IOC Report
etwSnBeIC2.exe

loading gif

Files

File Path
Type
Category
Malicious
etwSnBeIC2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\ET Ammeter Side 10.7.45\ET Ammeter Side 10.7.45.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-17BMK.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-1N1JF.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-2DHLG.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-3MH90.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-4IH98.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-6ES77.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-7IMBQ.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-8F8OG.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-8IPC7.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-9O8U2.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-DNMH8.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-FLG21.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-JJ6AT.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-M5TJM.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-MRRC0.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-N1N9Q.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-NESP7.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-QAKC5.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-S9L3Q.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-T7CO0.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgcc_s_dw2-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgdk-win32-2.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgdk_pixbuf-2.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgdkmm-2.4-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libglibmm-2.4-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgmodule-2.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgobject-2.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgomp-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libintl-8.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libjpeg-8.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\liblcms2-2.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpango-1.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpangocairo-1.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpangoft2-1.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpangomm-1.4-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpangowin32-1.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpixman-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\librsvg-2-2.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libsigc-2.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libtiff-5.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\is-CMV2A.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-S55QC.tmp\_isetup\_RegDLL.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-S55QC.tmp\_isetup\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-S55QC.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\et107it45.dat
data
dropped
C:\ProgramData\et107rc45.dat
data
dropped
C:\ProgramData\et107resa.dat
ASCII text, with no line terminators
dropped
C:\ProgramData\et107resb.dat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-3C13B.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-8RAC0.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-CABM6.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-E6D02.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-FH9M5.tmp
data
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-GNC2U.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-HJPUM.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-R08OU.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\libgraphite2.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\libharfbuzz-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\liblzma-5.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\libpcre-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\libpng16-16.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\libwinpthread-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\unins000.dat
InnoSetup Log Jenny Video Converter, version 0x30, 5926 bytes, 921702\user, "C:\Users\user\AppData\Local\Jenny Video Converter"
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\zlib1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-S55QC.tmp\_isetup\_shfoldr.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
There are 60 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\etwSnBeIC2.exe
"C:\Users\user\Desktop\etwSnBeIC2.exe"
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe
"C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32.exe" -i
malicious
C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp
"C:\Users\user\AppData\Local\Temp\is-MF78U.tmp\etwSnBeIC2.tmp" /SL5="$2042C,4242250,54272,C:\Users\user\Desktop\etwSnBeIC2.exe"

URLs

Name
IP
Malicious
aqplodo.ru
malicious
http://aqplodo.ru/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993acb69911f
185.208.158.248
malicious
http://aqplodo.ru/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c1e9939d32
185.208.158.248
malicious
http://www.innosetup.com/
unknown
http://185.208.1c8
unknown
http://tukaani.org/
unknown
http://www.remobjects.com/psU
unknown
http://tukaani.org/xz/
unknown
http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82d
unknown
http://mingw-w64.sourceforge.net/X
unknown
http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee948
unknown
http://www.remobjects.com/ps
unknown
http://fsf.org/
unknown
http://www.gnu.org/licenses/
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
aqplodo.ru
185.208.158.248
malicious

IPs

IP
Domain
Country
Malicious
185.208.158.248
aqplodo.ru
Switzerland
malicious
89.105.201.183
unknown
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
Inno Setup: Setup Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
Inno Setup: App Path
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
Inno Setup: Icon Group
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
Inno Setup: User
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
Inno Setup: Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
QuietUninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
InstallDate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\BetaTour
et_ammeter_side_i45_4
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2C83000
heap
page read and write
malicious
2D31000
direct allocation
page execute and read and write
malicious
544000
heap
page read and write
5D14000
direct allocation
page read and write
544000
heap
page read and write
2320000
direct allocation
page read and write
544000
heap
page read and write
544000
heap
page read and write
4B9000
heap
page read and write
5D28000
direct allocation
page read and write
4C0000
heap
page read and write
40B000
unkown
page read and write
597000
unkown
page execute and write copy
4BE000
heap
page read and write
2144000
direct allocation
page read and write
B9C000
heap
page read and write
544000
heap
page read and write
400000
unkown
page readonly
545000
heap
page read and write
544000
heap
page read and write
401000
unkown
page execute read
10001000
unkown
page execute read
544000
heap
page read and write
651000
heap
page read and write
10002000
unkown
page readonly
AA0000
heap
page read and write
544000
heap
page read and write
2730000
heap
page read and write
680000
heap
page read and write
2190000
direct allocation
page read and write
325E000
stack
page read and write
409000
unkown
page execute and read and write
400000
unkown
page readonly
56B0000
heap
page read and write
5B80000
direct allocation
page read and write
40D000
unkown
page write copy
2320000
direct allocation
page read and write
400000
unkown
page readonly
2230000
heap
page read and write
3634000
heap
page read and write
35FF000
stack
page read and write
A10000
heap
page read and write
58BC000
heap
page read and write
2640000
direct allocation
page read and write
4AB000
unkown
page readonly
544000
heap
page read and write
5A5000
unkown
page execute and write copy
2630000
heap
page read and write
B56000
heap
page read and write
D9D000
stack
page read and write
64C000
heap
page read and write
401000
unkown
page execute read
1F0000
heap
page read and write
2840000
direct allocation
page read and write
2770000
trusted library allocation
page read and write
36C0000
heap
page read and write
544000
heap
page read and write
227C000
direct allocation
page read and write
635000
heap
page read and write
544000
heap
page read and write
37C7000
heap
page read and write
9B000
stack
page read and write
544000
heap
page read and write
401000
unkown
page execute read
544000
heap
page read and write
324F000
stack
page read and write
544000
heap
page read and write
2248000
direct allocation
page read and write
89E000
stack
page read and write
430000
heap
page read and write
2088000
direct allocation
page read and write
544000
heap
page read and write
A50000
direct allocation
page read and write
30F0000
direct allocation
page read and write
5D22000
direct allocation
page read and write
49D000
unkown
page write copy
545000
heap
page read and write
2258000
direct allocation
page read and write
5771000
heap
page read and write
544000
heap
page read and write
5D1C000
direct allocation
page read and write
A40000
direct allocation
page read and write
5771000
heap
page read and write
544000
heap
page read and write
311E000
stack
page read and write
A30000
direct allocation
page read and write
28FE000
stack
page read and write
5D16000
direct allocation
page read and write
680000
heap
page read and write
2235000
heap
page read and write
544000
heap
page read and write
680000
heap
page read and write
314E000
stack
page read and write
544000
heap
page read and write
544000
heap
page read and write
545000
heap
page read and write
400000
unkown
page readonly
62D000
unkown
page readonly
19C000
stack
page read and write
10000000
unkown
page readonly
4AB000
unkown
page readonly
2258000
direct allocation
page read and write
632000
unkown
page write copy
544000
heap
page read and write
696000
unkown
page readonly
5D1A000
direct allocation
page read and write
338F000
stack
page read and write
544000
heap
page read and write
A42000
direct allocation
page read and write
33BE000
stack
page read and write
321F000
stack
page read and write
5B0000
direct allocation
page execute and read and write
5FE000
heap
page read and write
2770000
heap
page read and write
5F0000
heap
page read and write
5E0000
heap
page read and write
593000
unkown
page execute and write copy
544000
heap
page read and write
226C000
direct allocation
page read and write
544000
heap
page read and write
49A000
unkown
page write copy
30DF000
stack
page read and write
544000
heap
page read and write
630000
unkown
page write copy
5771000
heap
page read and write
5FA000
heap
page read and write
2080000
direct allocation
page read and write
654000
heap
page read and write
411000
unkown
page readonly
544000
heap
page read and write
2C8D000
heap
page read and write
34FE000
stack
page read and write
5D10000
direct allocation
page read and write
440000
heap
page read and write
5A1000
unkown
page execute and write copy
400000
unkown
page execute and read and write
2751000
heap
page read and write
367A000
heap
page read and write
2240000
direct allocation
page read and write
544000
heap
page read and write
591000
unkown
page execute and write copy
8A0000
heap
page read and write
4B0000
heap
page read and write
5771000
heap
page read and write
599000
unkown
page execute and write copy
49B000
unkown
page read and write
740000
heap
page read and write
30FE000
direct allocation
page read and write
227F000
direct allocation
page read and write
63F000
heap
page read and write
2070000
direct allocation
page read and write
544000
heap
page read and write
5A3000
unkown
page execute and write copy
544000
heap
page read and write
2190000
direct allocation
page read and write
56B0000
trusted library allocation
page read and write
B92000
heap
page read and write
5D24000
direct allocation
page read and write
544000
heap
page read and write
544000
heap
page read and write
544000
heap
page read and write
400000
unkown
page readonly
A70000
heap
page read and write
544000
heap
page read and write
5A81000
heap
page read and write
2190000
heap
page read and write
59B000
unkown
page execute and write copy
544000
heap
page read and write
544000
heap
page read and write
335E000
stack
page read and write
5D12000
direct allocation
page read and write
5880000
heap
page read and write
544000
heap
page read and write
96000
stack
page read and write
544000
heap
page read and write
544000
heap
page read and write
2EDB000
stack
page read and write
544000
heap
page read and write
5D20000
direct allocation
page read and write
4D0000
heap
page read and write
544000
heap
page read and write
34BF000
stack
page read and write
2649000
direct allocation
page read and write
544000
heap
page read and write
544000
heap
page read and write
5771000
heap
page read and write
5A80000
heap
page read and write
25FC000
stack
page read and write
224C000
direct allocation
page read and write
5E0F000
direct allocation
page read and write
2D6A000
direct allocation
page execute and read and write
36D3000
heap
page read and write
9B0000
heap
page read and write
5D1E000
direct allocation
page read and write
654000
heap
page read and write
499000
unkown
page write copy
2930000
heap
page read and write
328E000
stack
page read and write
21A4000
heap
page read and write
18D000
stack
page read and write
595000
unkown
page execute and write copy
21A0000
heap
page read and write
5A9000
unkown
page execute and write copy
544000
heap
page read and write
680000
heap
page read and write
499000
unkown
page read and write
2081000
direct allocation
page read and write
68A000
heap
page read and write
682000
heap
page read and write
544000
heap
page read and write
A20000
direct allocation
page read and write
AA8000
heap
page read and write
411000
unkown
page readonly
30F0000
direct allocation
page read and write
19D000
stack
page read and write
544000
heap
page read and write
B78000
heap
page read and write
59D000
unkown
page execute and write copy
63B000
heap
page read and write
2094000
direct allocation
page read and write
9C000
stack
page read and write
2074000
direct allocation
page read and write
40B000
unkown
page write copy
654000
heap
page read and write
401000
unkown
page execute read
401000
unkown
page execute and write copy
30F0000
direct allocation
page read and write
2610000
heap
page read and write
2239000
heap
page read and write
540000
heap
page read and write
B67000
heap
page read and write
3700000
heap
page read and write
59F000
unkown
page execute and write copy
69C000
heap
page read and write
C9F000
stack
page read and write
36D5000
heap
page read and write
654000
heap
page read and write
639000
unkown
page readonly
544000
heap
page read and write
9FE000
stack
page read and write
2540000
direct allocation
page read and write
2160000
heap
page read and write
544000
heap
page read and write
2260000
direct allocation
page read and write
5DB1000
direct allocation
page read and write
2247000
direct allocation
page read and write
5D18000
direct allocation
page read and write
544000
heap
page read and write
544000
heap
page read and write
There are 239 hidden memdumps, click here to show them.