Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
2fiDcmkaZY.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\89dad5d484a9f889a3a8dfca823edc3e_d06ed635-68f6-4e9a-955c-4899f5f57b9a
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\2fiDcmkaZY.exe
|
"C:\Users\user\Desktop\2fiDcmkaZY.exe"
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
||
C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe"
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
||
C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe"
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup gandcrab.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup nomoreransom.bit dns1.soprodns.ru
|
||
C:\Windows\SysWOW64\nslookup.exe
|
nslookup emsisoft.bit dns1.soprodns.ru
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 51 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://gdcbghvjyqy7jclk.onion.casa/2d028d577a0eb038
|
unknown
|
||
http://gdcbghvjyqy7jclk.onion/2d028d577a0eb038
|
unknown
|
||
http://gdcbghvjyqy7jclk.onion.top/2d028d577a0eb038
|
unknown
|
||
http://gdcbghvjyqy7jclk.onion.plus/2d028d577a0eb038
|
unknown
|
||
http://gdcbghvjyqy7jclk.onion.rip/2d028d577a0eb038
|
unknown
|
||
https://www.torproject.org/
|
unknown
|
||
http://gdcbghvjyqy7jclk.onion.guide/2d028d577a0eb038
|
unknown
|
||
http://ipv4bot.whatismyipaddress.com/
|
unknown
|
||
http://ipv4bot.whatismyipaddress.com/n
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
emsisoft.bit
|
unknown
|
||
nomoreransom.bit
|
unknown
|
||
gandcrab.bit
|
unknown
|
||
dns1.soprodns.ru
|
unknown
|
||
ipv4bot.whatismyipaddress.com
|
unknown
|
||
8.8.8.8.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
|
tbmdhshhgoz
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C79000
|
unkown
|
page write copy
|
||
C79000
|
unkown
|
page read and write
|
||
C79000
|
unkown
|
page read and write
|
||
A69000
|
unkown
|
page write copy
|
||
C79000
|
unkown
|
page write copy
|
||
A69000
|
unkown
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1F5A7C66000
|
heap
|
page read and write
|
||
1F5A8602000
|
trusted library allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
C6D000
|
stack
|
page read and write
|
||
A74000
|
unkown
|
page readonly
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1F5A7C4A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
DCB927E000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
26B2BC29000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
2AFEF285000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
26B2BA90000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
26B2BAA0000
|
heap
|
page read and write
|
||
DCB8F3B000
|
stack
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1F5A7C55000
|
heap
|
page read and write
|
||
2AFEF160000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1F5A7C66000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
2AFEF264000
|
heap
|
page read and write
|
||
2E00000
|
direct allocation
|
page execute and read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
E9F418F000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
C7CD5FF000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
C20000
|
trusted library allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
26B2BD02000
|
heap
|
page read and write
|
||
DD0000
|
trusted library allocation
|
page read and write
|
||
C7CCFAF000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1190000
|
direct allocation
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
A61000
|
unkown
|
page execute read
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
C71000
|
unkown
|
page execute read
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
E5C000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
2E90000
|
direct allocation
|
page execute and read and write
|
||
2DF0000
|
direct allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
2AFEF226000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
C7CD2FB000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
26B2C402000
|
trusted library allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1277000
|
heap
|
page read and write
|
||
2AFEF229000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
C84000
|
unkown
|
page readonly
|
||
122A000
|
heap
|
page read and write
|
||
26B2BC4D000
|
heap
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
341E000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
BAC000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
26B2BC49000
|
heap
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
2AFEF100000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
26B2BC7F000
|
heap
|
page read and write
|
||
E9F4877000
|
stack
|
page read and write
|
||
E9F497F000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1000000
|
direct allocation
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1F5A7D02000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
DCB97FF000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
2EA1000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
2AFEF28A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
26B2BD00000
|
heap
|
page read and write
|
||
2AFEF25D000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
2EA1000
|
heap
|
page read and write
|
||
C82000
|
unkown
|
page write copy
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
26B2BC4E000
|
heap
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
120A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
AAD000
|
stack
|
page read and write
|
||
1F5A7C50000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
2AFEF262000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
DCB93FD000
|
stack
|
page read and write
|
||
10FB000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
14DF000
|
stack
|
page read and write
|
||
26B2BC4F000
|
heap
|
page read and write
|
||
1010000
|
direct allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
E9F467B000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1F5A7C70000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
12DE000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
369E000
|
stack
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
D6C000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
C71000
|
unkown
|
page execute read
|
||
38F0000
|
direct allocation
|
page execute and read and write
|
||
122A000
|
heap
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
26B2BC4B000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
2AFEF300000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1F5A7B80000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1265000
|
heap
|
page read and write
|
||
10EA000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
15BF000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1250000
|
direct allocation
|
page read and write
|
||
A60000
|
unkown
|
page readonly
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
351F000
|
stack
|
page read and write
|
||
2AFEF27D000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
DCB94FB000
|
stack
|
page read and write
|
||
123B000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
3BA0000
|
direct allocation
|
page execute and read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
C82000
|
unkown
|
page write copy
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1F5A7D13000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1120000
|
direct allocation
|
page execute and read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
C7CD6FF000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
26B2BB00000
|
heap
|
page read and write
|
||
2AFEF0F0000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1F5A8490000
|
trusted library allocation
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
C70000
|
unkown
|
page readonly
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
38DA000
|
stack
|
page read and write
|
||
C84000
|
unkown
|
page readonly
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
C7CD3FB000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
E9F477E000
|
stack
|
page read and write
|
||
C70000
|
unkown
|
page readonly
|
||
1144000
|
heap
|
page read and write
|
||
26B2BD13000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
DCB8FBF000
|
stack
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
26B2C3A0000
|
trusted library allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
26B2BC80000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
2AFEF279000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
DCB95F7000
|
stack
|
page read and write
|
||
2AFEF25C000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
2AFEFC02000
|
trusted library allocation
|
page read and write
|
||
26B2BC8C000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
2AFEF25B000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
F5C000
|
stack
|
page read and write
|
||
1226000
|
heap
|
page read and write
|
||
C71000
|
unkown
|
page execute read
|
||
1144000
|
heap
|
page read and write
|
||
2AFEF25F000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1190000
|
direct allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1F5A7C89000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
2AFEF190000
|
trusted library allocation
|
page read and write
|
||
1260000
|
direct allocation
|
page read and write
|
||
C70000
|
unkown
|
page readonly
|
||
26B2BC4A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1F5A7C87000
|
heap
|
page read and write
|
||
13DE000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1F5A7C29000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
C70000
|
unkown
|
page readonly
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
26B2BC00000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
13AF000
|
stack
|
page read and write
|
||
33DF000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
2AFEF23C000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
37DD000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
D9E000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
2AFEF308000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
2EA1000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1F5A7D08000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
C7CCF2D000
|
stack
|
page read and write
|
||
26B2BD08000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1F5A7D00000
|
heap
|
page read and write
|
||
1F5A7C3C000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
2AFEF27D000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
26B2BC3C000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
A60000
|
unkown
|
page readonly
|
||
1144000
|
heap
|
page read and write
|
||
13C7000
|
heap
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
DCB96FF000
|
stack
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1190000
|
trusted library allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
2AFEF27F000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1F5A7C13000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
3BAB000
|
direct allocation
|
page execute and read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
E9F457B000
|
stack
|
page read and write
|
||
2AFEF313000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
26B2BC13000
|
heap
|
page read and write
|
||
E9F447F000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
379F000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
2DE0000
|
direct allocation
|
page read and write
|
||
2AFEF25E000
|
heap
|
page read and write
|
||
C7CD4F7000
|
stack
|
page read and write
|
||
1F5A7C76000
|
heap
|
page read and write
|
||
2AFEF200000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
393D000
|
stack
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
26B2BC6F000
|
heap
|
page read and write
|
||
1F5A7C7A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1F5A7BF0000
|
heap
|
page read and write
|
||
2AFEF279000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1F5A7C4D000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
2AFEF302000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
26B2BC51000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
2AFEF213000
|
heap
|
page read and write
|
||
C71000
|
unkown
|
page execute read
|
||
1144000
|
heap
|
page read and write
|
||
124E000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
E9F410B000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
2E00000
|
trusted library allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
C84000
|
unkown
|
page readonly
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
A74000
|
unkown
|
page readonly
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
2AFEF261000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1F5A7C00000
|
heap
|
page read and write
|
||
A61000
|
unkown
|
page execute read
|
||
1190000
|
direct allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
1F5A7B90000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
C84000
|
unkown
|
page readonly
|
||
1144000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
C7CCEAB000
|
stack
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
There are 629 hidden memdumps, click here to show them.