IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup zonealarm.bit ns1.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup ransomware.bit ns2.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup zonealarm.bit ns2.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup ransomware.bit ns1.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup zonealarm.bit ns1.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup ransomware.bit ns2.cloud-name.ru
malicious
C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe
"C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe"
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup zonealarm.bit ns2.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup ransomware.bit ns1.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup zonealarm.bit ns1.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup ransomware.bit ns2.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup zonealarm.bit ns2.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup ransomware.bit ns1.cloud-name.ru
malicious
C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe
"C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe"
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup zonealarm.bit ns1.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup ransomware.bit ns2.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup zonealarm.bit ns2.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup ransomware.bit ns1.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup zonealarm.bit ns1.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup ransomware.bit ns2.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup zonealarm.bit ns2.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup ransomware.bit ns1.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup zonealarm.bit ns1.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup ransomware.bit ns2.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup zonealarm.bit ns2.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup ransomware.bit ns1.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup zonealarm.bit ns1.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup ransomware.bit ns2.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup zonealarm.bit ns2.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup ransomware.bit ns1.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup zonealarm.bit ns1.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup ransomware.bit ns2.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup zonealarm.bit ns2.cloud-name.ru
malicious
C:\Windows\SysWOW64\nslookup.exe
nslookup ransomware.bit ns1.cloud-name.ru
malicious
C:\Windows\System32\dllhost.exe
C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 60 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://gandcrab2pie73et.onion.rip/da3fe3083522c987
unknown
malicious
http://gandcrab2pie73et.onion/da3fe3083522c987
unknown
malicious
https://gandcrab2pie73et.onion.
unknown
malicious
https://gandcrab2pie73et.onion.to/da3fe3083522c987
unknown
malicious
https://gandcrab2pie73et.onion.guide/da3fe3083522c987
unknown
malicious
https://gandcrab2pie73et.onion.plus/da3fe3083522c987
unknown
malicious
https://psi-im.org/download/
unknown
http://ipv4bot.whatismyipaddress.com/(
unknown
http://ipv4bot.whatismyipaddress.com/G
unknown
http://www.sfu.ca/jabber/Psi_Jabber_PC.pdf
unknown
https://www.torproject.org/
unknown
http://ipv4bot.whatismyipaddress.com/
unknown
http://sj.ms/register.php
unknown
http://ipv4bot.whatismyipaddress.com/;
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipv4bot.whatismyipaddress.com
unknown
malicious
ransomware.bit
unknown
malicious
zonealarm.bit
unknown
malicious
ns1.cloud-name.ru
unknown
malicious
ns2.cloud-name.ru
unknown
malicious
1.1.1.1.in-addr.arpa
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
bgummckzlfn

Memdumps

Base Address
Regiontype
Protect
Malicious
FE1000
unkown
page read and write
malicious
BBF000
direct allocation
page execute and read and write
malicious
BB0000
direct allocation
page execute and read and write
malicious
FE1000
unkown
page read and write
malicious
F90000
direct allocation
page execute and read and write
malicious
430000
direct allocation
page execute and read and write
malicious
E11000
unkown
page read and write
malicious
BBF000
direct allocation
page execute and read and write
malicious
2AF0000
heap
page read and write
1171000
heap
page read and write
48EF000
stack
page read and write
FCE000
heap
page read and write
37D000
stack
page read and write
338F000
stack
page read and write
1171000
heap
page read and write
29BE000
unkown
page read and write
FCE000
heap
page read and write
324F000
unkown
page read and write
2FCC000
stack
page read and write
FCE000
heap
page read and write
2F0E000
stack
page read and write
2B50000
heap
page read and write
FCE000
heap
page read and write
4EBF000
stack
page read and write
35A9000
heap
page read and write
B54000
heap
page read and write
2ADD000
stack
page read and write
FCE000
heap
page read and write
2A70000
heap
page read and write
3150000
heap
page read and write
29B0000
heap
page read and write
48E000
heap
page read and write
2A7E000
stack
page read and write
2677000
heap
page read and write
43D000
stack
page read and write
354F000
stack
page read and write
1171000
heap
page read and write
2E9E000
stack
page read and write
FD1000
unkown
page execute read
FCE000
heap
page read and write
2D65000
heap
page read and write
2A9C000
stack
page read and write
1172000
heap
page read and write
266E000
stack
page read and write
FA8000
heap
page read and write
FCE000
heap
page read and write
445000
direct allocation
page execute and read and write
289E000
stack
page read and write
1171000
heap
page read and write
1171000
heap
page read and write
FCE000
heap
page read and write
35B3000
heap
page read and write
33BE000
stack
page read and write
2A53000
heap
page read and write
2F9E000
stack
page read and write
26A9000
heap
page read and write
33C000
stack
page read and write
332E000
unkown
page read and write
2A5C000
stack
page read and write
322E000
stack
page read and write
278C000
stack
page read and write
2EE3000
heap
page read and write
3A37000
direct allocation
page read and write
FDC000
unkown
page readonly
4E7E000
stack
page read and write
B54000
heap
page read and write
374B000
stack
page read and write
2F10000
heap
page read and write
FCE000
heap
page read and write
3499000
heap
page read and write
47CE000
stack
page read and write
34F3000
heap
page read and write
B54000
heap
page read and write
2DF0000
heap
page read and write
2AF0000
heap
page read and write
FCE000
heap
page read and write
4DDE000
stack
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
2FB9000
heap
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
2A70000
heap
page read and write
59E000
unkown
page read and write
2AE0000
heap
page read and write
2A0E000
stack
page read and write
2A95000
heap
page read and write
1171000
heap
page read and write
FE7000
heap
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
2D1E000
stack
page read and write
1BE000
unkown
page read and write
1FF000
unkown
page read and write
28DD000
stack
page read and write
2940000
heap
page read and write
2C20000
heap
page read and write
3410000
heap
page read and write
2920000
heap
page read and write
EA0000
direct allocation
page read and write
27D5000
heap
page read and write
29E0000
heap
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
BF0000
direct allocation
page read and write
41EE000
stack
page read and write
1171000
heap
page read and write
2E4F000
stack
page read and write
2D40000
heap
page read and write
2F3F000
stack
page read and write
326F000
stack
page read and write
290F000
stack
page read and write
2750000
heap
page read and write
31AE000
stack
page read and write
1171000
heap
page read and write
2CFE000
stack
page read and write
298E000
unkown
page read and write
2D5F000
stack
page read and write
3490000
heap
page read and write
3A10000
direct allocation
page execute and read and write
54D000
stack
page read and write
2B3F000
stack
page read and write
4DCE000
stack
page read and write
2F00000
heap
page read and write
34FE000
stack
page read and write
32F3000
heap
page read and write
4D9F000
stack
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
35ED000
stack
page read and write
2F79000
heap
page read and write
5AD000
stack
page read and write
2A6F000
unkown
page read and write
121E000
heap
page read and write
29E0000
heap
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
BE0000
direct allocation
page read and write
2CE5000
heap
page read and write
FCE000
heap
page read and write
296E000
unkown
page read and write
FCE000
heap
page read and write
590000
heap
page read and write
FCE000
heap
page read and write
2E30000
heap
page read and write
39F0000
direct allocation
page execute and read and write
3140000
heap
page read and write
307E000
stack
page read and write
2923000
heap
page read and write
FCE000
heap
page read and write
352E000
stack
page read and write
358E000
stack
page read and write
2BCC000
stack
page read and write
2F70000
heap
page read and write
33BE000
stack
page read and write
34A0000
heap
page read and write
297C000
stack
page read and write
450000
heap
page read and write
287C000
stack
page read and write
4C8F000
stack
page read and write
B54000
heap
page read and write
35F3000
heap
page read and write
BE0000
direct allocation
page execute and read and write
FC6000
heap
page read and write
2E0E000
stack
page read and write
2C60000
heap
page read and write
34D000
stack
page read and write
2AC0000
heap
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
2E5E000
unkown
page read and write
31CF000
stack
page read and write
31EE000
unkown
page read and write
2920000
heap
page read and write
E0C000
unkown
page readonly
FCE000
heap
page read and write
1171000
heap
page read and write
FCE000
heap
page read and write
2A7E000
unkown
page read and write
31AD000
unkown
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
58F000
unkown
page read and write
32DF000
stack
page read and write
FCE000
heap
page read and write
51E000
stack
page read and write
58E000
stack
page read and write
FCE000
heap
page read and write
E11000
unkown
page write copy
2C2E000
stack
page read and write
322E000
stack
page read and write
262E000
stack
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
B0000
direct allocation
page read and write
2FE0000
heap
page read and write
45BE000
stack
page read and write
28F0000
heap
page read and write
3295000
heap
page read and write
2C19000
heap
page read and write
FD9000
heap
page read and write
32F9000
heap
page read and write
3030000
heap
page read and write
FCE000
heap
page read and write
41AE000
stack
page read and write
2D0E000
stack
page read and write
E27000
unkown
page readonly
2C5E000
stack
page read and write
FCE000
heap
page read and write
3165000
heap
page read and write
545000
heap
page read and write
2A8F000
stack
page read and write
FCE000
heap
page read and write
2E9E000
stack
page read and write
33FF000
stack
page read and write
2ADE000
stack
page read and write
2780000
heap
page read and write
460000
heap
page read and write
FCE000
heap
page read and write
304E000
stack
page read and write
294E000
unkown
page read and write
30BD000
stack
page read and write
2ACE000
stack
page read and write
343F000
stack
page read and write
3550000
heap
page read and write
27DF000
unkown
page read and write
28FF000
stack
page read and write
2C10000
heap
page read and write
2C90000
heap
page read and write
BE0000
direct allocation
page read and write
463E000
stack
page read and write
2C1F000
stack
page read and write
29FE000
unkown
page read and write
321E000
stack
page read and write
FCE000
heap
page read and write
2A9F000
unkown
page read and write
312F000
stack
page read and write
2BB0000
heap
page read and write
1171000
heap
page read and write
4FD000
unkown
page read and write
FCE000
heap
page read and write
30E3000
heap
page read and write
FCE000
heap
page read and write
2F4F000
stack
page read and write
422F000
stack
page read and write
281F000
stack
page read and write
28F3000
heap
page read and write
2DA0000
heap
page read and write
FCE000
heap
page read and write
2B93000
heap
page read and write
2A90000
heap
page read and write
FD0000
unkown
page readonly
291F000
stack
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
2A85000
heap
page read and write
3500000
heap
page read and write
2F50000
heap
page read and write
3070000
heap
page read and write
329E000
stack
page read and write
55F000
stack
page read and write
27CD000
stack
page read and write
48F000
stack
page read and write
41E000
stack
page read and write
29CF000
stack
page read and write
BE0000
direct allocation
page read and write
EC0000
direct allocation
page execute and read and write
B54000
heap
page read and write
53E000
unkown
page read and write
FCE000
heap
page read and write
32F0000
heap
page read and write
336E000
unkown
page read and write
FCE000
heap
page read and write
2A9D000
stack
page read and write
266F000
stack
page read and write
467F000
stack
page read and write
E01000
unkown
page execute read
478F000
stack
page read and write
FCE000
heap
page read and write
5CA000
heap
page read and write
2B32000
heap
page read and write
2BD0000
heap
page read and write
3500000
heap
page read and write
2C0E000
unkown
page read and write
309E000
stack
page read and write
53F000
stack
page read and write
4D0000
heap
page read and write
5B0000
heap
page read and write
321D000
stack
page read and write
309D000
stack
page read and write
32BE000
unkown
page read and write
2E8E000
stack
page read and write
2CCC000
stack
page read and write
30E0000
heap
page read and write
4D8E000
stack
page read and write
306E000
stack
page read and write
BE0000
direct allocation
page read and write
3319000
heap
page read and write
411F000
stack
page read and write
2670000
heap
page read and write
326F000
stack
page read and write
1171000
heap
page read and write
35C2000
heap
page read and write
5C0000
heap
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
2D4E000
stack
page read and write
1171000
heap
page read and write
2CE0000
heap
page read and write
3303000
heap
page read and write
2DCC000
stack
page read and write
2A2F000
stack
page read and write
1171000
heap
page read and write
2ECF000
stack
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
32E000
stack
page read and write
2D50000
heap
page read and write
EC0000
trusted library allocation
page read and write
2D3F000
stack
page read and write
FCE000
heap
page read and write
B54000
heap
page read and write
2FAD000
stack
page read and write
2EE9000
heap
page read and write
1171000
heap
page read and write
FCE000
heap
page read and write
4D0F000
stack
page read and write
3340000
heap
page read and write
FCE000
heap
page read and write
34CF000
stack
page read and write
340E000
unkown
page read and write
FCE000
heap
page read and write
2FF0000
heap
page read and write
2DD3000
heap
page read and write
595000
heap
page read and write
2F7C000
stack
page read and write
28B3000
heap
page read and write
2F0E000
stack
page read and write
325F000
stack
page read and write
28DE000
stack
page read and write
278D000
stack
page read and write
1171000
heap
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
E00000
unkown
page readonly
BC5000
direct allocation
page execute and read and write
323C000
stack
page read and write
FCE000
heap
page read and write
4B2F000
stack
page read and write
FD0000
unkown
page readonly
FCE000
heap
page read and write
1171000
heap
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
2DFE000
stack
page read and write
1171000
heap
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
324F000
stack
page read and write
FCE000
heap
page read and write
2FBD000
stack
page read and write
2B40000
heap
page read and write
2A80000
heap
page read and write
FF7000
unkown
page readonly
1171000
heap
page read and write
FCE000
heap
page read and write
2FAF000
stack
page read and write
170000
heap
page read and write
FCE000
heap
page read and write
2B80000
heap
page read and write
2E7F000
stack
page read and write
1171000
heap
page read and write
294F000
stack
page read and write
388E000
stack
page read and write
2EBD000
stack
page read and write
4AEE000
stack
page read and write
316E000
unkown
page read and write
FCE000
heap
page read and write
2AB0000
heap
page read and write
1171000
heap
page read and write
2D4F000
stack
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
362F000
stack
page read and write
2E7D000
stack
page read and write
5B0000
heap
page read and write
2D9E000
stack
page read and write
2DAE000
unkown
page read and write
30C0000
heap
page read and write
FCE000
heap
page read and write
2CA3000
heap
page read and write
1172000
heap
page read and write
3290000
heap
page read and write
FCE000
heap
page read and write
303D000
stack
page read and write
3300000
heap
page read and write
2C8F000
stack
page read and write
39CE000
stack
page read and write
2F23000
heap
page read and write
3375000
heap
page read and write
1171000
heap
page read and write
FF000
stack
page read and write
2A1F000
stack
page read and write
2C30000
heap
page read and write
299F000
stack
page read and write
2C2F000
stack
page read and write
2F9E000
stack
page read and write
287C000
stack
page read and write
1171000
heap
page read and write
40DE000
stack
page read and write
2ACE000
stack
page read and write
FCE000
heap
page read and write
27DC000
stack
page read and write
2A2E000
unkown
page read and write
FCE000
heap
page read and write
35B0000
heap
page read and write
1171000
heap
page read and write
3300000
heap
page read and write
2B8C000
stack
page read and write
42F000
stack
page read and write
1171000
heap
page read and write
59F000
stack
page read and write
FC6000
heap
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
2D3D000
stack
page read and write
314E000
stack
page read and write
32B0000
heap
page read and write
3110000
heap
page read and write
1171000
heap
page read and write
FCE000
heap
page read and write
A0000
direct allocation
page read and write
44AE000
stack
page read and write
FCE000
heap
page read and write
490E000
stack
page read and write
FCE000
heap
page read and write
C9E000
stack
page read and write
3250000
heap
page read and write
32F9000
heap
page read and write
35F000
stack
page read and write
2BAF000
unkown
page read and write
2B5F000
unkown
page read and write
2A45000
heap
page read and write
3145000
heap
page read and write
34CF000
stack
page read and write
1171000
heap
page read and write
45FE000
stack
page read and write
1171000
heap
page read and write
31D0000
heap
page read and write
31EE000
stack
page read and write
BF0000
direct allocation
page read and write
2B75000
heap
page read and write
2AE9000
heap
page read and write
364D000
stack
page read and write
298E000
stack
page read and write
2A93000
heap
page read and write
2FCF000
heap
page read and write
1180000
heap
page read and write
F90000
direct allocation
page execute and read and write
27D0000
heap
page read and write
FCE000
heap
page read and write
3A97000
direct allocation
page read and write
2F69000
heap
page read and write
2D6E000
stack
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
1171000
heap
page read and write
2D8E000
stack
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
3010000
heap
page read and write
2A1E000
stack
page read and write
277F000
stack
page read and write
469000
heap
page read and write
FCE000
heap
page read and write
30EE000
stack
page read and write
B50000
heap
page read and write
28CF000
stack
page read and write
32D0000
heap
page read and write
FCE000
heap
page read and write
2AB5000
heap
page read and write
FCE000
heap
page read and write
2D50000
heap
page read and write
1171000
heap
page read and write
2A93000
heap
page read and write
2C80000
heap
page read and write
1171000
heap
page read and write
2C1E000
stack
page read and write
485E000
stack
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
308F000
stack
page read and write
3160000
heap
page read and write
3348000
heap
page read and write
1171000
heap
page read and write
BA0000
heap
page read and write
2F13000
heap
page read and write
27E0000
heap
page read and write
474F000
stack
page read and write
1171000
heap
page read and write
FCE000
heap
page read and write
2C50000
heap
page read and write
2EFE000
stack
page read and write
25F0000
heap
page read and write
374D000
stack
page read and write
2BB0000
heap
page read and write
2B90000
heap
page read and write
290E000
unkown
page read and write
FCE000
heap
page read and write
10D000
stack
page read and write
33C0000
heap
page read and write
2DE0000
heap
page read and write
3203000
heap
page read and write
323D000
stack
page read and write
B00000
direct allocation
page read and write
32FF000
unkown
page read and write
FCE000
heap
page read and write
3503000
heap
page read and write
46CF000
stack
page read and write
30C000
stack
page read and write
33FE000
stack
page read and write
34A3000
heap
page read and write
1171000
heap
page read and write
2AEE000
stack
page read and write
2ECE000
stack
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
44EF000
stack
page read and write
1171000
heap
page read and write
32C5000
heap
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
3130000
heap
page read and write
1171000
heap
page read and write
3190000
heap
page read and write
475F000
stack
page read and write
2E49000
heap
page read and write
2C9F000
stack
page read and write
2B4E000
unkown
page read and write
FCE000
heap
page read and write
29D0000
heap
page read and write
354E000
stack
page read and write
2E30000
heap
page read and write
2B19000
heap
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
FCE000
heap
page read and write
2783000
heap
page read and write
FCE000
heap
page read and write
30C3000
heap
page read and write
FCE000
heap
page read and write
3200000
heap
page read and write
2F60000
heap
page read and write
2A79000
heap
page read and write
30A0000
heap
page read and write
1171000
heap
page read and write
270D000
stack
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
35A0000
heap
page read and write
FCE000
heap
page read and write
BF0000
direct allocation
page read and write
FAE000
heap
page read and write
FCE000
heap
page read and write
2EAF000
stack
page read and write
2C65000
heap
page read and write
2CD3000
heap
page read and write
2D7E000
unkown
page read and write
289C000
stack
page read and write
26A0000
heap
page read and write
4C4E000
stack
page read and write
1171000
heap
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
2C57000
heap
page read and write
2DEE000
unkown
page read and write
FCE000
heap
page read and write
356F000
stack
page read and write
290D000
stack
page read and write
2CFE000
stack
page read and write
FCE000
heap
page read and write
2C32000
heap
page read and write
337E000
stack
page read and write
FC6000
heap
page read and write
295E000
unkown
page read and write
FCE000
heap
page read and write
2970000
heap
page read and write
FCE000
heap
page read and write
28BD000
stack
page read and write
B90000
heap
page read and write
2C1F000
unkown
page read and write
307C000
stack
page read and write
33CE000
stack
page read and write
39FB000
direct allocation
page execute and read and write
BC5000
direct allocation
page execute and read and write
31D9000
heap
page read and write
FCE000
heap
page read and write
FF7000
unkown
page readonly
1171000
heap
page read and write
32AF000
unkown
page read and write
27AE000
stack
page read and write
276F000
stack
page read and write
2D90000
heap
page read and write
4D4E000
stack
page read and write
FD1000
unkown
page execute read
FFB000
heap
page read and write
2CEF000
stack
page read and write
2C89000
heap
page read and write
BF0000
direct allocation
page read and write
50C000
stack
page read and write
FDC000
unkown
page readonly
27BE000
stack
page read and write
BF0000
direct allocation
page read and write
54E000
unkown
page read and write
2A4E000
stack
page read and write
FCE000
heap
page read and write
320E000
unkown
page read and write
483000
heap
page read and write
325F000
stack
page read and write
28AF000
stack
page read and write
3015000
heap
page read and write
1171000
heap
page read and write
56C000
stack
page read and write
2C5C000
stack
page read and write
279E000
unkown
page read and write
33DF000
unkown
page read and write
B54000
heap
page read and write
4E0F000
stack
page read and write
27DC000
stack
page read and write
D9E000
stack
page read and write
2845000
heap
page read and write
2A3D000
stack
page read and write
2DAD000
stack
page read and write
28B0000
heap
page read and write
2A40000
heap
page read and write
1171000
heap
page read and write
EE000
stack
page read and write
2F83000
heap
page read and write
2DC0000
heap
page read and write
FC6000
heap
page read and write
1171000
heap
page read and write
2D3F000
stack
page read and write
301E000
stack
page read and write
FCE000
heap
page read and write
3553000
heap
page read and write
321F000
stack
page read and write
302F000
stack
page read and write
32F0000
heap
page read and write
F80000
heap
page read and write
1171000
heap
page read and write
2EE0000
heap
page read and write
2DA0000
heap
page read and write
2BC0000
heap
page read and write
FCE000
heap
page read and write
2E09000
heap
page read and write
2B9E000
stack
page read and write
281F000
stack
page read and write
FCE000
heap
page read and write
29FE000
unkown
page read and write
1171000
heap
page read and write
2D89000
heap
page read and write
2CFC000
stack
page read and write
2F40000
heap
page read and write
29EC000
stack
page read and write
2E80000
heap
page read and write
2F63000
heap
page read and write
28EE000
stack
page read and write
1171000
heap
page read and write
4E1F000
stack
page read and write
2A50000
heap
page read and write
2C73000
heap
page read and write
2E35000
heap
page read and write
1171000
heap
page read and write
FD0000
unkown
page readonly
2A3E000
stack
page read and write
322F000
stack
page read and write
34D0000
heap
page read and write
E0C000
unkown
page readonly
2D1E000
stack
page read and write
2ADD000
stack
page read and write
2A3E000
unkown
page read and write
31A0000
heap
page read and write
1171000
heap
page read and write
2D00000
heap
page read and write
FCE000
heap
page read and write
3120000
heap
page read and write
274C000
stack
page read and write
2C6E000
stack
page read and write
1DC000
stack
page read and write
B10000
direct allocation
page read and write
2D8F000
stack
page read and write
290E000
stack
page read and write
2A90000
heap
page read and write
FCE000
heap
page read and write
3293000
heap
page read and write
2C7E000
stack
page read and write
274E000
stack
page read and write
1171000
heap
page read and write
2800000
heap
page read and write
3570000
heap
page read and write
2B9E000
unkown
page read and write
1171000
heap
page read and write
2918000
heap
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
3424000
heap
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
29AE000
unkown
page read and write
2D90000
heap
page read and write
2910000
heap
page read and write
1171000
heap
page read and write
2D53000
heap
page read and write
344F000
unkown
page read and write
FCE000
heap
page read and write
262F000
unkown
page read and write
1171000
heap
page read and write
28EC000
stack
page read and write
FCE000
heap
page read and write
457E000
stack
page read and write
27CE000
stack
page read and write
2C70000
heap
page read and write
2CAE000
stack
page read and write
FCE000
heap
page read and write
1232000
heap
page read and write
1171000
heap
page read and write
FCE000
heap
page read and write
3409000
heap
page read and write
2968000
heap
page read and write
32DF000
stack
page read and write
2E00000
heap
page read and write
1171000
heap
page read and write
2D89000
heap
page read and write
5C0000
heap
page read and write
FCE000
heap
page read and write
28AE000
stack
page read and write
2D80000
heap
page read and write
FCE000
heap
page read and write
2910000
heap
page read and write
5A0000
heap
page read and write
FCE000
heap
page read and write
44EE000
stack
page read and write
452E000
stack
page read and write
2B70000
heap
page read and write
2BF5000
heap
page read and write
33E000
stack
page read and write
2BAE000
stack
page read and write
2B79000
heap
page read and write
2EBF000
unkown
page read and write
2AF3000
heap
page read and write
2DE3000
heap
page read and write
28D0000
heap
page read and write
3633000
heap
page read and write
1210000
heap
page read and write
FCE000
heap
page read and write
2D60000
heap
page read and write
29DE000
unkown
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
314E000
unkown
page read and write
B54000
heap
page read and write
FCE000
heap
page read and write
28BF000
stack
page read and write
33A0000
heap
page read and write
FD1000
unkown
page execute read
1171000
heap
page read and write
E00000
direct allocation
page read and write
FC6000
heap
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
FCE000
heap
page read and write
47F000
stack
page read and write
32C0000
heap
page read and write
2D2F000
stack
page read and write
2EBE000
stack
page read and write
FCE000
heap
page read and write
420000
heap
page read and write
5CF000
stack
page read and write
2ABE000
stack
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
3630000
heap
page read and write
2F45000
heap
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
2D93000
heap
page read and write
FCE000
heap
page read and write
2D4F000
stack
page read and write
345F000
stack
page read and write
34F0000
heap
page read and write
3220000
heap
page read and write
2EDF000
stack
page read and write
36F000
stack
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
2EE0000
heap
page read and write
1171000
heap
page read and write
1171000
heap
page read and write
1171000
heap
page read and write
48AE000
stack
page read and write
FCE000
heap
page read and write
2F40000
heap
page read and write
540000
heap
page read and write
480F000
stack
page read and write
1012000
heap
page read and write
29B0000
heap
page read and write
FA0000
heap
page read and write
2BDE000
stack
page read and write
B10000
direct allocation
page read and write
305C000
stack
page read and write
BF0000
direct allocation
page read and write
B00000
direct allocation
page read and write
2CDE000
stack
page read and write
2DA1000
heap
page read and write
FCE000
heap
page read and write
2F4F000
stack
page read and write
28CC000
stack
page read and write
2BC9000
heap
page read and write
FCE000
heap
page read and write
B54000
heap
page read and write
1171000
heap
page read and write
3220000
heap
page read and write
FCE000
heap
page read and write
52F000
stack
page read and write
1171000
heap
page read and write
350E000
stack
page read and write
FDC000
unkown
page readonly
1171000
heap
page read and write
1171000
heap
page read and write
1171000
heap
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
FC6000
heap
page read and write
FF7000
unkown
page readonly
26ED000
stack
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
2C9D000
stack
page read and write
FC6000
heap
page read and write
E27000
unkown
page readonly
2984000
heap
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
B54000
heap
page read and write
59F000
unkown
page read and write
BE0000
direct allocation
page read and write
333F000
stack
page read and write
332F000
stack
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
3260000
heap
page read and write
FCE000
heap
page read and write
3195000
heap
page read and write
DA0000
heap
page read and write
2B8F000
unkown
page read and write
474E000
stack
page read and write
326E000
unkown
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
4C8F000
stack
page read and write
2F03000
heap
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
1171000
heap
page read and write
2BA0000
heap
page read and write
FD1000
unkown
page execute read
2FB0000
heap
page read and write
2E13000
heap
page read and write
1171000
heap
page read and write
2C40000
heap
page read and write
2A80000
heap
page read and write
2830000
heap
page read and write
FCE000
heap
page read and write
318F000
unkown
page read and write
309F000
unkown
page read and write
2E1E000
unkown
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
1171000
heap
page read and write
470E000
stack
page read and write
F70000
heap
page read and write
2C5E000
stack
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
2B2F000
heap
page read and write
3510000
heap
page read and write
45FF000
stack
page read and write
2BF0000
heap
page read and write
31DE000
stack
page read and write
2D70000
heap
page read and write
FCE000
heap
page read and write
5A5000
heap
page read and write
32C0000
heap
page read and write
2BA0000
heap
page read and write
1171000
heap
page read and write
1171000
heap
page read and write
27DE000
stack
page read and write
289E000
stack
page read and write
FA5000
direct allocation
page execute and read and write
2A80000
heap
page read and write
471E000
stack
page read and write
38CD000
stack
page read and write
2A90000
heap
page read and write
456F000
stack
page read and write
FCE000
heap
page read and write
46DE000
stack
page read and write
FCE000
heap
page read and write
1170000
heap
page read and write
560000
heap
page read and write
AF0000
direct allocation
page read and write
2BB0000
heap
page read and write
29D5000
heap
page read and write
1171000
heap
page read and write
489F000
stack
page read and write
30AF000
stack
page read and write
FCE000
heap
page read and write
13C0000
heap
page read and write
FC6000
heap
page read and write
2B5E000
stack
page read and write
400000
heap
page read and write
FCE000
heap
page read and write
32F0000
heap
page read and write
2F8E000
stack
page read and write
B54000
heap
page read and write
28BD000
stack
page read and write
29D5000
heap
page read and write
3210000
heap
page read and write
2A2F000
stack
page read and write
FCE000
heap
page read and write
287E000
stack
page read and write
1171000
heap
page read and write
2BBE000
unkown
page read and write
2BD5000
heap
page read and write
3A10000
direct allocation
page read and write
FD0000
unkown
page readonly
2960000
heap
page read and write
3FE000
unkown
page read and write
2D0E000
stack
page read and write
FCE000
heap
page read and write
452F000
stack
page read and write
3E0000
heap
page read and write
2DFE000
stack
page read and write
FE1000
unkown
page write copy
29CE000
stack
page read and write
2990000
heap
page read and write
2F60000
heap
page read and write
2B1F000
stack
page read and write
FCE000
heap
page read and write
30BE000
stack
page read and write
121A000
heap
page read and write
2C4E000
stack
page read and write
3310000
heap
page read and write
1171000
heap
page read and write
262E000
stack
page read and write
2DD0000
heap
page read and write
4E5F000
stack
page read and write
425000
heap
page read and write
45FF000
stack
page read and write
33C5000
heap
page read and write
BE0000
direct allocation
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
3290000
heap
page read and write
58E000
stack
page read and write
49D000
stack
page read and write
FCE000
heap
page read and write
EB0000
direct allocation
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
2D90000
heap
page read and write
2AC3000
heap
page read and write
27F0000
heap
page read and write
4E1E000
stack
page read and write
328E000
stack
page read and write
AF0000
trusted library allocation
page read and write
2F20000
heap
page read and write
2E10000
heap
page read and write
2F6C000
stack
page read and write
341E000
stack
page read and write
2BD5000
heap
page read and write
26CF000
stack
page read and write
2B70000
heap
page read and write
3400000
heap
page read and write
B00000
direct allocation
page read and write
29B5000
heap
page read and write
FCE000
heap
page read and write
2CD0000
heap
page read and write
FCE000
heap
page read and write
494F000
stack
page read and write
1171000
heap
page read and write
FF7000
unkown
page readonly
298E000
stack
page read and write
FCE000
heap
page read and write
2B10000
heap
page read and write
5B0000
heap
page read and write
2DA3000
heap
page read and write
1171000
heap
page read and write
3B0000
heap
page read and write
358E000
stack
page read and write
4CCE000
stack
page read and write
2BFF000
unkown
page read and write
463F000
stack
page read and write
FCE000
heap
page read and write
2A4F000
stack
page read and write
DF0000
direct allocation
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
26DF000
stack
page read and write
FCE000
heap
page read and write
2DA0000
heap
page read and write
3170000
heap
page read and write
FCE000
heap
page read and write
48CF000
stack
page read and write
467F000
stack
page read and write
FCE000
heap
page read and write
FC6000
heap
page read and write
1171000
heap
page read and write
1171000
heap
page read and write
289E000
stack
page read and write
43BF000
stack
page read and write
FCE000
heap
page read and write
2C3D000
stack
page read and write
26AE000
stack
page read and write
30AE000
stack
page read and write
FDC000
unkown
page readonly
32DE000
stack
page read and write
1171000
heap
page read and write
2840000
heap
page read and write
FCE000
heap
page read and write
2E2E000
stack
page read and write
FCE000
heap
page read and write
2CF0000
heap
page read and write
FCE000
heap
page read and write
1171000
heap
page read and write
1171000
heap
page read and write
F70000
heap
page read and write
FCE000
heap
page read and write
28D9000
heap
page read and write
32EE000
stack
page read and write
2DEE000
unkown
page read and write
305E000
unkown
page read and write
2BAF000
stack
page read and write
3270000
heap
page read and write
FCE000
heap
page read and write
CC000
stack
page read and write
318E000
stack
page read and write
2FDF000
heap
page read and write
FCE000
heap
page read and write
FC6000
heap
page read and write
3415000
heap
page read and write
2A80000
heap
page read and write
BE0000
direct allocation
page read and write
2A30000
heap
page read and write
E00000
unkown
page readonly
2B9F000
stack
page read and write
2D50000
heap
page read and write
2B00000
heap
page read and write
FCE000
heap
page read and write
2C4F000
stack
page read and write
5B0000
heap
page read and write
2BCD000
stack
page read and write
5A0000
heap
page read and write
420000
heap
page read and write
FCE000
heap
page read and write
2E40000
heap
page read and write
2990000
heap
page read and write
327D000
stack
page read and write
480000
heap
page read and write
FCE000
heap
page read and write
26AC000
stack
page read and write
2D0F000
unkown
page read and write
500000
heap
page read and write
2E8E000
stack
page read and write
326F000
stack
page read and write
349E000
stack
page read and write
2A8F000
stack
page read and write
3190000
heap
page read and write
2BBE000
stack
page read and write
2BCE000
unkown
page read and write
2E7C000
stack
page read and write
FCE000
heap
page read and write
5A0000
heap
page read and write
30F0000
heap
page read and write
FCE000
heap
page read and write
35F0000
heap
page read and write
2F0E000
stack
page read and write
E01000
unkown
page execute read
FCE000
heap
page read and write
FCE000
heap
page read and write
329E000
stack
page read and write
B54000
heap
page read and write
2DA9000
heap
page read and write
470F000
stack
page read and write
266F000
stack
page read and write
29AF000
stack
page read and write
FCE000
heap
page read and write
2C9E000
stack
page read and write
292D000
stack
page read and write
29BD000
stack
page read and write
29D0000
heap
page read and write
FCE000
heap
page read and write
2A3D000
stack
page read and write
2E90000
heap
page read and write
FE1000
unkown
page write copy
360F000
stack
page read and write
2BD0000
heap
page read and write
2AD0000
heap
page read and write
2DC5000
heap
page read and write
1171000
heap
page read and write
2F09000
heap
page read and write
45C000
stack
page read and write
348E000
stack
page read and write
3270000
heap
page read and write
1171000
heap
page read and write
FCE000
heap
page read and write
2D80000
heap
page read and write
FCE000
heap
page read and write
44BF000
stack
page read and write
2B60000
heap
page read and write
310F000
unkown
page read and write
378D000
stack
page read and write
FCE000
heap
page read and write
B54000
heap
page read and write
1171000
heap
page read and write
BC5000
direct allocation
page execute and read and write
2BA0000
heap
page read and write
3370000
heap
page read and write
FCE000
heap
page read and write
45BE000
stack
page read and write
430000
heap
page read and write
2CAE000
stack
page read and write
There are 1135 hidden memdumps, click here to show them.