IOC Report
COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe

loading gif

Files

File Path
Type
Category
Malicious
COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\acceptancy
ASCII text, with very long lines (28674), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\aut6C1C.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut6CC8.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\teer
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
"C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\cscript.exe
"C:\Windows\SysWOW64\cscript.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\SysWOW64\svchost.exe"

URLs

Name
IP
Malicious
www.crucka.xyz/jd21/
malicious
http://www.thepowerofzeus.com/jd21/?tBZLfTtx=28cPGcaENb280W65HmbHU6pQLIPuemsbyE+toeghGUICUOM9gHK+zZW7s47qkPel79A7Dw==&oHEpRr=M2JpdRJ
185.107.56.60
malicious
http://www.00050591.xyz/jd21/?tBZLfTtx=+5nsDbzeImt5UbX4GDv04YNxDKhKydlr4q6vzHl7qi3uGOgXSU0vDET8vanb4niZtoheVA==&oHEpRr=M2JpdRJ
65.21.196.90
malicious
http://www.arthemis-168bet.site/jd21/?tBZLfTtx=4y1ij/qZRR1bNd/L/F5yLi+I0SkPKWffZZi+nDy9y9Wv5I2iqoZUG1btNWEB8myok8jbUg==&oHEpRr=M2JpdRJ
84.32.84.32
malicious
http://www.ilovetvs.com/jd21/?tBZLfTtx=Bo1mqRoziIz4wcXV2Hze6fEKc1jUulyNDnBrZ1tCE4J7kcYVEj/nayXnveqqwa6JZwq74w==&oHEpRr=M2JpdRJ
162.241.203.16
malicious
http://www.crucka.xyzReferer:
unknown
http://www.uhug.xyz/jd21/
unknown
http://www.alivioquantico.comReferer:
unknown
http://www.00050591.xyz/jd21/
unknown
http://www.freyja.info
unknown
http://www.alivioquantico.com/jd21/www.00050591.xyz
unknown
http://www.ilovetvs.com
unknown
http://www.mantapnagita777.com/jd21/
unknown
http://www.thepowerofzeus.com
unknown
http://www.gbqspj.club/jd21/
unknown
http://www.freyja.info/jd21/
unknown
http://www.mantapnagita777.com/jd21/www.kapten69pola.xyz
unknown
http://www.tyumk.xyzReferer:
unknown
http://www.00050591.xyz/jd21/www.kjsdhklssk73.xyz
unknown
http://www.arthemis-168bet.site/jd21/www.ilovetvs.com
unknown
http://www.bougeefilth.com
unknown
http://www.thepowerofzeus.comReferer:
unknown
http://www.amsya.comReferer:
unknown
http://www.gbqspj.clubReferer:
unknown
http://www.mantapnagita777.comReferer:
unknown
http://www.bougeefilth.com/jd21/
unknown
http://www.thepowerofzeus.com/jd21/www.alivioquantico.com
unknown
http://www.kapten69pola.xyz
unknown
http://www.tyumk.xyz/jd21/
unknown
http://www.00050591.xyzReferer:
unknown
http://www.amsya.com
unknown
http://www.autoitscript.com/autoit3
unknown
http://www.batremake.com/jd21/www.gbqspj.club
unknown
http://www.kjsdhklssk73.xyz/jd21/
unknown
http://www.tyumk.xyz/jd21/www.amsya.com
unknown
http://www.bougeefilth.com/jd21/www.uhug.xyz
unknown
http://www.batremake.com
unknown
http://www.ilovetvs.com/jd21/
unknown
http://www.piriform.com/ccleanerxe
unknown
http://www.uhug.xyz/jd21/www.crucka.xyz
unknown
http://www.alivioquantico.com/jd21/
unknown
http://www.freyja.infoReferer:
unknown
http://www.kjsdhklssk73.xyz/jd21/www.arthemis-168bet.site
unknown
http://www.batremake.com/jd21/
unknown
http://www.freyja.info/jd21/www.batremake.com
unknown
http://thebatcompany.fr/jd21?tBZLfTtx=GfbF6txqq2gI5hQXVs74X
unknown
http://www.arthemis-168bet.siteReferer:
unknown
http://www.crucka.xyz
unknown
http://www.ilovetvs.comReferer:
unknown
http://www.uhug.xyz
unknown
http://www.uhug.xyzReferer:
unknown
http://www.crucka.xyz/jd21/
unknown
http://java.sun.com
unknown
http://www.arthemis-168bet.site/jd21/
unknown
http://www.ilovetvs.com/jd21/www.bougeefilth.com
unknown
http://www.arthemis-168bet.site
unknown
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
unknown
http://www.gbqspj.club
unknown
http://www.kapten69pola.xyz/jd21/
unknown
http://www.batremake.comReferer:
unknown
http://www.kjsdhklssk73.xyzReferer:
unknown
http://www.alivioquantico.com
unknown
http://www.crucka.xyz/jd21/www.freyja.info
unknown
http://www.thepowerofzeus.com/jd21/
unknown
http://www.gbqspj.club/jd21/www.mantapnagita777.com
unknown
http://www.piriform.com/ccleaner
unknown
http://www.kapten69pola.xyzReferer:
unknown
http://www.amsya.com/jd21/
unknown
https://support.mozilla.org
unknown
http://www.00050591.xyz
unknown
http://www.kapten69pola.xyz/jd21/www.tyumk.xyz
unknown
http://www.tyumk.xyz
unknown
http://www.kjsdhklssk73.xyz
unknown
http://www.bougeefilth.comReferer:
unknown
http://www.mantapnagita777.com
unknown
There are 65 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
alivioquantico.com
192.185.209.182
malicious
ilovetvs.com
162.241.203.16
malicious
www.thepowerofzeus.com
185.107.56.60
malicious
arthemis-168bet.site
84.32.84.32
malicious
00050591.xyz
65.21.196.90
malicious
www.00050591.xyz
unknown
malicious
www.uhug.xyz
unknown
malicious
www.gbqspj.club
unknown
malicious
www.arthemis-168bet.site
unknown
malicious
www.bougeefilth.com
unknown
malicious
www.kjsdhklssk73.xyz
unknown
malicious
www.alivioquantico.com
unknown
malicious
www.crucka.xyz
unknown
malicious
www.ilovetvs.com
unknown
malicious
www.batremake.com
213.186.33.5
www.mantapnagita777.com
104.21.91.94
parkingpage.namecheap.com
91.195.240.19
www.freyja.info
76.223.54.146
There are 8 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
192.185.209.182
alivioquantico.com
United States
malicious
65.21.196.90
00050591.xyz
United States
malicious
185.107.56.60
www.thepowerofzeus.com
Netherlands
malicious
162.241.203.16
ilovetvs.com
United States
malicious
84.32.84.32
arthemis-168bet.site
Lithuania
malicious

Registry

Path
Value
Malicious
unknown
{993BE281-6695-4BA5-8A2A-7AACBFAAB69E} {0000013A-0000-0000-C000-000000000046} 0xFFFF
malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.AAC\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ADT\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.contact\OpenWithProgids
contact_wab_auto_file
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.DVR\OpenWithProgids
MediaCenter.DVR
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.DVR-MS\OpenWithProgids
MediaCenter.DVR-MS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dwfx\OpenWithProgids
Windows.XPSReachViewer
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jtx\OpenWithProgids
Windows.XPSReachViewer
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.M2T\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.14
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wpl\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WTV\OpenWithProgids
MediaCenter.WTVFile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xps\OpenWithProgids
Windows.XPSReachViewer
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
There are 91 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
110000
unclassified section
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
80000
system
page execute and read and write
malicious
1A0000
unclassified section
page execute and read and write
malicious
2D0000
trusted library allocation
page read and write
malicious
1C0000
direct allocation
page read and write
malicious
480000
unclassified section
page execute and read and write
malicious
1A0000
unkown
page readonly
3F0F000
unkown
page read and write
7440000
heap
page read and write
226000
heap
page read and write
140000
trusted library allocation
page read and write
6B90000
heap
page read and write
796E000
unkown
page read and write
5FE0000
unkown
page read and write
140000
trusted library allocation
page read and write
5FD0000
unkown
page read and write
2A5000
heap
page read and write
1FE7000
heap
page read and write
4200000
unkown
page read and write
2B00000
unkown
page readonly
3D17000
unkown
page read and write
12DC000
unkown
page readonly
5FB4000
heap
page read and write
400000
unkown
page readonly
6910000
heap
page read and write
3F03000
unkown
page read and write
7DE8000
unkown
page read and write
2D11000
direct allocation
page read and write
2BD0000
heap
page read and write
3980000
unkown
page read and write
850000
heap
page read and write
2D11000
direct allocation
page read and write
A17000
heap
page read and write
3BB0000
unkown
page read and write
69BB000
stack
page read and write
1130000
heap
page read and write
A8B000
heap
page read and write
2D14000
direct allocation
page read and write
2080000
direct allocation
page execute and read and write
1FE4000
heap
page read and write
140000
trusted library allocation
page read and write
3C60000
unkown
page readonly
6F0000
heap
page read and write
6F7000
heap
page read and write
140000
trusted library allocation
page read and write
26B000
heap
page read and write
110000
heap
page read and write
62B0000
heap
page read and write
400000
unkown
page readonly
2D11000
direct allocation
page read and write
560000
heap
page read and write
2B0A000
direct allocation
page read and write
2C20000
direct allocation
page read and write
8429000
unkown
page read and write
10000
heap
page read and write
8553000
unkown
page read and write
140000
trusted library allocation
page read and write
3D38000
unkown
page read and write
2A40000
unkown
page readonly
1B0000
direct allocation
page execute and read and write
260A000
unkown
page read and write
26B6000
unclassified section
page read and write
85D3000
unkown
page read and write
3C10000
unkown
page read and write
2AF1000
unkown
page read and write
2D17000
direct allocation
page read and write
1314000
unkown
page readonly
140000
trusted library allocation
page read and write
2CC000
stack
page read and write
226000
heap
page read and write
2D80000
direct allocation
page read and write
1CA000
heap
page read and write
A57000
heap
page read and write
47D5000
heap
page read and write
25DF000
unkown
page read and write
140000
trusted library allocation
page read and write
3BC0000
unkown
page read and write
2420000
unkown
page read and write
6760000
stack
page read and write
801C000
stack
page read and write
3D17000
unkown
page read and write
720A000
heap
page read and write
997000
direct allocation
page execute and read and write
1FBD000
stack
page read and write
48B0000
heap
page read and write
380000
trusted library allocation
page execute and read and write
7DC0000
unkown
page read and write
3E47000
unkown
page read and write
3B97000
stack
page read and write
720000
unkown
page readonly
3C00000
unkown
page read and write
9570000
heap
page read and write
1BE000
heap
page read and write
4658000
unkown
page read and write
33C000
unkown
page read and write
A6B000
heap
page read and write
2B9E000
stack
page read and write
47F9000
stack
page read and write
270000
heap
page read and write
705E000
stack
page read and write
7F05000
heap
page read and write
2160000
direct allocation
page execute and read and write
B03000
heap
page read and write
300000
unkown
page read and write
3F05000
unkown
page read and write
3E82000
unkown
page read and write
3CC0000
unkown
page read and write
3A60000
unkown
page readonly
20000
trusted library allocation
page read and write
2D17000
direct allocation
page read and write
69F0000
heap
page read and write
1B0000
heap
page read and write
1FE000
heap
page read and write
657D000
stack
page read and write
820000
direct allocation
page execute and read and write
3F05000
unkown
page read and write
23C0000
unkown
page read and write
140000
trusted library allocation
page read and write
2D14000
direct allocation
page read and write
3BF0000
unkown
page read and write
140000
trusted library allocation
page read and write
48AC000
stack
page read and write
39B0000
unkown
page read and write
140000
trusted library allocation
page read and write
2C10000
direct allocation
page read and write
140000
trusted library allocation
page read and write
140000
trusted library allocation
page read and write
A7B000
heap
page read and write
A5E000
stack
page read and write
1302000
unkown
page readonly
50D000
heap
page read and write
6090000
unkown
page read and write
2ACA000
stack
page read and write
6EC000
stack
page read and write
392E000
stack
page read and write
2A30000
direct allocation
page read and write
7F00000
heap
page read and write
580000
unkown
page readonly
2C10000
direct allocation
page read and write
140000
trusted library allocation
page read and write
B12000
heap
page read and write
6760000
stack
page read and write
3C80000
unkown
page read and write
2050000
heap
page read and write
3980000
unkown
page read and write
B12000
heap
page read and write
83D3000
unkown
page read and write
2AF1000
unkown
page read and write
2D11000
direct allocation
page read and write
472E000
stack
page read and write
3EE0000
unkown
page read and write
74C0000
unkown
page read and write
2177000
direct allocation
page execute and read and write
27DE000
stack
page read and write
1F7000
heap
page read and write
6A13000
heap
page read and write
5ED9000
stack
page read and write
AD1000
heap
page read and write
6F50000
heap
page read and write
1CA000
heap
page read and write
2D20000
direct allocation
page read and write
1C4000
heap
page read and write
2607000
unkown
page read and write
1B0000
heap
page read and write
73B0000
heap
page read and write
1D6000
heap
page read and write
E0000
unkown
page read and write
B13000
heap
page read and write
2D20000
direct allocation
page read and write
23B0000
unkown
page read and write
2F4000
heap
page read and write
21E5000
unkown
page read and write
2B9E000
stack
page read and write
8590000
unkown
page read and write
50A000
heap
page read and write
140000
trusted library allocation
page read and write
140000
trusted library allocation
page read and write
1BED000
heap
page read and write
B12000
heap
page read and write
140000
trusted library allocation
page read and write
9C000
stack
page read and write
3AA1000
unkown
page read and write
2B0A000
direct allocation
page read and write
2D9F000
unclassified section
page read and write
A57000
heap
page read and write
1B65000
heap
page read and write
78E6000
unkown
page read and write
E0000
unkown
page read and write
20000
heap
page read and write
84D4000
unkown
page read and write
4050000
unkown
page readonly
A6C000
heap
page read and write
994000
direct allocation
page execute and read and write
2D00000
direct allocation
page read and write
5FC0000
unkown
page read and write
249F000
unkown
page read and write
1D30000
unkown
page readonly
80E7000
unkown
page execute and read and write
1FE1000
heap
page read and write
4B0000
unclassified section
page execute and read and write
2D20000
direct allocation
page read and write
10000
heap
page read and write
3C50000
unkown
page readonly
39C0000
unkown
page read and write
371000
trusted library allocation
page execute and read and write
720000
direct allocation
page execute and read and write
A57000
heap
page read and write
684000
heap
page read and write
22B000
stack
page read and write
69F4000
heap
page read and write
676B000
stack
page read and write
8126000
unkown
page execute and read and write
5FD4000
unkown
page read and write
6B7E000
stack
page read and write
2A30000
direct allocation
page read and write
6F73000
heap
page read and write
676B000
stack
page read and write
2CB0000
unkown
page readonly
2D17000
direct allocation
page read and write
2C10000
direct allocation
page read and write
2C20000
direct allocation
page read and write
47D0000
heap
page read and write
A58000
heap
page read and write
2380000
unkown
page read and write
3AB0000
unkown
page read and write
5E08000
stack
page read and write
3ED0000
unkown
page read and write
1B65000
heap
page read and write
21D000
stack
page read and write
3D10000
unkown
page read and write
3E59000
unkown
page read and write
580000
unkown
page readonly
179000
stack
page read and write
22F1000
direct allocation
page execute and read and write
2B00000
unkown
page readonly
3BC0000
unkown
page read and write
2B0D000
direct allocation
page read and write
90A3000
system
page execute and read and write
1BD0000
heap
page read and write
2C20000
direct allocation
page read and write
681000
heap
page read and write
3A4E000
stack
page read and write
810000
direct allocation
page execute and read and write
470000
heap
page read and write
1CD2000
unkown
page read and write
1B7000
heap
page read and write
3B97000
stack
page read and write
6FD000
heap
page read and write
140000
trusted library allocation
page read and write
2070000
direct allocation
page execute and read and write
626E000
stack
page read and write
880000
direct allocation
page execute and read and write
3B00000
unkown
page read and write
21E0000
direct allocation
page execute and read and write
49CD000
stack
page read and write
A57000
heap
page read and write
6F7000
heap
page read and write
2B0A000
direct allocation
page read and write
3F03000
unkown
page read and write
2CB0000
unkown
page readonly
2D14000
direct allocation
page read and write
140000
trusted library allocation
page read and write
D6000
heap
page read and write
2B0000
unkown
page read and write
31E000
unkown
page read and write
2C20000
direct allocation
page read and write
4040000
unkown
page readonly
A57000
heap
page read and write
140000
trusted library allocation
page read and write
3E98000
unkown
page read and write
A8D000
heap
page read and write
1D10000
unkown
page readonly
1310000
unkown
page write copy
1B60000
heap
page read and write
626E000
stack
page read and write
2C20000
direct allocation
page read and write
1F9000
heap
page read and write
3ED0000
unkown
page read and write
350000
system
page execute and read and write
3D00000
unkown
page readonly
401E000
stack
page read and write
2420000
unkown
page read and write
2D80000
direct allocation
page read and write
1B30000
unkown
page readonly
347000
heap
page read and write
2D9E000
heap
page read and write
2CF0000
heap
page read and write
2D14000
direct allocation
page read and write
683B000
stack
page read and write
7200000
heap
page read and write
2407000
unkown
page read and write
7DE0000
unkown
page read and write
10000
heap
page read and write
140000
trusted library allocation
page read and write
3BF0000
unkown
page read and write
234E000
unkown
page read and write
A88000
heap
page read and write
2D95000
heap
page read and write
2A5000
heap
page read and write
A8D000
heap
page read and write
880F000
system
page read and write
23B0000
unkown
page read and write
39A0000
unkown
page read and write
3C80000
unkown
page read and write
A6B000
heap
page read and write
6F2000
heap
page read and write
A00000
direct allocation
page execute and read and write
4658000
unkown
page read and write
3AD0000
unkown
page read and write
676000
unclassified section
page execute and read and write
83D3000
unkown
page read and write
6C90000
heap
page read and write
25E0000
unkown
page read and write
21E5000
unkown
page read and write
3B00000
unkown
page read and write
6CF000
stack
page read and write
8FE0000
system
page execute and read and write
2C10000
direct allocation
page read and write
994000
heap
page read and write
720000
unkown
page readonly
6C0000
heap
page read and write
7DE8000
unkown
page read and write
1D10000
unkown
page readonly
6DEE000
stack
page read and write
1B60000
heap
page read and write
140000
trusted library allocation
page read and write
8020000
unkown
page execute and read and write
20000
unkown
page readonly
6699000
stack
page read and write
2174000
direct allocation
page execute and read and write
23D0000
unkown
page read and write
298000
heap
page read and write
2D00000
direct allocation
page read and write
2B0D000
direct allocation
page read and write
3BD0000
unkown
page read and write
90A5000
system
page execute and read and write
1B7000
heap
page read and write
41FC000
stack
page read and write
300000
unkown
page read and write
340000
heap
page read and write
6FF000
stack
page read and write
799B000
unkown
page read and write
280000
heap
page read and write
3E47000
unkown
page read and write
7DC0000
heap
page read and write
3B10000
unkown
page read and write
430000
heap
page read and write
8553000
unkown
page read and write
28E000
heap
page read and write
4630000
unkown
page read and write
D0000
heap
page read and write
5B0000
trusted library allocation
page execute and read and write
3870000
unkown
page read and write
4630000
unkown
page read and write
23E0000
unkown
page readonly
3C70000
unkown
page readonly
415E000
stack
page read and write
670000
heap
page read and write
3ECA000
unkown
page read and write
590000
heap
page read and write
78F1000
unkown
page read and write
A6B000
heap
page read and write
7972000
unkown
page read and write
1CD2000
unkown
page read and write
62B0000
heap
page read and write
8CFF000
system
page read and write
6699000
stack
page read and write
10000
heap
page read and write
1240000
unkown
page readonly
84D4000
unkown
page read and write
9410000
heap
page read and write
3B90000
stack
page read and write
140000
trusted library allocation
page read and write
6B90000
heap
page read and write
23D0000
unkown
page read and write
140000
trusted library allocation
page read and write
1CFA000
unkown
page read and write
3EE000
stack
page read and write
2F0000
heap
page read and write
8412000
unkown
page read and write
9B2000
heap
page read and write
1B83000
heap
page read and write
19C000
stack
page read and write
22F7000
direct allocation
page execute and read and write
1B40000
unkown
page read and write
5FFE000
unkown
page read and write
63A000
heap
page read and write
682F000
stack
page read and write
2170000
direct allocation
page execute and read and write
2AC0000
stack
page read and write
2AE0000
unkown
page read and write
6DF000
stack
page read and write
23C0000
unkown
page read and write
7968000
unkown
page read and write
6EC000
heap
page read and write
140000
trusted library allocation
page read and write
7170000
heap
page read and write
2A30000
direct allocation
page read and write
8490000
unkown
page read and write
6EA000
stack
page read and write
2968000
stack
page read and write
A5C000
heap
page read and write
7200000
heap
page read and write
1BE0000
unkown
page readonly
2D00000
direct allocation
page read and write
A8D000
heap
page read and write
3BB0000
unkown
page read and write
3C70000
unkown
page readonly
7F0000
heap
page read and write
8616000
system
page read and write
249F000
unkown
page read and write
5FDE000
unkown
page read and write
90B5000
system
page execute and read and write
1C0000
trusted library allocation
page read and write
3B90000
stack
page read and write
3E82000
unkown
page read and write
3AA1000
unkown
page read and write
7DDE000
unkown
page read and write
7964000
unkown
page read and write
A34000
heap
page read and write
3DB1000
unkown
page read and write
2D9E000
heap
page read and write
1EF0000
heap
page read and write
3AC0000
unkown
page read and write
472E000
stack
page read and write
2D00000
direct allocation
page read and write
2C20000
direct allocation
page read and write
2B0D000
direct allocation
page read and write
2B0D000
direct allocation
page read and write
A7A000
heap
page read and write
3970000
unkown
page readonly
1C4000
heap
page read and write
64F0000
heap
page read and write
A57000
heap
page read and write
3BD0000
unkown
page read and write
68B8000
stack
page read and write
710000
direct allocation
page execute and read and write
7972000
unkown
page read and write
295E000
stack
page read and write
20000
unkown
page readonly
A57000
heap
page read and write
2430000
unkown
page read and write
8C000
stack
page read and write
A8D000
heap
page read and write
140000
trusted library allocation
page read and write
2A30000
direct allocation
page read and write
2C90000
unkown
page readonly
6F55000
heap
page read and write
800000
direct allocation
page execute and read and write
140000
trusted library allocation
page read and write
2D00000
direct allocation
page read and write
683B000
stack
page read and write
3E59000
unkown
page read and write
391000
trusted library allocation
page execute and read and write
798D000
unkown
page read and write
5E02000
stack
page read and write
1CFA000
unkown
page read and write
3CC0000
unkown
page read and write
657D000
stack
page read and write
2D80000
direct allocation
page read and write
2C5F000
stack
page read and write
6C90000
heap
page read and write
3C50000
unkown
page readonly
890000
direct allocation
page execute and read and write
6F8000
heap
page read and write
2D17000
direct allocation
page read and write
A6C000
heap
page read and write
4638000
unkown
page read and write
1302000
unkown
page readonly
A8D000
heap
page read and write
2D20000
direct allocation
page read and write
3EE7000
unkown
page read and write
5E10000
unkown
page read and write
2D17000
direct allocation
page read and write
140000
trusted library allocation
page read and write
2D20000
direct allocation
page read and write
1B83000
heap
page read and write
49CD000
stack
page read and write
9260000
heap
page read and write
140000
trusted library allocation
page read and write
2F4000
heap
page read and write
380000
trusted library allocation
page execute and read and write
2B0D000
direct allocation
page read and write
2CF0000
heap
page read and write
382B000
stack
page read and write
6AEF000
stack
page read and write
3B92000
stack
page read and write
8453000
unkown
page read and write
3A4E000
stack
page read and write
2C5F000
stack
page read and write
A8D000
heap
page read and write
140000
trusted library allocation
page read and write
1BE0000
unkown
page readonly
A5C000
heap
page read and write
28AF000
unclassified section
page read and write
2177000
stack
page read and write
78E6000
unkown
page read and write
23E0000
unkown
page readonly
1241000
unkown
page execute read
3F0F000
unkown
page read and write
202E000
stack
page read and write
A4E000
heap
page read and write
7170000
heap
page read and write
1314000
unkown
page readonly
170000
stack
page read and write
669B000
stack
page read and write
1F0000
heap
page read and write
3DDA000
unkown
page read and write
720A000
heap
page read and write
39B0000
unkown
page read and write
991000
direct allocation
page execute and read and write
A4E000
heap
page read and write
3C90000
unkown
page readonly
214000
heap
page read and write
260D000
unkown
page read and write
5FB0000
heap
page read and write
3970000
unkown
page readonly
1D30000
unkown
page readonly
2B0A000
direct allocation
page read and write
69BB000
stack
page read and write
8429000
unkown
page read and write
637000
unclassified section
page execute and read and write
A6C000
heap
page read and write
687000
heap
page read and write
3870000
unkown
page read and write
705E000
stack
page read and write
140000
trusted library allocation
page read and write
2407000
unkown
page read and write
1DBF000
stack
page read and write
580000
heap
page read and write
841B000
unkown
page read and write
2BA0000
unkown
page read and write
74C0000
unkown
page read and write
1B40000
unkown
page read and write
2D90000
heap
page read and write
391000
trusted library allocation
page execute and read and write
3AF0000
unkown
page read and write
6BB7000
heap
page read and write
1BE000
heap
page read and write
1FF0000
heap
page read and write
140000
trusted library allocation
page read and write
140000
trusted library allocation
page read and write
24AF000
stack
page read and write
1D20000
unkown
page readonly
6910000
heap
page read and write
140000
trusted library allocation
page read and write
5C1000
trusted library allocation
page execute and read and write
415E000
stack
page read and write
2D14000
direct allocation
page read and write
3B92000
stack
page read and write
3A50000
unkown
page readonly
4040000
unkown
page readonly
3A80000
unkown
page execute and read and write
2D90000
heap
page read and write
8590000
unkown
page read and write
48A9000
stack
page read and write
140000
trusted library allocation
page read and write
3AD0000
unkown
page read and write
24E0000
unkown
page read and write
2360000
direct allocation
page execute and read and write
2807000
unkown
page read and write
64F0000
heap
page read and write
6E00000
heap
page read and write
AD1000
heap
page read and write
6B99000
heap
page read and write
ACF000
heap
page read and write
5E07000
stack
page read and write
570000
unclassified section
page execute and read and write
1FD0000
heap
page read and write
69F4000
heap
page read and write
1EE0000
heap
page read and write
3A50000
unkown
page readonly
4020000
unkown
page readonly
295E000
stack
page read and write
2D80000
direct allocation
page read and write
6E00000
heap
page read and write
3C10000
unkown
page read and write
3AB0000
unkown
page read and write
382B000
stack
page read and write
364000
heap
page read and write
2D80000
direct allocation
page read and write
298000
heap
page read and write
3F70000
unkown
page execute read
A8D000
heap
page read and write
24E0000
unkown
page read and write
10000
heap
page read and write
A4C000
heap
page read and write
6FE000
heap
page read and write
6F73000
heap
page read and write
130C000
unkown
page read and write
2AE0000
unkown
page read and write
7E40000
heap
page read and write
360000
trusted library allocation
page execute and read and write
2968000
stack
page read and write
2D99000
heap
page read and write
3C90000
unkown
page readonly
140000
trusted library allocation
page read and write
140000
trusted library allocation
page read and write
140000
trusted library allocation
page read and write
2D80000
direct allocation
page read and write
3ECA000
unkown
page read and write
2A30000
direct allocation
page read and write
2370000
direct allocation
page execute and read and write
4020000
unkown
page readonly
2D14000
direct allocation
page read and write
33C000
unkown
page read and write
78D6000
unkown
page read and write
2380000
unkown
page read and write
7440000
heap
page read and write
6FD000
heap
page read and write
90CA000
system
page execute and read and write
690000
heap
page read and write
3A60000
unkown
page readonly
6EC000
heap
page read and write
2C90000
unkown
page readonly
260E000
unkown
page read and write
41FC000
stack
page read and write
814000
direct allocation
page execute and read and write
3DB1000
unkown
page read and write
2607000
unkown
page read and write
140000
trusted library allocation
page read and write
78D6000
unkown
page read and write
7F05000
heap
page read and write
3EE7000
unkown
page read and write
2180000
direct allocation
page execute and read and write
990000
heap
page read and write
31E000
unkown
page read and write
21F0000
direct allocation
page execute and read and write
1DBF000
stack
page read and write
9A0000
direct allocation
page execute and read and write
2D00000
direct allocation
page read and write
63D000
heap
page read and write
3B10000
unkown
page read and write
980000
direct allocation
page execute and read and write
7DDE000
unkown
page read and write
22E0000
direct allocation
page execute and read and write
116000
heap
page read and write
801C000
stack
page read and write
2B0D000
direct allocation
page read and write
2B0000
unkown
page read and write
63CC000
unkown
page read and write
3A80000
unkown
page execute and read and write
2D99000
heap
page read and write
140000
trusted library allocation
page read and write
1240000
unkown
page readonly
260A000
unkown
page read and write
22F4000
direct allocation
page execute and read and write
1D20000
unkown
page readonly
140000
trusted library allocation
page read and write
2D20000
direct allocation
page read and write
682F000
stack
page read and write
A4E000
heap
page read and write
39C0000
unkown
page read and write
6F50000
heap
page read and write
1241000
unkown
page execute read
A8E000
heap
page read and write
560000
heap
page read and write
69F0000
heap
page read and write
2D17000
direct allocation
page read and write
1B30000
unkown
page readonly
85D3000
unkown
page read and write
A6B000
heap
page read and write
8412000
unkown
page read and write
3945000
stack
page read and write
3CD0000
unkown
page readonly
A57000
heap
page read and write
2F0000
heap
page read and write
12DC000
unkown
page readonly
7DC0000
unkown
page read and write
1D6000
heap
page read and write
3C60000
unkown
page readonly
A5C000
heap
page read and write
2B0A000
direct allocation
page read and write
3C00000
unkown
page read and write
2D11000
direct allocation
page read and write
3F70000
unkown
page execute read
130C000
unkown
page write copy
4050000
unkown
page readonly
234E000
unkown
page read and write
3AF0000
unkown
page read and write
3EE0000
unkown
page read and write
2D11000
direct allocation
page read and write
4638000
unkown
page read and write
4E0000
heap
page read and write
2807000
unkown
page read and write
CB000
stack
page read and write
A10000
heap
page read and write
796E000
unkown
page read and write
130000
trusted library allocation
page read and write
2200000
direct allocation
page execute and read and write
7968000
unkown
page read and write
40D8000
stack
page read and write
2300000
direct allocation
page execute and read and write
140000
heap
page read and write
2D70000
unkown
page read and write
8453000
unkown
page read and write
140000
trusted library allocation
page read and write
3AC0000
unkown
page read and write
817000
direct allocation
page execute and read and write
2C10000
direct allocation
page read and write
140000
trusted library allocation
page read and write
2C10000
direct allocation
page read and write
A10000
direct allocation
page execute and read and write
47F000
stack
page read and write
4200000
unkown
page read and write
3D38000
unkown
page read and write
6C7000
heap
page read and write
28E000
heap
page read and write
70F000
stack
page read and write
1FF000
heap
page read and write
2B0A000
direct allocation
page read and write
1A0000
unkown
page readonly
A8D000
heap
page read and write
25E0000
unkown
page read and write
AD1000
heap
page read and write
2A40000
unkown
page readonly
669B000
stack
page read and write
2A30000
direct allocation
page read and write
4170000
unkown
page readonly
5FD0000
unkown
page read and write
2BD0000
unkown
page read and write
140000
trusted library allocation
page read and write
3CD0000
unkown
page readonly
2D95000
heap
page read and write
2430000
unkown
page read and write
401E000
stack
page read and write
372E000
stack
page read and write
6EE000
heap
page read and write
B6F000
stack
page read and write
489F000
stack
page read and write
140000
trusted library allocation
page read and write
A57000
heap
page read and write
48B0000
heap
page read and write
6B7E000
stack
page read and write
140000
trusted library allocation
page read and write
6F55000
heap
page read and write
170000
stack
page read and write
140000
trusted library allocation
page read and write
8490000
unkown
page read and write
2D70000
unkown
page read and write
3DDA000
unkown
page read and write
841B000
unkown
page read and write
7F00000
heap
page read and write
10000
heap
page read and write
5E00000
stack
page read and write
3D10000
unkown
page read and write
64D0000
heap
page read and write
5E2E000
unkown
page read and write
2440000
unkown
page read and write
3D00000
unkown
page readonly
6A13000
heap
page read and write
8A0000
direct allocation
page execute and read and write
6E4000
heap
page read and write
39A0000
unkown
page read and write
64D0000
heap
page read and write
45E000
stack
page read and write
179000
stack
page read and write
There are 748 hidden memdumps, click here to show them.