Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
9gkAKTWOXp.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Microsoft\vkspii.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\414045e2d09286d5db2581e0d955d358_d06ed635-68f6-4e9a-955c-4899f5f57b9a
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\9gkAKTWOXp.exe
|
"C:\Users\user\Desktop\9gkAKTWOXp.exe"
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
||
C:\Users\user\AppData\Roaming\Microsoft\vkspii.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\vkspii.exe"
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
||
C:\Users\user\AppData\Roaming\Microsoft\vkspii.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\vkspii.exe"
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 37 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://gdcbghvjyqy7jclk.onion.casa/e644d32fec6144de
|
unknown
|
||
http://gdcbghvjyqy7jclk.onion.top/e644d32fec6144de
|
unknown
|
||
http://gdcbghvjyqy7jclk.onion/e644d32fec6144de
|
unknown
|
||
https://www.torproject.org/
|
unknown
|
||
http://gdcbghvjyqy7jclk.onion.guide/e644d32fec6144de
|
unknown
|
||
http://gdcbghvjyqy7jclk.onion.plus/e644d32fec6144de
|
unknown
|
||
http://gdcbghvjyqy7jclk.onion.rip/e644d32fec6144de
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
emsisoft.bit
|
unknown
|
||
nomoreransom.bit
|
unknown
|
||
gandcrab.bit
|
unknown
|
||
dns1.soprodns.ru
|
unknown
|
||
ipv4bot.whatismyipaddress.com
|
unknown
|
||
8.8.8.8.in-addr.arpa
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
|
qfkhrdewlal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
40E000
|
unkown
|
page write copy
|
||
40E000
|
unkown
|
page read and write
|
||
40E000
|
unkown
|
page read and write
|
||
40E000
|
unkown
|
page write copy
|
||
40E000
|
unkown
|
page write copy
|
||
40E000
|
unkown
|
page read and write
|
||
412000
|
unkown
|
page write copy
|
||
412000
|
unkown
|
page write copy
|
||
420000
|
trusted library allocation
|
page read and write
|
||
18F8B700000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
F175BF9000
|
stack
|
page read and write
|
||
18F8B500000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
24557A5A000
|
heap
|
page read and write
|
||
24468C13000
|
heap
|
page read and write
|
||
276EAE02000
|
heap
|
page read and write
|
||
216B3002000
|
trusted library allocation
|
page read and write
|
||
F175DFA000
|
stack
|
page read and write
|
||
26747013000
|
heap
|
page read and write
|
||
24557A60000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
5BB000
|
heap
|
page read and write
|
||
1F177820000
|
heap
|
page read and write
|
||
AB3907D000
|
stack
|
page read and write
|
||
2260000
|
heap
|
page read and write
|
||
276EA650000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
4E0000
|
direct allocation
|
page read and write
|
||
18F8B600000
|
heap
|
page read and write
|
||
2674C880000
|
trusted library allocation
|
page read and write
|
||
18F8B4F0000
|
heap
|
page read and write
|
||
AB38E7D000
|
stack
|
page read and write
|
||
A1CD57F000
|
stack
|
page read and write
|
||
276EA68F000
|
heap
|
page read and write
|
||
C41D6FF000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1F177F50000
|
trusted library allocation
|
page read and write
|
||
4AB592E000
|
stack
|
page read and write
|
||
1B843370000
|
trusted library allocation
|
page read and write
|
||
278F000
|
stack
|
page read and write
|
||
1F177829000
|
heap
|
page read and write
|
||
276EAF92000
|
heap
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
9C91479000
|
stack
|
page read and write
|
||
276EA613000
|
heap
|
page read and write
|
||
1B843429000
|
heap
|
page read and write
|
||
7A866FE000
|
stack
|
page read and write
|
||
24468AD0000
|
heap
|
page read and write
|
||
F1754DB000
|
stack
|
page read and write
|
||
276EB013000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
1F177854000
|
heap
|
page read and write
|
||
2674C640000
|
heap
|
page read and write
|
||
24557A1B000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
276EA460000
|
heap
|
page read and write
|
||
216B2902000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2674C64D000
|
heap
|
page read and write
|
||
24557A7B000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
24557A6A000
|
heap
|
page read and write
|
||
26747072000
|
heap
|
page read and write
|
||
216B2858000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
24557A3A000
|
heap
|
page read and write
|
||
C41D4FE000
|
stack
|
page read and write
|
||
2674C690000
|
trusted library allocation
|
page read and write
|
||
24557A84000
|
heap
|
page read and write
|
||
26747FE0000
|
trusted library section
|
page readonly
|
||
2251000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
267470A2000
|
heap
|
page read and write
|
||
24557A4E000
|
heap
|
page read and write
|
||
24468C3C000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
276EA7B9000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page readonly
|
||
1F177837000
|
heap
|
page read and write
|
||
2D7F000
|
stack
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2130000
|
trusted library allocation
|
page read and write
|
||
AB38D7D000
|
stack
|
page read and write
|
||
AB3917F000
|
stack
|
page read and write
|
||
24557A7A000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
1C5A783D000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
26747FF0000
|
trusted library section
|
page readonly
|
||
276EAC60000
|
trusted library allocation
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
1C5A7E90000
|
remote allocation
|
page read and write
|
||
1F177813000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
1C5A7849000
|
heap
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
2674C6AB000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
A1CD77F000
|
stack
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2674C706000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2210000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
74BAD7E000
|
stack
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
74BA97F000
|
stack
|
page read and write
|
||
24557A53000
|
heap
|
page read and write
|
||
1B8434E1000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
267483A0000
|
trusted library allocation
|
page read and write
|
||
2674C6EC000
|
heap
|
page read and write
|
||
2674C617000
|
heap
|
page read and write
|
||
26747913000
|
heap
|
page read and write
|
||
7A8687F000
|
stack
|
page read and write
|
||
1B843D32000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
26747057000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
276EA63D000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
245578E0000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
540000
|
direct allocation
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
7A86C7E000
|
stack
|
page read and write
|
||
24557A61000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
F175EFF000
|
stack
|
page read and write
|
||
A1CD2FE000
|
stack
|
page read and write
|
||
18F8B629000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
1C5A7851000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
24468D13000
|
heap
|
page read and write
|
||
24468C00000
|
heap
|
page read and write
|
||
2C0A000
|
stack
|
page read and write
|
||
2674C870000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
1F177790000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
1C5A7E60000
|
trusted library allocation
|
page read and write
|
||
18F8B602000
|
heap
|
page read and write
|
||
276EA657000
|
heap
|
page read and write
|
||
74BA9FC000
|
stack
|
page read and write
|
||
1C5A7800000
|
heap
|
page read and write
|
||
A1CD27E000
|
stack
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
7A86A7A000
|
stack
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
276EA600000
|
heap
|
page read and write
|
||
276EAFD3000
|
heap
|
page read and write
|
||
26748371000
|
trusted library allocation
|
page read and write
|
||
7A861F9000
|
stack
|
page read and write
|
||
24557A63000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
276EA5D0000
|
trusted library allocation
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
ABC0EFE000
|
stack
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
21EE000
|
stack
|
page read and write
|
||
409000
|
unkown
|
page write copy
|
||
2251000
|
heap
|
page read and write
|
||
2674D000000
|
heap
|
page read and write
|
||
2B0D000
|
stack
|
page read and write
|
||
24468C8E000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
1C5A7813000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
26747958000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page readonly
|
||
580000
|
heap
|
page read and write
|
||
24557A2E000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
1B843400000
|
heap
|
page read and write
|
||
6B0000
|
direct allocation
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page execute read
|
||
7A8677E000
|
stack
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
74BAAFD000
|
stack
|
page read and write
|
||
1B8434BE000
|
heap
|
page read and write
|
||
4C4000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
24557A42000
|
heap
|
page read and write
|
||
26746EE0000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2251000
|
heap
|
page read and write
|
||
F1758FB000
|
stack
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
520000
|
direct allocation
|
page read and write
|
||
26746E70000
|
heap
|
page read and write
|
||
ABC107E000
|
stack
|
page read and write
|
||
ABC0FFD000
|
stack
|
page read and write
|
||
24557A47000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
24557A57000
|
heap
|
page read and write
|
||
1F1777A0000
|
heap
|
page read and write
|
||
58A000
|
heap
|
page read and write
|
||
18F8B713000
|
heap
|
page read and write
|
||
2674708E000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
276EAF43000
|
heap
|
page read and write
|
||
74BAF7E000
|
stack
|
page read and write
|
||
216B2802000
|
heap
|
page read and write
|
||
1B8434C6000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page readonly
|
||
A1CD87C000
|
stack
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
276EAFC9000
|
heap
|
page read and write
|
||
AB3937E000
|
stack
|
page read and write
|
||
24557A00000
|
heap
|
page read and write
|
||
1C5A76A0000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page read and write
|
||
26747918000
|
heap
|
page read and write
|
||
26747902000
|
heap
|
page read and write
|
||
26747900000
|
heap
|
page read and write
|
||
26746FF0000
|
trusted library section
|
page read and write
|
||
64E000
|
stack
|
page read and write
|
||
2674C570000
|
trusted library allocation
|
page read and write
|
||
18F8B702000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
245579E0000
|
trusted library allocation
|
page read and write
|
||
7A863FE000
|
stack
|
page read and write
|
||
A1CD4FB000
|
stack
|
page read and write
|
||
26747090000
|
heap
|
page read and write
|
||
7A865FB000
|
stack
|
page read and write
|
||
26747023000
|
heap
|
page read and write
|
||
520000
|
direct allocation
|
page read and write
|
||
540000
|
direct allocation
|
page read and write
|
||
18F8B65F000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
C41D27E000
|
stack
|
page read and write
|
||
7A85CDB000
|
stack
|
page read and write
|
||
402000
|
unkown
|
page execute read
|
||
276EA78E000
|
heap
|
page read and write
|
||
2674C54E000
|
trusted library allocation
|
page read and write
|
||
276EA62F000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
6C0000
|
direct allocation
|
page read and write
|
||
26747000000
|
heap
|
page read and write
|
||
2674C860000
|
trusted library allocation
|
page read and write
|
||
1C5A7835000
|
heap
|
page read and write
|
||
276EB002000
|
heap
|
page read and write
|
||
1C5A7824000
|
heap
|
page read and write
|
||
AB3927E000
|
stack
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
1B843200000
|
heap
|
page read and write
|
||
24557A13000
|
heap
|
page read and write
|
||
74BA2DB000
|
stack
|
page read and write
|
||
276EB030000
|
heap
|
page read and write
|
||
9C9107C000
|
stack
|
page read and write
|
||
216B26E0000
|
heap
|
page read and write
|
||
A1CD677000
|
stack
|
page read and write
|
||
520000
|
direct allocation
|
page read and write
|
||
18F8B688000
|
heap
|
page read and write
|
||
1F17782E000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
24468D08000
|
heap
|
page read and write
|
||
24557A65000
|
heap
|
page read and write
|
||
7A860F7000
|
stack
|
page read and write
|
||
A1CD97E000
|
stack
|
page read and write
|
||
24557A3C000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2674C810000
|
trusted library allocation
|
page read and write
|
||
1B843C02000
|
heap
|
page read and write
|
||
2250000
|
heap
|
page read and write
|
||
18F8B560000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page read and write
|
||
2050000
|
direct allocation
|
page read and write
|
||
402000
|
unkown
|
page execute read
|
||
5A9000
|
heap
|
page read and write
|
||
2110000
|
direct allocation
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
18F8B67B000
|
heap
|
page read and write
|
||
26748020000
|
trusted library section
|
page readonly
|
||
2C30000
|
direct allocation
|
page execute and read and write
|
||
2251000
|
heap
|
page read and write
|
||
2674C430000
|
trusted library allocation
|
page read and write
|
||
276EA681000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
26747029000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
18F8B64A000
|
heap
|
page read and write
|
||
24557A68000
|
heap
|
page read and write
|
||
74BA87E000
|
stack
|
page read and write
|
||
24468B30000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
24468C80000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
26747077000
|
heap
|
page read and write
|
||
24468C50000
|
heap
|
page read and write
|
||
ABC0DFE000
|
stack
|
page read and write
|
||
2674C540000
|
trusted library allocation
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
4D0000
|
direct allocation
|
page read and write
|
||
7A867FF000
|
stack
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
9C9127E000
|
stack
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
1C5A782A000
|
heap
|
page read and write
|
||
276EA683000
|
heap
|
page read and write
|
||
24557A58000
|
heap
|
page read and write
|
||
51A000
|
heap
|
page read and write
|
||
2674C8A0000
|
remote allocation
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
24557A31000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2060000
|
direct allocation
|
page read and write
|
||
276EB000000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2674C584000
|
trusted library allocation
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
5F3000
|
heap
|
page read and write
|
||
2674C3A0000
|
trusted library allocation
|
page read and write
|
||
24557A24000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2674C3B0000
|
trusted library allocation
|
page read and write
|
||
C41D5FF000
|
stack
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
276EAF00000
|
heap
|
page read and write
|
||
276EA7E5000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
74BAE7B000
|
stack
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
4AB59AE000
|
stack
|
page read and write
|
||
2674C6F8000
|
heap
|
page read and write
|
||
276EB023000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
24557A7E000
|
heap
|
page read and write
|
||
2120000
|
direct allocation
|
page read and write
|
||
276EAF6F000
|
heap
|
page read and write
|
||
7A862FB000
|
stack
|
page read and write
|
||
26747094000
|
heap
|
page read and write
|
||
1F177802000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page readonly
|
||
276EA686000
|
heap
|
page read and write
|
||
88F000
|
stack
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
18F8B661000
|
heap
|
page read and write
|
||
4C4000
|
heap
|
page read and write
|
||
216B2841000
|
heap
|
page read and write
|
||
26748393000
|
trusted library allocation
|
page read and write
|
||
276EA66C000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
1F178002000
|
trusted library allocation
|
page read and write
|
||
4AB5DFB000
|
stack
|
page read and write
|
||
74BA6FB000
|
stack
|
page read and write
|
||
4AB5F7E000
|
stack
|
page read and write
|
||
1C5A8002000
|
trusted library allocation
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
1F1777F0000
|
heap
|
page read and write
|
||
69F000
|
stack
|
page read and write
|
||
24557A55000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
56E000
|
stack
|
page read and write
|
||
5D1000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
510000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
7A864FB000
|
stack
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
276EA713000
|
heap
|
page read and write
|
||
276EAF22000
|
heap
|
page read and write
|
||
2674C702000
|
heap
|
page read and write
|
||
AB3947F000
|
stack
|
page read and write
|
||
24557A74000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
92F000
|
stack
|
page read and write
|
||
276EA65A000
|
heap
|
page read and write
|
||
2674C540000
|
trusted library allocation
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page readonly
|
||
9D000
|
stack
|
page read and write
|
||
409000
|
unkown
|
page write copy
|
||
4AB5E7F000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2C7E000
|
stack
|
page read and write
|
||
276EAFD1000
|
heap
|
page read and write
|
||
24557880000
|
heap
|
page read and write
|
||
24468C6F000
|
heap
|
page read and write
|
||
2674C850000
|
trusted library allocation
|
page read and write
|
||
26747802000
|
heap
|
page read and write
|
||
1C5A7690000
|
heap
|
page read and write
|
||
1B843270000
|
heap
|
page read and write
|
||
2674C8A0000
|
remote allocation
|
page read and write
|
||
4AB617F000
|
stack
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
4E0000
|
direct allocation
|
page read and write
|
||
C41D3FE000
|
stack
|
page read and write
|
||
2674C570000
|
trusted library allocation
|
page read and write
|
||
24558202000
|
trusted library allocation
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
276EAF02000
|
heap
|
page read and write
|
||
F175FFF000
|
stack
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
216B27E0000
|
trusted library allocation
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2674C62D000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
1C5A7902000
|
heap
|
page read and write
|
||
1C5A784D000
|
heap
|
page read and write
|
||
737000
|
heap
|
page read and write
|
||
24557A64000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
F175F7E000
|
stack
|
page read and write
|
||
ABC0D7C000
|
stack
|
page read and write
|
||
500000
|
trusted library allocation
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
276EA643000
|
heap
|
page read and write
|
||
2674C580000
|
trusted library allocation
|
page read and write
|
||
1B843513000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
24557A77000
|
heap
|
page read and write
|
||
1B843413000
|
heap
|
page read and write
|
||
2674C561000
|
trusted library allocation
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
216B2813000
|
heap
|
page read and write
|
||
2674C6A3000
|
heap
|
page read and write
|
||
2674C8A0000
|
remote allocation
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2674C700000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2674C664000
|
heap
|
page read and write
|
||
1F177800000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
74BAC7D000
|
stack
|
page read and write
|
||
26747113000
|
heap
|
page read and write
|
||
24468C4A000
|
heap
|
page read and write
|
||
216B2875000
|
heap
|
page read and write
|
||
216B2680000
|
heap
|
page read and write
|
||
4F0000
|
direct allocation
|
page read and write
|
||
21AE000
|
stack
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
18F8B590000
|
trusted library allocation
|
page read and write
|
||
18F8B666000
|
heap
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
2674707C000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
276EA652000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2674C6F0000
|
heap
|
page read and write
|
||
2C10000
|
direct allocation
|
page execute and read and write
|
||
ABC08CC000
|
stack
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
2674C62F000
|
heap
|
page read and write
|
||
267470B0000
|
heap
|
page read and write
|
||
9C9137E000
|
stack
|
page read and write
|
||
276EA66A000
|
heap
|
page read and write
|
||
29CE000
|
stack
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
24557A62000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
4AB58AC000
|
stack
|
page read and write
|
||
A1CD3FB000
|
stack
|
page read and write
|
||
4AB6077000
|
stack
|
page read and write
|
||
216B2913000
|
heap
|
page read and write
|
||
5E6000
|
heap
|
page read and write
|
||
74F000
|
stack
|
page read and write
|
||
F175CFF000
|
stack
|
page read and write
|
||
18F8B63C000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page execute read
|
||
2674C6FE000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
24557A52000
|
heap
|
page read and write
|
||
1B84348A000
|
heap
|
page read and write
|
||
26747815000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
A1CCFCB000
|
stack
|
page read and write
|
||
24557870000
|
heap
|
page read and write
|
||
18F8B65B000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
26746E80000
|
heap
|
page read and write
|
||
1C5A7802000
|
heap
|
page read and write
|
||
ABC117D000
|
stack
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
1F17783D000
|
heap
|
page read and write
|
||
26748000000
|
trusted library section
|
page readonly
|
||
2674C564000
|
trusted library allocation
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
18F8B708000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
24557A6D000
|
heap
|
page read and write
|
||
2674C600000
|
heap
|
page read and write
|
||
24468AC0000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2674C548000
|
trusted library allocation
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
24468D02000
|
heap
|
page read and write
|
||
267470FE000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
24557A51000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
18F8BE02000
|
trusted library allocation
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
7A8697F000
|
stack
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
276EAFB1000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
24468B60000
|
trusted library allocation
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
276EAF54000
|
heap
|
page read and write
|
||
24468C29000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page execute read
|
||
420000
|
heap
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page execute read
|
||
24557A3F000
|
heap
|
page read and write
|
||
24468D00000
|
heap
|
page read and write
|
||
26747102000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
216B2670000
|
heap
|
page read and write
|
||
24557A5C000
|
heap
|
page read and write
|
||
276EA629000
|
heap
|
page read and write
|
||
24557A59000
|
heap
|
page read and write
|
||
74BAB7B000
|
stack
|
page read and write
|
||
409000
|
unkown
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
276EAFBD000
|
heap
|
page read and write
|
||
26747FD0000
|
trusted library section
|
page readonly
|
||
730000
|
heap
|
page read and write
|
||
520000
|
direct allocation
|
page read and write
|
||
24557A75000
|
heap
|
page read and write
|
||
288F000
|
stack
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
24557A4A000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page readonly
|
||
5A9000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
9C9157F000
|
stack
|
page read and write
|
||
276EB027000
|
heap
|
page read and write
|
||
26747800000
|
heap
|
page read and write
|
||
1B843471000
|
heap
|
page read and write
|
||
2674C420000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
52E000
|
stack
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
F175B7C000
|
stack
|
page read and write
|
||
1B843502000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
24557A6B000
|
heap
|
page read and write
|
||
276EA4D0000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
276EAF22000
|
heap
|
page read and write
|
||
1B843444000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
570000
|
trusted library allocation
|
page read and write
|
||
AB38BFB000
|
stack
|
page read and write
|
||
409000
|
unkown
|
page write copy
|
||
2251000
|
heap
|
page read and write
|
||
2674703D000
|
heap
|
page read and write
|
||
5FA000
|
heap
|
page read and write
|
||
2674709F000
|
heap
|
page read and write
|
||
2290000
|
heap
|
page read and write
|
||
1C5A7700000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1B843210000
|
heap
|
page read and write
|
||
1C5A7E90000
|
remote allocation
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
24557A2F000
|
heap
|
page read and write
|
||
1B843D00000
|
heap
|
page read and write
|
||
26748010000
|
trusted library section
|
page readonly
|
||
2EBE000
|
stack
|
page read and write
|
||
216B2829000
|
heap
|
page read and write
|
||
26747EF0000
|
trusted library allocation
|
page read and write
|
||
C41CF4B000
|
stack
|
page read and write
|
||
216B2800000
|
heap
|
page read and write
|
||
AB387EB000
|
stack
|
page read and write
|
||
2240000
|
heap
|
page read and write
|
||
2674C6A0000
|
trusted library allocation
|
page read and write
|
||
276EA470000
|
heap
|
page read and write
|
||
C41CFCE000
|
stack
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
7A868FF000
|
stack
|
page read and write
|
||
26746FE0000
|
trusted library allocation
|
page read and write
|
||
24469402000
|
trusted library allocation
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
2674C6E0000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
F175A7F000
|
stack
|
page read and write
|
||
24557A5F000
|
heap
|
page read and write
|
||
AB3957F000
|
stack
|
page read and write
|
||
18F8B654000
|
heap
|
page read and write
|
||
1F177902000
|
heap
|
page read and write
|
||
26747918000
|
heap
|
page read and write
|
||
2EEB000
|
direct allocation
|
page execute and read and write
|
||
216B285B000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
1C5A7E90000
|
remote allocation
|
page read and write
|
||
24557B02000
|
heap
|
page read and write
|
||
ABC12FE000
|
stack
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
18F8B613000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
24557A56000
|
heap
|
page read and write
|
||
4D0000
|
trusted library allocation
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
24468C4E000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
1F177846000
|
heap
|
page read and write
|
||
2674C560000
|
trusted library allocation
|
page read and write
|
||
1B8434CF000
|
heap
|
page read and write
|
||
2251000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2674707A000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2EE0000
|
direct allocation
|
page execute and read and write
|
||
24468C55000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
2130000
|
direct allocation
|
page execute and read and write
|
There are 670 hidden memdumps, click here to show them.