IOC Report
ZFllSoXpoT.exe

loading gif

Files

File Path
Type
Category
Malicious
ZFllSoXpoT.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\ET Ammeter Side 10.7.46\ET Ammeter Side 10.7.46.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-1GTV3.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-2700D.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-4NH58.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-546FI.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-6D3ET.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-802JP.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-89P6A.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-A3JAA.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-C5452.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-CJ5EH.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-GVVRD.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-HU6GR.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-K6NUN.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-KPRR4.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-LKHV4.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-OBUNB.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-PC21V.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-RSP19.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-SKU3B.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-V1USB.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgcc_s_dw2-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgdk-win32-2.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgdk_pixbuf-2.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgdkmm-2.4-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libglibmm-2.4-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgmodule-2.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgobject-2.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgomp-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libintl-8.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libjpeg-8.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\liblcms2-2.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpango-1.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpangocairo-1.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpangoft2-1.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpangomm-1.4-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpangowin32-1.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpixman-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\librsvg-2-2.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libsigc-2.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libtiff-5.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\is-GTTMJ.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-11LMP.tmp\_isetup\_RegDLL.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-11LMP.tmp\_isetup\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-11LMP.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\ProgramData\et107it46.dat
data
dropped
C:\ProgramData\et107rc46.dat
data
dropped
C:\ProgramData\et107resa.dat
ASCII text, with no line terminators
dropped
C:\ProgramData\et107resb.dat
ASCII text, with no line terminators
dropped
C:\ProgramData\regid.1991-06.com.microsoft\regid.1991-06.com.microsoft_Windows-10-Pro.swidtag
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-68EAM.tmp
data
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-J93O6.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-JNPGG.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-K6ASR.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-K7E1C.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-K7K0E.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-QGIC5.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-UNA71.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\libgraphite2.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\libharfbuzz-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\liblzma-5.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\libpcre-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\libpng16-16.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\libwinpthread-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\unins000.dat
InnoSetup Log Jenny Video Converter, version 0x30, 6042 bytes, 210979\user, "C:\Users\user\AppData\Local\Jenny Video Converter"
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\zlib1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-11LMP.tmp\_isetup\_shfoldr.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
There are 62 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ZFllSoXpoT.exe
"C:\Users\user\Desktop\ZFllSoXpoT.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k LocalService -s W32Time
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
"C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe" -i
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
malicious
C:\Users\user\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp
"C:\Users\user~1\AppData\Local\Temp\is-J24J8.tmp\ZFllSoXpoT.tmp" /SL5="$10408,4236485,54272,C:\Users\user\Desktop\ZFllSoXpoT.exe"
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
csnzndu.net
malicious
http://csnzndu.net/search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928e4f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e54d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bcd6b9317
185.208.158.248
malicious
http://csnzndu.net/search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978f771ea771795af8e05c445db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c0ef919f3a
185.208.158.248
malicious
http://www.innosetup.com/
unknown
http://tukaani.org/
unknown
http://www.remobjects.com/psU
unknown
http://tukaani.org/xz/
unknown
http://mingw-w64.sourceforge.net/X
unknown
http://185.208.158.248/search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12eab517aa5c96bd86e8928
unknown
http://185.208.158.248/search/?q=67e28dd86f09f429110aa5197c27d78406abdd88be4b12ebb517aa5c96bd86ed82d
unknown
http://www.remobjects.com/ps
unknown
http://fsf.org/
unknown
http://standards.iso.org/iso/19770/-2/2009/schema.xsd
unknown
http://www.gnu.org/licenses/
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
csnzndu.net
185.208.158.248
malicious
time.windows.com
unknown

IPs

IP
Domain
Country
Malicious
185.208.158.248
csnzndu.net
Switzerland
malicious
89.105.201.183
unknown
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
STATE
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\Config
LastKnownGoodTime
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
EstimatedSize
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Security
c688cf83-9945-5ff6-0e1e-1ff1f8a2ec9a
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\SmallTour
et_ammeter_side_i46_12
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2E21000
direct allocation
page execute and read and write
malicious
2D75000
heap
page read and write
malicious
1C9885E0000
heap
page read and write
59F000
unkown
page execute and write copy
27B4EDC0000
remote allocation
page read and write
27B4E858000
heap
page read and write
2784000
heap
page read and write
8F0000
direct allocation
page read and write
19C000
stack
page read and write
401000
unkown
page execute read
20A1D932000
heap
page read and write
26D00A40000
heap
page read and write
27B4E630000
heap
page read and write
1D207FB000
stack
page read and write
20A1D802000
heap
page read and write
6B8CF5B000
stack
page read and write
1D20D7D000
stack
page read and write
570000
heap
page read and write
1C988616000
heap
page read and write
7F5000
heap
page read and write
26D009D0000
heap
page read and write
3710000
heap
page read and write
2130000
direct allocation
page read and write
27B4E813000
heap
page read and write
259C000
stack
page read and write
76A277E000
unkown
page readonly
822000
heap
page read and write
26E0000
direct allocation
page read and write
24D0000
heap
page read and write
20A1D048000
heap
page read and write
591000
unkown
page execute and write copy
1C988660000
heap
page read and write
6F9CBFD000
stack
page read and write
6F0000
heap
page read and write
20A1D016000
heap
page read and write
26D01215000
heap
page read and write
5A5000
unkown
page execute and write copy
6F9CF7D000
stack
page read and write
26D00A5E000
heap
page read and write
21C4000
direct allocation
page read and write
790000
heap
page read and write
20A1D680000
trusted library allocation
page read and write
17931E28000
heap
page read and write
328E000
stack
page read and write
33A2000
heap
page read and write
7F5000
heap
page read and write
401000
unkown
page execute read
6F9C2FE000
stack
page read and write
401000
unkown
page execute read
822000
heap
page read and write
6F9C47E000
stack
page read and write
360E000
stack
page read and write
10001000
unkown
page execute read
1D2147E000
unkown
page readonly
8F2000
direct allocation
page read and write
33C8000
heap
page read and write
2148000
direct allocation
page read and write
400000
unkown
page readonly
324F000
stack
page read and write
76A15AB000
stack
page read and write
690000
heap
page read and write
1C98862D000
heap
page read and write
696000
unkown
page readonly
30F0000
direct allocation
page read and write
400000
unkown
page readonly
5DC0000
direct allocation
page read and write
20A1D013000
heap
page read and write
26D00A2B000
heap
page read and write
2235000
heap
page read and write
26D00A00000
heap
page read and write
76A247B000
stack
page read and write
1C988800000
heap
page read and write
9C000
stack
page read and write
3393000
heap
page read and write
216F000
direct allocation
page read and write
27B4E710000
heap
page read and write
6F9C3FE000
unkown
page readonly
20A1D037000
heap
page read and write
6F9C1FE000
unkown
page readonly
76A217E000
unkown
page readonly
340C000
heap
page read and write
27B4E802000
heap
page read and write
281E000
heap
page read and write
6F9B91B000
stack
page read and write
17931E13000
heap
page read and write
8A0000
heap
page read and write
572F000
stack
page read and write
290D000
stack
page read and write
2108000
direct allocation
page read and write
20F0000
direct allocation
page read and write
9B000
stack
page read and write
26D01202000
heap
page read and write
3390000
heap
page read and write
5DC2000
direct allocation
page read and write
AD8000
heap
page read and write
1D2167E000
unkown
page readonly
26D00B00000
heap
page read and write
76A257E000
unkown
page readonly
37D6000
heap
page read and write
7DE000
heap
page read and write
1C988613000
heap
page read and write
3451000
heap
page read and write
582F000
stack
page read and write
7E1000
heap
page read and write
5A9000
unkown
page execute and write copy
BC3000
heap
page read and write
27B4E860000
heap
page read and write
4AB000
unkown
page readonly
59D000
unkown
page execute and write copy
5A0000
heap
page read and write
8D0000
direct allocation
page read and write
79E000
heap
page read and write
49D000
unkown
page write copy
6C0000
heap
page read and write
10002000
unkown
page readonly
5DA4000
direct allocation
page read and write
35CF000
stack
page read and write
27B4E84A000
heap
page read and write
5DBA000
direct allocation
page read and write
370F000
stack
page read and write
AD0000
heap
page read and write
2140000
direct allocation
page read and write
400000
unkown
page readonly
30F0000
direct allocation
page read and write
593000
unkown
page execute and write copy
BCC000
heap
page read and write
597000
unkown
page execute and write copy
2138000
direct allocation
page read and write
7EA000
heap
page read and write
1C988602000
heap
page read and write
6B8D7FE000
unkown
page readonly
6F9C4FE000
unkown
page readonly
1C9888E0000
heap
page read and write
20A1D926000
heap
page read and write
409000
unkown
page execute and read and write
400000
unkown
page readonly
76A267E000
stack
page read and write
49B000
unkown
page read and write
216F000
direct allocation
page read and write
24AE000
stack
page read and write
7F1000
heap
page read and write
2330000
direct allocation
page read and write
A6E000
stack
page read and write
76A1B76000
stack
page read and write
20A1D000000
heap
page read and write
58A000
heap
page read and write
430000
heap
page read and write
900000
direct allocation
page read and write
26D01200000
heap
page read and write
1C988637000
heap
page read and write
7F1000
heap
page read and write
25D0000
heap
page read and write
314E000
stack
page read and write
26D00A73000
heap
page read and write
823000
heap
page read and write
17931DE0000
heap
page read and write
401000
unkown
page execute read
580000
heap
page read and write
20A1D0AD000
heap
page read and write
27B4E860000
heap
page read and write
27B4E82B000
heap
page read and write
499000
unkown
page write copy
58E000
heap
page read and write
2720000
heap
page read and write
33BC000
heap
page read and write
58B000
unkown
page execute and write copy
5DD0000
direct allocation
page read and write
780000
direct allocation
page read and write
2920000
heap
page read and write
76A1C7E000
unkown
page readonly
1D20F7E000
stack
page read and write
17931E02000
heap
page read and write
499000
unkown
page read and write
BAF000
heap
page read and write
5A7000
unkown
page execute and write copy
25F1000
heap
page read and write
27B4E902000
heap
page read and write
24E0000
direct allocation
page read and write
6B8D5FE000
unkown
page readonly
1D2157E000
stack
page read and write
6F4000
heap
page read and write
2E5A000
direct allocation
page execute and read and write
27B4E822000
heap
page read and write
5B31000
heap
page read and write
26D009A0000
heap
page read and write
300E000
stack
page read and write
2770000
trusted library allocation
page read and write
1D20E7E000
unkown
page readonly
40D000
unkown
page write copy
822000
heap
page read and write
31B0000
heap
page read and write
26D00A76000
heap
page read and write
40B000
unkown
page read and write
2188000
direct allocation
page read and write
1D2137C000
stack
page read and write
5DD8000
direct allocation
page read and write
1C988658000
heap
page read and write
1C988D70000
trusted library allocation
page read and write
1C988702000
heap
page read and write
20A1D102000
heap
page read and write
5DCA000
direct allocation
page read and write
18E000
stack
page read and write
27B4EDC0000
remote allocation
page read and write
26D01130000
trusted library allocation
page read and write
6F9C7FE000
unkown
page readonly
6F9CA7E000
stack
page read and write
1C988600000
heap
page read and write
76A227E000
stack
page read and write
630000
unkown
page write copy
7D5000
heap
page read and write
27B4EDA0000
trusted library allocation
page read and write
26D009C0000
heap
page read and write
920000
heap
page read and write
A90000
heap
page read and write
B9F000
heap
page read and write
17931E26000
heap
page read and write
B8A000
heap
page read and write
6F9C8FD000
stack
page read and write
6F9CCFE000
unkown
page readonly
FC4637F000
stack
page read and write
26D00A8D000
heap
page read and write
400000
unkown
page readonly
96000
stack
page read and write
1C988664000
heap
page read and write
7F5000
heap
page read and write
1D2127E000
unkown
page readonly
17931E00000
heap
page read and write
17931E2B000
heap
page read and write
37D8000
heap
page read and write
49A000
unkown
page write copy
2FCB000
stack
page read and write
76A237E000
unkown
page readonly
411000
unkown
page readonly
2114000
direct allocation
page read and write
20A1D068000
heap
page read and write
420000
heap
page read and write
27B4E83F000
heap
page read and write
26D00B13000
heap
page read and write
5DC6000
direct allocation
page read and write
26D00A02000
heap
page read and write
26D00A4B000
heap
page read and write
40B000
unkown
page write copy
7F5000
heap
page read and write
780000
direct allocation
page read and write
27B4E800000
heap
page read and write
6F9C6FE000
stack
page read and write
79A000
heap
page read and write
215C000
direct allocation
page read and write
31B0000
trusted library allocation
page read and write
30FE000
direct allocation
page read and write
20F4000
direct allocation
page read and write
7BD000
heap
page read and write
FC4667C000
stack
page read and write
401000
unkown
page execute and write copy
62D000
unkown
page readonly
59B000
unkown
page execute and write copy
82B000
heap
page read and write
26D00A81000
heap
page read and write
6F9CFFE000
unkown
page readonly
697000
heap
page read and write
411000
unkown
page readonly
34CE000
stack
page read and write
3380000
heap
page read and write
2101000
direct allocation
page read and write
20A1D023000
heap
page read and write
6F9C5FE000
unkown
page readonly
5E61000
direct allocation
page read and write
20A1D048000
heap
page read and write
20A1CEF0000
heap
page read and write
20A1D087000
heap
page read and write
8E0000
direct allocation
page read and write
20A1D902000
heap
page read and write
334E000
stack
page read and write
27B4EE02000
trusted library allocation
page read and write
17931D00000
heap
page read and write
7F1000
heap
page read and write
17931F02000
heap
page read and write
26D00A13000
heap
page read and write
6B8D6FE000
stack
page read and write
2148000
direct allocation
page read and write
17931E45000
heap
page read and write
2150000
direct allocation
page read and write
5EBF000
direct allocation
page read and write
6F9C57E000
stack
page read and write
19D000
stack
page read and write
2790000
direct allocation
page read and write
26D00A64000
heap
page read and write
27B4E610000
heap
page read and write
1C988648000
heap
page read and write
17932602000
trusted library allocation
page read and write
6B0000
heap
page read and write
27B4E849000
heap
page read and write
639000
unkown
page readonly
632000
unkown
page write copy
27B4E828000
heap
page read and write
339D000
heap
page read and write
310F000
stack
page read and write
2330000
direct allocation
page read and write
20A1D033000
heap
page read and write
6B8D4FC000
stack
page read and write
17932470000
trusted library allocation
page read and write
8C0000
heap
page read and write
4AB000
unkown
page readonly
26D00A3A000
heap
page read and write
1D2107E000
unkown
page readonly
5DB8000
direct allocation
page read and write
FC4607B000
stack
page read and write
2230000
heap
page read and write
30F0000
heap
page read and write
5AF000
unkown
page execute and write copy
2D6E000
stack
page read and write
5DD6000
direct allocation
page read and write
10000000
unkown
page readonly
822000
heap
page read and write
32B0000
direct allocation
page read and write
330E000
stack
page read and write
5DD4000
direct allocation
page read and write
26D00B02000
heap
page read and write
FC4647B000
stack
page read and write
338F000
stack
page read and write
740000
heap
page read and write
4E0000
heap
page read and write
FC4657E000
stack
page read and write
6F9C9FE000
unkown
page readonly
5DCC000
direct allocation
page read and write
17931CE0000
heap
page read and write
7F5000
heap
page read and write
20A1CF10000
heap
page read and write
2780000
heap
page read and write
4C0000
heap
page read and write
5C30000
direct allocation
page read and write
2100000
direct allocation
page read and write
2239000
heap
page read and write
5B30000
heap
page read and write
2137000
direct allocation
page read and write
213C000
direct allocation
page read and write
5DDE000
direct allocation
page read and write
216C000
direct allocation
page read and write
20A1D92E000
heap
page read and write
1C988E02000
trusted library allocation
page read and write
26E9000
direct allocation
page read and write
696000
heap
page read and write
20A1CFF0000
heap
page read and write
20A1D93A000
heap
page read and write
76A1E7B000
stack
page read and write
17931E3F000
heap
page read and write
27B4EDC0000
remote allocation
page read and write
76A1F7E000
unkown
page readonly
20A1D900000
heap
page read and write
822000
heap
page read and write
76A207E000
stack
page read and write
5DCE000
direct allocation
page read and write
1D2117E000
stack
page read and write
670000
direct allocation
page execute and read and write
589000
unkown
page execute and write copy
6F9C0FD000
stack
page read and write
5A1000
unkown
page execute and write copy
6F9CAFE000
unkown
page readonly
7F2000
heap
page read and write
400000
unkown
page execute and read and write
There are 350 hidden memdumps, click here to show them.