IOC Report
2fiDcmkaZY.exe

loading gif

Files

File Path
Type
Category
Malicious
2fiDcmkaZY.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\89dad5d484a9f889a3a8dfca823edc3e_d06ed635-68f6-4e9a-955c-4899f5f57b9a
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\2fiDcmkaZY.exe
"C:\Users\user\Desktop\2fiDcmkaZY.exe"
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe
"C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe"
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe
"C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe"
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 51 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://gdcbghvjyqy7jclk.onion.casa/2d028d577a0eb038
unknown
malicious
http://gdcbghvjyqy7jclk.onion/2d028d577a0eb038
unknown
malicious
http://gdcbghvjyqy7jclk.onion.top/2d028d577a0eb038
unknown
malicious
http://gdcbghvjyqy7jclk.onion.plus/2d028d577a0eb038
unknown
http://gdcbghvjyqy7jclk.onion.rip/2d028d577a0eb038
unknown
https://www.torproject.org/
unknown
http://gdcbghvjyqy7jclk.onion.guide/2d028d577a0eb038
unknown
http://ipv4bot.whatismyipaddress.com/
unknown
http://ipv4bot.whatismyipaddress.com/n
unknown

Domains

Name
IP
Malicious
emsisoft.bit
unknown
malicious
nomoreransom.bit
unknown
malicious
gandcrab.bit
unknown
malicious
dns1.soprodns.ru
unknown
malicious
ipv4bot.whatismyipaddress.com
unknown
8.8.8.8.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
tbmdhshhgoz

Memdumps

Base Address
Regiontype
Protect
Malicious
C79000
unkown
page write copy
malicious
C79000
unkown
page read and write
malicious
C79000
unkown
page read and write
malicious
A69000
unkown
page write copy
malicious
C79000
unkown
page write copy
malicious
A69000
unkown
page read and write
malicious
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1F5A7C66000
heap
page read and write
1F5A8602000
trusted library allocation
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
C6D000
stack
page read and write
A74000
unkown
page readonly
1144000
heap
page read and write
122A000
heap
page read and write
122A000
heap
page read and write
1F5A7C4A000
heap
page read and write
1144000
heap
page read and write
DCB927E000
stack
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1120000
direct allocation
page read and write
122A000
heap
page read and write
26B2BC29000
heap
page read and write
1144000
heap
page read and write
2AFEF285000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1080000
trusted library allocation
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
26B2BA90000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
26B2BAA0000
heap
page read and write
DCB8F3B000
stack
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
12A0000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1F5A7C55000
heap
page read and write
2AFEF160000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1F5A7C66000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1130000
direct allocation
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
2AFEF264000
heap
page read and write
2E00000
direct allocation
page execute and read and write
1144000
heap
page read and write
1144000
heap
page read and write
E9F418F000
stack
page read and write
1144000
heap
page read and write
C7CD5FF000
stack
page read and write
1144000
heap
page read and write
C20000
trusted library allocation
page read and write
1144000
heap
page read and write
26B2BD02000
heap
page read and write
DD0000
trusted library allocation
page read and write
C7CCFAF000
stack
page read and write
1144000
heap
page read and write
1190000
direct allocation
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
A61000
unkown
page execute read
122A000
heap
page read and write
1144000
heap
page read and write
C71000
unkown
page execute read
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
11A0000
direct allocation
page read and write
E5C000
stack
page read and write
1144000
heap
page read and write
2E90000
direct allocation
page execute and read and write
2DF0000
direct allocation
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
2AFEF226000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
C7CD2FB000
stack
page read and write
1144000
heap
page read and write
1130000
direct allocation
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
26B2C402000
trusted library allocation
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1277000
heap
page read and write
2AFEF229000
heap
page read and write
1144000
heap
page read and write
C84000
unkown
page readonly
122A000
heap
page read and write
26B2BC4D000
heap
page read and write
1270000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
341E000
stack
page read and write
1144000
heap
page read and write
BAC000
stack
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
26B2BC49000
heap
page read and write
1130000
direct allocation
page read and write
1144000
heap
page read and write
2AFEF100000
heap
page read and write
1144000
heap
page read and write
26B2BC7F000
heap
page read and write
E9F4877000
stack
page read and write
E9F497F000
stack
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1000000
direct allocation
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1F5A7D02000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
A40000
heap
page read and write
1144000
heap
page read and write
DCB97FF000
stack
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
2EA1000
heap
page read and write
1144000
heap
page read and write
2AFEF28A000
heap
page read and write
1144000
heap
page read and write
26B2BD00000
heap
page read and write
2AFEF25D000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1130000
direct allocation
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
2EA1000
heap
page read and write
C82000
unkown
page write copy
1144000
heap
page read and write
122A000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
26B2BC4E000
heap
page read and write
1130000
direct allocation
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
2E7E000
stack
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
120A000
heap
page read and write
1144000
heap
page read and write
AAD000
stack
page read and write
1F5A7C50000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
2AFEF262000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
DCB93FD000
stack
page read and write
10FB000
stack
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
14DF000
stack
page read and write
26B2BC4F000
heap
page read and write
1010000
direct allocation
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
E9F467B000
stack
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1F5A7C70000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
12DE000
stack
page read and write
1144000
heap
page read and write
369E000
stack
page read and write
10E0000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1120000
direct allocation
page read and write
D6C000
stack
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
C71000
unkown
page execute read
38F0000
direct allocation
page execute and read and write
122A000
heap
page read and write
1120000
direct allocation
page read and write
1144000
heap
page read and write
26B2BC4B000
heap
page read and write
1144000
heap
page read and write
2AFEF300000
heap
page read and write
1144000
heap
page read and write
1F5A7B80000
heap
page read and write
1144000
heap
page read and write
1265000
heap
page read and write
10EA000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
BE0000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
15BF000
stack
page read and write
1144000
heap
page read and write
1250000
direct allocation
page read and write
A60000
unkown
page readonly
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
351F000
stack
page read and write
2AFEF27D000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
DCB94FB000
stack
page read and write
123B000
heap
page read and write
1144000
heap
page read and write
3BA0000
direct allocation
page execute and read and write
1144000
heap
page read and write
1144000
heap
page read and write
C82000
unkown
page write copy
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1F5A7D13000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1120000
direct allocation
page execute and read and write
122A000
heap
page read and write
1144000
heap
page read and write
C7CD6FF000
stack
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1130000
direct allocation
page read and write
26B2BB00000
heap
page read and write
2AFEF0F0000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1F5A8490000
trusted library allocation
page read and write
1120000
direct allocation
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
C70000
unkown
page readonly
1144000
heap
page read and write
122A000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
38DA000
stack
page read and write
C84000
unkown
page readonly
122A000
heap
page read and write
1144000
heap
page read and write
C7CD3FB000
stack
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
E9F477E000
stack
page read and write
C70000
unkown
page readonly
1144000
heap
page read and write
26B2BD13000
heap
page read and write
122A000
heap
page read and write
DCB8FBF000
stack
page read and write
C10000
heap
page read and write
122A000
heap
page read and write
26B2C3A0000
trusted library allocation
page read and write
1144000
heap
page read and write
2D80000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
26B2BC80000
heap
page read and write
1144000
heap
page read and write
1140000
heap
page read and write
1120000
direct allocation
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
2AFEF279000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
3A3E000
stack
page read and write
1244000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
DCB95F7000
stack
page read and write
2AFEF25C000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
2AFEFC02000
trusted library allocation
page read and write
26B2BC8C000
heap
page read and write
122A000
heap
page read and write
122A000
heap
page read and write
1130000
direct allocation
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
2AFEF25B000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
F5C000
stack
page read and write
1226000
heap
page read and write
C71000
unkown
page execute read
1144000
heap
page read and write
2AFEF25F000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1190000
direct allocation
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1F5A7C89000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
2AFEF190000
trusted library allocation
page read and write
1260000
direct allocation
page read and write
C70000
unkown
page readonly
26B2BC4A000
heap
page read and write
1144000
heap
page read and write
1F5A7C87000
heap
page read and write
13DE000
stack
page read and write
1144000
heap
page read and write
1F5A7C29000
heap
page read and write
2EA0000
heap
page read and write
1144000
heap
page read and write
C70000
unkown
page readonly
1144000
heap
page read and write
122A000
heap
page read and write
1200000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
26B2BC00000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
13AF000
stack
page read and write
33DF000
stack
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
2AFEF23C000
heap
page read and write
1144000
heap
page read and write
37DD000
stack
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
D9E000
stack
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
2AFEF308000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
3B7F000
stack
page read and write
2EA1000
heap
page read and write
1144000
heap
page read and write
1F5A7D08000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
13C0000
heap
page read and write
120E000
stack
page read and write
11D0000
heap
page read and write
1144000
heap
page read and write
C7CCF2D000
stack
page read and write
26B2BD08000
heap
page read and write
1144000
heap
page read and write
1F5A7D00000
heap
page read and write
1F5A7C3C000
heap
page read and write
122A000
heap
page read and write
2AFEF27D000
heap
page read and write
1144000
heap
page read and write
26B2BC3C000
heap
page read and write
1144000
heap
page read and write
1130000
direct allocation
page read and write
A60000
unkown
page readonly
1144000
heap
page read and write
13C7000
heap
page read and write
DDE000
stack
page read and write
122A000
heap
page read and write
DCB96FF000
stack
page read and write
122A000
heap
page read and write
122A000
heap
page read and write
1190000
trusted library allocation
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
2AFEF27F000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1F5A7C13000
heap
page read and write
122A000
heap
page read and write
122A000
heap
page read and write
3BAB000
direct allocation
page execute and read and write
3A7E000
stack
page read and write
1144000
heap
page read and write
1120000
direct allocation
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
E9F457B000
stack
page read and write
2AFEF313000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
26B2BC13000
heap
page read and write
E9F447F000
stack
page read and write
1144000
heap
page read and write
379F000
stack
page read and write
1144000
heap
page read and write
2DE0000
direct allocation
page read and write
2AFEF25E000
heap
page read and write
C7CD4F7000
stack
page read and write
1F5A7C76000
heap
page read and write
2AFEF200000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
393D000
stack
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
26B2BC6F000
heap
page read and write
1F5A7C7A000
heap
page read and write
1144000
heap
page read and write
1F5A7BF0000
heap
page read and write
2AFEF279000
heap
page read and write
1144000
heap
page read and write
1F5A7C4D000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
2AFEF302000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
26B2BC51000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
1120000
direct allocation
page read and write
122A000
heap
page read and write
2AFEF213000
heap
page read and write
C71000
unkown
page execute read
1144000
heap
page read and write
124E000
stack
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
D00000
heap
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
E9F410B000
stack
page read and write
1144000
heap
page read and write
2F50000
heap
page read and write
2E00000
trusted library allocation
page read and write
1144000
heap
page read and write
C84000
unkown
page readonly
1144000
heap
page read and write
1144000
heap
page read and write
A74000
unkown
page readonly
1144000
heap
page read and write
1144000
heap
page read and write
2AFEF261000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
1F5A7C00000
heap
page read and write
A61000
unkown
page execute read
1190000
direct allocation
page read and write
1144000
heap
page read and write
1144000
heap
page read and write
1F5A7B90000
heap
page read and write
1144000
heap
page read and write
C84000
unkown
page readonly
1144000
heap
page read and write
1144000
heap
page read and write
C7CCEAB000
stack
page read and write
1144000
heap
page read and write
122A000
heap
page read and write
122A000
heap
page read and write
There are 629 hidden memdumps, click here to show them.