IOC Report
jyU2NpOg5L.exe

loading gif

Files

File Path
Type
Category
Malicious
jyU2NpOg5L.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\ET Ammeter Side 10.7.46\ET Ammeter Side 10.7.46.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-008N6.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-09E0C.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-4CRJH.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-73912.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-7KAH0.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-7T2P6.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-8PQMK.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-9DL1V.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-B5LL1.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-CC1JP.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-DP48L.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-H0NOD.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-JA411.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-LDF51.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-PQQIR.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-RVLO5.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-TBLNP.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-UFRG7.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-V1IGP.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-VUI7C.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgcc_s_dw2-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgdk-win32-2.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgdk_pixbuf-2.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgdkmm-2.4-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libglibmm-2.4-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgmodule-2.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgobject-2.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgomp-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libintl-8.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libjpeg-8.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\liblcms2-2.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpango-1.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpangocairo-1.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpangoft2-1.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpangomm-1.4-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpangowin32-1.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpixman-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\librsvg-2-2.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libsigc-2.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libtiff-5.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\is-O41ML.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-PEK7B.tmp\_isetup\_RegDLL.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-PEK7B.tmp\_isetup\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-PEK7B.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\et107it46.dat
data
dropped
C:\ProgramData\et107rc46.dat
data
dropped
C:\ProgramData\et107resa.dat
ASCII text, with no line terminators
dropped
C:\ProgramData\et107resb.dat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-95O1F.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-9FN1B.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-9UPQ4.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-I1MM7.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-NCE8H.tmp
data
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-P6NAN.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-QT7KU.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-VB2TG.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\libgraphite2.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\libharfbuzz-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\liblzma-5.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\libpcre-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\libpng16-16.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\libwinpthread-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\unins000.dat
InnoSetup Log Jenny Video Converter, version 0x30, 5910 bytes, 767668\user, "C:\Users\user\AppData\Local\Jenny Video Converter"
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\zlib1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-PEK7B.tmp\_isetup\_shfoldr.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
There are 60 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\jyU2NpOg5L.exe
"C:\Users\user\Desktop\jyU2NpOg5L.exe"
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
"C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe" -i
malicious
C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp
"C:\Users\user\AppData\Local\Temp\is-8RF35.tmp\jyU2NpOg5L.tmp" /SL5="$10454,4254940,54272,C:\Users\user\Desktop\jyU2NpOg5L.exe"

URLs

Name
IP
Malicious
http://gwbnnsd.com/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c445db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c0ea929c3a
45.155.249.117
malicious
http://gwbnnsd.com/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b416e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993bc8689017
45.155.249.117
malicious
gwbnnsd.com
malicious
http://bfjiqqr.com/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c445db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c0ea929c3a
185.196.8.214
malicious
http://www.innosetup.com/
unknown
http://tukaani.org/
unknown
http://www.remobjects.com/psU
unknown
http://tukaani.org/xz/
unknown
http://mingw-w64.sourceforge.net/X
unknown
http://45.155.249.117/
unknown
http://45.155.249.117/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee9481
unknown
http://45.155.249.117/uFd
unknown
http://www.remobjects.com/ps
unknown
http://fsf.org/
unknown
http://185.196.8.214/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df1
unknown
http://45.155.249.117/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df
unknown
http://www.gnu.org/licenses/
unknown
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bfjiqqr.com
185.196.8.214
malicious
gwbnnsd.com
45.155.249.117
malicious

IPs

IP
Domain
Country
Malicious
45.155.249.117
gwbnnsd.com
Germany
malicious
185.196.8.214
bfjiqqr.com
Switzerland
malicious
89.105.201.183
unknown
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\SmallTour
et_ammeter_side_i46_8
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2CCE000
heap
page read and write
malicious
2D71000
direct allocation
page execute and read and write
malicious
73F000
heap
page read and write
499000
unkown
page read and write
632000
unkown
page write copy
554000
heap
page read and write
A02000
direct allocation
page read and write
554000
heap
page read and write
554000
heap
page read and write
315E000
heap
page read and write
2168000
direct allocation
page read and write
2360000
direct allocation
page read and write
411000
unkown
page readonly
409000
unkown
page execute and read and write
2320000
heap
page read and write
2DAA000
direct allocation
page execute and read and write
607F000
direct allocation
page read and write
250E000
stack
page read and write
96000
stack
page read and write
2F5B000
stack
page read and write
554000
heap
page read and write
3434000
heap
page read and write
2290000
direct allocation
page read and write
218C000
direct allocation
page read and write
40B000
unkown
page write copy
554000
heap
page read and write
554000
heap
page read and write
554000
heap
page read and write
49D000
unkown
page write copy
740000
heap
page read and write
2F9E000
stack
page read and write
5F72000
direct allocation
page read and write
554000
heap
page read and write
555000
heap
page read and write
713000
heap
page read and write
57F0000
trusted library allocation
page read and write
6B0000
heap
page read and write
4D0000
heap
page read and write
2680000
direct allocation
page read and write
357F000
stack
page read and write
2550000
heap
page read and write
33F0000
heap
page read and write
4AB000
unkown
page readonly
400000
unkown
page execute and read and write
554000
heap
page read and write
2571000
heap
page read and write
554000
heap
page read and write
58B1000
heap
page read and write
10000000
unkown
page readonly
689000
heap
page read and write
2689000
direct allocation
page read and write
2168000
direct allocation
page read and write
554000
heap
page read and write
554000
heap
page read and write
58B1000
heap
page read and write
554000
heap
page read and write
554000
heap
page read and write
400000
unkown
page readonly
554000
heap
page read and write
19D000
stack
page read and write
554000
heap
page read and write
6FF000
heap
page read and write
749000
heap
page read and write
4AB000
unkown
page readonly
24AE000
stack
page read and write
2290000
direct allocation
page read and write
710000
heap
page read and write
6BA000
heap
page read and write
554000
heap
page read and write
9C000
stack
page read and write
5F78000
direct allocation
page read and write
554000
heap
page read and write
30DE000
stack
page read and write
400000
unkown
page readonly
2CBD000
stack
page read and write
713000
heap
page read and write
2130000
direct allocation
page read and write
2AC8000
heap
page read and write
400000
unkown
page readonly
2520000
heap
page read and write
554000
heap
page read and write
599000
unkown
page execute and write copy
6FA000
heap
page read and write
58B1000
heap
page read and write
890000
heap
page read and write
36FF000
stack
page read and write
554000
heap
page read and write
2144000
direct allocation
page read and write
2131000
direct allocation
page read and write
58F000
unkown
page execute and write copy
587000
unkown
page execute and write copy
401000
unkown
page execute read
5F74000
direct allocation
page read and write
554000
heap
page read and write
2157000
direct allocation
page read and write
554000
heap
page read and write
B08000
heap
page read and write
3120000
heap
page read and write
75B000
heap
page read and write
554000
heap
page read and write
401000
unkown
page execute read
554000
heap
page read and write
430000
heap
page read and write
585000
unkown
page execute and write copy
9B000
stack
page read and write
347E000
stack
page read and write
3742000
heap
page read and write
554000
heap
page read and write
2170000
direct allocation
page read and write
680000
heap
page read and write
35BF000
stack
page read and write
31DF000
stack
page read and write
411000
unkown
page readonly
58B1000
heap
page read and write
630000
unkown
page write copy
680000
direct allocation
page execute and read and write
B4D000
heap
page read and write
57F0000
heap
page read and write
3700000
heap
page read and write
555000
heap
page read and write
5F76000
direct allocation
page read and write
554000
heap
page read and write
554000
heap
page read and write
554000
heap
page read and write
554000
heap
page read and write
589000
unkown
page execute and write copy
5F7C000
direct allocation
page read and write
2260000
heap
page read and write
554000
heap
page read and write
34BE000
stack
page read and write
710000
heap
page read and write
554000
heap
page read and write
4D0000
heap
page read and write
554000
heap
page read and write
5C0000
heap
page read and write
741000
heap
page read and write
35FE000
stack
page read and write
2329000
heap
page read and write
40D000
unkown
page write copy
2138000
direct allocation
page read and write
713000
heap
page read and write
5DF0000
direct allocation
page read and write
321E000
stack
page read and write
2360000
direct allocation
page read and write
4C0000
heap
page read and write
554000
heap
page read and write
583000
unkown
page execute and write copy
401000
unkown
page execute read
3381000
heap
page read and write
58B000
unkown
page execute and write copy
554000
heap
page read and write
554000
heap
page read and write
A00000
direct allocation
page read and write
73F000
heap
page read and write
2124000
direct allocation
page read and write
3376000
heap
page read and write
40B000
unkown
page read and write
22B4000
heap
page read and write
73F000
heap
page read and write
713000
heap
page read and write
554000
heap
page read and write
2325000
heap
page read and write
217C000
direct allocation
page read and write
5F88000
direct allocation
page read and write
3120000
direct allocation
page read and write
3436000
heap
page read and write
21F4000
direct allocation
page read and write
A30000
heap
page read and write
3420000
direct allocation
page read and write
554000
heap
page read and write
59EF000
stack
page read and write
5F90000
direct allocation
page read and write
2250000
heap
page read and write
420000
heap
page read and write
860000
heap
page read and write
A50000
heap
page read and write
3321000
heap
page read and write
49B000
unkown
page read and write
554000
heap
page read and write
309F000
stack
page read and write
B43000
heap
page read and write
73F000
heap
page read and write
62D000
unkown
page readonly
9E0000
direct allocation
page read and write
B2C000
heap
page read and write
554000
heap
page read and write
215C000
direct allocation
page read and write
554000
heap
page read and write
18D000
stack
page read and write
58B1000
heap
page read and write
400000
unkown
page readonly
3370000
heap
page read and write
499000
unkown
page write copy
10001000
unkown
page execute read
22B0000
heap
page read and write
550000
heap
page read and write
401000
unkown
page execute and write copy
696000
unkown
page readonly
10002000
unkown
page readonly
73F000
heap
page read and write
639000
unkown
page readonly
554000
heap
page read and write
5F7E000
direct allocation
page read and write
5A1000
unkown
page execute and write copy
401000
unkown
page execute read
554000
heap
page read and write
27E0000
trusted library allocation
page read and write
880000
heap
page read and write
554000
heap
page read and write
713000
heap
page read and write
2120000
direct allocation
page read and write
2E5C000
stack
page read and write
9F0000
direct allocation
page read and write
2158000
direct allocation
page read and write
58D000
unkown
page execute and write copy
A10000
direct allocation
page read and write
2700000
direct allocation
page read and write
331E000
stack
page read and write
49A000
unkown
page write copy
5B3000
unkown
page execute and write copy
5F7A000
direct allocation
page read and write
2670000
heap
page read and write
68E000
heap
page read and write
400000
unkown
page readonly
2890000
heap
page read and write
554000
heap
page read and write
19C000
stack
page read and write
2150000
direct allocation
page read and write
5FA2000
direct allocation
page read and write
6021000
direct allocation
page read and write
3320000
heap
page read and write
A58000
heap
page read and write
23F0000
direct allocation
page read and write
710000
heap
page read and write
554000
heap
page read and write
35BE000
stack
page read and write
218F000
direct allocation
page read and write
2BBE000
stack
page read and write
6BE000
heap
page read and write
24C0000
heap
page read and write
312E000
direct allocation
page read and write
3120000
direct allocation
page read and write
554000
heap
page read and write
554000
heap
page read and write
554000
heap
page read and write
554000
heap
page read and write
There are 236 hidden memdumps, click here to show them.