IOC Report
BUgAyPXboK.exe

loading gif

Files

File Path
Type
Category
Malicious
BUgAyPXboK.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\ykbxzh.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\21c8026919fd094ab07ec3c180a9f210_d06ed635-68f6-4e9a-955c-4899f5f57b9a
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\BUgAyPXboK.exe
"C:\Users\user\Desktop\BUgAyPXboK.exe"
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Users\user\AppData\Roaming\Microsoft\ykbxzh.exe
"C:\Users\user\AppData\Roaming\Microsoft\ykbxzh.exe"
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Users\user\AppData\Roaming\Microsoft\ykbxzh.exe
"C:\Users\user\AppData\Roaming\Microsoft\ykbxzh.exe"
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 39 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://gdcbghvjyqy7jclk.onion.casa/e644d32fec6144de
unknown
malicious
http://gdcbghvjyqy7jclk.onion.top/e644d32fec6144de
unknown
malicious
http://gdcbghvjyqy7jclk.onion/e644d32fec6144de
unknown
malicious
https://www.torproject.org/
unknown
http://gdcbghvjyqy7jclk.onion.guide/e644d32fec6144de
unknown
http://gdcbghvjyqy7jclk.onion.plus/e644d32fec6144de
unknown
http://gdcbghvjyqy7jclk.onion.rip/e644d32fec6144de
unknown

Domains

Name
IP
Malicious
emsisoft.bit
unknown
malicious
nomoreransom.bit
unknown
malicious
gandcrab.bit
unknown
malicious
dns1.soprodns.ru
unknown
malicious
ipv4bot.whatismyipaddress.com
unknown
8.8.8.8.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
cmskpbujpyb

Memdumps

Base Address
Regiontype
Protect
Malicious
412000
unkown
page write copy
malicious
40E000
unkown
page read and write
malicious
40E000
unkown
page write copy
malicious
40E000
unkown
page write copy
malicious
40E000
unkown
page write copy
malicious
40E000
unkown
page read and write
malicious
412000
unkown
page write copy
malicious
40E000
unkown
page read and write
malicious
2120000
direct allocation
page read and write
1A342000000
heap
page read and write
24DBBE3F000
heap
page read and write
2F195113000
heap
page read and write
2B1E000
stack
page read and write
149427A000
stack
page read and write
2221000
heap
page read and write
233B5440000
heap
page read and write
20193650000
heap
page read and write
2221000
heap
page read and write
1A33B713000
heap
page read and write
2F195994000
heap
page read and write
200E5B08000
heap
page read and write
2F19596F000
heap
page read and write
2221000
heap
page read and write
30000
heap
page read and write
AC3E87E000
stack
page read and write
1A33BDA0000
trusted library section
page readonly
1A340BF4000
trusted library allocation
page read and write
2221000
heap
page read and write
1A340EEE000
heap
page read and write
200E5A3C000
heap
page read and write
20193702000
heap
page read and write
2221000
heap
page read and write
525000
heap
page read and write
64F000
stack
page read and write
1A33BDD0000
trusted library section
page readonly
1A33C5E0000
trusted library allocation
page read and write
2CC01468000
heap
page read and write
2C30000
direct allocation
page execute and read and write
50A000
heap
page read and write
2221000
heap
page read and write
2221000
heap
page read and write
1A33B65A000
heap
page read and write
2CC0146D000
heap
page read and write
2221000
heap
page read and write
200E5A51000
heap
page read and write
2221000
heap
page read and write
2CC01447000
heap
page read and write
233B564E000
heap
page read and write
F7F94F9000
stack
page read and write
EAD607F000
stack
page read and write
2221000
heap
page read and write
2221000
heap
page read and write
2221000
heap
page read and write
2221000
heap
page read and write
EAD617B000
stack
page read and write
AC3E07C000
stack
page read and write
F7F987F000
stack
page read and write
2CC0145A000
heap
page read and write
2CC0147A000
heap
page read and write
4C0000
direct allocation
page read and write
372BAF7000
stack
page read and write
2CC01461000
heap
page read and write
20193655000
heap
page read and write
1A2AA450000
heap
page read and write
2CC0146F000
heap
page read and write
2F19518E000
heap
page read and write
2F195057000
heap
page read and write
233B5702000
heap
page read and write
24DBBE7B000
heap
page read and write
2CC01434000
heap
page read and write
2CC01400000
heap
page read and write
2221000
heap
page read and write
1A340CF0000
trusted library allocation
page read and write
2CC01460000
heap
page read and write
525000
heap
page read and write
4D4000
heap
page read and write
2221000
heap
page read and write
1A340EAF000
heap
page read and write
24DBC602000
trusted library allocation
page read and write
1A340EBA000
heap
page read and write
525000
heap
page read and write
2221000
heap
page read and write
20193708000
heap
page read and write
20B0000
direct allocation
page read and write
20B0000
direct allocation
page read and write
33BE5FF000
stack
page read and write
550000
heap
page read and write
233CB1A0000
trusted library allocation
page read and write
1A2AA402000
heap
page read and write
F7F927B000
stack
page read and write
2CC0147D000
heap
page read and write
525000
heap
page read and write
1A340BF1000
trusted library allocation
page read and write
2CC0143D000
heap
page read and write
2221000
heap
page read and write
525000
heap
page read and write
1A33B68B000
heap
page read and write
525000
heap
page read and write
2221000
heap
page read and write
2221000
heap
page read and write
20193600000
heap
page read and write
2230000
heap
page read and write
2221000
heap
page read and write
1A340CE0000
trusted library allocation
page read and write
1A340E9B000
heap
page read and write
2221000
heap
page read and write
2221000
heap
page read and write
2221000
heap
page read and write
B26157B000
stack
page read and write
2CC0144E000
heap
page read and write
F7F95FF000
stack
page read and write
1493AF7000
stack
page read and write
1A340A40000
trusted library allocation
page read and write
2F195A13000
heap
page read and write
1A340AC0000
trusted library allocation
page read and write
2221000
heap
page read and write
20193700000
heap
page read and write
200E5A7F000
heap
page read and write
233CAA29000
heap
page read and write
F7F947C000
stack
page read and write
2221000
heap
page read and write
233CA890000
heap
page read and write
21FE000
stack
page read and write
2221000
heap
page read and write
372B6FE000
stack
page read and write
1A2AA46E000
heap
page read and write
233CAA02000
heap
page read and write
2CC01463000
heap
page read and write
2221000
heap
page read and write
20193680000
heap
page read and write
1A340D30000
trusted library allocation
page read and write
1A340D30000
remote allocation
page read and write
2CC01457000
heap
page read and write
1493DFE000
stack
page read and write
2221000
heap
page read and write
1A340D30000
remote allocation
page read and write
1A33B66F000
heap
page read and write
1A340E3F000
heap
page read and write
409000
unkown
page write copy
2CC01445000
heap
page read and write
1A2AA429000
heap
page read and write
233B562F000
heap
page read and write
20193629000
heap
page read and write
2F1959C5000
heap
page read and write
233B5600000
heap
page read and write
2221000
heap
page read and write
233B55A0000
trusted library allocation
page read and write
200E58D0000
heap
page read and write
2221000
heap
page read and write
1493CFA000
stack
page read and write
1A2AA47A000
heap
page read and write
420000
trusted library allocation
page read and write
233CB1D0000
remote allocation
page read and write
414000
unkown
page readonly
1A33CA30000
trusted library allocation
page read and write
525000
heap
page read and write
1A33B690000
heap
page read and write
149407F000
stack
page read and write
4E0000
direct allocation
page read and write
2221000
heap
page read and write
2DBE000
stack
page read and write
2CC0146B000
heap
page read and write
EAD677F000
stack
page read and write
55A000
heap
page read and write
9D000
stack
page read and write
2221000
heap
page read and write
200E5A89000
heap
page read and write
4F0000
trusted library allocation
page read and write
1A2AAC70000
trusted library allocation
page read and write
2221000
heap
page read and write
500000
heap
page read and write
14943FB000
stack
page read and write
1493BFB000
stack
page read and write
2019364A000
heap
page read and write
24DBBBA0000
heap
page read and write
2019368A000
heap
page read and write
2221000
heap
page read and write
1A33CA01000
trusted library allocation
page read and write
30000
heap
page read and write
525000
heap
page read and write
8CF000
stack
page read and write
1A340F00000
heap
page read and write
2C7D000
stack
page read and write
1A2AA360000
heap
page read and write
1A33BE02000
heap
page read and write
2221000
heap
page read and write
2110000
heap
page read and write
1A2AA370000
heap
page read and write
EAD657F000
stack
page read and write
2F195A00000
heap
page read and write
525000
heap
page read and write
2C1E000
stack
page read and write
68E000
stack
page read and write
4D4000
heap
page read and write
200E5A71000
heap
page read and write
233B5629000
heap
page read and write
2221000
heap
page read and write
525000
heap
page read and write
A0F000
stack
page read and write
2140000
trusted library allocation
page read and write
525000
heap
page read and write
6F9367C000
stack
page read and write
2019367E000
heap
page read and write
402000
unkown
page execute read
24DBBE29000
heap
page read and write
2221000
heap
page read and write
233CA8A0000
heap
page read and write
149417E000
stack
page read and write
2F194F40000
trusted library allocation
page read and write
2CC01458000
heap
page read and write
1A33B600000
heap
page read and write
233B5602000
heap
page read and write
2F1959BD000
heap
page read and write
1A2AA43C000
heap
page read and write
2221000
heap
page read and write
1A340BD0000
trusted library allocation
page read and write
24DBBD00000
trusted library allocation
page read and write
14936FC000
stack
page read and write
B260FAB000
stack
page read and write
1A33B613000
heap
page read and write
7CE000
stack
page read and write
1A33BE15000
heap
page read and write
200E5860000
heap
page read and write
2F194F20000
trusted library allocation
page read and write
53D000
heap
page read and write
1A33BF00000
heap
page read and write
2221000
heap
page read and write
2F195076000
heap
page read and write
1A33B726000
heap
page read and write
1A340C10000
trusted library allocation
page read and write
2F195A02000
heap
page read and write
2F1951B9000
heap
page read and write
B2613FB000
stack
page read and write
525000
heap
page read and write
DC877FF000
stack
page read and write
20193560000
heap
page read and write
24DBBE60000
heap
page read and write
1A33BF18000
heap
page read and write
1A33BDB0000
trusted library section
page readonly
200E5A13000
heap
page read and write
2221000
heap
page read and write
F7F907B000
stack
page read and write
19C000
stack
page read and write
372BBFF000
stack
page read and write
525000
heap
page read and write
2F195029000
heap
page read and write
200E5870000
heap
page read and write
2F195902000
heap
page read and write
1A33B674000
heap
page read and write
200E5A58000
heap
page read and write
20193647000
heap
page read and write
1A33B657000
heap
page read and write
2221000
heap
page read and write
200E5B13000
heap
page read and write
2F194E20000
heap
page read and write
2221000
heap
page read and write
2060000
direct allocation
page read and write
2221000
heap
page read and write
2F195A30000
heap
page read and write
1A340E0E000
heap
page read and write
200E5A4C000
heap
page read and write
2F194DC0000
heap
page read and write
EAD5ABC000
stack
page read and write
574000
heap
page read and write
2221000
heap
page read and write
2CC01300000
heap
page read and write
1A2AA500000
heap
page read and write
1A33B629000
heap
page read and write
B261677000
stack
page read and write
20194002000
trusted library allocation
page read and write
4E0000
direct allocation
page read and write
2F195922000
heap
page read and write
2CC01474000
heap
page read and write
1A2AA508000
heap
page read and write
2F195043000
heap
page read and write
24DBBF13000
heap
page read and write
2F195A23000
heap
page read and write
528000
heap
page read and write
2F195065000
heap
page read and write
402000
unkown
page execute read
2CC01484000
heap
page read and write
2070000
trusted library allocation
page read and write
200E5A55000
heap
page read and write
670000
heap
page read and write
2221000
heap
page read and write
2CC01475000
heap
page read and write
233CAA13000
heap
page read and write
2221000
heap
page read and write
2221000
heap
page read and write
530000
direct allocation
page read and write
2221000
heap
page read and write
2221000
heap
page read and write
AC3E47E000
stack
page read and write
2221000
heap
page read and write
1A33BDC0000
trusted library section
page readonly
1A33BF18000
heap
page read and write
2F195922000
heap
page read and write
409000
unkown
page read and write
1A33B3D0000
heap
page read and write
2F19508B000
heap
page read and write
1A33CA20000
trusted library allocation
page read and write
1A340C00000
trusted library allocation
page read and write
400000
unkown
page readonly
1A2AA457000
heap
page read and write
6F93C7C000
stack
page read and write
DC876FE000
stack
page read and write
1A340BD0000
trusted library allocation
page read and write
2F195A27000
heap
page read and write
DC875FE000
stack
page read and write
233B5450000
heap
page read and write
400000
unkown
page readonly
53B000
heap
page read and write
2CC01429000
heap
page read and write
200E59D0000
trusted library allocation
page read and write
233CAA3C000
heap
page read and write
4F0000
direct allocation
page read and write
1A2AAE02000
trusted library allocation
page read and write
2221000
heap
page read and write
450000
heap
page read and write
1A33BDE0000
trusted library section
page readonly
B26187E000
stack
page read and write
2221000
heap
page read and write
2210000
direct allocation
page execute and read and write
1493FFF000
stack
page read and write
6F93A77000
stack
page read and write
200E5A00000
heap
page read and write
2221000
heap
page read and write
2F19503C000
heap
page read and write
2170000
heap
page read and write
2CC0145F000
heap
page read and write
1A33BF13000
heap
page read and write
2F195090000
heap
page read and write
525000
heap
page read and write
233CB1D0000
remote allocation
page read and write
233B5649000
heap
page read and write
372B67B000
stack
page read and write
2CC01390000
trusted library allocation
page read and write
22F0000
heap
page read and write
33BE6FF000
stack
page read and write
2CC01465000
heap
page read and write
4C0000
direct allocation
page execute and read and write
2221000
heap
page read and write
24DBBE02000
heap
page read and write
200E5A53000
heap
page read and write
2CC01432000
heap
page read and write
1A33BE00000
heap
page read and write
1A33B540000
trusted library section
page read and write
2CC0143B000
heap
page read and write
2019364D000
heap
page read and write
4C0000
direct allocation
page read and write
6F93B7F000
stack
page read and write
200E5B00000
heap
page read and write
1A2AA452000
heap
page read and write
402000
unkown
page execute read
2CC01446000
heap
page read and write
33BDF9C000
stack
page read and write
20193670000
heap
page read and write
2221000
heap
page read and write
1A340D30000
remote allocation
page read and write
402000
unkown
page execute read
2070000
heap
page read and write
B26127E000
stack
page read and write
200E5A4E000
heap
page read and write
4E0000
direct allocation
page read and write
409000
unkown
page read and write
24DBBE13000
heap
page read and write
2221000
heap
page read and write
409000
unkown
page write copy
2221000
heap
page read and write
9D000
stack
page read and write
525000
heap
page read and write
F7F937F000
stack
page read and write
24DBBB90000
heap
page read and write
2221000
heap
page read and write
200E5A7D000
heap
page read and write
2221000
heap
page read and write
1A33B3C0000
heap
page read and write
2221000
heap
page read and write
4E0000
direct allocation
page read and write
33BE4F9000
stack
page read and write
414000
unkown
page readonly
2221000
heap
page read and write
2F195943000
heap
page read and write
2CC0145C000
heap
page read and write
24DBBF02000
heap
page read and write
1A2AA48D000
heap
page read and write
2CC01413000
heap
page read and write
29DE000
stack
page read and write
2019363C000
heap
page read and write
1A33B702000
heap
page read and write
402000
unkown
page execute read
2CC01479000
heap
page read and write
2CC01502000
heap
page read and write
4C0000
direct allocation
page read and write
DC8737E000
stack
page read and write
4C0000
direct allocation
page read and write
2221000
heap
page read and write
400000
unkown
page readonly
1A33B69D000
heap
page read and write
1A2AA502000
heap
page read and write
14945FE000
stack
page read and write
AC3E5FF000
stack
page read and write
2221000
heap
page read and write
525000
heap
page read and write
4C0000
direct allocation
page read and write
4D0000
heap
page read and write
1A340BDE000
trusted library allocation
page read and write
21BE000
stack
page read and write
1493EFB000
stack
page read and write
233B5613000
heap
page read and write
1A33B530000
trusted library allocation
page read and write
1A33B430000
heap
page read and write
6F9377E000
stack
page read and write
20193550000
heap
page read and write
6F936FF000
stack
page read and write
678000
heap
page read and write
F7F96FA000
stack
page read and write
2CC01442000
heap
page read and write
24DBBE60000
heap
page read and write
2EBE000
stack
page read and write
1A2AA513000
heap
page read and write
2CC01440000
heap
page read and write
1A340EF0000
heap
page read and write
2130000
direct allocation
page read and write
233CAA26000
heap
page read and write
54E000
stack
page read and write
EAD637D000
stack
page read and write
233B54A0000
heap
page read and write
2221000
heap
page read and write
2221000
heap
page read and write
372B9FE000
stack
page read and write
2221000
heap
page read and write
2227000
heap
page read and write
233CAA57000
heap
page read and write
1A340D00000
trusted library allocation
page read and write
1A340C00000
trusted library allocation
page read and write
2221000
heap
page read and write
409000
unkown
page read and write
2221000
heap
page read and write
4E0000
direct allocation
page read and write
8AF000
stack
page read and write
1A340CA0000
trusted library allocation
page read and write
201935F0000
trusted library allocation
page read and write
20193613000
heap
page read and write
402000
unkown
page execute read
2221000
heap
page read and write
33BE3FE000
stack
page read and write
2221000
heap
page read and write
2CC0147E000
heap
page read and write
24DBBE00000
heap
page read and write
EAD667F000
stack
page read and write
400000
unkown
page readonly
2221000
heap
page read and write
14942FE000
stack
page read and write
2221000
heap
page read and write
90E000
stack
page read and write
2221000
heap
page read and write
1A33B69B000
heap
page read and write
1A33B642000
heap
page read and write
1A340E1F000
heap
page read and write
2CC01360000
heap
page read and write
DC872FE000
stack
page read and write
540000
direct allocation
page read and write
525000
heap
page read and write
78F000
stack
page read and write
2221000
heap
page read and write
F7F97FE000
stack
page read and write
200E5A29000
heap
page read and write
24DBBE6A000
heap
page read and write
414000
unkown
page readonly
2221000
heap
page read and write
24DBBE70000
heap
page read and write
20193713000
heap
page read and write
1A340E64000
heap
page read and write
2CC0146A000
heap
page read and write
233CAB02000
heap
page read and write
1A33BF02000
heap
page read and write
2221000
heap
page read and write
2221000
heap
page read and write
24DBBE5B000
heap
page read and write
2CC01464000
heap
page read and write
9D000
stack
page read and write
2CC01E02000
trusted library allocation
page read and write
2CC01444000
heap
page read and write
525000
heap
page read and write
24DBBE76000
heap
page read and write
2F195900000
heap
page read and write
7AE000
stack
page read and write
14940FE000
stack
page read and write
24DBBC00000
heap
page read and write
275F000
stack
page read and write
B26147E000
stack
page read and write
285F000
stack
page read and write
2F1959B1000
heap
page read and write
2221000
heap
page read and write
AC3E37C000
stack
page read and write
1A2AA3D0000
heap
page read and write
2221000
heap
page read and write
2221000
heap
page read and write
2CC01441000
heap
page read and write
2221000
heap
page read and write
2F19506C000
heap
page read and write
1A340F02000
heap
page read and write
2F1951E5000
heap
page read and write
1A2AA413000
heap
page read and write
1A33B677000
heap
page read and write
2ADF000
stack
page read and write
409000
unkown
page write copy
1A33CA23000
trusted library allocation
page read and write
2F195013000
heap
page read and write
2221000
heap
page read and write
1A2AA482000
heap
page read and write
2CC01462000
heap
page read and write
2221000
heap
page read and write
525000
heap
page read and write
525000
heap
page read and write
2221000
heap
page read and write
2221000
heap
page read and write
1A340D20000
trusted library allocation
page read and write
233CB202000
trusted library allocation
page read and write
2140000
direct allocation
page execute and read and write
B2612FE000
stack
page read and write
2221000
heap
page read and write
2F195078000
heap
page read and write
414000
unkown
page readonly
2F195802000
heap
page read and write
DC8727C000
stack
page read and write
1A340C14000
trusted library allocation
page read and write
2F195000000
heap
page read and write
4F0000
direct allocation
page read and write
AC3E6FD000
stack
page read and write
1A340BD8000
trusted library allocation
page read and write
DC874FE000
stack
page read and write
201935C0000
heap
page read and write
2220000
heap
page read and write
525000
heap
page read and write
1A340EE8000
heap
page read and write
1A33B679000
heap
page read and write
2221000
heap
page read and write
19C000
stack
page read and write
400000
unkown
page readonly
2221000
heap
page read and write
372B97B000
stack
page read and write
2CC012F0000
heap
page read and write
2221000
heap
page read and write
1A33B6FB000
heap
page read and write
200E6202000
trusted library allocation
page read and write
1A33B689000
heap
page read and write
233CAA00000
heap
page read and write
EAD647F000
stack
page read and write
2EE0000
direct allocation
page execute and read and write
2221000
heap
page read and write
525000
heap
page read and write
2F195086000
heap
page read and write
2CC01459000
heap
page read and write
2050000
direct allocation
page read and write
19C000
stack
page read and write
30000
heap
page read and write
1A340E4C000
heap
page read and write
2221000
heap
page read and write
233B5656000
heap
page read and write
2EEB000
direct allocation
page execute and read and write
2221000
heap
page read and write
F7F997F000
stack
page read and write
2221000
heap
page read and write
569000
heap
page read and write
2250000
heap
page read and write
1A340D10000
trusted library allocation
page read and write
1A33BDF0000
trusted library section
page readonly
200E5B02000
heap
page read and write
1A340E2D000
heap
page read and write
2221000
heap
page read and write
526000
heap
page read and write
372B77E000
stack
page read and write
2221000
heap
page read and write
4C0000
direct allocation
page read and write
2221000
heap
page read and write
2221000
heap
page read and write
2259000
heap
page read and write
1A340A30000
trusted library allocation
page read and write
2221000
heap
page read and write
2F194DB0000
heap
page read and write
1A340AB0000
trusted library allocation
page read and write
EAD687F000
stack
page read and write
AC3E2FF000
stack
page read and write
1A2AA44C000
heap
page read and write
AC3E57D000
stack
page read and write
2221000
heap
page read and write
525000
heap
page read and write
233B563E000
heap
page read and write
414000
unkown
page readonly
EAD5EFB000
stack
page read and write
2F195091000
heap
page read and write
1A340EB9000
heap
page read and write
400000
unkown
page readonly
1A340E00000
heap
page read and write
4C0000
direct allocation
page read and write
525000
heap
page read and write
372BCFC000
stack
page read and write
2221000
heap
page read and write
57B000
heap
page read and write
2D7A000
stack
page read and write
1A2AA400000
heap
page read and write
500000
heap
page read and write
2221000
heap
page read and write
233CA900000
heap
page read and write
1493F7F000
stack
page read and write
2F195954000
heap
page read and write
4E0000
direct allocation
page read and write
B26177E000
stack
page read and write
1A340BF0000
trusted library allocation
page read and write
420000
trusted library allocation
page read and write
233B5E02000
trusted library allocation
page read and write
2221000
heap
page read and write
1A340F0A000
heap
page read and write
233CB1D0000
remote allocation
page read and write
414000
unkown
page readonly
2221000
heap
page read and write
2CC0147B000
heap
page read and write
6F9397B000
stack
page read and write
6F93D7F000
stack
page read and write
There are 611 hidden memdumps, click here to show them.