IOC Report
eW1QrimJYd.exe

loading gif

Files

File Path
Type
Category
Malicious
eW1QrimJYd.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\qvvfpl.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\21c8026919fd094ab07ec3c180a9f210_d06ed635-68f6-4e9a-955c-4899f5f57b9a
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\eW1QrimJYd.exe
"C:\Users\user\Desktop\eW1QrimJYd.exe"
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Users\user\AppData\Roaming\Microsoft\qvvfpl.exe
"C:\Users\user\AppData\Roaming\Microsoft\qvvfpl.exe"
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Users\user\AppData\Roaming\Microsoft\qvvfpl.exe
"C:\Users\user\AppData\Roaming\Microsoft\qvvfpl.exe"
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 39 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://gdcbghvjyqy7jclk.onion.casa/5432c2cfc05a5a97
unknown
malicious
http://gdcbghvjyqy7jclk.onion/5432c2cfc05a5a97
unknown
malicious
http://gdcbghvjyqy7jclk.onion.top/5432c2cfc05a5a97
unknown
malicious
http://gdcbghvjyqy7jclk.onion.guide/5432c2cfc05a5a97
unknown
http://ipv4bot.whatismyipaddress.com/0
unknown
https://www.torproject.org/
unknown
http://ipv4bot.whatismyipaddress.com/D
unknown
http://gdcbghvjyqy7jclk.onion.rip/5432c2cfc05a5a97
unknown
http://ipv4bot.whatismyipaddress.com/
unknown
http://gdcbghvjyqy7jclk.onion.plus/5432c2cfc05a5a97
unknown

Domains

Name
IP
Malicious
emsisoft.bit
unknown
malicious
nomoreransom.bit
unknown
malicious
gandcrab.bit
unknown
malicious
dns1.soprodns.ru
unknown
malicious
ipv4bot.whatismyipaddress.com
unknown
8.8.8.8.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
cfbtnelfyrp

Memdumps

Base Address
Regiontype
Protect
Malicious
D79000
unkown
page read and write
malicious
D79000
unkown
page write copy
malicious
D79000
unkown
page read and write
malicious
D79000
unkown
page write copy
malicious
A89000
unkown
page read and write
malicious
A89000
unkown
page write copy
malicious
2441000
heap
page read and write
8E9000
heap
page read and write
1EC54000000
heap
page read and write
241BE80E000
trusted library allocation
page read and write
202A2652000
heap
page read and write
1EC54063000
heap
page read and write
D84000
unkown
page readonly
1EC5405E000
heap
page read and write
860000
direct allocation
page read and write
202A2602000
heap
page read and write
740000
direct allocation
page read and write
241BE62D000
heap
page read and write
241BE830000
trusted library allocation
page read and write
2441000
heap
page read and write
16C95E55000
heap
page read and write
9E2197F000
stack
page read and write
740000
direct allocation
page read and write
87B4B9E000
stack
page read and write
2A7F000
stack
page read and write
AEE000
stack
page read and write
1F50E0F0000
heap
page read and write
19E48194000
heap
page read and write
10AE000
stack
page read and write
1F50E213000
heap
page read and write
740000
direct allocation
page read and write
19D7C27E000
heap
page read and write
241B907C000
heap
page read and write
2441000
heap
page read and write
8E9000
heap
page read and write
8E9000
heap
page read and write
8E9000
heap
page read and write
241BE6FA000
heap
page read and write
2441000
heap
page read and write
2441000
heap
page read and write
2441000
heap
page read and write
8E9000
heap
page read and write
7F4B0FD000
stack
page read and write
1EC54066000
heap
page read and write
2441000
heap
page read and write
241BA460000
trusted library allocation
page read and write
8E9000
heap
page read and write
8E9000
heap
page read and write
754000
heap
page read and write
2441000
heap
page read and write
918000
heap
page read and write
557EB0B000
stack
page read and write
241B9918000
heap
page read and write
693187E000
stack
page read and write
202A2460000
heap
page read and write
19E48002000
heap
page read and write
370000
heap
page read and write
20D94C2F000
heap
page read and write
557FA7F000
stack
page read and write
EB8000
heap
page read and write
19E475E0000
trusted library allocation
page read and write
6FC000
stack
page read and write
11F09FF000
stack
page read and write
2441000
heap
page read and write
1EC54052000
heap
page read and write
241B9000000
heap
page read and write
19E47691000
heap
page read and write
2441000
heap
page read and write
8DD90FD000
stack
page read and write
241BE960000
remote allocation
page read and write
1EC5408B000
heap
page read and write
2441000
heap
page read and write
8E9000
heap
page read and write
2441000
heap
page read and write
2441000
heap
page read and write
2441000
heap
page read and write
D70000
unkown
page readonly
2441000
heap
page read and write
8E9000
heap
page read and write
8E9000
heap
page read and write
202A2590000
remote allocation
page read and write
8E9000
heap
page read and write
730000
direct allocation
page read and write
241B8FD1000
trusted library allocation
page read and write
241B90A1000
heap
page read and write
2441000
heap
page read and write
2441000
heap
page read and write
2441000
heap
page read and write
1EC5405C000
heap
page read and write
730000
direct allocation
page read and write
45C000
stack
page read and write
8E9000
heap
page read and write
16C95E69000
heap
page read and write
2441000
heap
page read and write
20D94A80000
heap
page read and write
1F50E284000
heap
page read and write
2441000
heap
page read and write
2441000
heap
page read and write
16C965B0000
trusted library allocation
page read and write
2441000
heap
page read and write
7F4AF7D000
stack
page read and write
2441000
heap
page read and write
2441000
heap
page read and write
241B9093000
heap
page read and write
8E9000
heap
page read and write
8E9000
heap
page read and write
19D7C200000
heap
page read and write
19E47652000
heap
page read and write
EB0000
heap
page read and write
830000
heap
page read and write
7F4AA7B000
stack
page read and write
3DC000
stack
page read and write
241B9058000
heap
page read and write
557F57E000
stack
page read and write
730000
direct allocation
page read and write
9E20FDB000
stack
page read and write
8E9000
heap
page read and write
1F50E27B000
heap
page read and write
8E9000
heap
page read and write
202A2400000
heap
page read and write
2441000
heap
page read and write
8DD9477000
stack
page read and write
16C96602000
trusted library allocation
page read and write
D70000
unkown
page readonly
D71000
unkown
page execute read
241B9918000
heap
page read and write
2441000
heap
page read and write
1EC53DA0000
heap
page read and write
19E47629000
heap
page read and write
19E48227000
heap
page read and write
19E47672000
heap
page read and write
8E9000
heap
page read and write
2441000
heap
page read and write
241BA0F0000
trusted library section
page readonly
2441000
heap
page read and write
8E9000
heap
page read and write
87B4A9C000
stack
page read and write
2441000
heap
page read and write
20D94C3A000
heap
page read and write
2441000
heap
page read and write
2441000
heap
page read and write
241BA0E0000
trusted library section
page readonly
2441000
heap
page read and write
19E48171000
heap
page read and write
8CA000
heap
page read and write
19E48230000
heap
page read and write
2441000
heap
page read and write
241BE920000
trusted library allocation
page read and write
19E48223000
heap
page read and write
241B9029000
heap
page read and write
241BE960000
remote allocation
page read and write
238E000
stack
page read and write
2441000
heap
page read and write
8DD937B000
stack
page read and write
730000
direct allocation
page read and write
9E21A7F000
stack
page read and write
1F50E26D000
heap
page read and write
754000
heap
page read and write
241B8F70000
trusted library section
page read and write
87B517E000
stack
page read and write
2441000
heap
page read and write
19E48122000
heap
page read and write
241B9913000
heap
page read and write
19E477E5000
heap
page read and write
A94000
unkown
page readonly
8E9000
heap
page read and write
2441000
heap
page read and write
241B908F000
heap
page read and write
19E47590000
heap
page read and write
241BF000000
heap
page read and write
202A2E02000
trusted library allocation
page read and write
19E47656000
heap
page read and write
2441000
heap
page read and write
8E9000
heap
page read and write
2441000
heap
page read and write
241BE700000
heap
page read and write
241BE960000
trusted library allocation
page read and write
1EC53D90000
heap
page read and write
19E47613000
heap
page read and write
2441000
heap
page read and write
8E9000
heap
page read and write
2DFD000
stack
page read and write
202A2590000
remote allocation
page read and write
730000
direct allocation
page execute and read and write
241BE820000
trusted library allocation
page read and write
8E9000
heap
page read and write
16C95F13000
heap
page read and write
8E9000
heap
page read and write
1F50E231000
heap
page read and write
8E9000
heap
page read and write
9E215FB000
stack
page read and write
19E475C0000
trusted library allocation
page read and write
693154B000
stack
page read and write
2441000
heap
page read and write
241B9958000
heap
page read and write
1F50E263000
heap
page read and write
8B0000
heap
page read and write
19E477B9000
heap
page read and write
19E47687000
heap
page read and write
2441000
heap
page read and write
241B9013000
heap
page read and write
D60000
direct allocation
page read and write
8E9000
heap
page read and write
A50000
direct allocation
page execute and read and write
2441000
heap
page read and write
19E48122000
heap
page read and write
D50000
direct allocation
page read and write
557F3FF000
stack
page read and write
96C000
stack
page read and write
16C95CA0000
heap
page read and write
8E9000
heap
page read and write
8E9000
heap
page read and write
8E9000
heap
page read and write
A94000
unkown
page readonly
19D7C150000
heap
page read and write
750000
heap
page read and write
2441000
heap
page read and write
16C95CB0000
heap
page read and write
1F50E246000
heap
page read and write
241BA110000
trusted library section
page readonly
241BE6AC000
heap
page read and write
20D94C13000
heap
page read and write
19E47713000
heap
page read and write
8E9000
heap
page read and write
8E9000
heap
page read and write
2441000
heap
page read and write
D82000
unkown
page write copy
1F50E277000
heap
page read and write
8E9000
heap
page read and write
8E9000
heap
page read and write
19E48100000
heap
page read and write
19D7CC02000
trusted library allocation
page read and write
19E481BF000
heap
page read and write
19D7C28E000
heap
page read and write
241BE6A2000
heap
page read and write
20D94C02000
heap
page read and write
2443000
heap
page read and write
2441000
heap
page read and write
870000
direct allocation
page read and write
8E9000
heap
page read and write
42A38FF000
stack
page read and write
2441000
heap
page read and write
202A2635000
heap
page read and write
87B4B1E000
stack
page read and write
557F5FF000
stack
page read and write
2441000
heap
page read and write
241B90B0000
heap
page read and write
92F000
heap
page read and write
202A23F0000
heap
page read and write
8E9000
heap
page read and write
241B9800000
heap
page read and write
6931BFC000
stack
page read and write
19E4765C000
heap
page read and write
8E9000
heap
page read and write
1EC54081000
heap
page read and write
D71000
unkown
page execute read
241B9102000
heap
page read and write
860000
trusted library allocation
page read and write
11EF000
stack
page read and write
1F50E240000
heap
page read and write
20D94C48000
heap
page read and write
19E47670000
heap
page read and write
19D7C300000
heap
page read and write
D71000
unkown
page execute read
241B909F000
heap
page read and write
241B9079000
heap
page read and write
8DD967F000
stack
page read and write
241B908D000
heap
page read and write
241B90FE000
heap
page read and write
8E9000
heap
page read and write
42A37FF000
stack
page read and write
1F50E249000
heap
page read and write
740000
direct allocation
page read and write
8E9000
heap
page read and write
8E9000
heap
page read and write
241B9900000
heap
page read and write
2441000
heap
page read and write
20D94C54000
heap
page read and write
2441000
heap
page read and write
241BE6F4000
heap
page read and write
D84000
unkown
page readonly
1F50E25E000
heap
page read and write
1F50E26A000
heap
page read and write
2441000
heap
page read and write
30B0000
direct allocation
page execute and read and write
241BA0C0000
trusted library section
page readonly
202A2590000
remote allocation
page read and write
936000
heap
page read and write
241B8E00000
heap
page read and write
20D94BD0000
trusted library allocation
page read and write
19E48154000
heap
page read and write
1EC54060000
heap
page read and write
16C95E5B000
heap
page read and write
241B9902000
heap
page read and write
2441000
heap
page read and write
19D7C228000
heap
page read and write
16C95E4F000
heap
page read and write
BEE000
stack
page read and write
AAF000
stack
page read and write
1F50E200000
heap
page read and write
1F50E24E000
heap
page read and write
19E4762F000
heap
page read and write
241B9113000
heap
page read and write
16C95F02000
heap
page read and write
937000
heap
page read and write
1EC54802000
trusted library allocation
page read and write
2441000
heap
page read and write
19E47530000
heap
page read and write
1EC54100000
heap
page read and write
19E47600000
heap
page read and write
2441000
heap
page read and write
87B4F7E000
stack
page read and write
730000
direct allocation
page read and write
241B9815000
heap
page read and write
1F50E244000
heap
page read and write
20D94C36000
heap
page read and write
2441000
heap
page read and write
730000
direct allocation
page read and write
8E9000
heap
page read and write
557F17C000
stack
page read and write
7F4B1FD000
stack
page read and write
557F07A000
stack
page read and write
8E9000
heap
page read and write
1EC54029000
heap
page read and write
2441000
heap
page read and write
740000
direct allocation
page read and write
1F0000
heap
page read and write
2441000
heap
page read and write
2441000
heap
page read and write
8A0000
direct allocation
page read and write
8E9000
heap
page read and write
2441000
heap
page read and write
2441000
heap
page read and write
8DD977E000
stack
page read and write
19D7C1C0000
heap
page read and write
241BE821000
trusted library allocation
page read and write
2441000
heap
page read and write
557EF78000
stack
page read and write
11F08FA000
stack
page read and write
9F0000
heap
page read and write
8E9000
heap
page read and write
8E9000
heap
page read and write
1F50E23D000
heap
page read and write
2441000
heap
page read and write
1F50E267000
heap
page read and write
8E5000
heap
page read and write
241BE930000
trusted library allocation
page read and write
241B8E60000
heap
page read and write
2441000
heap
page read and write
1F50E080000
heap
page read and write
8E9000
heap
page read and write
860000
direct allocation
page read and write
16C95E13000
heap
page read and write
6931AFE000
stack
page read and write
20D94C46000
heap
page read and write
2441000
heap
page read and write
16C95E7A000
heap
page read and write
2441000
heap
page read and write
241BA100000
trusted library section
page readonly
6931A7B000
stack
page read and write
241BE63D000
heap
page read and write
8E9000
heap
page read and write
241BE940000
trusted library allocation
page read and write
8DD907B000
stack
page read and write
1EC54027000
heap
page read and write
241BE6E3000
heap
page read and write
8E9000
heap
page read and write
30BB000
direct allocation
page execute and read and write
A30000
direct allocation
page read and write
D70000
unkown
page readonly
241BE840000
trusted library allocation
page read and write
1F50E090000
heap
page read and write
42A35FD000
stack
page read and write
55C000
stack
page read and write
10EE000
stack
page read and write
1F50E1F0000
trusted library allocation
page read and write
2441000
heap
page read and write
42A2D4B000
stack
page read and write
19E4763D000
heap
page read and write
19D7C202000
heap
page read and write
16C95E02000
heap
page read and write
87B527E000
stack
page read and write
241BE8D0000
trusted library allocation
page read and write
740000
direct allocation
page read and write
1EC54108000
heap
page read and write
8E9000
heap
page read and write
8E9000
heap
page read and write
308F000
stack
page read and write
2441000
heap
page read and write
23CE000
stack
page read and write
E90000
heap
page read and write
8E9000
heap
page read and write
8E9000
heap
page read and write
9E219FF000
stack
page read and write
8BA000
heap
page read and write
1F50E258000
heap
page read and write
A81000
unkown
page execute read
19E48102000
heap
page read and write
9E213FA000
stack
page read and write
11F039C000
stack
page read and write
A50000
trusted library allocation
page read and write
2441000
heap
page read and write
20D94D02000
heap
page read and write
1F50E22E000
heap
page read and write
20D94C3E000
heap
page read and write
2441000
heap
page read and write
8E9000
heap
page read and write
19E481D6000
heap
page read and write
890000
direct allocation
page read and write
20D95402000
trusted library allocation
page read and write
19E47644000
heap
page read and write
7F4ACFE000
stack
page read and write
D84000
unkown
page readonly
9E2177F000
stack
page read and write
D71000
unkown
page execute read
8E9000
heap
page read and write
2BBE000
stack
page read and write
557F47E000
stack
page read and write
557F4FE000
stack
page read and write
2441000
heap
page read and write
19E4778E000
heap
page read and write
A40000
direct allocation
page read and write
241BE950000
trusted library allocation
page read and write
2441000
heap
page read and write
2469000
heap
page read and write
241BE64A000
heap
page read and write
2441000
heap
page read and write
8E9000
heap
page read and write
202A2702000
heap
page read and write
2E00000
direct allocation
page execute and read and write
8DD917E000
stack
page read and write
241BE800000
trusted library allocation
page read and write
241BE663000
heap
page read and write
7F4AE7E000
stack
page read and write
2441000
heap
page read and write
557F37B000
stack
page read and write
730000
direct allocation
page read and write
19E481CB000
heap
page read and write
19E48213000
heap
page read and write
9E214FE000
stack
page read and write
8E9000
heap
page read and write
557F6FA000
stack
page read and write
11F0AFF000
stack
page read and write
2441000
heap
page read and write
2441000
heap
page read and write
42A34FF000
stack
page read and write
2441000
heap
page read and write
42A3AFE000
stack
page read and write
1F50E26B000
heap
page read and write
20D94C00000
heap
page read and write
19E48143000
heap
page read and write
8E9000
heap
page read and write
2441000
heap
page read and write
1EC53F00000
trusted library allocation
page read and write
1F50E25A000
heap
page read and write
19E48200000
heap
page read and write
2441000
heap
page read and write
241B9072000
heap
page read and write
1F50E302000
heap
page read and write
8E9000
heap
page read and write
20D94AD0000
heap
page read and write
241B9802000
heap
page read and write
8E9000
heap
page read and write
19D7C23C000
heap
page read and write
241B8DF0000
heap
page read and write
19E47664000
heap
page read and write
241BE824000
trusted library allocation
page read and write
42A33FC000
stack
page read and write
19E481B1000
heap
page read and write
D70000
unkown
page readonly
202A2629000
heap
page read and write
42A36FF000
stack
page read and write
557F27E000
stack
page read and write
8E9000
heap
page read and write
241BE4E0000
trusted library allocation
page read and write
241BE808000
trusted library allocation
page read and write
2441000
heap
page read and write
810000
trusted library allocation
page read and write
202A2613000
heap
page read and write
241BE69F000
heap
page read and write
8E9000
heap
page read and write
11F0BF9000
stack
page read and write
740000
direct allocation
page read and write
690000
trusted library allocation
page read and write
8DD957D000
stack
page read and write
42A32FF000
stack
page read and write
2441000
heap
page read and write
8E9000
heap
page read and write
860000
direct allocation
page read and write
2E4D000
stack
page read and write
19D7C254000
heap
page read and write
2441000
heap
page read and write
8E9000
heap
page read and write
16C95E00000
heap
page read and write
8E9000
heap
page read and write
1F50E260000
heap
page read and write
122E000
stack
page read and write
2441000
heap
page read and write
241BE702000
heap
page read and write
19D7C160000
heap
page read and write
241BE844000
trusted library allocation
page read and write
20D94C29000
heap
page read and write
241BE910000
trusted library allocation
page read and write
A80000
unkown
page readonly
2441000
heap
page read and write
8E9000
heap
page read and write
D82000
unkown
page write copy
8E9000
heap
page read and write
1F50E27E000
heap
page read and write
2441000
heap
page read and write
19E47690000
heap
page read and write
241B903D000
heap
page read and write
8E9000
heap
page read and write
8FB000
heap
page read and write
241B9077000
heap
page read and write
2441000
heap
page read and write
2441000
heap
page read and write
2CFD000
stack
page read and write
D84000
unkown
page readonly
2441000
heap
page read and write
1F50E259000
heap
page read and write
16C95E3F000
heap
page read and write
241B8FF3000
trusted library allocation
page read and write
202A263E000
heap
page read and write
241B8F60000
trusted library allocation
page read and write
19D7C313000
heap
page read and write
924000
heap
page read and write
8E9000
heap
page read and write
19D7C1F0000
trusted library allocation
page read and write
2441000
heap
page read and write
8E9000
heap
page read and write
19D7C246000
heap
page read and write
8E9000
heap
page read and write
241BE615000
heap
page read and write
8C0000
heap
page read and write
A20000
heap
page read and write
1F50E242000
heap
page read and write
8E9000
heap
page read and write
8E9000
heap
page read and write
8DD927B000
stack
page read and write
1EC53E00000
heap
page read and write
19D7C266000
heap
page read and write
2441000
heap
page read and write
1F50E262000
heap
page read and write
2441000
heap
page read and write
132E000
stack
page read and write
42A317B000
stack
page read and write
8E9000
heap
page read and write
1EC54013000
heap
page read and write
241B8FF0000
trusted library allocation
page read and write
7F4AFFF000
stack
page read and write
202A2600000
heap
page read and write
2441000
heap
page read and write
19D7C308000
heap
page read and write
19D7C260000
heap
page read and write
9E2187A000
stack
page read and write
900000
heap
page read and write
2450000
heap
page read and write
2441000
heap
page read and write
241BE830000
trusted library allocation
page read and write
1F50E241000
heap
page read and write
241B9FE0000
trusted library allocation
page read and write
2441000
heap
page read and write
8E9000
heap
page read and write
2441000
heap
page read and write
241BE600000
heap
page read and write
2441000
heap
page read and write
19E47520000
heap
page read and write
241BE470000
trusted library allocation
page read and write
8E9000
heap
page read and write
8E9000
heap
page read and write
69315CD000
stack
page read and write
19E48202000
heap
page read and write
8E9000
heap
page read and write
241B9026000
heap
page read and write
2441000
heap
page read and write
D3D000
stack
page read and write
8E9000
heap
page read and write
2441000
heap
page read and write
202A2560000
trusted library allocation
page read and write
2441000
heap
page read and write
241BE960000
remote allocation
page read and write
1EC5403C000
heap
page read and write
8E9000
heap
page read and write
16C95E29000
heap
page read and write
754000
heap
page read and write
2441000
heap
page read and write
2441000
heap
page read and write
557F77E000
stack
page read and write
CFC000
stack
page read and write
6931EFF000
stack
page read and write
7F4B27E000
stack
page read and write
A80000
unkown
page readonly
7F4AD7E000
stack
page read and write
2F8E000
stack
page read and write
A81000
unkown
page execute read
19D7C302000
heap
page read and write
16C95E75000
heap
page read and write
1F50E23A000
heap
page read and write
2441000
heap
page read and write
9D0000
trusted library allocation
page read and write
16C95D10000
heap
page read and write
2420000
direct allocation
page execute and read and write
20D94A70000
heap
page read and write
CB0000
heap
page read and write
6931DFF000
stack
page read and write
1F50E22D000
heap
page read and write
2441000
heap
page read and write
1F50EA02000
trusted library allocation
page read and write
241BE6DD000
heap
page read and write
297F000
stack
page read and write
8E9000
heap
page read and write
1F50E257000
heap
page read and write
241BE4F0000
trusted library allocation
page read and write
8E9000
heap
page read and write
2F4A000
stack
page read and write
2441000
heap
page read and write
693197B000
stack
page read and write
9E21679000
stack
page read and write
202A2624000
heap
page read and write
890000
heap
page read and write
241BE702000
heap
page read and write
1EC54102000
heap
page read and write
241B9126000
heap
page read and write
241BE800000
trusted library allocation
page read and write
1F50E27A000
heap
page read and write
1F50E245000
heap
page read and write
42A39FF000
stack
page read and write
2440000
heap
page read and write
87B507E000
stack
page read and write
8E9000
heap
page read and write
2CBF000
stack
page read and write
2441000
heap
page read and write
241BE61F000
heap
page read and write
6931CF7000
stack
page read and write
1EC54113000
heap
page read and write
740000
direct allocation
page read and write
241BE460000
trusted library allocation
page read and write
19D7C28A000
heap
page read and write
19D7C213000
heap
page read and write
557F87A000
stack
page read and write
87D000
stack
page read and write
8E9000
heap
page read and write
241BA0D0000
trusted library section
page readonly
1F50E265000
heap
page read and write
1F50E229000
heap
page read and write
There are 636 hidden memdumps, click here to show them.