Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
RUNIT2.EXE
|
ASCII text, with CRLF line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\CSC5B8025FC83464292BBE495898E339EBE.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\CSC5FF1484DFEAC4FAA872A2D156A7AC56A.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\CSC79526781084487E8E42D8F778C3DF69.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PCWF86D.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES857A.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ba, 9 symbols, created Tue Oct 29 17:16:59 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES8D3A.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ba, 9 symbols, created Tue Oct 29 17:17:01 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES99AE.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ba, 9 symbols, created Tue Oct 29 17:17:04 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\SDIAG_3769ae4e-01bf-480c-897c-dac247b4f277\DiagPackage.diagpkg
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\SDIAG_3769ae4e-01bf-480c-897c-dac247b4f277\DiagPackage.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\SDIAG_3769ae4e-01bf-480c-897c-dac247b4f277\RS_ProgramCompatibilityWizard.ps1
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\SDIAG_3769ae4e-01bf-480c-897c-dac247b4f277\TS_ProgramCompatibilityWizard.ps1
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\SDIAG_3769ae4e-01bf-480c-897c-dac247b4f277\VF_ProgramCompatibilityWizard.ps1
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\SDIAG_3769ae4e-01bf-480c-897c-dac247b4f277\en-GB\CL_LouserzationData.psd1
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\SDIAG_3769ae4e-01bf-480c-897c-dac247b4f277\en-GB\DiagPackage.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\SDIAG_3769ae4e-01bf-480c-897c-dac247b4f277\result\results.xsl
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\hr5jugav.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rgr4voti.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\w3fyocc2.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
There are 9 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\hr5jugav.cmdline"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\rgr4voti.cmdline"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\w3fyocc2.cmdline"
|
||
C:\Windows\System32\pcwrun.exe
|
C:\Windows\system32\pcwrun.exe "C:\Users\user\Desktop\RUNIT2.EXE" ContextMenu
|
||
C:\Windows\System32\msdt.exe
|
C:\Windows\System32\msdt.exe -path C:\Windows\diagnostics\index\PCWDiagnostic.xml -af C:\Users\user\AppData\Local\Temp\PCWF86D.xml
/skip TRUE
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES857A.tmp"
"c:\Users\user\AppData\Local\Temp\CSC79526781084487E8E42D8F778C3DF69.TMP"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES8D3A.tmp"
"c:\Users\user\AppData\Local\Temp\CSC5FF1484DFEAC4FAA872A2D156A7AC56A.TMP"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES99AE.tmp"
"c:\Users\user\AppData\Local\Temp\CSC5B8025FC83464292BBE495898E339EBE.TMP"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1816D63D000
|
heap
|
page read and write
|
||
1816D600000
|
heap
|
page read and write
|
||
70C3FFD000
|
stack
|
page read and write
|
||
14CC1099000
|
heap
|
page read and write
|
||
2CD2EEC0000
|
direct allocation
|
page read and write
|
||
1C02866B000
|
heap
|
page read and write
|
||
84C739C000
|
stack
|
page read and write
|
||
2CD2BFB7000
|
heap
|
page read and write
|
||
1C02863A000
|
heap
|
page read and write
|
||
70C3E7A000
|
stack
|
page read and write
|
||
1816BC40000
|
heap
|
page read and write
|
||
1816F67C000
|
heap
|
page read and write
|
||
14CC1270000
|
heap
|
page read and write
|
||
1816D64B000
|
heap
|
page read and write
|
||
1816DD6C000
|
heap
|
page read and write
|
||
1816D61A000
|
heap
|
page read and write
|
||
2CD2BFF7000
|
heap
|
page read and write
|
||
1C028820000
|
heap
|
page read and write
|
||
1C028683000
|
heap
|
page read and write
|
||
1816D632000
|
heap
|
page read and write
|
||
1C0286DF000
|
heap
|
page read and write
|
||
2CD2BF40000
|
heap
|
page read and write
|
||
19422805000
|
heap
|
page read and write
|
||
1816F605000
|
heap
|
page read and write
|
||
1816D5EA000
|
heap
|
page read and write
|
||
14CC2AED000
|
direct allocation
|
page read and write
|
||
19420DF7000
|
heap
|
page read and write
|
||
1816D5FF000
|
heap
|
page read and write
|
||
1816D673000
|
heap
|
page read and write
|
||
2CD2BF84000
|
heap
|
page read and write
|
||
2CD2EE80000
|
direct allocation
|
page read and write
|
||
1C028682000
|
heap
|
page read and write
|
||
1C0286C8000
|
heap
|
page read and write
|
||
1A3FD1D0000
|
heap
|
page read and write
|
||
14CC10F3000
|
heap
|
page read and write
|
||
14CC1103000
|
heap
|
page read and write
|
||
1816D612000
|
heap
|
page read and write
|
||
70C417E000
|
stack
|
page read and write
|
||
2CD2C114000
|
heap
|
page read and write
|
||
14CC10CD000
|
heap
|
page read and write
|
||
1816D5F6000
|
heap
|
page read and write
|
||
19422802000
|
heap
|
page read and write
|
||
2CD2BFFC000
|
heap
|
page read and write
|
||
1816BAA9000
|
heap
|
page read and write
|
||
1816D65F000
|
heap
|
page read and write
|
||
1816D912000
|
heap
|
page read and write
|
||
14CC405C000
|
direct allocation
|
page read and write
|
||
1816BBA0000
|
heap
|
page read and write
|
||
14CC4024000
|
direct allocation
|
page read and write
|
||
1816F613000
|
heap
|
page read and write
|
||
2CD2BFC5000
|
heap
|
page read and write
|
||
5886CFE000
|
stack
|
page read and write
|
||
1816F5E1000
|
heap
|
page read and write
|
||
1C028691000
|
heap
|
page read and write
|
||
1FB08F64000
|
heap
|
page read and write
|
||
1C02868F000
|
heap
|
page read and write
|
||
1816BCC5000
|
heap
|
page read and write
|
||
14CC10BE000
|
heap
|
page read and write
|
||
1816D640000
|
heap
|
page read and write
|
||
1816D61A000
|
heap
|
page read and write
|
||
14CC1122000
|
heap
|
page read and write
|
||
1816BB76000
|
heap
|
page read and write
|
||
14CC10AB000
|
heap
|
page read and write
|
||
1816F6AB000
|
heap
|
page read and write
|
||
14CC10C1000
|
heap
|
page read and write
|
||
2CD2BF8E000
|
heap
|
page read and write
|
||
14CC10B8000
|
heap
|
page read and write
|
||
AA35DFE000
|
stack
|
page read and write
|
||
19422807000
|
heap
|
page read and write
|
||
14CC10D4000
|
heap
|
page read and write
|
||
2CD2BF8A000
|
heap
|
page read and write
|
||
14CC1125000
|
heap
|
page read and write
|
||
1816F6B0000
|
heap
|
page read and write
|
||
14CC1103000
|
heap
|
page read and write
|
||
14CC10BA000
|
heap
|
page read and write
|
||
1816D64B000
|
heap
|
page read and write
|
||
14CC110F000
|
heap
|
page read and write
|
||
1C02878B000
|
direct allocation
|
page read and write
|
||
1816BAA0000
|
heap
|
page read and write
|
||
14CC2B1B000
|
direct allocation
|
page read and write
|
||
2CD2BFB7000
|
heap
|
page read and write
|
||
1816F676000
|
heap
|
page read and write
|
||
1C02867F000
|
heap
|
page read and write
|
||
1C02867A000
|
heap
|
page read and write
|
||
1816DD61000
|
heap
|
page read and write
|
||
14CC109F000
|
heap
|
page read and write
|
||
1816D5EA000
|
heap
|
page read and write
|
||
1A3FD1B0000
|
heap
|
page read and write
|
||
70C407F000
|
stack
|
page read and write
|
||
18CF3F000
|
stack
|
page read and write
|
||
14CC2BA0000
|
heap
|
page read and write
|
||
14CC10FF000
|
heap
|
page read and write
|
||
2CD2BFF2000
|
heap
|
page read and write
|
||
AA35FFE000
|
stack
|
page read and write
|
||
2CD2BF9B000
|
heap
|
page read and write
|
||
14CC2B07000
|
direct allocation
|
page read and write
|
||
1816D622000
|
heap
|
page read and write
|
||
2CD2C01E000
|
heap
|
page read and write
|
||
14CC1114000
|
heap
|
page read and write
|
||
19420E01000
|
heap
|
page read and write
|
||
1816F5EE000
|
heap
|
page read and write
|
||
1C028770000
|
direct allocation
|
page read and write
|
||
2CD2C027000
|
heap
|
page read and write
|
||
194229C0000
|
heap
|
page read and write
|
||
2CD2D8C7000
|
direct allocation
|
page read and write
|
||
1C02866C000
|
heap
|
page read and write
|
||
14CC109C000
|
heap
|
page read and write
|
||
2CD2BFAC000
|
heap
|
page read and write
|
||
2CD2BF94000
|
heap
|
page read and write
|
||
1816D677000
|
heap
|
page read and write
|
||
84C78FF000
|
stack
|
page read and write
|
||
1C028600000
|
heap
|
page read and write
|
||
14CC109F000
|
heap
|
page read and write
|
||
2CD2BFB7000
|
heap
|
page read and write
|
||
1A3FD1A0000
|
heap
|
page read and write
|
||
70C40FB000
|
stack
|
page read and write
|
||
1C0286B0000
|
heap
|
page read and write
|
||
21B1038A000
|
heap
|
page read and write
|
||
1C0286C1000
|
heap
|
page read and write
|
||
70C42FF000
|
stack
|
page read and write
|
||
2CD2C019000
|
heap
|
page read and write
|
||
1816F608000
|
heap
|
page read and write
|
||
2CD2C002000
|
heap
|
page read and write
|
||
19420D60000
|
heap
|
page read and write
|
||
14CC10F0000
|
heap
|
page read and write
|
||
18170AC8000
|
heap
|
page read and write
|
||
2CD2EF00000
|
direct allocation
|
page read and write
|
||
1816DDAD000
|
heap
|
page read and write
|
||
2CD2D9D0000
|
heap
|
page read and write
|
||
14CC1103000
|
heap
|
page read and write
|
||
14CC3F90000
|
direct allocation
|
page read and write
|
||
1A3FD3C0000
|
heap
|
page read and write
|
||
2CD2BF91000
|
heap
|
page read and write
|
||
2CD2BFAF000
|
heap
|
page read and write
|
||
2CD2BFA2000
|
heap
|
page read and write
|
||
78EC4FE000
|
stack
|
page read and write
|
||
1816F5FC000
|
heap
|
page read and write
|
||
21B10550000
|
heap
|
page read and write
|
||
1816D60B000
|
heap
|
page read and write
|
||
1C028675000
|
heap
|
page read and write
|
||
2CD2EE86000
|
direct allocation
|
page read and write
|
||
1816D5EA000
|
heap
|
page read and write
|
||
14CC10AF000
|
heap
|
page read and write
|
||
14CC10FC000
|
heap
|
page read and write
|
||
1C02B443000
|
direct allocation
|
page read and write
|
||
1C028672000
|
heap
|
page read and write
|
||
1C028730000
|
direct allocation
|
page read and write
|
||
2CD2BFC5000
|
heap
|
page read and write
|
||
1816F64C000
|
heap
|
page read and write
|
||
14CC10AF000
|
heap
|
page read and write
|
||
1816DF9E000
|
heap
|
page read and write
|
||
1816BB83000
|
heap
|
page read and write
|
||
1C028661000
|
heap
|
page read and write
|
||
14CC2B00000
|
direct allocation
|
page read and write
|
||
2CD2EF45000
|
direct allocation
|
page read and write
|
||
2CD2C01E000
|
heap
|
page read and write
|
||
2CD2BFC0000
|
heap
|
page read and write
|
||
14CC10D2000
|
heap
|
page read and write
|
||
2CD2BF91000
|
heap
|
page read and write
|
||
2CD2BFB3000
|
heap
|
page read and write
|
||
14CC10DC000
|
heap
|
page read and write
|
||
14CC10D2000
|
heap
|
page read and write
|
||
2CD2BFD6000
|
heap
|
page read and write
|
||
2CD2BE60000
|
heap
|
page read and write
|
||
1816D61E000
|
heap
|
page read and write
|
||
44461FE000
|
stack
|
page read and write
|
||
1816BB51000
|
heap
|
page read and write
|
||
1816D617000
|
heap
|
page read and write
|
||
14CC111F000
|
heap
|
page read and write
|
||
2CD2EDC0000
|
direct allocation
|
page read and write
|
||
1C028570000
|
heap
|
page read and write
|
||
1942280B000
|
heap
|
page read and write
|
||
1C0286DF000
|
heap
|
page read and write
|
||
1816D5E2000
|
heap
|
page read and write
|
||
1C0286C5000
|
heap
|
page read and write
|
||
14CC10A7000
|
heap
|
page read and write
|
||
14CC1170000
|
heap
|
page read and write
|
||
1FB08CF8000
|
heap
|
page read and write
|
||
2CD2EF40000
|
direct allocation
|
page read and write
|
||
1816BB51000
|
heap
|
page read and write
|
||
2CD2BFE1000
|
heap
|
page read and write
|
||
1C0286A5000
|
heap
|
page read and write
|
||
78EC11C000
|
stack
|
page read and write
|
||
19422807000
|
heap
|
page read and write
|
||
1816D5F5000
|
heap
|
page read and write
|
||
1816BB5C000
|
heap
|
page read and write
|
||
1C0286D6000
|
heap
|
page read and write
|
||
1C0286BA000
|
heap
|
page read and write
|
||
2CD2D920000
|
direct allocation
|
page read and write
|
||
1816D606000
|
heap
|
page read and write
|
||
14CC4050000
|
direct allocation
|
page read and write
|
||
1C0286C5000
|
heap
|
page read and write
|
||
1A3FD1D7000
|
heap
|
page read and write
|
||
2CD2BF8E000
|
heap
|
page read and write
|
||
1C028694000
|
heap
|
page read and write
|
||
1C0286E4000
|
heap
|
page read and write
|
||
1816D642000
|
heap
|
page read and write
|
||
1816D5DC000
|
heap
|
page read and write
|
||
2CD2D8C3000
|
direct allocation
|
page read and write
|
||
1C0286DD000
|
heap
|
page read and write
|
||
2CD2C110000
|
heap
|
page read and write
|
||
14CC3F50000
|
direct allocation
|
page read and write
|
||
1816D603000
|
heap
|
page read and write
|
||
1816D6A1000
|
heap
|
page read and write
|
||
5886BFE000
|
stack
|
page read and write
|
||
1C028682000
|
heap
|
page read and write
|
||
1816D66B000
|
heap
|
page read and write
|
||
14CC10BE000
|
heap
|
page read and write
|
||
2CD2BFDE000
|
heap
|
page read and write
|
||
2CD2C013000
|
heap
|
page read and write
|
||
1C028637000
|
heap
|
page read and write
|
||
1C02866B000
|
heap
|
page read and write
|
||
18170B90000
|
trusted library allocation
|
page read and write
|
||
2CD2BFB1000
|
heap
|
page read and write
|
||
14CC12E0000
|
heap
|
page read and write
|
||
1816DD92000
|
heap
|
page read and write
|
||
1C0286C8000
|
heap
|
page read and write
|
||
1816D63B000
|
heap
|
page read and write
|
||
2CD2BFDE000
|
heap
|
page read and write
|
||
1816DDAF000
|
heap
|
page read and write
|
||
2CD2BFCD000
|
heap
|
page read and write
|
||
14CC10B2000
|
heap
|
page read and write
|
||
1816BB45000
|
heap
|
page read and write
|
||
1C02869D000
|
heap
|
page read and write
|
||
1C028661000
|
heap
|
page read and write
|
||
2CD2BF8A000
|
heap
|
page read and write
|
||
14CC110C000
|
heap
|
page read and write
|
||
1C028668000
|
heap
|
page read and write
|
||
1C0286D1000
|
heap
|
page read and write
|
||
14CC1077000
|
heap
|
page read and write
|
||
2CD2BFE9000
|
heap
|
page read and write
|
||
14CC109D000
|
heap
|
page read and write
|
||
14CC4022000
|
direct allocation
|
page read and write
|
||
14CC3FD0000
|
direct allocation
|
page read and write
|
||
1C028698000
|
heap
|
page read and write
|
||
21B10730000
|
heap
|
page read and write
|
||
1816DD97000
|
heap
|
page read and write
|
||
2CD2BF9E000
|
heap
|
page read and write
|
||
1A3FD3B0000
|
heap
|
page read and write
|
||
2CD2BFA3000
|
heap
|
page read and write
|
||
1816BB49000
|
heap
|
page read and write
|
||
14CC111D000
|
heap
|
page read and write
|
||
2CD2BFE3000
|
heap
|
page read and write
|
||
1816DDB7000
|
heap
|
page read and write
|
||
19420D90000
|
heap
|
page read and write
|
||
2CD2ED80000
|
direct allocation
|
page read and write
|
||
1816DD8E000
|
heap
|
page read and write
|
||
1C028689000
|
heap
|
page read and write
|
||
78EC6FE000
|
stack
|
page read and write
|
||
1C02865E000
|
heap
|
page read and write
|
||
78EC5FF000
|
stack
|
page read and write
|
||
1C02A080000
|
direct allocation
|
page read and write
|
||
14CC1103000
|
heap
|
page read and write
|
||
4445FFE000
|
stack
|
page read and write
|
||
1816B9B0000
|
heap
|
page read and write
|
||
19422780000
|
heap
|
page read and write
|
||
2CD2BFE9000
|
heap
|
page read and write
|
||
194229C7000
|
heap
|
page read and write
|
||
14CC10C9000
|
heap
|
page read and write
|
||
14CC10E7000
|
heap
|
page read and write
|
||
1C02869A000
|
heap
|
page read and write
|
||
14CC1314000
|
heap
|
page read and write
|
||
1816BB52000
|
heap
|
page read and write
|
||
1816BB9C000
|
heap
|
page read and write
|
||
1C028664000
|
heap
|
page read and write
|
||
2CD2BFC2000
|
heap
|
page read and write
|
||
1816DD95000
|
heap
|
page read and write
|
||
1C028824000
|
heap
|
page read and write
|
||
2CD2BF9C000
|
heap
|
page read and write
|
||
2CD2BFD6000
|
heap
|
page read and write
|
||
1FB08B30000
|
heap
|
page read and write
|
||
21B10734000
|
heap
|
page read and write
|
||
1C02865D000
|
heap
|
page read and write
|
||
1816BBC0000
|
heap
|
page read and write
|
||
19420D70000
|
heap
|
page read and write
|
||
14CC10C3000
|
heap
|
page read and write
|
||
14CC1093000
|
heap
|
page read and write
|
||
2CD2BFBE000
|
heap
|
page read and write
|
||
2CD2C01A000
|
heap
|
page read and write
|
||
18170A9B000
|
heap
|
page read and write
|
||
1816F6A9000
|
heap
|
page read and write
|
||
14CC10AA000
|
heap
|
page read and write
|
||
1816DD95000
|
heap
|
page read and write
|
||
194229CE000
|
heap
|
page read and write
|
||
1816F62D000
|
heap
|
page read and write
|
||
1816DD60000
|
heap
|
page read and write
|
||
1816F67A000
|
heap
|
page read and write
|
||
1C028490000
|
heap
|
page read and write
|
||
70C437F000
|
stack
|
page read and write
|
||
1816D639000
|
heap
|
page read and write
|
||
18170A90000
|
heap
|
page read and write
|
||
1816F5E0000
|
heap
|
page read and write
|
||
1FB08C30000
|
heap
|
page read and write
|
||
70C3EFE000
|
stack
|
page read and write
|
||
14CC10B4000
|
heap
|
page read and write
|
||
14CC2AC0000
|
direct allocation
|
page read and write
|
||
1816BCC0000
|
heap
|
page read and write
|
||
4445BF7000
|
stack
|
page read and write
|
||
2CD2BF9B000
|
heap
|
page read and write
|
||
2CD2D900000
|
heap
|
page read and write
|
||
194229CB000
|
heap
|
page read and write
|
||
14CC10AD000
|
heap
|
page read and write
|
||
1942280A000
|
heap
|
page read and write
|
||
19422870000
|
heap
|
page read and write
|
||
2CD2EE00000
|
direct allocation
|
page read and write
|
||
1816DD87000
|
heap
|
page read and write
|
||
1C028630000
|
heap
|
page read and write
|
||
1816F623000
|
heap
|
page read and write
|
||
14CC1310000
|
heap
|
page read and write
|
||
14CC10E7000
|
heap
|
page read and write
|
||
1C028590000
|
heap
|
page read and write
|
||
194229D0000
|
heap
|
page read and write
|
||
19422803000
|
heap
|
page read and write
|
||
1816DDE5000
|
heap
|
page read and write
|
||
14CC2BA4000
|
heap
|
page read and write
|
||
18170A93000
|
heap
|
page read and write
|
||
1816D616000
|
heap
|
page read and write
|
||
1816D5FB000
|
heap
|
page read and write
|
||
2CD2EE40000
|
direct allocation
|
page read and write
|
||
2CD2BFFA000
|
heap
|
page read and write
|
||
1816DDB7000
|
heap
|
page read and write
|
||
1816D5C4000
|
heap
|
page read and write
|
||
2CD2C010000
|
heap
|
page read and write
|
||
1816D632000
|
heap
|
page read and write
|
||
1816BB4E000
|
heap
|
page read and write
|
||
2CD2C013000
|
heap
|
page read and write
|
||
2CD2BFAA000
|
heap
|
page read and write
|
||
84C76FE000
|
stack
|
page read and write
|
||
1FB08F60000
|
heap
|
page read and write
|
||
14CC111B000
|
heap
|
page read and write
|
||
1C0286E4000
|
heap
|
page read and write
|
||
DFCF3FE000
|
stack
|
page read and write
|
||
194229CC000
|
heap
|
page read and write
|
||
194229C9000
|
heap
|
page read and write
|
||
1C02866F000
|
heap
|
page read and write
|
||
1C0286E6000
|
heap
|
page read and write
|
||
1816D626000
|
heap
|
page read and write
|
||
2CD2BFF9000
|
heap
|
page read and write
|
||
2CD2BFC8000
|
heap
|
page read and write
|
||
194229D2000
|
heap
|
page read and write
|
||
2CD2D8C0000
|
direct allocation
|
page read and write
|
||
2CD2C023000
|
heap
|
page read and write
|
||
194229D2000
|
heap
|
page read and write
|
||
1816BB84000
|
heap
|
page read and write
|
||
1C02865D000
|
heap
|
page read and write
|
||
4445DFE000
|
stack
|
page read and write
|
||
14CC10FE000
|
heap
|
page read and write
|
||
1816D720000
|
heap
|
page read and write
|
||
18D27E000
|
stack
|
page read and write
|
||
2CD2C020000
|
heap
|
page read and write
|
||
2CD2D960000
|
direct allocation
|
page read and write
|
||
70C43FC000
|
stack
|
page read and write
|
||
AA361FE000
|
stack
|
page read and write
|
||
14CC10B6000
|
heap
|
page read and write
|
||
2CD2BFE6000
|
heap
|
page read and write
|
||
1C02868C000
|
heap
|
page read and write
|
||
1816F684000
|
heap
|
page read and write
|
||
1816D5D0000
|
heap
|
page read and write
|
||
DFCF1FE000
|
stack
|
page read and write
|
||
1C028777000
|
direct allocation
|
page read and write
|
||
1816DD73000
|
heap
|
page read and write
|
||
2CD2BFE1000
|
heap
|
page read and write
|
||
2CD2BFAA000
|
heap
|
page read and write
|
||
1C02867E000
|
heap
|
page read and write
|
||
1816BB96000
|
heap
|
page read and write
|
||
18CEBB000
|
stack
|
page read and write
|
||
1816BB59000
|
heap
|
page read and write
|
||
19420DF0000
|
heap
|
page read and write
|
||
1816D5C0000
|
heap
|
page read and write
|
||
1C0286A7000
|
heap
|
page read and write
|
||
194229D3000
|
heap
|
page read and write
|
||
1816D64B000
|
heap
|
page read and write
|
||
2CD2C025000
|
heap
|
page read and write
|
||
1816D62A000
|
heap
|
page read and write
|
||
14CC4041000
|
direct allocation
|
page read and write
|
||
2CD2BF9D000
|
heap
|
page read and write
|
||
2CD2BFAE000
|
heap
|
page read and write
|
||
14CC109C000
|
heap
|
page read and write
|
||
14CC10D0000
|
heap
|
page read and write
|
||
1C0286A5000
|
heap
|
page read and write
|
||
14CC1070000
|
heap
|
page read and write
|
||
1816D91A000
|
heap
|
page read and write
|
||
19422804000
|
heap
|
page read and write
|
||
1816D667000
|
heap
|
page read and write
|
||
1C0286AD000
|
heap
|
page read and write
|
||
1816F60B000
|
heap
|
page read and write
|
||
1816D648000
|
heap
|
page read and write
|
||
14CC10FC000
|
heap
|
page read and write
|
||
1C0286B0000
|
heap
|
page read and write
|
||
1C0287B0000
|
direct allocation
|
page read and write
|
||
1C0286DF000
|
heap
|
page read and write
|
||
2CD2C00B000
|
heap
|
page read and write
|
||
21B10380000
|
heap
|
page read and write
|
||
14CC10BA000
|
heap
|
page read and write
|
||
21B10340000
|
heap
|
page read and write
|
||
14CC10BE000
|
heap
|
page read and write
|
||
1816DDA4000
|
heap
|
page read and write
|
||
1C028677000
|
heap
|
page read and write
|
||
84C77FE000
|
stack
|
page read and write
|
||
2CD2BFBE000
|
heap
|
page read and write
|
||
2CD2BFE1000
|
heap
|
page read and write
|
||
70C3F7E000
|
stack
|
page read and write
|
||
2CD2C060000
|
heap
|
page read and write
|
||
1816D648000
|
heap
|
page read and write
|
||
21B10387000
|
heap
|
page read and write
|
||
1942280E000
|
heap
|
page read and write
|
||
1816DFAA000
|
heap
|
page read and write
|
||
1C02865B000
|
heap
|
page read and write
|
||
1C02A082000
|
direct allocation
|
page read and write
|
||
14CC2B40000
|
direct allocation
|
page read and write
|
||
1942280A000
|
heap
|
page read and write
|
||
1C02864A000
|
heap
|
page read and write
|
||
2CD2D8DB000
|
direct allocation
|
page read and write
|
||
1C0286E4000
|
heap
|
page read and write
|
||
1C02A094000
|
heap
|
page read and write
|
||
19421165000
|
heap
|
page read and write
|
||
5886DFF000
|
stack
|
page read and write
|
||
1816D5E2000
|
heap
|
page read and write
|
||
2CD2BFDE000
|
heap
|
page read and write
|
||
1816D63F000
|
heap
|
page read and write
|
||
1C028678000
|
heap
|
page read and write
|
||
18CFBE000
|
stack
|
page read and write
|
||
2CD2BFC9000
|
heap
|
page read and write
|
||
1816F62F000
|
heap
|
page read and write
|
||
2CD2BFA4000
|
heap
|
page read and write
|
||
14CC1250000
|
heap
|
page read and write
|
||
2CD2D9D4000
|
heap
|
page read and write
|
||
1816F61E000
|
heap
|
page read and write
|
||
1816DDB1000
|
heap
|
page read and write
|
||
AA35BF7000
|
stack
|
page read and write
|
||
1816BB9E000
|
heap
|
page read and write
|
||
1C02867E000
|
heap
|
page read and write
|
||
1C0286C4000
|
heap
|
page read and write
|
||
2CD2BF60000
|
heap
|
page read and write
|
||
2CD2C019000
|
heap
|
page read and write
|
||
14CC10BC000
|
heap
|
page read and write
|
||
1942280A000
|
heap
|
page read and write
|
||
18170AC8000
|
heap
|
page read and write
|
||
14CC111F000
|
heap
|
page read and write
|
||
2CD2BFF2000
|
heap
|
page read and write
|
||
1816D663000
|
heap
|
page read and write
|
||
2CD2C005000
|
heap
|
page read and write
|
||
1816D5EA000
|
heap
|
page read and write
|
||
14CC10C2000
|
heap
|
page read and write
|
||
2CD2BFAA000
|
heap
|
page read and write
|
||
2CD2BFF6000
|
heap
|
page read and write
|
||
1816D66F000
|
heap
|
page read and write
|
||
14CC10A2000
|
heap
|
page read and write
|
||
1FB08CF0000
|
heap
|
page read and write
|
||
1816D910000
|
heap
|
page read and write
|
||
2CD2BFE6000
|
heap
|
page read and write
|
||
1C028668000
|
heap
|
page read and write
|
||
1C02B440000
|
direct allocation
|
page read and write
|
||
19421160000
|
heap
|
page read and write
|
||
2CD2BFB7000
|
heap
|
page read and write
|
||
2CD2BF69000
|
heap
|
page read and write
|
||
14CC10D9000
|
heap
|
page read and write
|
||
1816D61E000
|
heap
|
page read and write
|
||
14CC1084000
|
heap
|
page read and write
|
||
14CC10EE000
|
heap
|
page read and write
|
||
1C02A090000
|
heap
|
page read and write
|
||
1816DDA8000
|
heap
|
page read and write
|
||
2CD2BFDE000
|
heap
|
page read and write
|
||
2CD2EEC8000
|
direct allocation
|
page read and write
|
||
14CC1122000
|
heap
|
page read and write
|
||
1C02A010000
|
direct allocation
|
page read and write
|
||
1816F67F000
|
heap
|
page read and write
|
||
5886AFC000
|
stack
|
page read and write
|
||
2CD2BF97000
|
heap
|
page read and write
|
||
2CD2EE84000
|
direct allocation
|
page read and write
|
||
1A3FD3B4000
|
heap
|
page read and write
|
||
14CC10F3000
|
heap
|
page read and write
|
||
1816D5FD000
|
heap
|
page read and write
|
||
1816DF60000
|
heap
|
page read and write
|
||
2CD2C010000
|
heap
|
page read and write
|
||
1816D635000
|
heap
|
page read and write
|
||
2CD2BF9A000
|
heap
|
page read and write
|
||
194229D2000
|
heap
|
page read and write
|
||
2CD2C001000
|
heap
|
page read and write
|
||
1816DD8F000
|
heap
|
page read and write
|
||
18170A9D000
|
heap
|
page read and write
|
||
14CC10AD000
|
heap
|
page read and write
|
||
1816D5EC000
|
heap
|
page read and write
|
||
70C427F000
|
stack
|
page read and write
|
||
2CD2C0D0000
|
direct allocation
|
page read and write
|
||
1816D64C000
|
heap
|
page read and write
|
||
1816D628000
|
heap
|
page read and write
|
||
14CC1108000
|
heap
|
page read and write
|
||
14CC10C1000
|
heap
|
page read and write
|
||
14CC4010000
|
direct allocation
|
page read and write
|
||
1C028655000
|
heap
|
page read and write
|
||
1C029FD0000
|
direct allocation
|
page read and write
|
||
1816D604000
|
heap
|
page read and write
|
||
1816BAE7000
|
heap
|
page read and write
|
||
2CD2BFC5000
|
heap
|
page read and write
|
||
1816DD99000
|
heap
|
page read and write
|
||
2CD2BFB6000
|
heap
|
page read and write
|
||
14CC10D6000
|
heap
|
page read and write
|
||
DFCF5FE000
|
stack
|
page read and write
|
||
1816DFA8000
|
heap
|
page read and write
|
||
1816DD92000
|
heap
|
page read and write
|
||
14CC4063000
|
direct allocation
|
page read and write
|
||
2CD2BFCF000
|
heap
|
page read and write
|
||
1C028773000
|
direct allocation
|
page read and write
|
||
DFCEFF7000
|
stack
|
page read and write
|
||
2CD2BFAD000
|
heap
|
page read and write
|
||
1C02A050000
|
direct allocation
|
page read and write
|
||
1816BABD000
|
heap
|
page read and write
|
||
19422800000
|
heap
|
page read and write
|
||
1816BB98000
|
heap
|
page read and write
|
||
1816D649000
|
heap
|
page read and write
|
||
1FB08C10000
|
heap
|
page read and write
|
||
2CD2BFD6000
|
heap
|
page read and write
|
||
21B10350000
|
heap
|
page read and write
|
||
14CC2B03000
|
direct allocation
|
page read and write
|
||
1816D649000
|
heap
|
page read and write
|
||
1C028675000
|
heap
|
page read and write
|
||
2CD2C00A000
|
heap
|
page read and write
|
||
1816BCA0000
|
heap
|
page read and write
|
There are 509 hidden memdumps, click here to show them.