IOC Report
RechX2022.11.11_1045X.xls

loading gif

Files

File Path
Type
Category
Malicious
RechX2022.11.11_1045X.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: Gydar, Last Saved By: Gydar, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Thu Nov 10 07:26:07 2022, Security: 0
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\2yXcjy57oZTTUNweDidCGUY[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\o0oHPECmC0WPIXcvQPJOXzFOO7w00z7mkDO[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\EvvmhfKiKFhKrSuHfBq[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\RechX2022.11.11_1045X.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: Gydar, Last Saved By: Gydar, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Thu Nov 10 07:26:07 2022, Security: 0
dropped
malicious
C:\Users\user\elv2.ooocccxxx
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\elv3.ooocccxxx
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\elv4.ooocccxxx
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\AAA2.tmp (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\D116.tmp (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\~DF32588C8EB2A3FE52.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF8A90DB7077A13DA6.TMP
data
dropped
C:\Users\user\Desktop\6B247BB0.tmp (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: Gydar, Last Saved By: Gydar, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Thu Nov 10 07:26:07 2022, Security: 0
dropped
C:\Users\user\Desktop\BD680000
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: Gydar, Last Saved By: user, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Mon Nov 14 16:07:30 2022, Security: 0
dropped
C:\Users\user\Desktop\BD680000:Zone.Identifier
ASCII text, with CRLF line terminators
modified
C:\Windows\System32\HXVNCiWla\DkEI.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\LxJhBpIGuQtuqLqlk\rgLdvmpYAAMw.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\YsDsgPDHHUIQoh\TzrBJWzmduQmnx.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\YsDsgPDHHUIQoh\TzrBJWzmduQmnx.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\LxJhBpIGuQtuqLqlk\rgLdvmpYAAMw.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\HXVNCiWla\DkEI.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\YsDsgPDHHUIQoh\TzrBJWzmduQmnx.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\LxJhBpIGuQtuqLqlk\rgLdvmpYAAMw.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\HXVNCiWla\DkEI.dll
malicious
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://182.162.143.56/qhecxbnpzjg/
182.162.143.56
malicious
http://sbm.xinmoshiwang.com/upload/VaOfWEb3pW76UO/
47.92.35.35
malicious
https://182.162.143.56/boiplpwswxcuxnjh/uinwb/ubppn/lupq/
182.162.143.56
malicious
https://182.162.143.56/acqrviy/djjybechrofav/
182.162.143.56
malicious
https://182.162.143.56/foelwwmtkdwehjqr/njwmpsxnqsxod/rlwwfo/
182.162.143.56
malicious
https://182.162.143.56/urupsapzfmrxqv/
182.162.143.56
malicious
https://182.162.
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://ly.yjlianyi.top/wp-admin/4cChao/
81.68.152.197
http://crl.entrust.net/server1.crl0
unknown
https://datie-tw.com/img/O8G0RDZj7MYCuJyPoP/
175.98.167.165
http://ocsp.entrust.net03
unknown
https://173.255.211.88/owewlpmufrqxtxj/
unknown
https://copunupo.ac.zm/cgi-bin/WFFcGx/
41.63.0.22
https://182.162.143.56/boiplpwswxcuxnjh/uinwb/ubppn/lupq/B
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
https://182.162.143.56/urupsapzfmrxqv/zW
unknown
http://ocsp.entrust.net0D
unknown
https://secure.comodo.com/CPS0
unknown
http://crl.entrust.net/2048ca.crl0
unknown
There are 11 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sbm.xinmoshiwang.com
47.92.35.35
datie-tw.com
175.98.167.165
copunupo.ac.zm
41.63.0.22
ly.yjlianyi.top
81.68.152.197

IPs

IP
Domain
Country
Malicious
110.232.117.186
unknown
Australia
malicious
103.132.242.26
unknown
India
malicious
104.168.155.143
unknown
United States
malicious
79.137.35.198
unknown
France
malicious
45.118.115.99
unknown
Indonesia
malicious
172.104.251.154
unknown
United States
malicious
115.68.227.76
unknown
Korea Republic of
malicious
163.44.196.120
unknown
Singapore
malicious
206.189.28.199
unknown
United States
malicious
45.63.99.23
unknown
United States
malicious
107.170.39.149
unknown
United States
malicious
197.242.150.244
unknown
South Africa
malicious
185.4.135.165
unknown
Greece
malicious
183.111.227.137
unknown
Korea Republic of
malicious
45.176.232.124
unknown
Colombia
malicious
139.59.56.73
unknown
Singapore
malicious
169.57.156.166
unknown
United States
malicious
164.68.99.3
unknown
Germany
malicious
139.59.126.41
unknown
Singapore
malicious
167.172.253.162
unknown
United States
malicious
147.139.166.154
unknown
United States
malicious
202.129.205.3
unknown
Thailand
malicious
167.172.199.165
unknown
United States
malicious
153.92.5.27
unknown
Germany
malicious
159.65.140.115
unknown
United States
malicious
159.65.88.10
unknown
United States
malicious
172.105.226.75
unknown
United States
malicious
164.90.222.65
unknown
United States
malicious
213.239.212.5
unknown
Germany
malicious
5.135.159.50
unknown
France
malicious
173.255.211.88
unknown
United States
malicious
212.24.98.99
unknown
Lithuania
malicious
186.194.240.217
unknown
Brazil
malicious
91.187.140.35
unknown
Serbia
malicious
119.59.103.152
unknown
Thailand
malicious
159.89.202.34
unknown
United States
malicious
201.94.166.162
unknown
Brazil
malicious
160.16.142.56
unknown
Japan
malicious
103.75.201.2
unknown
Thailand
malicious
91.207.28.33
unknown
Kyrgyzstan
malicious
103.43.75.120
unknown
Japan
malicious
188.44.20.25
unknown
Macedonia
malicious
45.235.8.30
unknown
Brazil
malicious
153.126.146.25
unknown
Japan
malicious
72.15.201.15
unknown
United States
malicious
82.223.21.224
unknown
Spain
malicious
173.212.193.249
unknown
Germany
malicious
95.217.221.146
unknown
Germany
malicious
149.56.131.28
unknown
Canada
malicious
209.97.163.214
unknown
United States
malicious
182.162.143.56
unknown
Korea Republic of
malicious
1.234.2.232
unknown
Korea Republic of
malicious
129.232.188.93
unknown
South Africa
malicious
94.23.45.86
unknown
France
malicious
81.68.152.197
ly.yjlianyi.top
China
175.98.167.165
datie-tw.com
Taiwan; Republic of China (ROC)
47.92.35.35
sbm.xinmoshiwang.com
China
41.63.0.22
copunupo.ac.zm
Zambia
There are 48 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
TzrBJWzmduQmnx.dll
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
rgLdvmpYAAMw.dll
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
DkEI.dll
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
),'
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\6647D
6647D
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
4j'
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\86EAA
86EAA
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
There are 35 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1AA000
heap
page read and write
malicious
180001000
direct allocation
page execute read
malicious
3C0000
direct allocation
page execute and read and write
malicious
28A000
heap
page read and write
malicious
3B0000
direct allocation
page execute and read and write
malicious
1EF0000
direct allocation
page execute and read and write
malicious
2D0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
4C0000
direct allocation
page execute and read and write
malicious
3B0000
direct allocation
page execute and read and write
malicious
1B0000
direct allocation
page execute and read and write
malicious
37A000
heap
page read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
31A000
heap
page read and write
malicious
140000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
4B0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
2266000
heap
page read and write
218D000
heap
page read and write
540000
heap
page read and write
2E00000
heap
page read and write
550000
heap
page read and write
201000
heap
page read and write
249000
heap
page read and write
400000
remote allocation
page read and write
7FEF90F1000
unkown
page execute read
2D06000
heap
page read and write
239000
heap
page read and write
1FDB000
heap
page read and write
22B7000
heap
page read and write
2E2000
heap
page read and write
20A5000
heap
page read and write
2D39000
stack
page read and write
2186000
heap
page read and write
23EC000
stack
page read and write
3E4000
heap
page read and write
368000
heap
page read and write
21B000
stack
page read and write
21DE000
heap
page read and write
217B000
heap
page read and write
362000
heap
page read and write
5F0000
heap
page read and write
2C60000
heap
page read and write
23EF000
stack
page read and write
2C4000
heap
page read and write
10C000
stack
page read and write
23B000
heap
page read and write
2BD0000
heap
page read and write
126000
heap
page read and write
3304000
heap
page read and write
1F3000
heap
page read and write
2A8E000
stack
page read and write
21B5000
heap
page read and write
2E7E000
stack
page read and write
2E8000
heap
page read and write
1F60000
heap
page read and write
2B40000
heap
page read and write
544000
heap
page read and write
2130000
heap
page read and write
370000
heap
page read and write
35E000
heap
page read and write
2D02000
heap
page read and write
7FEF9157000
unkown
page read and write
3B0000
heap
page read and write
2C6E000
stack
page read and write
C3000
heap
page read and write
2D07000
heap
page read and write
534000
heap
page read and write
32F1000
heap
page read and write
3AD000
heap
page read and write
7FEF9112000
unkown
page readonly
400000
remote allocation
page read and write
18002F000
direct allocation
page readonly
18002D000
direct allocation
page readonly
2187000
heap
page read and write
21F7000
heap
page read and write
114000
heap
page read and write
7FEF915D000
unkown
page readonly
2156000
heap
page read and write
1F20000
direct allocation
page execute and read and write
3CD000
heap
page read and write
4FF000
stack
page read and write
236C000
stack
page read and write
2910000
heap
page read and write
7FEF90EA000
unkown
page readonly
2AF0000
heap
page read and write
4F6000
heap
page read and write
270000
heap
page read and write
2A90000
heap
page read and write
354000
heap
page read and write
80000
heap
page read and write
22E6000
heap
page read and write
2CF0000
heap
page read and write
213B000
heap
page read and write
150000
heap
page read and write
201000
heap
page read and write
215D000
heap
page read and write
2BF2000
heap
page read and write
180000000
direct allocation
page read and write
128000
heap
page read and write
3D6000
heap
page read and write
10000
heap
page read and write
249000
heap
page read and write
456000
heap
page read and write
21F0000
heap
page read and write
31C0000
heap
page read and write
1A3000
heap
page read and write
201000
heap
page read and write
2A0000
heap
page read and write
18002E000
direct allocation
page read and write
254F000
stack
page read and write
7FEF9081000
unkown
page execute read
18002E000
direct allocation
page read and write
346E000
stack
page read and write
2DA000
heap
page read and write
2B94000
heap
page read and write
1E8000
heap
page read and write
E0000
heap
page read and write
694000
heap
page read and write
2CE9000
heap
page read and write
2157000
heap
page read and write
2346000
heap
page read and write
7FEF9077000
unkown
page read and write
2BD9000
heap
page read and write
CA000
heap
page read and write
1D6000
heap
page read and write
1FD5000
heap
page read and write
2230000
heap
page read and write
216D000
heap
page read and write
13B000
heap
page read and write
18002F000
direct allocation
page readonly
377000
heap
page read and write
586000
heap
page read and write
2A6000
heap
page read and write
1ED000
stack
page read and write
18002E000
direct allocation
page read and write
4C0000
heap
page read and write
335000
heap
page read and write
2167000
heap
page read and write
18002E000
direct allocation
page read and write
20F7000
heap
page read and write
3B6000
heap
page read and write
200B000
heap
page read and write
590000
heap
page read and write
3E0000
heap
page read and write
25FC000
stack
page read and write
420000
heap
page read and write
7FEF90F0000
unkown
page readonly
180000000
direct allocation
page read and write
2B0000
direct allocation
page execute and read and write
2FE000
heap
page read and write
18002F000
direct allocation
page readonly
3B4000
heap
page read and write
2190000
heap
page read and write
690000
heap
page read and write
32F0000
heap
page read and write
5F4000
heap
page read and write
18002D000
direct allocation
page readonly
235A000
stack
page read and write
2C7000
heap
page read and write
2246000
heap
page read and write
261E000
stack
page read and write
21CE000
heap
page read and write
2316000
heap
page read and write
2820000
heap
page read and write
2120000
heap
page read and write
18002D000
direct allocation
page readonly
7FEF90F0000
unkown
page readonly
33FE000
stack
page read and write
2190000
heap
page read and write
3C0000
heap
page read and write
21C0000
heap
page read and write
180000000
direct allocation
page read and write
342000
heap
page read and write
52C000
stack
page read and write
384000
heap
page read and write
21CB000
heap
page read and write
77000
heap
page read and write
2D4000
heap
page read and write
2870000
heap
page read and write
2145000
heap
page read and write
282C000
stack
page read and write
7FEF907C000
unkown
page execute
23C000
stack
page read and write
180000000
direct allocation
page read and write
3E7000
heap
page read and write
30A3000
heap
page read and write
18002F000
direct allocation
page readonly
2287000
heap
page read and write
2D4000
heap
page read and write
1FA000
heap
page read and write
34D000
heap
page read and write
349000
heap
page read and write
18002F000
direct allocation
page readonly
6FF000
stack
page read and write
7FEF907C000
unkown
page execute
224D000
heap
page read and write
180000
heap
page read and write
3F6000
heap
page read and write
7FEF915D000
unkown
page readonly
18002E000
direct allocation
page read and write
135000
heap
page read and write
420000
heap
page read and write
10000
heap
page read and write
18002D000
direct allocation
page readonly
207000
heap
page read and write
2BDF000
heap
page read and write
7FEF9077000
unkown
page read and write
1FA5000
heap
page read and write
7EFE0000
unkown
page readonly
2C0000
heap
page read and write
7FEF9032000
unkown
page readonly
7FEF90EC000
unkown
page execute
7FEF90E7000
unkown
page read and write
18002D000
direct allocation
page readonly
1FA0000
heap
page read and write
3097000
heap
page read and write
25E000
heap
page read and write
21C0000
heap
page read and write
3E0000
direct allocation
page execute and read and write
207000
heap
page read and write
7FEF9011000
unkown
page execute read
3307000
heap
page read and write
22F7000
heap
page read and write
10000
heap
page read and write
10000
heap
page read and write
2180000
heap
page read and write
7FEF907D000
unkown
page readonly
253E000
stack
page read and write
400000
trusted library allocation
page read and write
2CB0000
heap
page read and write
20A0000
heap
page read and write
3300000
heap
page read and write
1A0000
trusted library allocation
page read and write
2469000
stack
page read and write
1F65000
heap
page read and write
310000
remote allocation
page read and write
1A7000
heap
page read and write
654000
heap
page read and write
4AE000
heap
page read and write
500000
trusted library allocation
page read and write
33E0000
heap
page read and write
180000
heap
page read and write
254C000
stack
page read and write
7FEF90ED000
unkown
page readonly
22A0000
heap
page read and write
22B6000
heap
page read and write
3280000
heap
page read and write
18002E000
direct allocation
page read and write
11B000
stack
page read and write
2AAC000
stack
page read and write
3B4000
heap
page read and write
1E0000
heap
page read and write
1A0000
remote allocation
page read and write
54B000
heap
page read and write
7FEF9032000
unkown
page readonly
7FEF907A000
unkown
page readonly
373000
heap
page read and write
180000000
direct allocation
page read and write
2150000
heap
page read and write
2D12000
heap
page read and write
280000
heap
page read and write
244F000
stack
page read and write
10000
heap
page read and write
7FEF907D000
unkown
page readonly
100000
heap
page read and write
2E8000
heap
page read and write
368000
heap
page read and write
2A0000
heap
page read and write
22E0000
heap
page read and write
D3000
heap
page read and write
184000
heap
page read and write
7FEF90EC000
unkown
page execute
190000
trusted library allocation
page read and write
7FEF90E7000
unkown
page read and write
23B9000
stack
page read and write
207000
heap
page read and write
2130000
heap
page read and write
2247000
heap
page read and write
210000
trusted library allocation
page read and write
2207000
heap
page read and write
222E000
heap
page read and write
21B0000
heap
page read and write
22DE000
heap
page read and write
24BF000
stack
page read and write
21FE000
heap
page read and write
1FD000
heap
page read and write
2EFE000
stack
page read and write
290000
heap
page read and write
443000
heap
page read and write
7FEF915D000
unkown
page readonly
515000
heap
page read and write
210000
remote allocation
page read and write
226D000
heap
page read and write
500000
trusted library allocation
page read and write
7FEF915C000
unkown
page execute
261B000
stack
page read and write
3F0000
heap
page read and write
7FEF907D000
unkown
page readonly
216E000
heap
page read and write
18002D000
direct allocation
page readonly
2699000
stack
page read and write
243000
heap
page read and write
1F0000
heap
page read and write
7FEF9010000
unkown
page readonly
4F0000
direct allocation
page execute and read and write
426000
heap
page read and write
22BE000
heap
page read and write
327F000
stack
page read and write
22E7000
heap
page read and write
AE000
heap
page read and write
384000
heap
page read and write
4E0000
direct allocation
page execute and read and write
7FEF9032000
unkown
page readonly
530000
heap
page read and write
2DE000
heap
page read and write
7FEF915A000
unkown
page readonly
500000
trusted library allocation
page read and write
21B7000
heap
page read and write
7FEF90A2000
unkown
page readonly
510000
heap
page read and write
18002F000
direct allocation
page readonly
2C8000
heap
page read and write
4F0000
direct allocation
page execute and read and write
10000
heap
page read and write
10000
heap
page read and write
49C000
heap
page read and write
30B4000
heap
page read and write
BE000
heap
page read and write
7FEF90ED000
unkown
page readonly
2280000
heap
page read and write
7FEF90EA000
unkown
page readonly
250D000
stack
page read and write
3090000
heap
page read and write
3B4000
heap
page read and write
7FEF9112000
unkown
page readonly
22DF000
stack
page read and write
26E000
heap
page read and write
21F6000
heap
page read and write
2DCE000
stack
page read and write
2D9E000
stack
page read and write
283000
heap
page read and write
7FEF915C000
unkown
page execute
2CF2000
heap
page read and write
2E2000
heap
page read and write
157000
heap
page read and write
2A7000
heap
page read and write
7FEF90F0000
unkown
page readonly
2E2000
heap
page read and write
2EEC000
stack
page read and write
2C0000
heap
page read and write
3C0000
heap
page read and write
18002D000
direct allocation
page readonly
510000
remote allocation
page read and write
234F000
stack
page read and write
20DB000
heap
page read and write
2B98000
heap
page read and write
23B000
heap
page read and write
327000
heap
page read and write
2DAF000
stack
page read and write
21B6000
heap
page read and write
650000
heap
page read and write
2DB0000
heap
page read and write
223F000
stack
page read and write
12C000
stack
page read and write
2A70000
heap
page read and write
184000
heap
page read and write
7FEF9080000
unkown
page readonly
2105000
heap
page read and write
2ECE000
stack
page read and write
374000
heap
page read and write
2CD0000
heap
page read and write
1DE000
heap
page read and write
2DDF000
stack
page read and write
2B83000
heap
page read and write
2B6000
heap
page read and write
227E000
heap
page read and write
740000
heap
page read and write
2A3D000
stack
page read and write
2B80000
heap
page read and write
3B0000
heap
page read and write
27B000
stack
page read and write
18002F000
direct allocation
page readonly
2B0000
heap
page read and write
21D0000
heap
page read and write
26C000
stack
page read and write
10000
heap
page read and write
180000000
direct allocation
page read and write
498000
heap
page read and write
7FEF9010000
unkown
page readonly
2FA000
heap
page read and write
247D000
stack
page read and write
2276000
heap
page read and write
2100000
heap
page read and write
7FEF9080000
unkown
page readonly
10000
heap
page read and write
24EF000
stack
page read and write
3C1000
heap
page read and write
4F0000
trusted library allocation
page read and write
249F000
stack
page read and write
370000
heap
page read and write
3F6000
heap
page read and write
580000
heap
page read and write
32D000
heap
page read and write
620000
heap
page read and write
3C0000
heap
page read and write
210000
remote allocation
page read and write
510000
remote allocation
page read and write
2140000
heap
page read and write
7FEF9081000
unkown
page execute read
18002D000
direct allocation
page readonly
2E6000
heap
page read and write
87000
heap
page read and write
18002E000
direct allocation
page read and write
2C8000
heap
page read and write
32E0000
heap
page read and write
7FEF90ED000
unkown
page readonly
310000
remote allocation
page read and write
12C000
stack
page read and write
2277000
heap
page read and write
1E8000
heap
page read and write
7FEF9011000
unkown
page execute read
22F6000
heap
page read and write
2F3000
heap
page read and write
2280000
heap
page read and write
7FEF90A2000
unkown
page readonly
33FF000
stack
page read and write
1E7000
heap
page read and write
1F3000
heap
page read and write
2C0000
heap
page read and write
334000
heap
page read and write
359000
heap
page read and write
349000
heap
page read and write
7FEF9112000
unkown
page readonly
44A000
heap
page read and write
7FEF907A000
unkown
page readonly
18002D000
direct allocation
page readonly
3E0000
heap
page read and write
237000
heap
page read and write
21A0000
heap
page read and write
1F9B000
heap
page read and write
2B40000
heap
page read and write
30B8000
heap
page read and write
7FEF915A000
unkown
page readonly
2BEE000
heap
page read and write
201000
heap
page read and write
243000
heap
page read and write
2310000
heap
page read and write
216000
heap
page read and write
2AE000
stack
page read and write
339000
heap
page read and write
22B000
stack
page read and write
3308000
heap
page read and write
300000
trusted library allocation
page read and write
257F000
stack
page read and write
624000
heap
page read and write
362000
heap
page read and write
1B6000
heap
page read and write
2D3E000
stack
page read and write
2D6000
heap
page read and write
410000
heap
page read and write
205E000
stack
page read and write
21EB000
heap
page read and write
2F6000
heap
page read and write
342000
heap
page read and write
10000
heap
page read and write
18002F000
direct allocation
page readonly
110000
heap
page read and write
2195000
heap
page read and write
2B70000
heap
page read and write
20C0000
heap
page read and write
2DE000
heap
page read and write
10000
heap
page read and write
2B9C000
heap
page read and write
25CE000
stack
page read and write
226000
heap
page read and write
2EFE000
stack
page read and write
30BC000
heap
page read and write
22F0000
heap
page read and write
3F7000
heap
page read and write
2230000
heap
page read and write
77F000
stack
page read and write
7FEF915A000
unkown
page readonly
2A0C000
stack
page read and write
24DC000
stack
page read and write
2CE0000
heap
page read and write
465000
heap
page read and write
330D000
heap
page read and write
114000
heap
page read and write
456000
heap
page read and write
2B81000
heap
page read and write
433000
heap
page read and write
320000
heap
page read and write
220D000
heap
page read and write
2C6000
heap
page read and write
584000
heap
page read and write
4F0000
direct allocation
page execute and read and write
1A0000
heap
page read and write
384000
heap
page read and write
7FEF907A000
unkown
page readonly
7FEF9011000
unkown
page execute read
1E4000
heap
page read and write
744000
heap
page read and write
2075000
heap
page read and write
2C4000
heap
page read and write
43A000
heap
page read and write
2070000
heap
page read and write
180000000
direct allocation
page read and write
21BD000
heap
page read and write
296C000
stack
page read and write
414000
heap
page read and write
7FEF9157000
unkown
page read and write
3F0000
trusted library allocation
page read and write
20F6000
heap
page read and write
1E6000
heap
page read and write
141000
heap
page read and write
133000
heap
page read and write
18002E000
direct allocation
page read and write
2CFE000
heap
page read and write
7FEF90A2000
unkown
page readonly
3F0000
heap
page read and write
313000
heap
page read and write
7FEF90E7000
unkown
page read and write
24E000
heap
page read and write
2BCE000
stack
page read and write
4A2000
heap
page read and write
510000
trusted library allocation
page read and write
22B0000
heap
page read and write
3A0000
heap
page read and write
500000
trusted library allocation
page read and write
23AF000
stack
page read and write
2CCF000
stack
page read and write
180000000
direct allocation
page read and write
24E000
heap
page read and write
180000000
direct allocation
page read and write
230000
heap
page read and write
7FEF90F1000
unkown
page execute read
1A0000
heap
page read and write
170000
direct allocation
page execute and read and write
2BE1000
heap
page read and write
24DE000
stack
page read and write
18002F000
direct allocation
page readonly
1F30000
trusted library allocation
page read and write
180000
heap
page read and write
2317000
heap
page read and write
37D000
heap
page read and write
1A0000
remote allocation
page read and write
2267000
heap
page read and write
30A1000
heap
page read and write
35E000
heap
page read and write
21FD000
heap
page read and write
7FEF9157000
unkown
page read and write
2240000
heap
page read and write
261000
heap
page read and write
2166000
heap
page read and write
120000
heap
page read and write
42E000
heap
page read and write
7FEF907C000
unkown
page execute
1F3000
heap
page read and write
200000
trusted library allocation
page read and write
2720000
heap
page read and write
2210000
heap
page read and write
565000
heap
page read and write
2D01000
heap
page read and write
7FEF915C000
unkown
page execute
136000
heap
page read and write
7FEF9080000
unkown
page readonly
7FEF90EA000
unkown
page readonly
116000
heap
page read and write
7FEF90EC000
unkown
page execute
1FD0000
heap
page read and write
2DCE000
stack
page read and write
3260000
heap
page read and write
7FEF9010000
unkown
page readonly
2E8000
heap
page read and write
255E000
stack
page read and write
359000
heap
page read and write
500000
remote allocation
page read and write
3F6000
heap
page read and write
18002E000
direct allocation
page read and write
2286000
heap
page read and write
24000
heap
page read and write
24CC000
stack
page read and write
3BB000
heap
page read and write
1F9000
heap
page read and write
310000
trusted library allocation
page read and write
644000
heap
page read and write
2E8000
heap
page read and write
20FD000
heap
page read and write
70000
heap
page read and write
1F0000
direct allocation
page execute and read and write
17C000
stack
page read and write
2A7E000
stack
page read and write
560000
heap
page read and write
7FEF90F1000
unkown
page execute read
500000
remote allocation
page read and write
2980000
heap
page read and write
2BC0000
heap
page read and write
34D000
heap
page read and write
59E000
stack
page read and write
207000
heap
page read and write
2206000
heap
page read and write
596000
heap
page read and write
2347000
heap
page read and write
3B8000
heap
page read and write
460000
heap
page read and write
2340000
heap
page read and write
7FEF9077000
unkown
page read and write
556000
heap
page read and write
20AB000
heap
page read and write
41E000
heap
page read and write
DA000
heap
page read and write
2E6E000
stack
page read and write
520000
heap
page read and write
18E000
heap
page read and write
640000
heap
page read and write
226E000
heap
page read and write
7FEF9081000
unkown
page execute read
11B000
heap
page read and write
2270000
heap
page read and write
235000
heap
page read and write
20000
heap
page read and write
2AF0000
heap
page read and write
597000
heap
page read and write
266D000
stack
page read and write
There are 620 hidden memdumps, click here to show them.