IOC Report
#U8d26#U53f7#U5bc6#U7801#U8868.xls.exe

loading gif

Files

File Path
Type
Category
Malicious
#U8d26#U53f7#U5bc6#U7801#U8868.xls.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\???????.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 5 15:52:21 2022, mtime=Fri Aug 5 15:52:32 2022, atime=Fri Aug 5 15:52:32 2022, length=23552, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
modified
C:\Users\user\Desktop\???????.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1200, Locale ID: 2052, Author: ma, Last Saved By: Adminis, Create Time/Date: Sun Jul 25 22:22:00 2021, Last Saved Time/Date: Mon Jul 18 16:11:36 2022, Name of Creating Application: WPS Of, Security: 0
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exe
"C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exe"
malicious
C:\Windows\System32\cmd.exe
c:\windows\system32\cmd.exe /C start ???????.xls
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /dde

URLs

Name
IP
Malicious
http://jquery-min.us:8443/jquery-3.3.2.slim.min.js
malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
http://27.0.135.13/
unknown
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
https://jquery-min.us:8443/jquery-3.3.2.slim.min.jsL
unknown
https://jquery-min.us:8443/
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://jquery-min.us:8443/jquery-3.3.2.slim.min.js
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
https://my.microsoftpersonalcontent.com
unknown
https://store.office.cn/addinstemplate
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://jquery-min.us:8443/s
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
unknown
http://27.0.135.13/%E6%B6%89%E7%96%AB%E8%BD%A8%E8%BF%B9%E6%A3%80%E6%9F%A5%E8%A1%A8.xls
27.0.135.13
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://messaging.lifecycle.office.com/
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
http://code.jquery.com/
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
https://management.azure.com/
unknown
https://messaging.lifecycle.office.com/getcustommessage16
unknown
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
unknown
https://login.windows.net/common/oauth2/authorize
unknown
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
jquery-min.us
unknown
malicious

IPs

IP
Domain
Country
Malicious
27.0.135.13
unknown
China

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\DDECache\Excel\system
ProcessName
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\DDECache\Excel\system
WindowName
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\DDECache\Excel\system
WindowClassName
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\f0\52C64B7E
@C:\Program Files\Common Files\Microsoft Shared\Office16\oregres.dll,-206
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
EXCELFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\StartupItems
e,)
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\StartupItems
f,)
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\StartupItems
f4)
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\DocumentRecovery\33867
33867
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\DocumentRecovery\355B3
355B3
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 21
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
EXCELFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\DocumentRecovery\33867
33867
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
CacheReady
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
LastRequest
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
CacheReady
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
LastUpdate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
NextUpdate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Place MRU\Change
ChangeId
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\File MRU\Change
ChangeId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Security\Trusted Documents
LastPurgeTime
There are 60 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
C0001CE000
direct allocation
page read and write
malicious
C0001D4000
direct allocation
page read and write
malicious
26E30000
direct allocation
page execute and read and write
malicious
290F2550000
trusted library section
page read and write
1EE0FA00000
heap
page read and write
FB000
heap
page read and write
290F2656000
heap
page read and write
290F35E0000
trusted library allocation
page read and write
290F268D000
heap
page read and write
3251D8B000
stack
page read and write
B2FC2FF000
stack
page read and write
C0000E4000
direct allocation
page read and write
B2FC4FF000
stack
page read and write
C000186000
direct allocation
page read and write
C0000EE000
direct allocation
page read and write
290F7EDA000
heap
page read and write
290F267A000
heap
page read and write
1BEE1A75000
heap
page read and write
C000012000
direct allocation
page read and write
1BEE1B02000
heap
page read and write
E48000
direct allocation
page read and write
C0000D2000
direct allocation
page read and write
A0000
heap
page read and write
290F7EE0000
heap
page read and write
290F7EF8000
heap
page read and write
C0000D8000
direct allocation
page read and write
290F2DB1000
trusted library allocation
page read and write
C000118000
direct allocation
page read and write
C000080000
direct allocation
page read and write
1EE0FA8A000
heap
page read and write
32525FE000
stack
page read and write
1BEE1A00000
heap
page read and write
904000
unkown
page execute and read and write
290F7D40000
remote allocation
page read and write
290F2DD0000
trusted library allocation
page read and write
C0000A6000
direct allocation
page read and write
C000031000
direct allocation
page read and write
B2FC27B000
stack
page read and write
2242F849000
heap
page read and write
C0000A0000
direct allocation
page read and write
99478F9000
stack
page read and write
1BEE1A13000
heap
page read and write
2242F800000
heap
page read and write
80000
heap
page read and write
C0000B6000
direct allocation
page read and write
290F269F000
heap
page read and write
160C2C52000
heap
page read and write
B2FC37E000
stack
page read and write
1EE10202000
trusted library allocation
page read and write
2242F870000
heap
page read and write
1E16E2E0000
trusted library allocation
page read and write
290F7D20000
trusted library allocation
page read and write
2937E000
stack
page read and write
28B3A000
stack
page read and write
1E16E210000
trusted library allocation
page read and write
160C2C46000
heap
page read and write
290F3A60000
trusted library allocation
page read and write
1BEE1A82000
heap
page read and write
9947A7F000
stack
page read and write
C00010A000
direct allocation
page read and write
1CB000
direct allocation
page read and write
32520FF000
stack
page read and write
2242F730000
trusted library allocation
page read and write
C0000C4000
direct allocation
page read and write
2242F848000
heap
page read and write
E6E17F000
stack
page read and write
2242F879000
heap
page read and write
9947879000
stack
page read and write
290F2F13000
heap
page read and write
2242F850000
heap
page read and write
290F7AD0000
trusted library allocation
page read and write
290F23E0000
heap
page read and write
1EE0FB13000
heap
page read and write
290F7EF6000
heap
page read and write
160C2C70000
heap
page read and write
290F2F18000
heap
page read and write
B2FC3FF000
stack
page read and write
AC000
heap
page read and write
290F36D0000
trusted library section
page readonly
C00009C000
direct allocation
page read and write
2242F859000
heap
page read and write
290F7D10000
trusted library allocation
page read and write
400000
unkown
page readonly
1EE0F7D0000
heap
page read and write
290F7BE0000
trusted library allocation
page read and write
2242F856000
heap
page read and write
683A57B000
stack
page read and write
99479F9000
stack
page read and write
B2FC77E000
stack
page read and write
1E16E2D0000
trusted library allocation
page read and write
1C0000
direct allocation
page read and write
C000002000
direct allocation
page read and write
1BEE1890000
heap
page read and write
290F36E0000
trusted library section
page readonly
C0000FE000
direct allocation
page read and write
290F7E15000
heap
page read and write
C000035000
direct allocation
page read and write
C0000F4000
direct allocation
page read and write
2242F852000
heap
page read and write
C000098000
direct allocation
page read and write
C00018C000
direct allocation
page read and write
1BEE1A28000
heap
page read and write
2915F000
stack
page read and write
160C2D13000
heap
page read and write
290F7E3E000
heap
page read and write
32523F7000
stack
page read and write
268CF000
stack
page read and write
8F1000
unkown
page execute and read and write
290F2F18000
heap
page read and write
8F7000
unkown
page execute and read and write
1BEE1A02000
heap
page read and write
2242F83C000
heap
page read and write
2242F913000
heap
page read and write
C000100000
direct allocation
page read and write
290F2694000
heap
page read and write
C000197000
direct allocation
page read and write
C00002A000
direct allocation
page read and write
B2FBE79000
stack
page read and write
32521FC000
stack
page read and write
32522FB000
stack
page read and write
290F2DE0000
trusted library allocation
page read and write
1BEE1B13000
heap
page read and write
1E16E2C0000
heap
page readonly
623D1FB000
stack
page read and write
C000019000
direct allocation
page read and write
1E16E200000
trusted library allocation
page read and write
EC5000
heap
page read and write
C0000DA000
direct allocation
page read and write
C0001BC000
direct allocation
page read and write
160C2C50000
heap
page read and write
10000
heap
page read and write
E6E47E000
stack
page read and write
C0000E0000
direct allocation
page read and write
290F7EAC000
heap
page read and write
160C2B40000
heap
page read and write
105000
heap
page read and write
1E16E0D1000
heap
page read and write
20000
direct allocation
page read and write
683A47B000
stack
page read and write
99474AC000
stack
page read and write
1E16E2B0000
trusted library allocation
page read and write
1BEE18A0000
heap
page read and write
325207F000
stack
page read and write
160C2AD0000
heap
page read and write
C0000DE000
direct allocation
page read and write
1E16E070000
heap
page read and write
290F2E15000
heap
page read and write
290F3700000
trusted library section
page readonly
C0000E2000
direct allocation
page read and write
623CD8B000
stack
page read and write
160C2C29000
heap
page read and write
160C2C3C000
heap
page read and write
290F36C0000
trusted library section
page readonly
290F26FC000
heap
page read and write
160C2C00000
heap
page read and write
2242F85A000
heap
page read and write
1BEE21A0000
trusted library allocation
page read and write
26ACC000
stack
page read and write
C000180000
direct allocation
page read and write
B2FBF7B000
stack
page read and write
1E16DF40000
trusted library allocation
page read and write
290F263C000
heap
page read and write
290F26A1000
heap
page read and write
1BEE1A41000
heap
page read and write
2242F902000
heap
page read and write
905000
unkown
page execute and write copy
B2FBD77000
stack
page read and write
160C2C8E000
heap
page read and write
160C2AE0000
heap
page read and write
264CF000
stack
page read and write
1BEE2202000
trusted library allocation
page read and write
290F7E17000
heap
page read and write
160C2D00000
heap
page read and write
108000
heap
page read and write
290F2440000
heap
page read and write
1E16E310000
trusted library allocation
page read and write
1E16E190000
heap
page read and write
794000
unkown
page execute and write copy
C000190000
direct allocation
page read and write
160C2C7A000
heap
page read and write
401000
unkown
page execute and read and write
290F7C04000
trusted library allocation
page read and write
1BEE1A53000
heap
page read and write
B2FC17B000
stack
page read and write
2242F908000
heap
page read and write
9947AFE000
stack
page read and write
290F7EA4000
heap
page read and write
290F7D40000
trusted library allocation
page read and write
C000017000
direct allocation
page read and write
10CF000
stack
page read and write
290F7D40000
remote allocation
page read and write
2242F5D0000
heap
page read and write
290F7E00000
heap
page read and write
2242F855000
heap
page read and write
160C2D08000
heap
page read and write
160C2C4F000
heap
page read and write
1EE0F940000
trusted library allocation
page read and write
290F2671000
heap
page read and write
290F23D0000
heap
page read and write
32524FE000
stack
page read and write
290F7C10000
trusted library allocation
page read and write
1BEE1B00000
heap
page read and write
290F2629000
heap
page read and write
C00009E000
direct allocation
page read and write
1EE0FB02000
heap
page read and write
99475AE000
stack
page read and write
160C2C88000
heap
page read and write
28D39000
stack
page read and write
DDF000
stack
page read and write
E20000
direct allocation
page read and write
290F2676000
heap
page read and write
290F7EFA000
heap
page read and write
22430002000
trusted library allocation
page read and write
160C2D02000
heap
page read and write
160C2B70000
trusted library allocation
page read and write
290F7D30000
trusted library allocation
page read and write
26CCF000
stack
page read and write
6839F3C000
stack
page read and write
C0000C9000
direct allocation
page read and write
1EE0FA70000
heap
page read and write
1C4000
direct allocation
page read and write
906000
unkown
page read and write
C0000CE000
direct allocation
page read and write
400000
unkown
page readonly
160C2C47000
heap
page read and write
EC0000
heap
page read and write
E6E377000
stack
page read and write
1E16EE00000
trusted library allocation
page read and write
290F7C20000
trusted library allocation
page read and write
266CF000
stack
page read and write
2242F900000
heap
page read and write
1E16E305000
heap
page read and write
290F7AC0000
trusted library allocation
page read and write
1E16E270000
trusted library allocation
page read and write
E40000
direct allocation
page read and write
290F7CB0000
trusted library allocation
page read and write
28F3F000
stack
page read and write
E0C000
direct allocation
page read and write
623D3F7000
stack
page read and write
994752F000
stack
page read and write
C000000000
direct allocation
page read and write
E6DD0F000
stack
page read and write
290F7C01000
trusted library allocation
page read and write
1E16E300000
heap
page read and write
C00000C000
direct allocation
page read and write
C000199000
direct allocation
page read and write
ADF000
stack
page read and write
290F7D00000
trusted library allocation
page read and write
1E16E170000
heap
page read and write
C00008E000
direct allocation
page read and write
C0000E6000
direct allocation
page read and write
C000094000
direct allocation
page read and write
C000008000
direct allocation
page read and write
290F36F0000
trusted library section
page readonly
E04000
direct allocation
page read and write
290F2DF0000
trusted library allocation
page read and write
290F268F000
heap
page read and write
290F7EF3000
heap
page read and write
146000
heap
page read and write
290F7EE2000
heap
page read and write
290F2F58000
heap
page read and write
E6E27B000
stack
page read and write
1BEE1900000
heap
page read and write
2242F84D000
heap
page read and write
B2FC07E000
stack
page read and write
290F7C00000
trusted library allocation
page read and write
623D0FE000
stack
page read and write
1E16E309000
heap
page read and write
290F7BEE000
trusted library allocation
page read and write
1EE0F7E0000
heap
page read and write
E6E0FD000
stack
page read and write
290F7BE8000
trusted library allocation
page read and write
C0001A2000
direct allocation
page read and write
290F2613000
heap
page read and write
1EE0FA02000
heap
page read and write
C0000FA000
direct allocation
page read and write
E00000
direct allocation
page read and write
C0001A8000
direct allocation
page read and write
2242F89C000
heap
page read and write
290F7C24000
trusted library allocation
page read and write
290F7E4B000
heap
page read and write
E6E57F000
stack
page read and write
1A0000
heap
page read and write
C000027000
direct allocation
page read and write
290F2DD3000
trusted library allocation
page read and write
C00008A000
direct allocation
page read and write
290F2600000
heap
page read and write
B2FB90B000
stack
page read and write
111000
heap
page read and write
623D5FF000
stack
page read and write
290F7E36000
heap
page read and write
683A67B000
stack
page read and write
290F3710000
trusted library section
page readonly
C000084000
direct allocation
page read and write
1C9000
direct allocation
page read and write
290F2540000
trusted library allocation
page read and write
C0000A2000
direct allocation
page read and write
160C2C4B000
heap
page read and write
C00000E000
direct allocation
page read and write
290F7EF8000
heap
page read and write
290F2713000
heap
page read and write
1EE0FA29000
heap
page read and write
1E16E0BE000
heap
page read and write
290F7CF0000
trusted library allocation
page read and write
160C2C4D000
heap
page read and write
E6DC8B000
stack
page read and write
E6DD8E000
stack
page read and write
C000182000
direct allocation
page read and write
1E16E0B6000
heap
page read and write
1EE0FA13000
heap
page read and write
623D4FE000
stack
page read and write
C00011A000
direct allocation
page read and write
2242F897000
heap
page read and write
121000
heap
page read and write
290F7C10000
trusted library allocation
page read and write
2242F813000
heap
page read and write
C000090000
direct allocation
page read and write
C0001AC000
direct allocation
page read and write
1E16DF30000
heap
page read and write
623D2FB000
stack
page read and write
1EE0F840000
heap
page read and write
C0000B8000
direct allocation
page read and write
C00001B000
direct allocation
page read and write
2242F829000
heap
page read and write
906000
unkown
page write copy
1E16E0BE000
heap
page read and write
1EE0FA3C000
heap
page read and write
290F2F02000
heap
page read and write
2242F84F000
heap
page read and write
2242F5C0000
heap
page read and write
160C3602000
trusted library allocation
page read and write
2242F84C000
heap
page read and write
1E16E0BE000
heap
page read and write
2242F853000
heap
page read and write
994797F000
stack
page read and write
C000014000
direct allocation
page read and write
C00011C000
direct allocation
page read and write
290F7BE0000
trusted library allocation
page read and write
C0000A8000
direct allocation
page read and write
290F7E2B000
heap
page read and write
290F2F00000
heap
page read and write
C0000C0000
direct allocation
page read and write
B2FC57F000
stack
page read and write
C000010000
direct allocation
page read and write
1E16F040000
trusted library allocation
page read and write
290F7D40000
remote allocation
page read and write
C000088000
direct allocation
page read and write
290F7EF4000
heap
page read and write
290F2702000
heap
page read and write
C000025000
direct allocation
page read and write
C0001AE000
direct allocation
page read and write
131000
heap
page read and write
C000020000
direct allocation
page read and write
2242F630000
heap
page read and write
623D07F000
stack
page read and write
2242F84B000
heap
page read and write
160C2C13000
heap
page read and write
290F2E00000
heap
page read and write
683A77E000
stack
page read and write
B2FC47E000
stack
page read and write
290F2E02000
heap
page read and write
290F268A000
heap
page read and write
C0000F2000
direct allocation
page read and write
160C2C4C000
heap
page read and write
290F9000000
heap
page read and write
290F7E65000
heap
page read and write
There are 356 hidden memdumps, click here to show them.