
page read and write
2B4000
heap
page read and write
4F8000
heap
page read and write
3140000
heap
page read and write
3F8000
heap
page read and write
2D34000
heap
page read and write
588000
heap
page read and write
20FB000
heap
page read and write
7FEF70C0000
unkown
page readonly
7FEF70E2000
unkown
page readonly
310000
heap
page read and write
180000000
direct allocation
page read and write
4BF000
heap
page read and write
47E000
heap
page read and write
2D88000
heap
page read and write
4D6000
heap
page read and write
337000
heap
page read and write
22CF000
stack
page read and write
18002F000
direct allocation
page read and write
2FAE000
heap
page read and write
2800000
heap
page read and write
7FEF74D0000
unkown
page readonly
138000
heap
page read and write
328000
heap
page read and write
2290000
heap
page read and write
6D0000
heap
page read and write
282F000
heap
page read and write
140000
heap
page read and write
31A000
heap
page read and write
370F000
heap
page read and write
361000
heap
page read and write
7EFE0000
unkown
page readonly
70B000
heap
page read and write
405000
heap
page read and write
18002F000
direct allocation
page read and write
2AB0000
heap
page read and write
3F8000
heap
page read and write
67F000
stack
page read and write
7FEF74FB000
unkown
page read and write
2FAE000
heap
page read and write
7FEF9D20000
unkown
page readonly
4D4000
heap
page read and write
30C000
heap
page read and write
23AF000
stack
page read and write
410000
heap
page read and write
208000
stack
page read and write
2C7000
heap
page read and write
18002E000
direct allocation
page readonly
10000
heap
page read and write
2BE000
heap
page read and write
221B000
heap
page read and write
7FEF9D4F000
unkown
page readonly
508000
heap
page read and write
3ED000
heap
page read and write
4A0000
heap
page read and write
7FEF74FB000
unkown
page read and write
650000
remote allocation
page read and write
1C0000
direct allocation
page execute and read and write
23A0000
heap
page read and write
177000
heap
page read and write
484000
heap
page read and write
2BC7000
heap
page read and write
271F000
stack
page read and write
347000
heap
page read and write
38A000
heap
page read and write
2B0000
direct allocation
page execute and read and write
1E5000
heap
page read and write
330000
heap
page read and write
415000
heap
page read and write
4E0000
heap
page read and write
7FEF74D1000
unkown
page execute read
228000
heap
page read and write
34E6000
heap
page read and write
578000
heap
page read and write
32E000
heap
page read and write
2FAE000
heap
page read and write
1D6000
heap
page read and write
36D000
heap
page read and write
28E9000
heap
page read and write
34E8000
heap
page read and write
283F000
heap
page read and write
53D000
heap
page read and write
10000
heap
page read and write
650000
remote allocation
page read and write
1A3000
heap
page read and write
2FCD000
heap
page read and write
290000
heap
page read and write
266000
heap
page read and write
D8000
stack
page read and write
60F000
stack
page read and write
94000
heap
page read and write
361000
heap
page read and write
7FEF9D4B000
unkown
page read and write
18002F000
direct allocation
page read and write
2C9F000
stack
page read and write
2C4000
heap
page read and write
390000
heap
page read and write
18002F000
direct allocation
page read and write
90000
heap
page read and write
2FAE000
heap
page read and write
2C40000
heap
page read and write
21A0000
heap
page read and write
2FB4000
heap
page read and write
2850000
heap
page read and write
540000
heap
page read and write
2D50000
heap
page read and write
2F99000
heap
page read and write
684000
heap
page read and write
18002E000
direct allocation
page readonly
6B0000
heap
page read and write
180030000
direct allocation
page readonly
20C0000
heap
page read and write
18002E000
direct allocation
page readonly
2362000
heap
page read and write
116000
heap
page read and write
368000
heap
page read and write
1AE000
heap
page read and write
2BCC000
heap
page read and write
There are 514 hidden memdumps, click here to show them.