IOC Report
N6jsQ3XNNX.exe

loading gif

Files

File Path
Type
Category
Malicious
N6jsQ3XNNX.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\ET Ammeter Side 10.7.45\ET Ammeter Side 10.7.45.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-0NOE7.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-19DMT.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-3L92A.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-8FEA4.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-8J8L1.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-8PPAH.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-CCK3H.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-D0HIN.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-DDT59.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-E27ND.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-FABCG.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-GR40U.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-I6MFQ.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-IR87B.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-KK58F.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-O680T.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-P1MHN.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-R14KT.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-R59QM.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\is-S9SIF.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32_64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgcc_s_dw2-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgdk-win32-2.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgdk_pixbuf-2.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgdkmm-2.4-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libglibmm-2.4-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgmodule-2.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgobject-2.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libgomp-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libintl-8.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libjpeg-8.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\liblcms2-2.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpango-1.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpangocairo-1.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpangoft2-1.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpangomm-1.4-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpangowin32-1.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libpixman-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\librsvg-2-2.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libsigc-2.0-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\libtiff-5.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\is-SAKD7.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-PNPJE.tmp\N6jsQ3XNNX.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-SQ448.tmp\_isetup\_RegDLL.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-SQ448.tmp\_isetup\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-SQ448.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\et107it45.dat
data
dropped
C:\ProgramData\et107rc45.dat
data
dropped
C:\ProgramData\et107resa.dat
ASCII text, with no line terminators
dropped
C:\ProgramData\et107resb.dat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-73S5T.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-7MVDI.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-AUN77.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-CK3T2.tmp
data
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-G1ORK.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-MCN70.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-SBF1H.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\is-SPPOJ.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\libgraphite2.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\libharfbuzz-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\liblzma-5.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\libpcre-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\libpng16-16.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\libwinpthread-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\uninstall\unins000.dat
InnoSetup Log Jenny Video Converter, version 0x30, 6034 bytes, 760639\user, "C:\Users\user\AppData\Local\Jenny Video Converter"
dropped
C:\Users\user\AppData\Local\Jenny Video Converter\zlib1.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-SQ448.tmp\_isetup\_shfoldr.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
There are 60 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\N6jsQ3XNNX.exe
"C:\Users\user\Desktop\N6jsQ3XNNX.exe"
malicious
C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32_64.exe
"C:\Users\user\AppData\Local\Jenny Video Converter\jennyvideoconverter32_64.exe" -i
malicious
C:\Users\user\AppData\Local\Temp\is-PNPJE.tmp\N6jsQ3XNNX.tmp
"C:\Users\user\AppData\Local\Temp\is-PNPJE.tmp\N6jsQ3XNNX.tmp" /SL5="$203BE,4230882,54272,C:\Users\user\Desktop\N6jsQ3XNNX.exe"
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager

URLs

Name
IP
Malicious
http://diuzout.info/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf712c5ec93993c
185.208.158.248
malicious
http://diuzout.info/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d993ece699511
185.208.158.248
malicious
diuzout.info
malicious
http://www.innosetup.com/
unknown
http://185.208.158.248/s
unknown
http://tukaani.org/
unknown
http://185.208.158.248/search/?q=67e28dd83d5df22
unknown
http://31.214.157.226/rand
89.105.201.183
http://www.remobjects.com/psU
unknown
http://tukaani.org/xz/
unknown
http://185.208.158.248/search/?q=67e28dd83d5df220160
unknown
http://185.208.158.248/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12e
unknown
http://mingw-w64.sourceforge.net/X
unknown
http://185.208.158.248/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82d
unknown
http://185.208.158.248/search/?q=67e28dd83d5df2201606a51?a
unknown
http://185.208.158.248/search/?qbn1
unknown
http://www.remobjects.com/ps
unknown
http://fsf.org/
unknown
http://185.208.158.248/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5
unknown
http://185.208.158.248/search/?q
unknown
http://185.208.158.248/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948
unknown
http://185.208.158.248/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd8Yo
unknown
http://185.208.1
unknown
http://www.gnu.org/licenses/
unknown
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
diuzout.info
185.208.158.248
malicious
212.20.149.52.in-addr.arpa
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.208.158.248
diuzout.info
Switzerland
malicious
31.214.157.226
unknown
Germany
89.105.201.183
unknown
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
Inno Setup: Setup Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
Inno Setup: App Path
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
Inno Setup: Icon Group
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
Inno Setup: User
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
Inno Setup: Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
QuietUninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
InstallDate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Jenny Video Converter_is1
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\BetaTour
et_ammeter_side_i45_11
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2CD9000
heap
page read and write
malicious
2D81000
direct allocation
page execute and read and write
malicious
DF3A7FE000
unkown
page readonly
49A000
unkown
page write copy
25F0000
direct allocation
page read and write
24B4A290000
heap
page read and write
24C0000
direct allocation
page read and write
58D0000
direct allocation
page read and write
307F000
stack
page read and write
639000
unkown
page readonly
760000
heap
page read and write
5B1000
unkown
page execute and write copy
411000
unkown
page readonly
430000
heap
page read and write
854000
heap
page read and write
DF3A8FE000
stack
page read and write
2770000
heap
page read and write
24B4A42F000
heap
page read and write
24A2000
direct allocation
page read and write
2300000
heap
page read and write
9B000
stack
page read and write
400000
unkown
page readonly
30EE000
stack
page read and write
2450000
heap
page read and write
340F000
stack
page read and write
5A80000
direct allocation
page read and write
56D0000
heap
page read and write
DF3A4FE000
stack
page read and write
5A8E000
direct allocation
page read and write
420000
heap
page read and write
4AB000
unkown
page readonly
DF3A6FC000
stack
page read and write
285C000
stack
page read and write
2170000
direct allocation
page read and write
218C000
direct allocation
page read and write
24F4000
heap
page read and write
5AB000
unkown
page execute and write copy
2094000
direct allocation
page read and write
57D1000
heap
page read and write
34CE000
stack
page read and write
57D0000
heap
page read and write
5B3000
unkown
page execute and write copy
710000
heap
page read and write
6BE000
heap
page read and write
5A90000
direct allocation
page read and write
3710000
heap
page read and write
3350000
heap
page read and write
24F0000
heap
page read and write
24B4A43F000
heap
page read and write
2158000
direct allocation
page read and write
24B4A422000
heap
page read and write
2088000
direct allocation
page read and write
24B4A370000
heap
page read and write
79D000
heap
page read and write
DF3A0FD000
stack
page read and write
716000
heap
page read and write
6BA000
heap
page read and write
2250000
heap
page read and write
2710000
heap
page read and write
3180000
direct allocation
page read and write
5A8A000
direct allocation
page read and write
32CF000
stack
page read and write
2305000
heap
page read and write
2F2B000
stack
page read and write
5A88000
direct allocation
page read and write
73E000
heap
page read and write
26F0000
heap
page read and write
2CCE000
stack
page read and write
2160000
direct allocation
page read and write
40D000
unkown
page write copy
24B4A402000
heap
page read and write
2074000
direct allocation
page read and write
24B4A455000
heap
page read and write
400000
unkown
page readonly
332E000
stack
page read and write
26AE000
stack
page read and write
714000
heap
page read and write
400000
unkown
page readonly
24B4A3A0000
trusted library allocation
page read and write
26EE000
stack
page read and write
795000
heap
page read and write
73E000
heap
page read and write
4D0000
heap
page read and write
2309000
heap
page read and write
401000
unkown
page execute read
590000
heap
page read and write
560000
heap
page read and write
5AD000
unkown
page execute and write copy
10002000
unkown
page readonly
2081000
direct allocation
page read and write
37D7000
heap
page read and write
596000
heap
page read and write
706000
heap
page read and write
4AB000
unkown
page readonly
5A86000
direct allocation
page read and write
7A8000
heap
page read and write
589000
unkown
page execute and write copy
217C000
direct allocation
page read and write
770000
heap
page read and write
696000
unkown
page readonly
5A7000
unkown
page execute and write copy
499000
unkown
page write copy
499000
unkown
page read and write
267C000
heap
page read and write
597000
heap
page read and write
632000
unkown
page write copy
2310000
direct allocation
page read and write
6D5000
heap
page read and write
18D000
stack
page read and write
73E000
heap
page read and write
87E000
heap
page read and write
2080000
direct allocation
page read and write
73F000
heap
page read and write
24B4AC02000
trusted library allocation
page read and write
401000
unkown
page execute and write copy
370F000
stack
page read and write
5A8C000
direct allocation
page read and write
40B000
unkown
page read and write
24B4A413000
heap
page read and write
31CE000
stack
page read and write
5AF000
unkown
page execute and write copy
2310000
direct allocation
page read and write
899000
heap
page read and write
5B6F000
direct allocation
page read and write
401000
unkown
page execute read
2840000
trusted library allocation
page read and write
401000
unkown
page execute read
5A92000
direct allocation
page read and write
7A0000
heap
page read and write
5A9000
unkown
page execute and write copy
24B0000
heap
page read and write
2168000
direct allocation
page read and write
10000000
unkown
page readonly
62D000
unkown
page readonly
766000
heap
page read and write
49D000
unkown
page write copy
19D000
stack
page read and write
409000
unkown
page execute and read and write
79D000
heap
page read and write
58E0000
direct allocation
page read and write
5A1000
unkown
page execute and write copy
4C0000
heap
page read and write
10001000
unkown
page execute read
2540000
direct allocation
page read and write
5B11000
direct allocation
page read and write
2157000
direct allocation
page read and write
35CF000
stack
page read and write
31EF000
stack
page read and write
23A1000
heap
page read and write
3752000
heap
page read and write
796000
heap
page read and write
2144000
direct allocation
page read and write
9C000
stack
page read and write
3340000
heap
page read and write
740000
heap
page read and write
2450000
direct allocation
page read and write
40B000
unkown
page write copy
730000
heap
page read and write
DF39B7B000
stack
page read and write
780000
heap
page read and write
218F000
direct allocation
page read and write
2579000
direct allocation
page read and write
530000
heap
page read and write
6B0000
heap
page read and write
795000
heap
page read and write
790000
direct allocation
page read and write
43A000
heap
page read and write
2490000
direct allocation
page read and write
795000
heap
page read and write
5A68000
direct allocation
page read and write
DF3A5FE000
unkown
page readonly
2714000
heap
page read and write
49B000
unkown
page read and write
330E000
stack
page read and write
3414000
heap
page read and write
318E000
direct allocation
page read and write
2150000
direct allocation
page read and write
3180000
trusted library allocation
page read and write
215C000
direct allocation
page read and write
43E000
heap
page read and write
78C000
heap
page read and write
2560000
heap
page read and write
85A000
heap
page read and write
400000
unkown
page execute and read and write
2880000
heap
page read and write
21C0000
heap
page read and write
341F000
heap
page read and write
24A0000
direct allocation
page read and write
DF3A9FE000
unkown
page readonly
DF3A3FE000
unkown
page readonly
24B4A42B000
heap
page read and write
400000
unkown
page readonly
DF3A1FE000
unkown
page readonly
73F000
heap
page read and write
DF3A2FE000
stack
page read and write
360E000
stack
page read and write
79D000
heap
page read and write
24B4A400000
heap
page read and write
2DBA000
direct allocation
page execute and read and write
79D000
heap
page read and write
680000
direct allocation
page execute and read and write
2F7E000
stack
page read and write
33CD000
heap
page read and write
400000
unkown
page readonly
19C000
stack
page read and write
2450000
direct allocation
page read and write
630000
unkown
page write copy
716000
heap
page read and write
2260000
heap
page read and write
411000
unkown
page readonly
2070000
direct allocation
page read and write
24B4A270000
heap
page read and write
24B4A502000
heap
page read and write
2570000
direct allocation
page read and write
401000
unkown
page execute read
281D000
stack
page read and write
96000
stack
page read and write
716000
heap
page read and write
3180000
direct allocation
page read and write
322E000
stack
page read and write
There are 210 hidden memdumps, click here to show them.