IOC Report
RUNIT2.EXE

loading gif

Files

File Path
Type
Category
Malicious
RUNIT2.EXE
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\CSC5B8025FC83464292BBE495898E339EBE.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\CSC5FF1484DFEAC4FAA872A2D156A7AC56A.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\CSC79526781084487E8E42D8F778C3DF69.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\PCWF86D.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\RES857A.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ba, 9 symbols, created Tue Oct 29 17:16:59 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RES8D3A.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ba, 9 symbols, created Tue Oct 29 17:17:01 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RES99AE.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ba, 9 symbols, created Tue Oct 29 17:17:04 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\SDIAG_3769ae4e-01bf-480c-897c-dac247b4f277\DiagPackage.diagpkg
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\SDIAG_3769ae4e-01bf-480c-897c-dac247b4f277\DiagPackage.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\SDIAG_3769ae4e-01bf-480c-897c-dac247b4f277\RS_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\SDIAG_3769ae4e-01bf-480c-897c-dac247b4f277\TS_ProgramCompatibilityWizard.ps1
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\SDIAG_3769ae4e-01bf-480c-897c-dac247b4f277\VF_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\SDIAG_3769ae4e-01bf-480c-897c-dac247b4f277\en-GB\CL_LouserzationData.psd1
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\SDIAG_3769ae4e-01bf-480c-897c-dac247b4f277\en-GB\DiagPackage.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\SDIAG_3769ae4e-01bf-480c-897c-dac247b4f277\result\results.xsl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\hr5jugav.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\rgr4voti.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\w3fyocc2.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\hr5jugav.cmdline"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\rgr4voti.cmdline"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\w3fyocc2.cmdline"
malicious
C:\Windows\System32\pcwrun.exe
C:\Windows\system32\pcwrun.exe "C:\Users\user\Desktop\RUNIT2.EXE" ContextMenu
C:\Windows\System32\msdt.exe
C:\Windows\System32\msdt.exe -path C:\Windows\diagnostics\index\PCWDiagnostic.xml -af C:\Users\user\AppData\Local\Temp\PCWF86D.xml /skip TRUE
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES857A.tmp" "c:\Users\user\AppData\Local\Temp\CSC79526781084487E8E42D8F778C3DF69.TMP"
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES8D3A.tmp" "c:\Users\user\AppData\Local\Temp\CSC5FF1484DFEAC4FAA872A2D156A7AC56A.TMP"
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES99AE.tmp" "c:\Users\user\AppData\Local\Temp\CSC5B8025FC83464292BBE495898E339EBE.TMP"

Memdumps

Base Address
Regiontype
Protect
Malicious
1816D63D000
heap
page read and write
1816D600000
heap
page read and write
70C3FFD000
stack
page read and write
14CC1099000
heap
page read and write
2CD2EEC0000
direct allocation
page read and write
1C02866B000
heap
page read and write
84C739C000
stack
page read and write
2CD2BFB7000
heap
page read and write
1C02863A000
heap
page read and write
70C3E7A000
stack
page read and write
1816BC40000
heap
page read and write
1816F67C000
heap
page read and write
14CC1270000
heap
page read and write
1816D64B000
heap
page read and write
1816DD6C000
heap
page read and write
1816D61A000
heap
page read and write
2CD2BFF7000
heap
page read and write
1C028820000
heap
page read and write
1C028683000
heap
page read and write
1816D632000
heap
page read and write
1C0286DF000
heap
page read and write
2CD2BF40000
heap
page read and write
19422805000
heap
page read and write
1816F605000
heap
page read and write
1816D5EA000
heap
page read and write
14CC2AED000
direct allocation
page read and write
19420DF7000
heap
page read and write
1816D5FF000
heap
page read and write
1816D673000
heap
page read and write
2CD2BF84000
heap
page read and write
2CD2EE80000
direct allocation
page read and write
1C028682000
heap
page read and write
1C0286C8000
heap
page read and write
1A3FD1D0000
heap
page read and write
14CC10F3000
heap
page read and write
14CC1103000
heap
page read and write
1816D612000
heap
page read and write
70C417E000
stack
page read and write
2CD2C114000
heap
page read and write
14CC10CD000
heap
page read and write
1816D5F6000
heap
page read and write
19422802000
heap
page read and write
2CD2BFFC000
heap
page read and write
1816BAA9000
heap
page read and write
1816D65F000
heap
page read and write
1816D912000
heap
page read and write
14CC405C000
direct allocation
page read and write
1816BBA0000
heap
page read and write
14CC4024000
direct allocation
page read and write
1816F613000
heap
page read and write
2CD2BFC5000
heap
page read and write
5886CFE000
stack
page read and write
1816F5E1000
heap
page read and write
1C028691000
heap
page read and write
1FB08F64000
heap
page read and write
1C02868F000
heap
page read and write
1816BCC5000
heap
page read and write
14CC10BE000
heap
page read and write
1816D640000
heap
page read and write
1816D61A000
heap
page read and write
14CC1122000
heap
page read and write
1816BB76000
heap
page read and write
14CC10AB000
heap
page read and write
1816F6AB000
heap
page read and write
14CC10C1000
heap
page read and write
2CD2BF8E000
heap
page read and write
14CC10B8000
heap
page read and write
AA35DFE000
stack
page read and write
19422807000
heap
page read and write
14CC10D4000
heap
page read and write
2CD2BF8A000
heap
page read and write
14CC1125000
heap
page read and write
1816F6B0000
heap
page read and write
14CC1103000
heap
page read and write
14CC10BA000
heap
page read and write
1816D64B000
heap
page read and write
14CC110F000
heap
page read and write
1C02878B000
direct allocation
page read and write
1816BAA0000
heap
page read and write
14CC2B1B000
direct allocation
page read and write
2CD2BFB7000
heap
page read and write
1816F676000
heap
page read and write
1C02867F000
heap
page read and write
1C02867A000
heap
page read and write
1816DD61000
heap
page read and write
14CC109F000
heap
page read and write
1816D5EA000
heap
page read and write
1A3FD1B0000
heap
page read and write
70C407F000
stack
page read and write
18CF3F000
stack
page read and write
14CC2BA0000
heap
page read and write
14CC10FF000
heap
page read and write
2CD2BFF2000
heap
page read and write
AA35FFE000
stack
page read and write
2CD2BF9B000
heap
page read and write
14CC2B07000
direct allocation
page read and write
1816D622000
heap
page read and write
2CD2C01E000
heap
page read and write
14CC1114000
heap
page read and write
19420E01000
heap
page read and write
1816F5EE000
heap
page read and write
1C028770000
direct allocation
page read and write
2CD2C027000
heap
page read and write
194229C0000
heap
page read and write
2CD2D8C7000
direct allocation
page read and write
1C02866C000
heap
page read and write
14CC109C000
heap
page read and write
2CD2BFAC000
heap
page read and write
2CD2BF94000
heap
page read and write
1816D677000
heap
page read and write
84C78FF000
stack
page read and write
1C028600000
heap
page read and write
14CC109F000
heap
page read and write
2CD2BFB7000
heap
page read and write
1A3FD1A0000
heap
page read and write
70C40FB000
stack
page read and write
1C0286B0000
heap
page read and write
21B1038A000
heap
page read and write
1C0286C1000
heap
page read and write
70C42FF000
stack
page read and write
2CD2C019000
heap
page read and write
1816F608000
heap
page read and write
2CD2C002000
heap
page read and write
19420D60000
heap
page read and write
14CC10F0000
heap
page read and write
18170AC8000
heap
page read and write
2CD2EF00000
direct allocation
page read and write
1816DDAD000
heap
page read and write
2CD2D9D0000
heap
page read and write
14CC1103000
heap
page read and write
14CC3F90000
direct allocation
page read and write
1A3FD3C0000
heap
page read and write
2CD2BF91000
heap
page read and write
2CD2BFAF000
heap
page read and write
2CD2BFA2000
heap
page read and write
78EC4FE000
stack
page read and write
1816F5FC000
heap
page read and write
21B10550000
heap
page read and write
1816D60B000
heap
page read and write
1C028675000
heap
page read and write
2CD2EE86000
direct allocation
page read and write
1816D5EA000
heap
page read and write
14CC10AF000
heap
page read and write
14CC10FC000
heap
page read and write
1C02B443000
direct allocation
page read and write
1C028672000
heap
page read and write
1C028730000
direct allocation
page read and write
2CD2BFC5000
heap
page read and write
1816F64C000
heap
page read and write
14CC10AF000
heap
page read and write
1816DF9E000
heap
page read and write
1816BB83000
heap
page read and write
1C028661000
heap
page read and write
14CC2B00000
direct allocation
page read and write
2CD2EF45000
direct allocation
page read and write
2CD2C01E000
heap
page read and write
2CD2BFC0000
heap
page read and write
14CC10D2000
heap
page read and write
2CD2BF91000
heap
page read and write
2CD2BFB3000
heap
page read and write
14CC10DC000
heap
page read and write
14CC10D2000
heap
page read and write
2CD2BFD6000
heap
page read and write
2CD2BE60000
heap
page read and write
1816D61E000
heap
page read and write
44461FE000
stack
page read and write
1816BB51000
heap
page read and write
1816D617000
heap
page read and write
14CC111F000
heap
page read and write
2CD2EDC0000
direct allocation
page read and write
1C028570000
heap
page read and write
1942280B000
heap
page read and write
1C0286DF000
heap
page read and write
1816D5E2000
heap
page read and write
1C0286C5000
heap
page read and write
14CC10A7000
heap
page read and write
14CC1170000
heap
page read and write
1FB08CF8000
heap
page read and write
2CD2EF40000
direct allocation
page read and write
1816BB51000
heap
page read and write
2CD2BFE1000
heap
page read and write
1C0286A5000
heap
page read and write
78EC11C000
stack
page read and write
19422807000
heap
page read and write
1816D5F5000
heap
page read and write
1816BB5C000
heap
page read and write
1C0286D6000
heap
page read and write
1C0286BA000
heap
page read and write
2CD2D920000
direct allocation
page read and write
1816D606000
heap
page read and write
14CC4050000
direct allocation
page read and write
1C0286C5000
heap
page read and write
1A3FD1D7000
heap
page read and write
2CD2BF8E000
heap
page read and write
1C028694000
heap
page read and write
1C0286E4000
heap
page read and write
1816D642000
heap
page read and write
1816D5DC000
heap
page read and write
2CD2D8C3000
direct allocation
page read and write
1C0286DD000
heap
page read and write
2CD2C110000
heap
page read and write
14CC3F50000
direct allocation
page read and write
1816D603000
heap
page read and write
1816D6A1000
heap
page read and write
5886BFE000
stack
page read and write
1C028682000
heap
page read and write
1816D66B000
heap
page read and write
14CC10BE000
heap
page read and write
2CD2BFDE000
heap
page read and write
2CD2C013000
heap
page read and write
1C028637000
heap
page read and write
1C02866B000
heap
page read and write
18170B90000
trusted library allocation
page read and write
2CD2BFB1000
heap
page read and write
14CC12E0000
heap
page read and write
1816DD92000
heap
page read and write
1C0286C8000
heap
page read and write
1816D63B000
heap
page read and write
2CD2BFDE000
heap
page read and write
1816DDAF000
heap
page read and write
2CD2BFCD000
heap
page read and write
14CC10B2000
heap
page read and write
1816BB45000
heap
page read and write
1C02869D000
heap
page read and write
1C028661000
heap
page read and write
2CD2BF8A000
heap
page read and write
14CC110C000
heap
page read and write
1C028668000
heap
page read and write
1C0286D1000
heap
page read and write
14CC1077000
heap
page read and write
2CD2BFE9000
heap
page read and write
14CC109D000
heap
page read and write
14CC4022000
direct allocation
page read and write
14CC3FD0000
direct allocation
page read and write
1C028698000
heap
page read and write
21B10730000
heap
page read and write
1816DD97000
heap
page read and write
2CD2BF9E000
heap
page read and write
1A3FD3B0000
heap
page read and write
2CD2BFA3000
heap
page read and write
1816BB49000
heap
page read and write
14CC111D000
heap
page read and write
2CD2BFE3000
heap
page read and write
1816DDB7000
heap
page read and write
19420D90000
heap
page read and write
2CD2ED80000
direct allocation
page read and write
1816DD8E000
heap
page read and write
1C028689000
heap
page read and write
78EC6FE000
stack
page read and write
1C02865E000
heap
page read and write
78EC5FF000
stack
page read and write
1C02A080000
direct allocation
page read and write
14CC1103000
heap
page read and write
4445FFE000
stack
page read and write
1816B9B0000
heap
page read and write
19422780000
heap
page read and write
2CD2BFE9000
heap
page read and write
194229C7000
heap
page read and write
14CC10C9000
heap
page read and write
14CC10E7000
heap
page read and write
1C02869A000
heap
page read and write
14CC1314000
heap
page read and write
1816BB52000
heap
page read and write
1816BB9C000
heap
page read and write
1C028664000
heap
page read and write
2CD2BFC2000
heap
page read and write
1816DD95000
heap
page read and write
1C028824000
heap
page read and write
2CD2BF9C000
heap
page read and write
2CD2BFD6000
heap
page read and write
1FB08B30000
heap
page read and write
21B10734000
heap
page read and write
1C02865D000
heap
page read and write
1816BBC0000
heap
page read and write
19420D70000
heap
page read and write
14CC10C3000
heap
page read and write
14CC1093000
heap
page read and write
2CD2BFBE000
heap
page read and write
2CD2C01A000
heap
page read and write
18170A9B000
heap
page read and write
1816F6A9000
heap
page read and write
14CC10AA000
heap
page read and write
1816DD95000
heap
page read and write
194229CE000
heap
page read and write
1816F62D000
heap
page read and write
1816DD60000
heap
page read and write
1816F67A000
heap
page read and write
1C028490000
heap
page read and write
70C437F000
stack
page read and write
1816D639000
heap
page read and write
18170A90000
heap
page read and write
1816F5E0000
heap
page read and write
1FB08C30000
heap
page read and write
70C3EFE000
stack
page read and write
14CC10B4000
heap
page read and write
14CC2AC0000
direct allocation
page read and write
1816BCC0000
heap
page read and write
4445BF7000
stack
page read and write
2CD2BF9B000
heap
page read and write
2CD2D900000
heap
page read and write
194229CB000
heap
page read and write
14CC10AD000
heap
page read and write
1942280A000
heap
page read and write
19422870000
heap
page read and write
2CD2EE00000
direct allocation
page read and write
1816DD87000
heap
page read and write
1C028630000
heap
page read and write
1816F623000
heap
page read and write
14CC1310000
heap
page read and write
14CC10E7000
heap
page read and write
1C028590000
heap
page read and write
194229D0000
heap
page read and write
19422803000
heap
page read and write
1816DDE5000
heap
page read and write
14CC2BA4000
heap
page read and write
18170A93000
heap
page read and write
1816D616000
heap
page read and write
1816D5FB000
heap
page read and write
2CD2EE40000
direct allocation
page read and write
2CD2BFFA000
heap
page read and write
1816DDB7000
heap
page read and write
1816D5C4000
heap
page read and write
2CD2C010000
heap
page read and write
1816D632000
heap
page read and write
1816BB4E000
heap
page read and write
2CD2C013000
heap
page read and write
2CD2BFAA000
heap
page read and write
84C76FE000
stack
page read and write
1FB08F60000
heap
page read and write
14CC111B000
heap
page read and write
1C0286E4000
heap
page read and write
DFCF3FE000
stack
page read and write
194229CC000
heap
page read and write
194229C9000
heap
page read and write
1C02866F000
heap
page read and write
1C0286E6000
heap
page read and write
1816D626000
heap
page read and write
2CD2BFF9000
heap
page read and write
2CD2BFC8000
heap
page read and write
194229D2000
heap
page read and write
2CD2D8C0000
direct allocation
page read and write
2CD2C023000
heap
page read and write
194229D2000
heap
page read and write
1816BB84000
heap
page read and write
1C02865D000
heap
page read and write
4445DFE000
stack
page read and write
14CC10FE000
heap
page read and write
1816D720000
heap
page read and write
18D27E000
stack
page read and write
2CD2C020000
heap
page read and write
2CD2D960000
direct allocation
page read and write
70C43FC000
stack
page read and write
AA361FE000
stack
page read and write
14CC10B6000
heap
page read and write
2CD2BFE6000
heap
page read and write
1C02868C000
heap
page read and write
1816F684000
heap
page read and write
1816D5D0000
heap
page read and write
DFCF1FE000
stack
page read and write
1C028777000
direct allocation
page read and write
1816DD73000
heap
page read and write
2CD2BFE1000
heap
page read and write
2CD2BFAA000
heap
page read and write
1C02867E000
heap
page read and write
1816BB96000
heap
page read and write
18CEBB000
stack
page read and write
1816BB59000
heap
page read and write
19420DF0000
heap
page read and write
1816D5C0000
heap
page read and write
1C0286A7000
heap
page read and write
194229D3000
heap
page read and write
1816D64B000
heap
page read and write
2CD2C025000
heap
page read and write
1816D62A000
heap
page read and write
14CC4041000
direct allocation
page read and write
2CD2BF9D000
heap
page read and write
2CD2BFAE000
heap
page read and write
14CC109C000
heap
page read and write
14CC10D0000
heap
page read and write
1C0286A5000
heap
page read and write
14CC1070000
heap
page read and write
1816D91A000
heap
page read and write
19422804000
heap
page read and write
1816D667000
heap
page read and write
1C0286AD000
heap
page read and write
1816F60B000
heap
page read and write
1816D648000
heap
page read and write
14CC10FC000
heap
page read and write
1C0286B0000
heap
page read and write
1C0287B0000
direct allocation
page read and write
1C0286DF000
heap
page read and write
2CD2C00B000
heap
page read and write
21B10380000
heap
page read and write
14CC10BA000
heap
page read and write
21B10340000
heap
page read and write
14CC10BE000
heap
page read and write
1816DDA4000
heap
page read and write
1C028677000
heap
page read and write
84C77FE000
stack
page read and write
2CD2BFBE000
heap
page read and write
2CD2BFE1000
heap
page read and write
70C3F7E000
stack
page read and write
2CD2C060000
heap
page read and write
1816D648000
heap
page read and write
21B10387000
heap
page read and write
1942280E000
heap
page read and write
1816DFAA000
heap
page read and write
1C02865B000
heap
page read and write
1C02A082000
direct allocation
page read and write
14CC2B40000
direct allocation
page read and write
1942280A000
heap
page read and write
1C02864A000
heap
page read and write
2CD2D8DB000
direct allocation
page read and write
1C0286E4000
heap
page read and write
1C02A094000
heap
page read and write
19421165000
heap
page read and write
5886DFF000
stack
page read and write
1816D5E2000
heap
page read and write
2CD2BFDE000
heap
page read and write
1816D63F000
heap
page read and write
1C028678000
heap
page read and write
18CFBE000
stack
page read and write
2CD2BFC9000
heap
page read and write
1816F62F000
heap
page read and write
2CD2BFA4000
heap
page read and write
14CC1250000
heap
page read and write
2CD2D9D4000
heap
page read and write
1816F61E000
heap
page read and write
1816DDB1000
heap
page read and write
AA35BF7000
stack
page read and write
1816BB9E000
heap
page read and write
1C02867E000
heap
page read and write
1C0286C4000
heap
page read and write
2CD2BF60000
heap
page read and write
2CD2C019000
heap
page read and write
14CC10BC000
heap
page read and write
1942280A000
heap
page read and write
18170AC8000
heap
page read and write
14CC111F000
heap
page read and write
2CD2BFF2000
heap
page read and write
1816D663000
heap
page read and write
2CD2C005000
heap
page read and write
1816D5EA000
heap
page read and write
14CC10C2000
heap
page read and write
2CD2BFAA000
heap
page read and write
2CD2BFF6000
heap
page read and write
1816D66F000
heap
page read and write
14CC10A2000
heap
page read and write
1FB08CF0000
heap
page read and write
1816D910000
heap
page read and write
2CD2BFE6000
heap
page read and write
1C028668000
heap
page read and write
1C02B440000
direct allocation
page read and write
19421160000
heap
page read and write
2CD2BFB7000
heap
page read and write
2CD2BF69000
heap
page read and write
14CC10D9000
heap
page read and write
1816D61E000
heap
page read and write
14CC1084000
heap
page read and write
14CC10EE000
heap
page read and write
1C02A090000
heap
page read and write
1816DDA8000
heap
page read and write
2CD2BFDE000
heap
page read and write
2CD2EEC8000
direct allocation
page read and write
14CC1122000
heap
page read and write
1C02A010000
direct allocation
page read and write
1816F67F000
heap
page read and write
5886AFC000
stack
page read and write
2CD2BF97000
heap
page read and write
2CD2EE84000
direct allocation
page read and write
1A3FD3B4000
heap
page read and write
14CC10F3000
heap
page read and write
1816D5FD000
heap
page read and write
1816DF60000
heap
page read and write
2CD2C010000
heap
page read and write
1816D635000
heap
page read and write
2CD2BF9A000
heap
page read and write
194229D2000
heap
page read and write
2CD2C001000
heap
page read and write
1816DD8F000
heap
page read and write
18170A9D000
heap
page read and write
14CC10AD000
heap
page read and write
1816D5EC000
heap
page read and write
70C427F000
stack
page read and write
2CD2C0D0000
direct allocation
page read and write
1816D64C000
heap
page read and write
1816D628000
heap
page read and write
14CC1108000
heap
page read and write
14CC10C1000
heap
page read and write
14CC4010000
direct allocation
page read and write
1C028655000
heap
page read and write
1C029FD0000
direct allocation
page read and write
1816D604000
heap
page read and write
1816BAE7000
heap
page read and write
2CD2BFC5000
heap
page read and write
1816DD99000
heap
page read and write
2CD2BFB6000
heap
page read and write
14CC10D6000
heap
page read and write
DFCF5FE000
stack
page read and write
1816DFA8000
heap
page read and write
1816DD92000
heap
page read and write
14CC4063000
direct allocation
page read and write
2CD2BFCF000
heap
page read and write
1C028773000
direct allocation
page read and write
DFCEFF7000
stack
page read and write
2CD2BFAD000
heap
page read and write
1C02A050000
direct allocation
page read and write
1816BABD000
heap
page read and write
19422800000
heap
page read and write
1816BB98000
heap
page read and write
1816D649000
heap
page read and write
1FB08C10000
heap
page read and write
2CD2BFD6000
heap
page read and write
21B10350000
heap
page read and write
14CC2B03000
direct allocation
page read and write
1816D649000
heap
page read and write
1C028675000
heap
page read and write
2CD2C00A000
heap
page read and write
1816BCA0000
heap
page read and write
There are 509 hidden memdumps, click here to show them.