IOC Report
Datei_26744565.xls

loading gif

Files

File Path
Type
Category
Malicious
Datei_26744565.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: Dream, Last Saved By: TYHRETH, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Fri May 20 07:48:11 2022, Security: 0
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\1Cb5zOjLgWGDemz55C5[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
downloaded
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\T35PENELLOsp[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
downloaded
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\4HWP0KQI[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
downloaded
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Jf8[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
downloaded
malicious
C:\Users\user\Desktop\Datei_26744565.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: Dream, Last Saved By: TYHRETH, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Fri May 20 07:48:11 2022, Security: 0
dropped
malicious
C:\Users\user\uxevr1.ocx
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\uxevr2.ocx
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\uxevr3.ocx
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\uxevr4.ocx
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\AnDDvm\lwQjfM.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\IvkabqgmpEJ\fEKh.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\MreGm\Zazriwdkuo.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\RrQZitdNyvCFEhe\pDnxsvRJXW.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61480 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Temp\CabE354.tmp
Microsoft Cabinet archive data, 61480 bytes, 1 file
dropped
C:\Users\user\AppData\Local\Temp\TarE355.tmp
data
modified
C:\Users\user\AppData\Local\Temp\~DF510C5EA216433379.TMP
data
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\uxevr1.ocx
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\RrQZitdNyvCFEhe\pDnxsvRJXW.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\uxevr2.ocx
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\MreGm\Zazriwdkuo.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\uxevr3.ocx
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AnDDvm\lwQjfM.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\uxevr4.ocx
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IvkabqgmpEJ\fEKh.dll"
malicious

URLs

Name
IP
Malicious
http://learnviaonline.com/wp-admin/qGb/
103.171.181.223
malicious
http://milanstaffing.com/images/D4TRnDubF/
107.189.3.39
malicious
http://kolejleri.com/wp-admin/REvup/
85.114.142.153
malicious
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://ocsp.comodoc
unknown
http://crl.entrust.net/server1.crl0
unknown
http://ocsp.entrust.net03
unknown
https://165.22.73.229:8080/
unknown
https://165.22.73.229/
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
https://165.22.73.229/E&
unknown
https://secure.comodo.co
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
http://crl.com
unknown
http://ocsp.entrust.net0D
unknown
https://secure.comodo.com/CPS0
unknown
https://165.22.73.229:8080/4
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://165.22.73.229:8080/0
unknown
https://165.22.73.229/d
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
kolejleri.com
85.114.142.153
malicious
milanstaffing.com
107.189.3.39
learnviaonline.com
103.171.181.223
stainedglassexpress.com
66.71.247.68

IPs

IP
Domain
Country
Malicious
85.114.142.153
kolejleri.com
Germany
malicious
165.22.73.229
unknown
United States
malicious
103.171.181.223
learnviaonline.com
unknown
107.189.3.39
milanstaffing.com
United States
66.71.247.68
stainedglassexpress.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
;r,
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\65B2A
65B2A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
lj,
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1FE0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
1C0000
direct allocation
page execute and read and write
malicious
2E0000
direct allocation
page execute and read and write
malicious
3C0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
4F0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
450000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
3C0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
3C0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
2EF2000
heap
page read and write
160000
heap
page read and write
2E7E000
heap
page read and write
217B000
heap
page read and write
3C0000
heap
page read and write
1F3000
heap
page read and write
2B3E000
stack
page read and write
2F30000
heap
page read and write
1B6000
heap
page read and write
7FEF70E2000
unkown
page readonly
353E000
heap
page read and write
478000
heap
page read and write
7FEF9D4F000
unkown
page readonly
18002E000
direct allocation
page readonly
430000
heap
page read and write
300F000
heap
page read and write
256000
heap
page read and write
2F50000
heap
page read and write
70000
heap
page read and write
232F000
stack
page read and write
7FEF9D21000
unkown
page execute read
1BA000
heap
page read and write
7FEF7082000
unkown
page readonly
23E000
heap
page read and write
270D000
stack
page read and write
21E000
heap
page read and write
450000
heap
page read and write
211B000
heap
page read and write
466000
heap
page read and write
20E0000
heap
page read and write
2F3A000
heap
page read and write
5CF000
stack
page read and write
1A8000
stack
page read and write
2F3A000
heap
page read and write
211B000
heap
page read and write
434000
heap
page read and write
2ACE000
stack
page read and write
2020000
remote allocation
page read and write
3F0000
heap
page read and write
2D2000
heap
page read and write
7FEF74F1000
unkown
page execute read
7FEF70EB000
unkown
page read and write
2CC000
heap
page read and write
2262000
heap
page read and write
314000
heap
page read and write
2080000
remote allocation
page read and write
2310000
heap
page read and write
2E10000
heap
page read and write
3B4000
heap
page read and write
2F50000
heap
page read and write
280000
heap
page read and write
353E000
heap
page read and write
34F6000
heap
page read and write
2F5B000
heap
page read and write
425000
heap
page read and write
416000
heap
page read and write
1A0000
heap
page read and write
1DE000
heap
page read and write
18002E000
direct allocation
page readonly
180000000
direct allocation
page read and write
1B0000
direct allocation
page execute and read and write
18002E000
direct allocation
page readonly
320000
heap
page read and write
310000
heap
page read and write
2F50000
heap
page read and write
430000
heap
page read and write
476000
heap
page read and write
2F2B000
heap
page read and write
10000
heap
page read and write
31D0000
heap
page read and write
3D0000
heap
page read and write
4B0000
heap
page read and write
23BF000
stack
page read and write
3585000
heap
page read and write
277E000
stack
page read and write
77000
heap
page read and write
1D3000
heap
page read and write
23C000
heap
page read and write
360000
remote allocation
page read and write
2F60000
heap
page read and write
24B000
heap
page read and write
2F45000
heap
page read and write
283000
heap
page read and write
2F32000
heap
page read and write
22EF000
stack
page read and write
5D4000
heap
page read and write
180000000
direct allocation
page read and write
2EFA000
heap
page read and write
1FC000
heap
page read and write
2CE000
heap
page read and write
28EB000
stack
page read and write
230D000
stack
page read and write
2F40000
heap
page read and write
180030000
direct allocation
page readonly
3564000
heap
page read and write
20C5000
heap
page read and write
2F3A000
heap
page read and write
22E2000
heap
page read and write
4F8000
heap
page read and write
2F3C000
heap
page read and write
18002E000
direct allocation
page readonly
2300000
heap
page read and write
2F50000
heap
page read and write
26E000
heap
page read and write
23A000
heap
page read and write
29FE000
stack
page read and write
20AF000
stack
page read and write
18002F000
direct allocation
page read and write
2B4F000
stack
page read and write
AE000
heap
page read and write
7FEF70EF000
unkown
page readonly
277000
heap
page read and write
3B0000
direct allocation
page execute and read and write
2F3C000
heap
page read and write
316000
heap
page read and write
2F3B000
heap
page read and write
7FEF70C0000
unkown
page readonly
1A0000
heap
page read and write
24AF000
stack
page read and write
2F00000
heap
page read and write
520000
heap
page read and write
20E5000
heap
page read and write
27C000
heap
page read and write
2F0000
heap
page read and write
10000
heap
page read and write
2E4000
heap
page read and write
180000000
direct allocation
page read and write
51D000
heap
page read and write
28D0000
heap
page read and write
30B000
heap
page read and write
410000
heap
page read and write
26FF000
stack
page read and write
28F000
heap
page read and write
518000
heap
page read and write
7FEF7060000
unkown
page readonly
18002F000
direct allocation
page read and write
360000
remote allocation
page read and write
2F07000
heap
page read and write
18002E000
direct allocation
page readonly
2420000
heap
page read and write
225000
heap
page read and write
20E0000
heap
page read and write
1BE000
heap
page read and write
2F50000
heap
page read and write
55B000
heap
page read and write
2090000
remote allocation
page read and write
15A000
heap
page read and write
2F76000
heap
page read and write
2860000
heap
page read and write
3F6000
heap
page read and write
2B0000
direct allocation
page execute and read and write
2D0000
heap
page read and write
213000
heap
page read and write
167000
heap
page read and write
454000
heap
page read and write
210B000
heap
page read and write
7FEF9D20000
unkown
page readonly
220B000
stack
page read and write
2F3C000
heap
page read and write
23CF000
stack
page read and write
180030000
direct allocation
page readonly
2F40000
heap
page read and write
2EFF000
heap
page read and write
22C000
heap
page read and write
210000
trusted library allocation
page read and write
1B8000
stack
page read and write
2850000
heap
page read and write
28F0000
heap
page read and write
180030000
direct allocation
page readonly
10000
heap
page read and write
18002E000
direct allocation
page readonly
440000
heap
page read and write
496000
heap
page read and write
18002F000
direct allocation
page read and write
28A000
heap
page read and write
7FEF751F000
unkown
page readonly
2C0E000
stack
page read and write
2920000
heap
page read and write
2B6000
heap
page read and write
488000
heap
page read and write
10000
heap
page read and write
280000
heap
page read and write
110000
heap
page read and write
2C0000
direct allocation
page execute and read and write
2090000
remote allocation
page read and write
2CBF000
stack
page read and write
2EF2000
heap
page read and write
7FEF7061000
unkown
page execute read
A9000
stack
page read and write
32A000
heap
page read and write
3040000
heap
page read and write
4C0000
heap
page read and write
2F50000
heap
page read and write
2F50000
heap
page read and write
2F57000
heap
page read and write
254000
heap
page read and write
2C7E000
stack
page read and write
2145000
heap
page read and write
456000
heap
page read and write
20D5000
heap
page read and write
128000
stack
page read and write
225C000
stack
page read and write
2D6000
heap
page read and write
1C0000
heap
page read and write
2AF000
heap
page read and write
291000
heap
page read and write
1E9000
stack
page read and write
544000
heap
page read and write
49D000
heap
page read and write
2B20000
heap
page read and write
7FEF74F1000
unkown
page execute read
1E0000
heap
page read and write
28F000
heap
page read and write
20FB000
heap
page read and write
14E000
heap
page read and write
245000
heap
page read and write
2EEB000
heap
page read and write
2F3C000
heap
page read and write
7FEF708B000
unkown
page read and write
5D4000
heap
page read and write
2BD000
heap
page read and write
180030000
direct allocation
page readonly
29A0000
heap
page read and write
7FEF70C1000
unkown
page execute read
10000
heap
page read and write
18002E000
direct allocation
page readonly
2140000
heap
page read and write
34C1000
heap
page read and write
7FEF751B000
unkown
page read and write
3B0000
direct allocation
page execute and read and write
1A7000
heap
page read and write
4B8000
heap
page read and write
124000
heap
page read and write
18002F000
direct allocation
page read and write
5D0000
heap
page read and write
10000
heap
page read and write
117000
heap
page read and write
2C3E000
stack
page read and write
4C0000
heap
page read and write
4A8000
heap
page read and write
249000
heap
page read and write
26CD000
stack
page read and write
10C000
heap
page read and write
2260000
heap
page read and write
1FE000
heap
page read and write
34B1000
heap
page read and write
187000
heap
page read and write
7FEF751B000
unkown
page read and write
2F40000
heap
page read and write
63E000
heap
page read and write
258F000
stack
page read and write
3D5000
heap
page read and write
22BE000
stack
page read and write
434000
heap
page read and write
7FEF9D42000
unkown
page readonly
286000
heap
page read and write
498000
heap
page read and write
7FEF708F000
unkown
page readonly
48D000
heap
page read and write
287000
heap
page read and write
21C5000
heap
page read and write
624000
heap
page read and write
525000
heap
page read and write
2DC000
heap
page read and write
2C00000
heap
page read and write
2D7E000
stack
page read and write
2EF2000
heap
page read and write
7FEF9D42000
unkown
page readonly
21B000
heap
page read and write
180000000
direct allocation
page read and write
353D000
heap
page read and write
3B0000
heap
page read and write
280000
heap
page read and write
5D0000
heap
page read and write
C3000
heap
page read and write
22FF000
stack
page read and write
21B2000
heap
page read and write
478000
heap
page read and write
3E0000
heap
page read and write
233000
heap
page read and write
430000
heap
page read and write
29F0000
heap
page read and write
3585000
heap
page read and write
524000
heap
page read and write
2EE0000
heap
page read and write
630000
heap
page read and write
2EBF000
heap
page read and write
18002F000
direct allocation
page read and write
100000
heap
page read and write
130000
direct allocation
page execute and read and write
2F40000
heap
page read and write
20D0000
heap
page read and write
2F3C000
heap
page read and write
2E0000
heap
page read and write
2F57000
heap
page read and write
2F32000
heap
page read and write
180000
heap
page read and write
2080000
remote allocation
page read and write
278F000
stack
page read and write
283000
heap
page read and write
21C0000
heap
page read and write
2EF5000
heap
page read and write
410000
trusted library allocation
page read and write
2030000
heap
page read and write
22E0000
heap
page read and write
34B0000
heap
page read and write
252000
heap
page read and write
468000
heap
page read and write
4B4000
heap
page read and write
2312000
heap
page read and write
2ACB000
stack
page read and write
325000
heap
page read and write
2F51000
heap
page read and write
426000
heap
page read and write
180030000
direct allocation
page readonly
4F6000
heap
page read and write
7FEF708B000
unkown
page read and write
180000000
direct allocation
page read and write
34CF000
heap
page read and write
2869000
heap
page read and write
488000
heap
page read and write
289F000
heap
page read and write
1FC000
heap
page read and write
20E000
heap
page read and write
2F37000
heap
page read and write
20E5000
heap
page read and write
29DF000
stack
page read and write
2F47000
heap
page read and write
22DB000
stack
page read and write
2F50000
heap
page read and write
204000
heap
page read and write
7FEF70EF000
unkown
page readonly
1AC000
heap
page read and write
7FEF708F000
unkown
page readonly
7FEF7512000
unkown
page readonly
20FE000
stack
page read and write
18002E000
direct allocation
page readonly
2B00000
heap
page read and write
2F3C000
heap
page read and write
213000
heap
page read and write
279000
heap
page read and write
22D000
heap
page read and write
2E60000
heap
page read and write
7FEF74F0000
unkown
page readonly
7FEF70EB000
unkown
page read and write
20C0000
heap
page read and write
16A000
heap
page read and write
3010000
heap
page read and write
2B3E000
heap
page read and write
2EE0000
heap
page read and write
167000
heap
page read and write
2F40000
heap
page read and write
2BF0000
heap
page read and write
1FA000
heap
page read and write
286B000
stack
page read and write
2F3C000
heap
page read and write
2F43000
heap
page read and write
2370000
heap
page read and write
2F50000
heap
page read and write
2F3B000
heap
page read and write
10000
heap
page read and write
2D0E000
stack
page read and write
3B0000
direct allocation
page execute and read and write
2B1E000
stack
page read and write
178000
stack
page read and write
2F50000
heap
page read and write
2F2B000
heap
page read and write
2E9C000
stack
page read and write
2D4000
heap
page read and write
180030000
direct allocation
page readonly
18002F000
direct allocation
page read and write
7FEF7512000
unkown
page readonly
23DF000
stack
page read and write
34BF000
heap
page read and write
20E000
heap
page read and write
21AE000
stack
page read and write
230000
heap
page read and write
3584000
heap
page read and write
1B0000
direct allocation
page execute and read and write
26BF000
stack
page read and write
1C7000
heap
page read and write
1DA000
heap
page read and write
7FEF74F0000
unkown
page readonly
13C000
heap
page read and write
353D000
heap
page read and write
22E0000
heap
page read and write
7FEF7082000
unkown
page readonly
272000
heap
page read and write
21FB000
heap
page read and write
295000
heap
page read and write
2C0000
heap
page read and write
2F50000
heap
page read and write
10000
heap
page read and write
2F44000
heap
page read and write
1A8000
stack
page read and write
D8000
stack
page read and write
2F3C000
heap
page read and write
7FEF9D4B000
unkown
page read and write
18002F000
direct allocation
page read and write
2F4B000
heap
page read and write
40B000
heap
page read and write
21BF000
stack
page read and write
230000
heap
page read and write
180030000
direct allocation
page readonly
27E000
heap
page read and write
620000
heap
page read and write
1B3000
heap
page read and write
237000
heap
page read and write
21B0000
heap
page read and write
F4000
heap
page read and write
254000
heap
page read and write
21A000
heap
page read and write
7FEF7060000
unkown
page readonly
520000
heap
page read and write
410000
trusted library allocation
page read and write
24F000
heap
page read and write
3150000
heap
page read and write
2A0000
heap
page read and write
180030000
direct allocation
page readonly
2D9000
heap
page read and write
280B000
stack
page read and write
CA000
heap
page read and write
2EF1000
heap
page read and write
2F40000
heap
page read and write
1A0000
heap
page read and write
7FEF7061000
unkown
page execute read
420000
heap
page read and write
2B7B000
stack
page read and write
498000
heap
page read and write
540000
heap
page read and write
27BE000
stack
page read and write
19E000
heap
page read and write
7FEF9D4B000
unkown
page read and write
18002F000
direct allocation
page read and write
460000
heap
page read and write
634000
heap
page read and write
163000
heap
page read and write
2F43000
heap
page read and write
2F0F000
heap
page read and write
420000
heap
page read and write
7FEF751F000
unkown
page readonly
F0000
heap
page read and write
7FEF9D20000
unkown
page readonly
2ED4000
heap
page read and write
508000
heap
page read and write
1AC000
heap
page read and write
3040000
heap
page read and write
7FEF70E2000
unkown
page readonly
278D000
stack
page read and write
2D40000
heap
page read and write
2F6000
heap
page read and write
222F000
stack
page read and write
180000000
direct allocation
page read and write
281000
heap
page read and write
26D000
heap
page read and write
2BDE000
stack
page read and write
250000
heap
page read and write
4F6000
heap
page read and write
2F40000
heap
page read and write
7FEF9D4F000
unkown
page readonly
180000000
direct allocation
page read and write
356000
heap
page read and write
2C00000
heap
page read and write
20E000
heap
page read and write
2F40000
heap
page read and write
2E0000
heap
page read and write
7FEF9D21000
unkown
page execute read
2F32000
heap
page read and write
2B6000
heap
page read and write
326000
heap
page read and write
1E7000
heap
page read and write
27A000
heap
page read and write
117000
heap
page read and write
2F43000
heap
page read and write
2020000
remote allocation
page read and write
7FEF70C0000
unkown
page readonly
24D000
heap
page read and write
4BD000
heap
page read and write
305000
heap
page read and write
2E9C000
heap
page read and write
2F8D000
heap
page read and write
2F40000
heap
page read and write
1DE000
heap
page read and write
1B6000
heap
page read and write
530000
trusted library allocation
page read and write
1DE000
heap
page read and write
2F08000
heap
page read and write
2EE4000
heap
page read and write
19C000
heap
page read and write
180000000
direct allocation
page read and write
2AF000
heap
page read and write
7FEF70C1000
unkown
page execute read
There are 498 hidden memdumps, click here to show them.