IOC Report
jW3NEKvxH1.exe

loading gif

Files

File Path
Type
Category
Malicious
jW3NEKvxH1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\Public\Dlaybpxl.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Dlaybpxl.PIF">), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Public\Libraries\Dlaybpxl
data
dropped
malicious
C:\Users\Public\Libraries\Dlaybpxl.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\lxpbyalD.cmd
DOS batch file, Unicode text, UTF-8 text, with very long lines (324), with CRLF line terminators
dropped
malicious
C:\Users\Public\Libraries\PNO
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\alpha.pif
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\Public\xpha.pif
PE32 executable (console) Intel 80386, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
\Device\Null
ASCII text, with CRLF, CR line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\jW3NEKvxH1.exe
"C:\Users\user\Desktop\jW3NEKvxH1.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\lxpbyalD.cmd" "
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl.exe /y C:\Users\user\Desktop\jW3NEKvxH1.exe /d C:\\Users\\Public\\Libraries\\Dlaybpxl.PIF /o
malicious
C:\Windows\SysWOW64\SndVol.exe
C:\Windows\System32\SndVol.exe
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10
malicious
C:\Users\Public\xpha.pif
C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10
malicious
C:\Users\Public\Libraries\Dlaybpxl.PIF
"C:\Users\Public\Libraries\Dlaybpxl.PIF"
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c del "C:\Users\Public\xpha.pif"
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \SysWOW64
malicious
C:\Windows\SysWOW64\SndVol.exe
C:\Windows\System32\SndVol.exe
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \"
malicious
C:\Users\Public\Libraries\Dlaybpxl.PIF
"C:\Users\Public\Libraries\Dlaybpxl.PIF"
malicious
C:\Windows\SysWOW64\colorcpl.exe
C:\Windows\System32\colorcpl.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
manazara.master-workdone.com.ua
malicious
zara.master-workdone.com.ua
malicious
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
https://bitbucket.org/
unknown
https://bitbucket.org/masterservicwes/mastermanservices/downloads/165_Dlaybpxloke
185.166.143.50
https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net
unknown
https://sectigo.com/CPS0
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://web-security-reports.services.atlassian.com/csp-report/bb-website
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://bitbucket.org/masterservicwes/ma
unknown
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/
unknown
https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net
unknown
https://dz8aopenkvv6s.cloudfront.net
unknown
https://bbuseruploads.s3.amazonaws.com:443/03fa479d-619a-4b32-874d-a4ddf918e902/downloads/2601acd3-6
unknown
http://geoplugin.net/json.gp
unknown
http://geoplugin.net/json.gp/C
unknown
https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
unknown
https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net
unknown
https://cdn.cookielaw.org/
unknown
https://bbuseruploads.s3.amazonaws.com/03fa479d-619a-4b32-874d-a4ddf918e902/downloads/2601acd3-63c3-
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/;
unknown
https://aui-cdn.atlassian.com/
unknown
https://remote-app-switcher.stg-east.frontend.public.atl-paas.net
unknown
http://www.pmail.com
unknown
https://bbuseruploads.s3.amazonaws.com/
unknown
http://ocsp.sectigo.com0C
unknown
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
manazara.master-workdone.com.ua
104.243.42.254
malicious
zara.master-workdone.com.ua
104.243.42.254
malicious
s3-w.us-east-1.amazonaws.com
3.5.30.3
bitbucket.org
185.166.143.50
bbuseruploads.s3.amazonaws.com
unknown

IPs

IP
Domain
Country
Malicious
104.243.42.254
manazara.master-workdone.com.ua
United States
malicious
185.166.143.50
bitbucket.org
Germany
3.5.30.3
s3-w.us-east-1.amazonaws.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Dlaybpxl
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-RX8VCL
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-RX8VCL
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-RX8VCL
time
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2920000
remote allocation
page execute and read and write
malicious
607000
heap
page read and write
malicious
2DB7000
direct allocation
page execute and read and write
malicious
2460000
remote allocation
page execute and read and write
malicious
21D67000
heap
page read and write
malicious
2940000
remote allocation
page execute and read and write
malicious
33ED0000
heap
page read and write
malicious
7E7A0000
direct allocation
page read and write
malicious
314F000
heap
page read and write
7CC000
stack
page read and write
7EAAF000
direct allocation
page read and write
3126000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
7EA30000
direct allocation
page read and write
505D000
heap
page read and write
313F000
heap
page read and write
7EAAF000
direct allocation
page read and write
3123000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
E5E000
unkown
page read and write
4EB0000
direct allocation
page read and write
345E000
unkown
page read and write
2141D000
stack
page read and write
7EA60000
direct allocation
page read and write
700000
heap
page read and write
314F000
heap
page read and write
87D000
heap
page read and write
20B38000
direct allocation
page read and write
2554000
remote allocation
page execute and read and write
840000
unkown
page readonly
212FE000
stack
page read and write
E7E000
unkown
page readonly
E5E000
unkown
page write copy
314F000
heap
page read and write
314F000
heap
page read and write
7EF20000
direct allocation
page read and write
325D000
stack
page read and write
20B46000
direct allocation
page read and write
21EBC000
direct allocation
page read and write
2103F000
stack
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
34F0000
heap
page read and write
314F000
heap
page read and write
690000
direct allocation
page execute and read and write
20B3A000
direct allocation
page read and write
846000
unkown
page readonly
475000
unkown
page read and write
CDF000
stack
page read and write
7F040000
direct allocation
page read and write
401000
unkown
page execute read
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
5049000
heap
page read and write
314F000
heap
page read and write
7E890000
direct allocation
page read and write
E30000
unkown
page readonly
7EAC0000
direct allocation
page read and write
314F000
heap
page read and write
313F000
heap
page read and write
2118F000
stack
page read and write
7FC9F000
direct allocation
page read and write
27B2000
heap
page read and write
7EE5E000
direct allocation
page read and write
7FC60000
direct allocation
page read and write
7FB60000
direct allocation
page read and write
3090000
heap
page read and write
4DE0000
heap
page read and write
23D0000
direct allocation
page read and write
3151000
heap
page read and write
2E2E000
stack
page read and write
87A000
heap
page read and write
314F000
heap
page read and write
E7E000
unkown
page readonly
335E000
unkown
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
313F000
heap
page read and write
20B6A000
direct allocation
page read and write
7E816000
direct allocation
page read and write
86C000
heap
page read and write
313F000
heap
page read and write
218A9000
heap
page read and write
218A9000
heap
page read and write
29B3000
remote allocation
page execute and read and write
7DD000
heap
page read and write
314F000
heap
page read and write
B10000
heap
page read and write
314F000
heap
page read and write
7DB000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
5A30000
trusted library allocation
page read and write
9A0000
heap
page read and write
21AF5000
heap
page read and write
314F000
heap
page read and write
B30000
heap
page read and write
314F000
heap
page read and write
20B41000
direct allocation
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
507C000
heap
page read and write
473000
unkown
page read and write
34B3000
heap
page read and write
E30000
unkown
page readonly
2131E000
stack
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
22D3000
direct allocation
page read and write
47C000
unkown
page readonly
3123000
heap
page read and write
313F000
heap
page read and write
284E000
heap
page read and write
314F000
heap
page read and write
7AA000
heap
page read and write
2D61000
direct allocation
page execute read
314F000
heap
page read and write
20B08000
direct allocation
page read and write
860000
heap
page read and write
20A86000
direct allocation
page read and write
3100000
heap
page read and write
3400000
heap
page read and write
73F000
stack
page read and write
313F000
heap
page read and write
3126000
heap
page read and write
476000
unkown
page execute and read and write
1F0000
heap
page read and write
545000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
20F3F000
stack
page read and write
4ED000
stack
page read and write
BA0000
heap
page read and write
28FC000
stack
page read and write
2F80000
heap
page read and write
6B0000
heap
page read and write
660000
heap
page read and write
5075000
heap
page read and write
3126000
heap
page read and write
314F000
heap
page read and write
215FE000
stack
page read and write
314F000
heap
page read and write
313F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
3151000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
20C4A000
stack
page read and write
473000
unkown
page read and write
7EA50000
direct allocation
page read and write
7F400000
direct allocation
page read and write
3151000
heap
page read and write
2B6E000
stack
page read and write
314F000
heap
page read and write
2119F000
stack
page read and write
7E910000
direct allocation
page read and write
301E000
stack
page read and write
9B000
stack
page read and write
314F000
heap
page read and write
2B29000
heap
page read and write
BDE000
stack
page read and write
3402E000
stack
page read and write
3150000
heap
page read and write
2D8E000
direct allocation
page read and write
20B8A000
direct allocation
page read and write
4E2E000
stack
page read and write
468000
unkown
page read and write
3126000
heap
page read and write
7F04E000
direct allocation
page read and write
20A3E000
direct allocation
page read and write
314F000
heap
page read and write
20C14000
direct allocation
page read and write
314F000
heap
page read and write
1D0000
heap
page read and write
890000
heap
page read and write
21EDF000
stack
page read and write
E30000
unkown
page readonly
20B78000
direct allocation
page read and write
314F000
heap
page read and write
6BE000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
3123000
heap
page read and write
20B3F000
direct allocation
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
380F000
stack
page read and write
314F000
heap
page read and write
2E80000
heap
page read and write
314F000
heap
page read and write
3125000
heap
page read and write
3497000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
21470000
remote allocation
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
2DB5000
direct allocation
page read and write
33EB0000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
5065000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
7F040000
direct allocation
page read and write
211DE000
stack
page read and write
2AB0000
heap
page read and write
314F000
heap
page read and write
313F000
heap
page read and write
313F000
heap
page read and write
E5E000
unkown
page write copy
3127000
heap
page read and write
314F000
heap
page read and write
2DEF000
stack
page read and write
20A6E000
direct allocation
page read and write
7DB000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
2132E000
stack
page read and write
2E4E000
direct allocation
page read and write
B9F000
stack
page read and write
21787000
heap
page read and write
E31000
unkown
page execute read
314F000
heap
page read and write
9DF000
stack
page read and write
5ED000
stack
page read and write
7E8000
heap
page read and write
314F000
heap
page read and write
E7E000
unkown
page readonly
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
3860000
heap
page read and write
314F000
heap
page read and write
3126000
heap
page read and write
708000
heap
page read and write
2420000
heap
page read and write
E30000
unkown
page readonly
7EA60000
direct allocation
page read and write
313F000
heap
page read and write
2D60000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
7BA000
heap
page read and write
314F000
heap
page read and write
21BD0000
heap
page read and write
2AD0000
heap
page read and write
284C000
heap
page read and write
ADA000
heap
page read and write
E7E000
unkown
page readonly
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
68E000
stack
page read and write
314F000
heap
page read and write
2E2D000
direct allocation
page execute and read and write
314F000
heap
page read and write
3810000
heap
page read and write
17B000
stack
page read and write
7F400000
direct allocation
page read and write
21CA0000
heap
page read and write
21BF0000
heap
page read and write
21BA0000
heap
page read and write
78F000
stack
page read and write
314F000
heap
page read and write
89A000
heap
page read and write
7F130000
direct allocation
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
34CE000
stack
page read and write
3126000
heap
page read and write
314F000
heap
page read and write
20C31000
direct allocation
page read and write
314F000
heap
page read and write
20EFF000
stack
page read and write
212EE000
stack
page read and write
7F040000
direct allocation
page read and write
2440000
direct allocation
page execute and read and write
314F000
heap
page read and write
314F000
heap
page read and write
4DEF000
stack
page read and write
3950000
heap
page read and write
3126000
heap
page read and write
313F000
heap
page read and write
314F000
heap
page read and write
7F960000
direct allocation
page read and write
314F000
heap
page read and write
7FC20000
direct allocation
page read and write
7F040000
direct allocation
page read and write
3126000
heap
page read and write
7F030000
direct allocation
page read and write
2F5FF000
stack
page read and write
2133E000
stack
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
3126000
heap
page read and write
2F9B000
direct allocation
page execute and read and write
314F000
heap
page read and write
32FD000
stack
page read and write
314F000
heap
page read and write
3123000
heap
page read and write
E31000
unkown
page execute read
750000
heap
page read and write
314F000
heap
page read and write
20ACA000
direct allocation
page read and write
314F000
heap
page read and write
38BF000
stack
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
630000
heap
page read and write
3406F000
stack
page read and write
7F920000
direct allocation
page read and write
314F000
heap
page read and write
506A000
heap
page read and write
2F6D000
stack
page read and write
2FDE000
stack
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
22A0000
direct allocation
page read and write
8CD000
stack
page read and write
313F000
heap
page read and write
11C000
stack
page read and write
313F000
heap
page read and write
314F000
heap
page read and write
2EAE000
direct allocation
page execute and read and write
314F000
heap
page read and write
4C39000
stack
page read and write
314F000
heap
page read and write
7EB1A000
direct allocation
page read and write
51CF000
stack
page read and write
314F000
heap
page read and write
871000
heap
page read and write
20C4F000
stack
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
313F000
heap
page read and write
313F000
heap
page read and write
3126000
heap
page read and write
20DAF000
stack
page read and write
3126000
heap
page read and write
7F0EF000
direct allocation
page read and write
313F000
heap
page read and write
314F000
heap
page read and write
990000
heap
page read and write
3125000
heap
page read and write
361A000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
32FE000
stack
page read and write
2F1D000
stack
page read and write
2473000
direct allocation
page read and write
34B4000
heap
page read and write
52C0000
direct allocation
page read and write
313F000
heap
page read and write
313F000
heap
page read and write
20CAE000
stack
page read and write
7E750000
direct allocation
page read and write
314F000
heap
page read and write
23EF000
stack
page read and write
2411000
direct allocation
page read and write
314F000
heap
page read and write
3870000
heap
page read and write
314F000
heap
page read and write
3126000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
313F000
heap
page read and write
2FE0000
heap
page read and write
518E000
stack
page read and write
314F000
heap
page read and write
86A000
heap
page read and write
20D3F000
stack
page read and write
7E9AF000
direct allocation
page read and write
7E5B0000
direct allocation
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
4E30000
heap
page read and write
22E8000
direct allocation
page read and write
314F000
heap
page read and write
E10000
heap
page read and write
7A0000
heap
page read and write
314F000
heap
page read and write
7DD000
heap
page read and write
20B1D000
direct allocation
page read and write
314F000
heap
page read and write
870000
heap
page read and write
2DF0000
heap
page read and write
3110000
heap
page read and write
841000
unkown
page execute read
314F000
heap
page read and write
7FAD0000
direct allocation
page read and write
505A000
heap
page read and write
846000
unkown
page readonly
314F000
heap
page read and write
3650000
heap
page read and write
2DE7000
direct allocation
page execute and read and write
3125000
heap
page read and write
314F000
heap
page read and write
840000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
2B25000
heap
page read and write
7DD000
heap
page read and write
3126000
heap
page read and write
21B2D000
heap
page read and write
314F000
heap
page read and write
E7A000
unkown
page readonly
314F000
heap
page read and write
E7E000
unkown
page readonly
37BF000
stack
page read and write
314F000
heap
page read and write
2D5E000
direct allocation
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
313F000
heap
page read and write
314F000
heap
page read and write
20C7F000
stack
page read and write
3860000
heap
page read and write
20B16000
direct allocation
page read and write
20B33000
direct allocation
page read and write
314F000
heap
page read and write
7F080000
direct allocation
page read and write
2EDB000
direct allocation
page execute and read and write
7EB30000
direct allocation
page read and write
7EAD0000
direct allocation
page read and write
A9E000
stack
page read and write
43E000
stack
page read and write
313F000
heap
page read and write
313F000
heap
page read and write
2F1D000
stack
page read and write
2F5B0000
heap
page read and write
314F000
heap
page read and write
3126000
heap
page read and write
2102F000
stack
page read and write
E5E000
unkown
page write copy
7F390000
direct allocation
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
313F000
heap
page read and write
313F000
heap
page read and write
2D66000
heap
page read and write
7EA50000
direct allocation
page read and write
508C000
heap
page read and write
7EE50000
direct allocation
page read and write
5086000
heap
page read and write
34A2000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
313F000
heap
page read and write
20B71000
direct allocation
page read and write
313F000
heap
page read and write
7E9D0000
direct allocation
page read and write
314F000
heap
page read and write
313F000
heap
page read and write
E7A000
unkown
page readonly
2856000
heap
page read and write
20B63000
direct allocation
page read and write
314F000
heap
page read and write
3126000
heap
page read and write
314F000
heap
page read and write
21B82000
heap
page read and write
314F000
heap
page read and write
20DBF000
stack
page read and write
1E0000
heap
page read and write
841000
unkown
page execute read
314F000
heap
page read and write
B13000
heap
page read and write
6BA000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
2D31000
direct allocation
page execute read
7DB000
heap
page read and write
314F000
heap
page read and write
23ED000
direct allocation
page read and write
7FC40000
direct allocation
page read and write
211BF000
stack
page read and write
314F000
heap
page read and write
2FAF0000
heap
page read and write
2108E000
stack
page read and write
2A14000
remote allocation
page execute and read and write
2EA3000
direct allocation
page read and write
333E000
stack
page read and write
314F000
heap
page read and write
313F000
heap
page read and write
7EAB0000
direct allocation
page read and write
314F000
heap
page read and write
7F250000
direct allocation
page read and write
7EA4F000
direct allocation
page read and write
20B4D000
direct allocation
page read and write
337E000
stack
page read and write
314F000
heap
page read and write
473000
unkown
page read and write
314F000
heap
page read and write
7D5000
heap
page read and write
844000
unkown
page read and write
3125000
heap
page read and write
2145F000
trusted library allocation
page read and write
21F3C000
heap
page read and write
314F000
heap
page read and write
7DD000
heap
page read and write
314F000
heap
page read and write
2F80000
heap
page read and write
2F600000
heap
page read and write
313F000
heap
page read and write
507C000
heap
page read and write
E7E000
unkown
page readonly
7F0C0000
direct allocation
page read and write
211FE000
stack
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
5F0000
heap
page read and write
314F000
heap
page read and write
2403000
direct allocation
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
7EB00000
direct allocation
page read and write
2109E000
stack
page read and write
7F250000
direct allocation
page read and write
3126000
heap
page read and write
2C20000
heap
page read and write
214BE000
stack
page read and write
760000
direct allocation
page execute and read and write
7BC000
heap
page read and write
468000
unkown
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
20B54000
direct allocation
page read and write
23FC000
direct allocation
page read and write
5E0000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
2292000
direct allocation
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
21B86000
heap
page read and write
314F000
heap
page read and write
20F7E000
stack
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
3125000
heap
page read and write
7E91F000
direct allocation
page read and write
2144F000
trusted library allocation
page read and write
19D000
stack
page read and write
314F000
heap
page read and write
2C60000
heap
page read and write
314F000
heap
page read and write
3151000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
20C23000
direct allocation
page read and write
2FEE000
stack
page read and write
314F000
heap
page read and write
2993000
remote allocation
page execute and read and write
19D000
stack
page read and write
21B5E000
heap
page read and write
314F000
heap
page read and write
212DD000
stack
page read and write
7F110000
direct allocation
page read and write
314F000
heap
page read and write
7F8F0000
direct allocation
page read and write
314F000
heap
page read and write
34B3000
heap
page read and write
507C000
heap
page read and write
550000
heap
page read and write
314F000
heap
page read and write
6D3000
heap
page read and write
3151000
heap
page read and write
E5E000
unkown
page read and write
5AE000
stack
page read and write
32FD000
stack
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
5076000
heap
page read and write
246C000
direct allocation
page read and write
314F000
heap
page read and write
313F000
heap
page read and write
314F000
heap
page read and write
B90000
heap
page read and write
314F000
heap
page read and write
7F8F0000
direct allocation
page read and write
5C0000
heap
page read and write
3490000
heap
page read and write
2464000
direct allocation
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
2FAE0000
heap
page read and write
311C000
heap
page read and write
7EB30000
direct allocation
page read and write
3123000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
540000
heap
page read and write
314F000
heap
page read and write
83D000
stack
page read and write
34120000
heap
page read and write
3440000
heap
page read and write
E7A000
unkown
page readonly
E7A000
unkown
page readonly
29BD000
stack
page read and write
375F000
stack
page read and write
3660000
heap
page read and write
760000
heap
page read and write
314F000
heap
page read and write
7E940000
direct allocation
page read and write
21440000
trusted library allocation
page read and write
E62000
unkown
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
7FB000
heap
page read and write
21F30000
trusted library allocation
page read and write
4DAF000
stack
page read and write
3123000
heap
page read and write
314F000
heap
page read and write
240A000
direct allocation
page read and write
3240000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
211EE000
stack
page read and write
E7A000
unkown
page readonly
245D000
direct allocation
page read and write
2E8B000
heap
page read and write
468000
unkown
page write copy
1C0000
heap
page read and write
E7A000
unkown
page readonly
314F000
heap
page read and write
5075000
heap
page read and write
5076000
heap
page read and write
E30000
unkown
page readonly
7FB3F000
direct allocation
page read and write
20B24000
direct allocation
page read and write
3123000
heap
page read and write
823000
heap
page read and write
314F000
heap
page read and write
2142F000
stack
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
22BD000
direct allocation
page read and write
314F000
heap
page read and write
29B6000
remote allocation
page execute and read and write
506D000
heap
page read and write
282C000
heap
page read and write
6EF000
heap
page read and write
2DE3000
direct allocation
page read and write
33EB8000
heap
page read and write
3126000
heap
page read and write
4DAE000
stack
page read and write
4E9F000
stack
page read and write
3126000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
508C000
heap
page read and write
E31000
unkown
page execute read
314F000
heap
page read and write
51F0000
heap
page read and write
819000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
7F100000
direct allocation
page read and write
E7A000
unkown
page readonly
E30000
unkown
page readonly
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
313F000
heap
page read and write
6D0000
heap
page read and write
314F000
heap
page read and write
E31000
unkown
page execute read
705000
heap
page read and write
E7A000
unkown
page readonly
22C4000
direct allocation
page read and write
30FD000
stack
page read and write
5065000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
22E1000
direct allocation
page read and write
7BC000
heap
page read and write
314F000
heap
page read and write
7E890000
direct allocation
page read and write
21B7E000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
20C4E000
stack
page execute and read and write
314F000
heap
page read and write
314F000
heap
page read and write
340E000
stack
page read and write
2F59D000
stack
page read and write
400000
unkown
page readonly
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
2432000
direct allocation
page read and write
9B000
stack
page read and write
5075000
heap
page read and write
314F000
heap
page read and write
E7E000
unkown
page readonly
27B4000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
E5E000
unkown
page read and write
313F000
heap
page read and write
314F000
heap
page read and write
5730000
trusted library allocation
page read and write
21450000
trusted library allocation
page read and write
508C000
heap
page read and write
313F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
7EAC0000
direct allocation
page read and write
313F000
heap
page read and write
E31000
unkown
page execute read
82C000
heap
page read and write
385E000
stack
page read and write
21AF0000
heap
page read and write
5050000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
21CEE000
stack
page read and write
506A000
heap
page read and write
E7E000
unkown
page readonly
314F000
heap
page read and write
20B00000
direct allocation
page read and write
20C7A000
stack
page read and write
314F000
heap
page read and write
5CE000
stack
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
4C3B000
stack
page read and write
314F000
heap
page read and write
E7E000
unkown
page readonly
314F000
heap
page read and write
74E000
stack
page read and write
7E820000
direct allocation
page read and write
7EE60000
direct allocation
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
20DFE000
stack
page read and write
7F030000
direct allocation
page read and write
3126000
heap
page read and write
A7E000
stack
page read and write
503F000
stack
page read and write
359E000
stack
page read and write
7FAB0000
direct allocation
page read and write
314F000
heap
page read and write
2A34000
remote allocation
page execute and read and write
20B2C000
direct allocation
page read and write
E5E000
unkown
page write copy
314F000
heap
page read and write
E30000
unkown
page readonly
3126000
heap
page read and write
E5E000
unkown
page read and write
600000
heap
page read and write
314F000
heap
page read and write
5E5000
heap
page read and write
23B5000
direct allocation
page read and write
E5E000
unkown
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
7EFD0000
direct allocation
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
3610000
heap
page read and write
5086000
heap
page read and write
3125000
heap
page read and write
7AE000
heap
page read and write
314F000
heap
page read and write
335D000
stack
page read and write
20C2A000
direct allocation
page read and write
58F000
stack
page read and write
550000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
23F4000
direct allocation
page read and write
305E000
stack
page read and write
314F000
heap
page read and write
5058000
heap
page read and write
BA6000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
7EB80000
direct allocation
page read and write
22DA000
direct allocation
page read and write
7FA30000
direct allocation
page read and write
210BE000
stack
page read and write
7F180000
direct allocation
page read and write
7F180000
direct allocation
page read and write
CCF000
stack
page read and write
314F000
heap
page read and write
3151000
heap
page read and write
313F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
E30000
unkown
page readonly
314F000
heap
page read and write
2852000
heap
page read and write
4DF0000
heap
page read and write
313F000
heap
page read and write
5065000
heap
page read and write
880000
heap
page read and write
7E890000
direct allocation
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
21D2E000
stack
page read and write
3126000
heap
page read and write
314F000
heap
page read and write
7E0000
heap
page read and write
4F70000
heap
page read and write
7F04E000
direct allocation
page read and write
2D8D000
stack
page read and write
7A0000
heap
page read and write
314F000
heap
page read and write
7DD000
heap
page read and write
21AF1000
heap
page read and write
20EEF000
stack
page read and write
314F000
heap
page read and write
349E000
stack
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
20E3F000
stack
page read and write
E31000
unkown
page execute read
7FD90000
direct allocation
page read and write
314F000
heap
page read and write
55D0000
direct allocation
page read and write
314F000
heap
page read and write
505A000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
7F400000
direct allocation
page read and write
3126000
heap
page read and write
7EAAF000
direct allocation
page read and write
74F000
stack
page read and write
2BE8000
heap
page read and write
4CED000
stack
page read and write
6E0000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
21430000
heap
page read and write
3151000
heap
page read and write
314F000
heap
page read and write
2481000
direct allocation
page read and write
20F2E000
stack
page read and write
314F000
heap
page read and write
1E0000
heap
page read and write
27B3000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
2854000
heap
page read and write
844000
unkown
page write copy
560000
heap
page read and write
21E9E000
stack
page read and write
7F14F000
direct allocation
page read and write
7A8000
heap
page read and write
314F000
heap
page read and write
20B0F000
direct allocation
page read and write
34FA000
heap
page read and write
E31000
unkown
page execute read
E31000
unkown
page execute read
3123000
heap
page read and write
3480000
heap
page read and write
314F000
heap
page read and write
238B0000
heap
page read and write
2E75000
direct allocation
page read and write
7D5000
heap
page read and write
313F000
heap
page read and write
314F000
heap
page read and write
7F090000
direct allocation
page read and write
7F0C0000
direct allocation
page read and write
E7A000
unkown
page readonly
314F000
heap
page read and write
216FE000
stack
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
20A10000
direct allocation
page read and write
33B0000
heap
page read and write
20F3E000
stack
page read and write
33FEF000
stack
page read and write
314F000
heap
page read and write
2107F000
stack
page read and write
3123000
heap
page read and write
313F000
heap
page read and write
21F3F000
trusted library allocation
page read and write
640000
heap
page read and write
8DE000
stack
page read and write
2850000
heap
page read and write
2EA7000
direct allocation
page execute and read and write
63D000
stack
page read and write
5086000
heap
page read and write
314F000
heap
page read and write
7EAC0000
direct allocation
page read and write
314F000
heap
page read and write
4E50000
heap
page read and write
3125000
heap
page read and write
2F80000
heap
page read and write
5065000
heap
page read and write
313F000
heap
page read and write
314F000
heap
page read and write
E30000
unkown
page readonly
20C06000
direct allocation
page read and write
314F000
heap
page read and write
550000
heap
page read and write
3150000
heap
page read and write
50E000
stack
page read and write
20C0D000
direct allocation
page read and write
314F000
heap
page read and write
AD0000
heap
page read and write
314F000
heap
page read and write
21B53000
heap
page read and write
314F000
heap
page read and write
39A0000
heap
page read and write
670000
heap
page read and write
E7E000
unkown
page readonly
314F000
heap
page read and write
313F000
heap
page read and write
313F000
heap
page read and write
313F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
313F000
heap
page read and write
2D05000
heap
page read and write
3126000
heap
page read and write
7DB000
heap
page read and write
24D3000
remote allocation
page execute and read and write
49ED000
stack
page read and write
20B48000
direct allocation
page read and write
7E9A0000
direct allocation
page read and write
21AFA000
heap
page read and write
314F000
heap
page read and write
2488000
direct allocation
page read and write
314F000
heap
page read and write
21440000
heap
page read and write
20CBE000
stack
page read and write
2F90000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
3126000
heap
page read and write
313F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
E30000
unkown
page readonly
7F8F0000
direct allocation
page read and write
29FD000
stack
page read and write
3125000
heap
page read and write
314F000
heap
page read and write
3126000
heap
page read and write
314F000
heap
page read and write
5200000
trusted library allocation
page read and write
6C0000
heap
page read and write
313F000
heap
page read and write
680000
heap
page read and write
314F000
heap
page read and write
3127000
heap
page read and write
ABE000
stack
page read and write
314F000
heap
page read and write
E7E000
unkown
page readonly
62E000
stack
page read and write
476000
unkown
page execute and read and write
314F000
heap
page read and write
314F000
heap
page read and write
2418000
direct allocation
page read and write
22CC000
direct allocation
page read and write
314F000
heap
page read and write
B96000
heap
page read and write
20D3A000
stack
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
13C000
stack
page read and write
E31000
unkown
page execute read
314F000
heap
page read and write
7EB30000
direct allocation
page read and write
2C43000
heap
page read and write
3125000
heap
page read and write
7FCAF000
direct allocation
page read and write
7FC50000
direct allocation
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
313F000
heap
page read and write
313F000
heap
page read and write
508C000
heap
page read and write
E5E000
unkown
page write copy
33FE000
stack
page read and write
2BAE000
stack
page read and write
7EF00000
direct allocation
page read and write
313F000
heap
page read and write
282E000
heap
page read and write
475000
unkown
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
21B8C000
heap
page read and write
33B0000
heap
page read and write
314F000
heap
page read and write
87D000
heap
page read and write
314F000
heap
page read and write
2FCE000
stack
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
20DEE000
stack
page read and write
314F000
heap
page read and write
477000
unkown
page write copy
313F000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
2E21000
direct allocation
page execute read
20C7E000
stack
page execute and read and write
3123000
heap
page read and write
21470000
remote allocation
page read and write
314F000
heap
page read and write
5076000
heap
page read and write
220E9000
heap
page read and write
E30000
unkown
page readonly
7F17F000
direct allocation
page read and write
30DF000
stack
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
313F000
heap
page read and write
3125000
heap
page read and write
314F000
heap
page read and write
E5E000
unkown
page write copy
635000
heap
page read and write
2D40000
heap
page read and write
E31000
unkown
page execute read
21D60000
heap
page read and write
7E896000
direct allocation
page read and write
314F000
heap
page read and write
7E8B0000
direct allocation
page read and write
314F000
heap
page read and write
97F000
stack
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
313F000
heap
page read and write
4D90000
heap
page read and write
E7E000
unkown
page readonly
314F000
heap
page read and write
20B03000
direct allocation
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
3490000
heap
page read and write
AC0000
heap
page read and write
9DE000
stack
page read and write
314F000
heap
page read and write
E7A000
unkown
page readonly
E31000
unkown
page execute read
2D30000
direct allocation
page readonly
314F000
heap
page read and write
23780000
heap
page read and write
2143F000
stack
page read and write
313F000
heap
page read and write
5C3000
heap
page read and write
314F000
heap
page read and write
33C0000
heap
page read and write
7EB00000
direct allocation
page read and write
7D5000
heap
page read and write
20B0A000
direct allocation
page read and write
359F000
stack
page read and write
4C90000
heap
page read and write
313F000
heap
page read and write
3123000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
3151000
heap
page read and write
E7A000
unkown
page readonly
7EEEF000
direct allocation
page read and write
5040000
heap
page read and write
314F000
heap
page read and write
38C0000
heap
page read and write
7E680000
direct allocation
page read and write
5065000
heap
page read and write
314F000
heap
page read and write
2FA0000
heap
page read and write
468000
unkown
page read and write
314F000
heap
page read and write
B20000
heap
page read and write
314F000
heap
page read and write
20BFF000
direct allocation
page read and write
4B20000
heap
page read and write
313F000
heap
page read and write
506D000
heap
page read and write
B36000
heap
page read and write
313F000
heap
page read and write
7F96F000
direct allocation
page read and write
750000
heap
page read and write
19D000
stack
page read and write
21440000
heap
page read and write
7DB000
heap
page read and write
314F000
heap
page read and write
3124000
heap
page read and write
7F7000
heap
page read and write
88C000
stack
page read and write
20C38000
direct allocation
page read and write
2E6F000
stack
page read and write
2FD0000
heap
page read and write
7D5000
heap
page read and write
4DB0000
direct allocation
page read and write
3125000
heap
page read and write
314F000
heap
page read and write
E30000
unkown
page readonly
314F000
heap
page read and write
24D6000
remote allocation
page execute and read and write
15D000
stack
page read and write
367F000
stack
page read and write
2E9B000
heap
page read and write
3126000
heap
page read and write
7C5000
heap
page read and write
476000
unkown
page execute and read and write
E7A000
unkown
page readonly
4DDE000
stack
page read and write
3125000
heap
page read and write
314F000
heap
page read and write
3125000
heap
page read and write
4D2A000
stack
page read and write
2B0C000
stack
page read and write
E31000
unkown
page execute read
33BA000
heap
page read and write
93E000
stack
page read and write
2DAE000
stack
page read and write
70E000
stack
page read and write
7BA000
heap
page read and write
314F000
heap
page read and write
2FD0000
heap
page read and write
314F000
heap
page read and write
20D3E000
stack
page execute and read and write
215BF000
stack
page read and write
314F000
heap
page read and write
313F000
heap
page read and write
66E000
stack
page read and write
2996000
remote allocation
page execute and read and write
313F000
heap
page read and write
7F957000
direct allocation
page read and write
3126000
heap
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
840000
unkown
page readonly
314F000
heap
page read and write
7E3000
heap
page read and write
21A54000
heap
page read and write
21470000
remote allocation
page read and write
314F000
heap
page read and write
4D6E000
stack
page read and write
3123000
heap
page read and write
21BB0000
heap
page read and write
E5E000
unkown
page read and write
2EAB000
direct allocation
page execute and read and write
314F000
heap
page read and write
313F000
heap
page read and write
314F000
heap
page read and write
7EA60000
direct allocation
page read and write
2366000
direct allocation
page read and write
7FCD0000
direct allocation
page read and write
314F000
heap
page read and write
67A000
stack
page read and write
314F000
heap
page read and write
314F000
heap
page read and write
247A000
direct allocation
page read and write
9B000
stack
page read and write
2440000
direct allocation
page read and write
There are 1171 hidden memdumps, click here to show them.