IOC Report
9gkAKTWOXp.exe

loading gif

Files

File Path
Type
Category
Malicious
9gkAKTWOXp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\vkspii.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\414045e2d09286d5db2581e0d955d358_d06ed635-68f6-4e9a-955c-4899f5f57b9a
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\9gkAKTWOXp.exe
"C:\Users\user\Desktop\9gkAKTWOXp.exe"
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Users\user\AppData\Roaming\Microsoft\vkspii.exe
"C:\Users\user\AppData\Roaming\Microsoft\vkspii.exe"
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Users\user\AppData\Roaming\Microsoft\vkspii.exe
"C:\Users\user\AppData\Roaming\Microsoft\vkspii.exe"
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 37 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://gdcbghvjyqy7jclk.onion.casa/e644d32fec6144de
unknown
malicious
http://gdcbghvjyqy7jclk.onion.top/e644d32fec6144de
unknown
malicious
http://gdcbghvjyqy7jclk.onion/e644d32fec6144de
unknown
malicious
https://www.torproject.org/
unknown
http://gdcbghvjyqy7jclk.onion.guide/e644d32fec6144de
unknown
http://gdcbghvjyqy7jclk.onion.plus/e644d32fec6144de
unknown
http://gdcbghvjyqy7jclk.onion.rip/e644d32fec6144de
unknown

Domains

Name
IP
Malicious
emsisoft.bit
unknown
malicious
nomoreransom.bit
unknown
malicious
gandcrab.bit
unknown
malicious
dns1.soprodns.ru
unknown
malicious
ipv4bot.whatismyipaddress.com
unknown
8.8.8.8.in-addr.arpa
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
qfkhrdewlal

Memdumps

Base Address
Regiontype
Protect
Malicious
40E000
unkown
page write copy
malicious
40E000
unkown
page read and write
malicious
40E000
unkown
page read and write
malicious
40E000
unkown
page write copy
malicious
40E000
unkown
page write copy
malicious
40E000
unkown
page read and write
malicious
412000
unkown
page write copy
malicious
412000
unkown
page write copy
malicious
420000
trusted library allocation
page read and write
18F8B700000
heap
page read and write
2251000
heap
page read and write
F175BF9000
stack
page read and write
18F8B500000
heap
page read and write
2251000
heap
page read and write
400000
unkown
page readonly
24557A5A000
heap
page read and write
24468C13000
heap
page read and write
276EAE02000
heap
page read and write
216B3002000
trusted library allocation
page read and write
F175DFA000
stack
page read and write
26747013000
heap
page read and write
24557A60000
heap
page read and write
30000
heap
page read and write
5BB000
heap
page read and write
1F177820000
heap
page read and write
AB3907D000
stack
page read and write
2260000
heap
page read and write
276EA650000
heap
page read and write
5A9000
heap
page read and write
4E0000
direct allocation
page read and write
18F8B600000
heap
page read and write
2674C880000
trusted library allocation
page read and write
18F8B4F0000
heap
page read and write
AB38E7D000
stack
page read and write
A1CD57F000
stack
page read and write
276EA68F000
heap
page read and write
C41D6FF000
stack
page read and write
400000
unkown
page readonly
1F177F50000
trusted library allocation
page read and write
4AB592E000
stack
page read and write
1B843370000
trusted library allocation
page read and write
278F000
stack
page read and write
1F177829000
heap
page read and write
276EAF92000
heap
page read and write
2DBE000
stack
page read and write
9C91479000
stack
page read and write
276EA613000
heap
page read and write
1B843429000
heap
page read and write
7A866FE000
stack
page read and write
24468AD0000
heap
page read and write
F1754DB000
stack
page read and write
276EB013000
heap
page read and write
5A9000
heap
page read and write
1F177854000
heap
page read and write
2674C640000
heap
page read and write
24557A1B000
heap
page read and write
5A9000
heap
page read and write
276EA460000
heap
page read and write
216B2902000
heap
page read and write
5A9000
heap
page read and write
2674C64D000
heap
page read and write
24557A7B000
heap
page read and write
2251000
heap
page read and write
5A9000
heap
page read and write
5A9000
heap
page read and write
5A9000
heap
page read and write
24557A6A000
heap
page read and write
26747072000
heap
page read and write
216B2858000
heap
page read and write
2251000
heap
page read and write
24557A3A000
heap
page read and write
C41D4FE000
stack
page read and write
2674C690000
trusted library allocation
page read and write
24557A84000
heap
page read and write
26747FE0000
trusted library section
page readonly
2251000
heap
page read and write
2251000
heap
page read and write
267470A2000
heap
page read and write
24557A4E000
heap
page read and write
24468C3C000
heap
page read and write
2251000
heap
page read and write
276EA7B9000
heap
page read and write
414000
unkown
page readonly
1F177837000
heap
page read and write
2D7F000
stack
page read and write
2251000
heap
page read and write
2251000
heap
page read and write
2130000
trusted library allocation
page read and write
AB38D7D000
stack
page read and write
AB3917F000
stack
page read and write
24557A7A000
heap
page read and write
19C000
stack
page read and write
1C5A783D000
heap
page read and write
2251000
heap
page read and write
26747FF0000
trusted library section
page readonly
276EAC60000
trusted library allocation
page read and write
2251000
heap
page read and write
1C5A7E90000
remote allocation
page read and write
1F177813000
heap
page read and write
2251000
heap
page read and write
1C5A7849000
heap
page read and write
510000
direct allocation
page read and write
2674C6AB000
heap
page read and write
2251000
heap
page read and write
4F0000
heap
page read and write
A1CD77F000
stack
page read and write
2251000
heap
page read and write
2674C706000
heap
page read and write
2251000
heap
page read and write
2210000
heap
page read and write
5A9000
heap
page read and write
2251000
heap
page read and write
2251000
heap
page read and write
74BAD7E000
stack
page read and write
5A9000
heap
page read and write
74BA97F000
stack
page read and write
24557A53000
heap
page read and write
1B8434E1000
heap
page read and write
2251000
heap
page read and write
5A9000
heap
page read and write
267483A0000
trusted library allocation
page read and write
2674C6EC000
heap
page read and write
2674C617000
heap
page read and write
26747913000
heap
page read and write
7A8687F000
stack
page read and write
1B843D32000
heap
page read and write
2251000
heap
page read and write
26747057000
heap
page read and write
5A9000
heap
page read and write
276EA63D000
heap
page read and write
2251000
heap
page read and write
2251000
heap
page read and write
245578E0000
heap
page read and write
5A9000
heap
page read and write
540000
direct allocation
page read and write
2251000
heap
page read and write
590000
heap
page read and write
2251000
heap
page read and write
7A86C7E000
stack
page read and write
24557A61000
heap
page read and write
2251000
heap
page read and write
F175EFF000
stack
page read and write
A1CD2FE000
stack
page read and write
18F8B629000
heap
page read and write
2251000
heap
page read and write
1C5A7851000
heap
page read and write
2251000
heap
page read and write
24468D13000
heap
page read and write
24468C00000
heap
page read and write
2C0A000
stack
page read and write
2674C870000
trusted library allocation
page read and write
9D000
stack
page read and write
510000
direct allocation
page read and write
1F177790000
heap
page read and write
5A9000
heap
page read and write
1C5A7E60000
trusted library allocation
page read and write
18F8B602000
heap
page read and write
276EA657000
heap
page read and write
74BA9FC000
stack
page read and write
1C5A7800000
heap
page read and write
A1CD27E000
stack
page read and write
2251000
heap
page read and write
7A86A7A000
stack
page read and write
2251000
heap
page read and write
276EA600000
heap
page read and write
276EAFD3000
heap
page read and write
26748371000
trusted library allocation
page read and write
7A861F9000
stack
page read and write
24557A63000
heap
page read and write
2251000
heap
page read and write
2251000
heap
page read and write
276EA5D0000
trusted library allocation
page read and write
2251000
heap
page read and write
ABC0EFE000
stack
page read and write
5A5000
heap
page read and write
21EE000
stack
page read and write
409000
unkown
page write copy
2251000
heap
page read and write
2674D000000
heap
page read and write
2B0D000
stack
page read and write
24468C8E000
heap
page read and write
2251000
heap
page read and write
1C5A7813000
heap
page read and write
2251000
heap
page read and write
26747958000
heap
page read and write
414000
unkown
page readonly
580000
heap
page read and write
24557A2E000
heap
page read and write
2251000
heap
page read and write
1B843400000
heap
page read and write
6B0000
direct allocation
page read and write
5A9000
heap
page read and write
402000
unkown
page execute read
7A8677E000
stack
page read and write
2251000
heap
page read and write
74BAAFD000
stack
page read and write
1B8434BE000
heap
page read and write
4C4000
heap
page read and write
5A9000
heap
page read and write
2251000
heap
page read and write
24557A42000
heap
page read and write
26746EE0000
heap
page read and write
2251000
heap
page read and write
5A9000
heap
page read and write
78E000
stack
page read and write
400000
unkown
page readonly
2251000
heap
page read and write
F1758FB000
stack
page read and write
5A9000
heap
page read and write
520000
direct allocation
page read and write
26746E70000
heap
page read and write
ABC107E000
stack
page read and write
ABC0FFD000
stack
page read and write
24557A47000
heap
page read and write
5A9000
heap
page read and write
24557A57000
heap
page read and write
1F1777A0000
heap
page read and write
58A000
heap
page read and write
18F8B713000
heap
page read and write
2674708E000
heap
page read and write
30000
heap
page read and write
5A9000
heap
page read and write
5A9000
heap
page read and write
276EAF43000
heap
page read and write
74BAF7E000
stack
page read and write
216B2802000
heap
page read and write
1B8434C6000
heap
page read and write
414000
unkown
page readonly
A1CD87C000
stack
page read and write
2251000
heap
page read and write
2251000
heap
page read and write
2251000
heap
page read and write
276EAFC9000
heap
page read and write
AB3937E000
stack
page read and write
24557A00000
heap
page read and write
1C5A76A0000
heap
page read and write
5A9000
heap
page read and write
2251000
heap
page read and write
409000
unkown
page read and write
26747918000
heap
page read and write
26747902000
heap
page read and write
26747900000
heap
page read and write
26746FF0000
trusted library section
page read and write
64E000
stack
page read and write
2674C570000
trusted library allocation
page read and write
18F8B702000
heap
page read and write
5A9000
heap
page read and write
245579E0000
trusted library allocation
page read and write
7A863FE000
stack
page read and write
A1CD4FB000
stack
page read and write
26747090000
heap
page read and write
7A865FB000
stack
page read and write
26747023000
heap
page read and write
520000
direct allocation
page read and write
540000
direct allocation
page read and write
18F8B65F000
heap
page read and write
5A9000
heap
page read and write
2251000
heap
page read and write
C41D27E000
stack
page read and write
7A85CDB000
stack
page read and write
402000
unkown
page execute read
276EA78E000
heap
page read and write
2674C54E000
trusted library allocation
page read and write
276EA62F000
heap
page read and write
2251000
heap
page read and write
5A9000
heap
page read and write
6C0000
direct allocation
page read and write
26747000000
heap
page read and write
2674C860000
trusted library allocation
page read and write
1C5A7835000
heap
page read and write
276EB002000
heap
page read and write
1C5A7824000
heap
page read and write
AB3927E000
stack
page read and write
5A9000
heap
page read and write
1B843200000
heap
page read and write
24557A13000
heap
page read and write
74BA2DB000
stack
page read and write
276EB030000
heap
page read and write
9C9107C000
stack
page read and write
216B26E0000
heap
page read and write
A1CD677000
stack
page read and write
520000
direct allocation
page read and write
18F8B688000
heap
page read and write
1F17782E000
heap
page read and write
2251000
heap
page read and write
24468D08000
heap
page read and write
24557A65000
heap
page read and write
7A860F7000
stack
page read and write
A1CD97E000
stack
page read and write
24557A3C000
heap
page read and write
5A9000
heap
page read and write
2674C810000
trusted library allocation
page read and write
1B843C02000
heap
page read and write
2250000
heap
page read and write
18F8B560000
heap
page read and write
409000
unkown
page read and write
2050000
direct allocation
page read and write
402000
unkown
page execute read
5A9000
heap
page read and write
2110000
direct allocation
page read and write
5A9000
heap
page read and write
2251000
heap
page read and write
18F8B67B000
heap
page read and write
26748020000
trusted library section
page readonly
2C30000
direct allocation
page execute and read and write
2251000
heap
page read and write
2674C430000
trusted library allocation
page read and write
276EA681000
heap
page read and write
5A9000
heap
page read and write
26747029000
heap
page read and write
5A9000
heap
page read and write
18F8B64A000
heap
page read and write
24557A68000
heap
page read and write
74BA87E000
stack
page read and write
24468B30000
heap
page read and write
2251000
heap
page read and write
24468C80000
heap
page read and write
5A9000
heap
page read and write
26747077000
heap
page read and write
24468C50000
heap
page read and write
ABC0DFE000
stack
page read and write
2674C540000
trusted library allocation
page read and write
2ACF000
stack
page read and write
4D0000
direct allocation
page read and write
7A867FF000
stack
page read and write
2251000
heap
page read and write
9C9127E000
stack
page read and write
2251000
heap
page read and write
5A9000
heap
page read and write
5A9000
heap
page read and write
2251000
heap
page read and write
1C5A782A000
heap
page read and write
276EA683000
heap
page read and write
24557A58000
heap
page read and write
51A000
heap
page read and write
2674C8A0000
remote allocation
page read and write
510000
direct allocation
page read and write
2251000
heap
page read and write
24557A31000
heap
page read and write
5A9000
heap
page read and write
2060000
direct allocation
page read and write
276EB000000
heap
page read and write
2251000
heap
page read and write
2674C584000
trusted library allocation
page read and write
2251000
heap
page read and write
5F3000
heap
page read and write
2674C3A0000
trusted library allocation
page read and write
24557A24000
heap
page read and write
2251000
heap
page read and write
2674C3B0000
trusted library allocation
page read and write
C41D5FF000
stack
page read and write
2251000
heap
page read and write
276EAF00000
heap
page read and write
276EA7E5000
heap
page read and write
5A9000
heap
page read and write
2251000
heap
page read and write
74BAE7B000
stack
page read and write
5A9000
heap
page read and write
2251000
heap
page read and write
4AB59AE000
stack
page read and write
2674C6F8000
heap
page read and write
276EB023000
heap
page read and write
5A9000
heap
page read and write
24557A7E000
heap
page read and write
2120000
direct allocation
page read and write
276EAF6F000
heap
page read and write
7A862FB000
stack
page read and write
26747094000
heap
page read and write
1F177802000
heap
page read and write
414000
unkown
page readonly
276EA686000
heap
page read and write
88F000
stack
page read and write
5A9000
heap
page read and write
18F8B661000
heap
page read and write
4C4000
heap
page read and write
216B2841000
heap
page read and write
26748393000
trusted library allocation
page read and write
276EA66C000
heap
page read and write
5A9000
heap
page read and write
1F178002000
trusted library allocation
page read and write
4AB5DFB000
stack
page read and write
74BA6FB000
stack
page read and write
4AB5F7E000
stack
page read and write
1C5A8002000
trusted library allocation
page read and write
2251000
heap
page read and write
2251000
heap
page read and write
1F1777F0000
heap
page read and write
69F000
stack
page read and write
24557A55000
heap
page read and write
2251000
heap
page read and write
5A9000
heap
page read and write
56E000
stack
page read and write
5D1000
heap
page read and write
2251000
heap
page read and write
5A9000
heap
page read and write
510000
direct allocation
page execute and read and write
400000
unkown
page readonly
7A864FB000
stack
page read and write
2251000
heap
page read and write
276EA713000
heap
page read and write
276EAF22000
heap
page read and write
2674C702000
heap
page read and write
AB3947F000
stack
page read and write
24557A74000
heap
page read and write
5A9000
heap
page read and write
5A9000
heap
page read and write
92F000
stack
page read and write
276EA65A000
heap
page read and write
2674C540000
trusted library allocation
page read and write
2251000
heap
page read and write
414000
unkown
page readonly
9D000
stack
page read and write
409000
unkown
page write copy
4AB5E7F000
stack
page read and write
400000
unkown
page readonly
2C7E000
stack
page read and write
276EAFD1000
heap
page read and write
24557880000
heap
page read and write
24468C6F000
heap
page read and write
2674C850000
trusted library allocation
page read and write
26747802000
heap
page read and write
1C5A7690000
heap
page read and write
1B843270000
heap
page read and write
2674C8A0000
remote allocation
page read and write
4AB617F000
stack
page read and write
5A9000
heap
page read and write
2251000
heap
page read and write
5A9000
heap
page read and write
2251000
heap
page read and write
19C000
stack
page read and write
4E0000
direct allocation
page read and write
C41D3FE000
stack
page read and write
2674C570000
trusted library allocation
page read and write
24558202000
trusted library allocation
page read and write
510000
direct allocation
page read and write
276EAF02000
heap
page read and write
F175FFF000
stack
page read and write
5A9000
heap
page read and write
216B27E0000
trusted library allocation
page read and write
2251000
heap
page read and write
2674C62D000
heap
page read and write
2251000
heap
page read and write
5A9000
heap
page read and write
5A9000
heap
page read and write
1C5A7902000
heap
page read and write
1C5A784D000
heap
page read and write
737000
heap
page read and write
24557A64000
heap
page read and write
2251000
heap
page read and write
F175F7E000
stack
page read and write
ABC0D7C000
stack
page read and write
500000
trusted library allocation
page read and write
2251000
heap
page read and write
276EA643000
heap
page read and write
2674C580000
trusted library allocation
page read and write
1B843513000
heap
page read and write
5A9000
heap
page read and write
24557A77000
heap
page read and write
1B843413000
heap
page read and write
2674C561000
trusted library allocation
page read and write
2251000
heap
page read and write
5A9000
heap
page read and write
30000
heap
page read and write
216B2813000
heap
page read and write
2674C6A3000
heap
page read and write
2674C8A0000
remote allocation
page read and write
5A9000
heap
page read and write
2674C700000
heap
page read and write
5A9000
heap
page read and write
2674C664000
heap
page read and write
1F177800000
heap
page read and write
2251000
heap
page read and write
74BAC7D000
stack
page read and write
26747113000
heap
page read and write
24468C4A000
heap
page read and write
216B2875000
heap
page read and write
216B2680000
heap
page read and write
4F0000
direct allocation
page read and write
21AE000
stack
page read and write
2251000
heap
page read and write
2251000
heap
page read and write
18F8B590000
trusted library allocation
page read and write
18F8B666000
heap
page read and write
510000
direct allocation
page read and write
2674707C000
heap
page read and write
5A9000
heap
page read and write
276EA652000
heap
page read and write
5A9000
heap
page read and write
2674C6F0000
heap
page read and write
2C10000
direct allocation
page execute and read and write
ABC08CC000
stack
page read and write
510000
direct allocation
page read and write
2674C62F000
heap
page read and write
267470B0000
heap
page read and write
9C9137E000
stack
page read and write
276EA66A000
heap
page read and write
29CE000
stack
page read and write
2251000
heap
page read and write
24557A62000
heap
page read and write
2251000
heap
page read and write
510000
direct allocation
page read and write
2251000
heap
page read and write
2251000
heap
page read and write
5A9000
heap
page read and write
4AB58AC000
stack
page read and write
A1CD3FB000
stack
page read and write
4AB6077000
stack
page read and write
216B2913000
heap
page read and write
5E6000
heap
page read and write
74F000
stack
page read and write
F175CFF000
stack
page read and write
18F8B63C000
heap
page read and write
402000
unkown
page execute read
2674C6FE000
heap
page read and write
5A9000
heap
page read and write
24557A52000
heap
page read and write
1B84348A000
heap
page read and write
26747815000
heap
page read and write
5A9000
heap
page read and write
A1CCFCB000
stack
page read and write
24557870000
heap
page read and write
18F8B65B000
heap
page read and write
5A9000
heap
page read and write
26746E80000
heap
page read and write
1C5A7802000
heap
page read and write
ABC117D000
stack
page read and write
5A9000
heap
page read and write
1F17783D000
heap
page read and write
26748000000
trusted library section
page readonly
2674C564000
trusted library allocation
page read and write
2251000
heap
page read and write
18F8B708000
heap
page read and write
5A9000
heap
page read and write
5A9000
heap
page read and write
24557A6D000
heap
page read and write
2674C600000
heap
page read and write
24468AC0000
heap
page read and write
5A9000
heap
page read and write
2251000
heap
page read and write
2674C548000
trusted library allocation
page read and write
5A9000
heap
page read and write
24468D02000
heap
page read and write
267470FE000
heap
page read and write
5A9000
heap
page read and write
24557A51000
heap
page read and write
5A9000
heap
page read and write
18F8BE02000
trusted library allocation
page read and write
5A9000
heap
page read and write
7A8697F000
stack
page read and write
2251000
heap
page read and write
276EAFB1000
heap
page read and write
2251000
heap
page read and write
24468B60000
trusted library allocation
page read and write
5A9000
heap
page read and write
276EAF54000
heap
page read and write
24468C29000
heap
page read and write
5A9000
heap
page read and write
402000
unkown
page execute read
420000
heap
page read and write
4C0000
heap
page read and write
402000
unkown
page execute read
24557A3F000
heap
page read and write
24468D00000
heap
page read and write
26747102000
heap
page read and write
2251000
heap
page read and write
5A9000
heap
page read and write
5A9000
heap
page read and write
216B2670000
heap
page read and write
24557A5C000
heap
page read and write
276EA629000
heap
page read and write
24557A59000
heap
page read and write
74BAB7B000
stack
page read and write
409000
unkown
page read and write
2251000
heap
page read and write
276EAFBD000
heap
page read and write
26747FD0000
trusted library section
page readonly
730000
heap
page read and write
520000
direct allocation
page read and write
24557A75000
heap
page read and write
288F000
stack
page read and write
2251000
heap
page read and write
24557A4A000
heap
page read and write
2251000
heap
page read and write
414000
unkown
page readonly
5A9000
heap
page read and write
2251000
heap
page read and write
2251000
heap
page read and write
5A9000
heap
page read and write
9C9157F000
stack
page read and write
276EB027000
heap
page read and write
26747800000
heap
page read and write
1B843471000
heap
page read and write
2674C420000
trusted library allocation
page read and write
9D000
stack
page read and write
2251000
heap
page read and write
52E000
stack
page read and write
19C000
stack
page read and write
F175B7C000
stack
page read and write
1B843502000
heap
page read and write
2251000
heap
page read and write
2251000
heap
page read and write
24557A6B000
heap
page read and write
276EA4D0000
heap
page read and write
2251000
heap
page read and write
2251000
heap
page read and write
276EAF22000
heap
page read and write
1B843444000
heap
page read and write
2251000
heap
page read and write
570000
trusted library allocation
page read and write
AB38BFB000
stack
page read and write
409000
unkown
page write copy
2251000
heap
page read and write
2674703D000
heap
page read and write
5FA000
heap
page read and write
2674709F000
heap
page read and write
2290000
heap
page read and write
1C5A7700000
heap
page read and write
400000
unkown
page readonly
1B843210000
heap
page read and write
1C5A7E90000
remote allocation
page read and write
2251000
heap
page read and write
2251000
heap
page read and write
24557A2F000
heap
page read and write
1B843D00000
heap
page read and write
26748010000
trusted library section
page readonly
2EBE000
stack
page read and write
216B2829000
heap
page read and write
26747EF0000
trusted library allocation
page read and write
C41CF4B000
stack
page read and write
216B2800000
heap
page read and write
AB387EB000
stack
page read and write
2240000
heap
page read and write
2674C6A0000
trusted library allocation
page read and write
276EA470000
heap
page read and write
C41CFCE000
stack
page read and write
5A9000
heap
page read and write
7A868FF000
stack
page read and write
26746FE0000
trusted library allocation
page read and write
24469402000
trusted library allocation
page read and write
2251000
heap
page read and write
510000
heap
page read and write
2674C6E0000
heap
page read and write
5A9000
heap
page read and write
2251000
heap
page read and write
2251000
heap
page read and write
F175A7F000
stack
page read and write
24557A5F000
heap
page read and write
AB3957F000
stack
page read and write
18F8B654000
heap
page read and write
1F177902000
heap
page read and write
26747918000
heap
page read and write
2EEB000
direct allocation
page execute and read and write
216B285B000
heap
page read and write
2251000
heap
page read and write
1C5A7E90000
remote allocation
page read and write
24557B02000
heap
page read and write
ABC12FE000
stack
page read and write
2251000
heap
page read and write
18F8B613000
heap
page read and write
5A9000
heap
page read and write
2251000
heap
page read and write
5A9000
heap
page read and write
2251000
heap
page read and write
24557A56000
heap
page read and write
4D0000
trusted library allocation
page read and write
5A9000
heap
page read and write
24468C4E000
heap
page read and write
5A9000
heap
page read and write
2251000
heap
page read and write
1F177846000
heap
page read and write
2674C560000
trusted library allocation
page read and write
1B8434CF000
heap
page read and write
2251000
heap
page read and write
5A9000
heap
page read and write
2674707A000
heap
page read and write
5A9000
heap
page read and write
2EE0000
direct allocation
page execute and read and write
24468C55000
heap
page read and write
5A9000
heap
page read and write
2130000
direct allocation
page execute and read and write
There are 670 hidden memdumps, click here to show them.