IOC Report
jpdy1E8K4A.exe

loading gif

Files

File Path
Type
Category
Malicious
jpdy1E8K4A.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\01194HH4
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\supergroups
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\jpdy1E8K4A.exe
"C:\Users\user\Desktop\jpdy1E8K4A.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\jpdy1E8K4A.exe"
malicious
C:\Program Files (x86)\kKbTGrEVxHOXFZankeIgaOwhwKlfruYCEaqJfeLAGMkBWtzeWzCkqcexRbilms\URUrIrqwFu.exe
"C:\Program Files (x86)\kKbTGrEVxHOXFZankeIgaOwhwKlfruYCEaqJfeLAGMkBWtzeWzCkqcexRbilms\URUrIrqwFu.exe"
malicious
C:\Windows\SysWOW64\netbtugc.exe
"C:\Windows\SysWOW64\netbtugc.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.dyme.tech/h7lb/
13.248.169.48
malicious
http://www.kexweb.top/3bdq/
63.250.47.40
malicious
http://www.languagemodel.pro/nxfn/
217.70.184.50
malicious
http://www.dyme.tech/h7lb/?I4ET5=RbPHaORuq3VLsIvBIelJ5GO51GGMXVitxUtCmsRXGI6jytYd3WVHAygqsg9m4sx7IXgloFX+8G+vydQZJLP0U8wzgLDyi+d9/jciraahzpwjZL5E+FLfjf2KFU0ZNlPPutFUmc0=&5xn03=7vMx2HlPWl
13.248.169.48
malicious
http://www.languagemodel.pro/nxfn/?I4ET5=6j3CvtUhPdUgNSN+xHguQlWnRKyrmKs9GdmFQzyR6PqyVz5YOV5r49CB0ghAIxZx6PIHaKVcYUnZkN+R6pfVfWaAaU8Sg/CwIadyJZ1Vunf0ESMtavaN5FCA7KYOqo/KmyEXwiQ=&5xn03=7vMx2HlPWl
217.70.184.50
malicious
http://www.kexweb.top/3bdq/?I4ET5=mPDvA1qI3GiuntP+47r7UbinyaAdWbB61+amzFfuWlPCagi05gb63n03Sa0iFCs5HVPasI6LuL9f8nEGr4Exv0kyrqFFpmLMz7jnyzN+XheUDXt53FO2cfXJKOJNKmSe0FPHbZU=&5xn03=7vMx2HlPWl
63.250.47.40
malicious
http://www.elsupertodo.net/2jit/?5xn03=7vMx2HlPWl&I4ET5=iS4P4oRSl8BXKzGDEvFFA2xLKhJOP7i6JXAZlPSQukWhX6ryYmutle+397gP2E/7l5jfN0VXuv9esRLW6mV1SoEkaj2DIJpzLN/p7keITu3kRidpknmkeFNiZOa1jl486ZzlEj4=
148.72.152.174
malicious
http://www.nobartv6.website/pp43/
103.224.182.242
malicious
http://www.tekilla.wtf/fpzw/
172.191.244.62
malicious
http://www.tekilla.wtf/fpzw/?I4ET5=vk5QQsijTkj0pfFyU7EEWfDzTnpieIWgcHfTrVh5yCT2NPNs5yeYEP2CyzpPbJkscWMx5aBCkSlgAfiy0IyVx4v2Cu8U6PY7doS41bFIW7T/4/1mYTXkrfUCe/4cLGyNDvWcha0=&5xn03=7vMx2HlPWl
172.191.244.62
malicious
http://www.omexai.info/7xi5/
3.33.130.190
malicious
http://www.mizuquan.top/e0nr/
43.242.202.169
malicious
http://www.bola88site.one/3qit/
172.96.191.39
malicious
http://www.jobworklanka.online/ikh0/
91.184.0.200
malicious
http://www.jobworklanka.online/ikh0/?5xn03=7vMx2HlPWl&I4ET5=lvx8xqKuEeZXr5IXmtDcOSOuXgPzygssZETVjxqXK0Zv2i3/Db6zT6O/acvvHmVSaGyiGmLaE43R+XLSCAO1uL6vU7t5jilJUCYKPYTSTWzBlftPtFsf3/wj5zdrQAyp0VL/hTg=
91.184.0.200
malicious
http://www.omexai.info/7xi5/?I4ET5=ixI46zwDNWOoK0d+RZ8JuaZDY//QVGo+qsFL+v4hzxqFGT4p3+8WtoPKGUs/aT1fkDncxQRflpqJVuNQFbELAz/7PAbspGHYrJhwiAgKAJ54r5fuZ48YeCJJLAh0jfNMUyJhiqw=&5xn03=7vMx2HlPWl
3.33.130.190
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.nobartv6.website
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.elsupertodo.net/2jit/?5xn03=7vMx2HlPWl&I4ET5=iS4P4oRSl8BXKzGDEvFFA2xLKhJOP7i6JXAZlPSQukW
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.gandi.net/en/domain
unknown
https://www.ecosia.org/newtab/
unknown
https://whois.gandi.net/en/results?search=languagemodel.pro
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.elsupertodo.net
148.72.152.174
malicious
webredir.vip.gandi.net
217.70.184.50
malicious
www.nobartv6.website
103.224.182.242
malicious
www.kexweb.top
63.250.47.40
malicious
bola88site.one
172.96.191.39
malicious
www.dyme.tech
13.248.169.48
malicious
www.mizuquan.top
43.242.202.169
malicious
redirect.3dns.box
172.191.244.62
malicious
jobworklanka.online
91.184.0.200
malicious
omexai.info
3.33.130.190
malicious
natroredirect.natrocdn.com
85.159.66.93
malicious
www.tekilla.wtf
unknown
malicious
www.omexai.info
unknown
malicious
www.sailnway.net
unknown
malicious
www.woshop.online
unknown
malicious
www.languagemodel.pro
unknown
malicious
www.bola88site.one
unknown
malicious
www.jobworklanka.online
unknown
malicious
www.arlon-commerce.com
unknown
malicious
www.kxshopmr.store
unknown
malicious
There are 10 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
172.191.244.62
redirect.3dns.box
United States
malicious
63.250.47.40
www.kexweb.top
United States
malicious
13.248.169.48
www.dyme.tech
United States
malicious
91.184.0.200
jobworklanka.online
Netherlands
malicious
172.96.191.39
bola88site.one
Canada
malicious
103.224.182.242
www.nobartv6.website
Australia
malicious
217.70.184.50
webredir.vip.gandi.net
France
malicious
148.72.152.174
www.elsupertodo.net
United States
malicious
3.33.130.190
omexai.info
United States
malicious
43.242.202.169
www.mizuquan.top
Hong Kong
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
system
page execute and read and write
malicious
40E0000
unkown
page execute and read and write
malicious
3360000
trusted library allocation
page read and write
malicious
2D40000
system
page execute and read and write
malicious
5B50000
unclassified section
page execute and read and write
malicious
3310000
trusted library allocation
page read and write
malicious
7C30000
unclassified section
page execute and read and write
malicious
7130000
system
page execute and read and write
malicious
47C9000
direct allocation
page read and write
33D1000
heap
page read and write
317A000
heap
page read and write
33D1000
heap
page read and write
483E000
direct allocation
page read and write
33D1000
heap
page read and write
3FA0000
heap
page read and write
E7E000
stack
page read and write
3213000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
D90000
heap
page read and write
3213000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
20000
unkown
page readonly
850000
unkown
page readonly
3EFF000
heap
page read and write
43A0000
direct allocation
page read and write
33D1000
heap
page read and write
1CFDF190000
heap
page read and write
3FEB000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
410000
heap
page read and write
33D1000
heap
page read and write
15E000
stack
page read and write
86BE000
stack
page read and write
3213000
heap
page read and write
400000
unkown
page readonly
33D1000
heap
page read and write
3194000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
720000
unkown
page read and write
4623000
direct allocation
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
40D1000
heap
page execute and read and write
7FF5000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
46A0000
direct allocation
page read and write
3213000
heap
page read and write
3160000
heap
page read and write
3127000
heap
page read and write
312D000
heap
page read and write
33C0000
heap
page read and write
606000
heap
page read and write
43A5000
heap
page read and write
970000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
7F86000
heap
page read and write
7F9F000
heap
page read and write
7FE2000
heap
page read and write
33D1000
heap
page read and write
7F7F000
heap
page read and write
33D1000
heap
page read and write
86FF000
stack
page read and write
33D1000
heap
page read and write
758000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
3180000
heap
page read and write
33D1000
heap
page read and write
3127000
heap
page read and write
318E000
heap
page read and write
750000
heap
page read and write
31A7000
heap
page read and write
3B52000
unclassified section
page read and write
33D1000
heap
page read and write
3213000
heap
page read and write
33D1000
heap
page read and write
31B9000
heap
page read and write
2084000
heap
page read and write
33D1000
heap
page read and write
1CFE0D01000
trusted library allocation
page read and write
572C000
system
page read and write
33D1000
heap
page read and write
31C3000
heap
page read and write
4CEA9FF000
stack
page read and write
1CFE0AE0000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
3213000
heap
page read and write
36E0000
unkown
page execute and read and write
8070000
trusted library allocation
page read and write
33D1000
heap
page read and write
3128000
heap
page read and write
392D000
heap
page read and write
33D1000
heap
page read and write
950000
heap
page read and write
33D1000
heap
page read and write
34D0000
trusted library allocation
page read and write
1CFDF1DA000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
100000
heap
page read and write
33D1000
heap
page read and write
311E000
heap
page read and write
47CD000
direct allocation
page read and write
33D1000
heap
page read and write
31B2000
heap
page read and write
46A0000
direct allocation
page read and write
6098000
system
page read and write
30F0000
heap
page read and write
35BE000
stack
page read and write
4623000
direct allocation
page read and write
33D1000
heap
page read and write
3213000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
3127000
heap
page read and write
33D1000
heap
page read and write
8B4000
stack
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
460A000
unclassified section
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
313C000
heap
page read and write
36BB000
heap
page read and write
33D1000
heap
page read and write
1CFE0DCE000
trusted library allocation
page read and write
33D1000
heap
page read and write
3740000
direct allocation
page execute and read and write
33D1000
heap
page read and write
5A50000
system
page read and write
47CD000
direct allocation
page read and write
71B0000
system
page execute and read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
3202000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
1CFE0C0A000
trusted library allocation
page read and write
4A22000
system
page read and write
31EF000
heap
page read and write
33D1000
heap
page read and write
490000
unkown
page readonly
8FE000
stack
page read and write
33D1000
heap
page read and write
37FF000
stack
page read and write
3EF2000
heap
page read and write
7FA2000
heap
page read and write
1CFDF060000
system
page execute and read and write
1B0000
heap
page read and write
33D1000
heap
page read and write
8270000
heap
page read and write
33D1000
heap
page read and write
2DE0000
heap
page read and write
3B2D000
direct allocation
page execute and read and write
47CD000
direct allocation
page read and write
31F5000
heap
page read and write
2E30000
heap
page read and write
2DD0000
heap
page read and write
21F0000
unkown
page readonly
36FE000
stack
page read and write
3EEB000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
3600000
heap
page read and write
33D1000
heap
page read and write
4CFC000
system
page read and write
358E000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
4478000
unclassified section
page read and write
33D1000
heap
page read and write
3FAA000
heap
page read and write
1CFE0AF0000
trusted library allocation
page read and write
1CFE0DAC000
trusted library allocation
page read and write
163F000
stack
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
622A000
system
page read and write
33D1000
heap
page read and write
483E000
direct allocation
page read and write
4500000
direct allocation
page read and write
71A4000
system
page execute and read and write
37D000
unkown
page read and write
31F7000
heap
page read and write
39C3000
heap
page read and write
4A8000
unkown
page read and write
5DE000
stack
page read and write
3198000
heap
page read and write
33D1000
heap
page read and write
1CFE0C03000
trusted library allocation
page read and write
2CCB000
stack
page read and write
21F0000
unkown
page readonly
33D1000
heap
page read and write
4AC0000
unclassified section
page read and write
33D1000
heap
page read and write
311C000
heap
page read and write
3EE7000
heap
page read and write
317A000
heap
page read and write
3630000
trusted library allocation
page read and write
33D1000
heap
page read and write
4623000
direct allocation
page read and write
33D1000
heap
page read and write
22E0000
unkown
page execute and read and write
33D1000
heap
page read and write
DB0000
heap
page read and write
46A0000
direct allocation
page read and write
318B000
heap
page read and write
33D1000
heap
page read and write
47C9000
direct allocation
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
4AB000
unkown
page readonly
3630000
trusted library allocation
page read and write
4077000
heap
page read and write
7F9D000
heap
page read and write
9AD000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
3F90000
heap
page read and write
33D1000
heap
page read and write
1CFE0A80000
heap
page read and write
33D1000
heap
page read and write
46A0000
direct allocation
page read and write
312D000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
2E70000
heap
page read and write
E3E000
stack
page read and write
110000
heap
page read and write
3DA0000
heap
page read and write
40E2000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
4B3C000
system
page read and write
33D1000
heap
page read and write
7FE6000
heap
page read and write
3200000
heap
page read and write
4623000
direct allocation
page read and write
33D1000
heap
page read and write
482000
unkown
page readonly
97E000
heap
page read and write
33D1000
heap
page read and write
3A82000
direct allocation
page execute and read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
4623000
direct allocation
page read and write
33D1000
heap
page read and write
31E5000
heap
page read and write
3110000
heap
page read and write
1CFDF1EC000
heap
page read and write
33D1000
heap
page read and write
7FE8000
heap
page read and write
20000
unkown
page readonly
33D1000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
3BDA000
heap
page read and write
5150000
unclassified section
page execute and read and write
1CFE0AF0000
trusted library allocation
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
3723000
heap
page read and write
4AE2000
system
page read and write
33D1000
heap
page read and write
5E98000
unclassified section
page execute and read and write
491000
unkown
page write copy
DE0000
heap
page read and write
460000
unkown
page read and write
529A000
unclassified section
page read and write
40D5000
heap
page read and write
40000
unkown
page readonly
33D1000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
1F0000
unkown
page readonly
2084000
heap
page read and write
3D42000
direct allocation
page execute and read and write
33D1000
heap
page read and write
3580000
trusted library allocation
page execute and read and write
2E74000
heap
page read and write
483E000
direct allocation
page read and write
33D1000
heap
page read and write
1E0000
unkown
page readonly
490000
unkown
page write copy
758000
heap
page read and write
483E000
direct allocation
page read and write
7FDB000
heap
page read and write
33D1000
heap
page read and write
46A0000
direct allocation
page read and write
31EB000
heap
page read and write
33D1000
heap
page read and write
710000
unkown
page read and write
33D1000
heap
page read and write
40E1000
heap
page read and write
33D1000
heap
page read and write
33D0000
heap
page read and write
33D4000
heap
page read and write
33D1000
heap
page read and write
4CE91FE000
stack
page read and write
47CD000
direct allocation
page read and write
19E000
stack
page read and write
D5B000
stack
page read and write
718A000
system
page execute and read and write
4CE99FE000
stack
page read and write
33D1000
heap
page read and write
731C000
unkown
page read and write
4C52000
unclassified section
page read and write
3213000
heap
page read and write
1CFE0DBE000
trusted library allocation
page read and write
33D1000
heap
page read and write
1CFDF0DD000
system
page execute and read and write
33D1000
heap
page read and write
710000
unkown
page read and write
47C9000
direct allocation
page read and write
1CFDF200000
heap
page read and write
491000
unkown
page execute read
33D1000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
3213000
heap
page read and write
58BE000
system
page read and write
33D1000
heap
page read and write
3BAC000
unclassified section
page read and write
400000
unkown
page readonly
3127000
heap
page read and write
33D1000
heap
page read and write
7F9A000
heap
page read and write
3630000
trusted library allocation
page read and write
3F23000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
31A1000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
36B7000
heap
page read and write
449A000
unkown
page execute and read and write
71B2000
system
page execute and read and write
4F76000
unclassified section
page read and write
3A0D000
direct allocation
page execute and read and write
36EE000
stack
page read and write
8080000
trusted library allocation
page read and write
33D1000
heap
page read and write
3F49000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
5108000
unclassified section
page read and write
776000
heap
page read and write
4428000
unkown
page execute and read and write
33D1000
heap
page read and write
3A00000
direct allocation
page execute and read and write
1CFE0C00000
trusted library allocation
page read and write
1CFDF1DF000
heap
page read and write
BE0000
unkown
page readonly
7207000
system
page execute and read and write
482000
unkown
page readonly
1CFE0C21000
trusted library allocation
page read and write
33D1000
heap
page read and write
2FB0000
direct allocation
page read and write
3801000
heap
page read and write
7F8B000
heap
page read and write
483E000
direct allocation
page read and write
6550000
trusted library allocation
page read and write
600000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
31A1000
heap
page read and write
3198000
heap
page read and write
3213000
heap
page read and write
31C6000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
3310000
trusted library allocation
page read and write
3B9E000
direct allocation
page execute and read and write
33D1000
heap
page read and write
AA000
stack
page read and write
372C000
heap
page read and write
311C000
heap
page read and write
33D1000
heap
page read and write
AA000
stack
page read and write
21E0000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
47C9000
direct allocation
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
3213000
heap
page read and write
5F06000
system
page read and write
5BE2000
system
page read and write
4CE89FB000
stack
page read and write
317B000
heap
page read and write
33D1000
heap
page read and write
491000
unkown
page execute read
4750000
unclassified section
page execute and read and write
386D000
direct allocation
page execute and read and write
2CE0000
unkown
page execute and read and write
471000
unkown
page readonly
33D1000
heap
page read and write
4500000
direct allocation
page read and write
4A5000
unkown
page read and write
33D1000
heap
page read and write
30F4000
heap
page read and write
3417000
heap
page read and write
4A5000
unkown
page read and write
33D1000
heap
page read and write
43A0000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
3400000
heap
page read and write
3123000
heap
page read and write
401000
unkown
page execute read
33D1000
heap
page read and write
1F10C000
system
page read and write
1CFDF202000
heap
page read and write
400000
unkown
page readonly
38DE000
direct allocation
page execute and read and write
3202000
heap
page read and write
33D1000
heap
page read and write
471000
unkown
page readonly
3501000
heap
page read and write
318E000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
400000
unkown
page readonly
600000
heap
page read and write
E00000
direct allocation
page read and write
311E000
heap
page read and write
1AC000
stack
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
30F4000
heap
page read and write
30000
unkown
page readonly
4623000
direct allocation
page read and write
1CFDF170000
heap
page read and write
97A000
heap
page read and write
3A11000
direct allocation
page execute and read and write
1C5000
heap
page read and write
3118000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
3194000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
7F98000
heap
page read and write
3417000
heap
page read and write
33D1000
heap
page read and write
3213000
heap
page read and write
480000
unkown
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
5D74000
system
page read and write
40000
unkown
page readonly
33D1000
heap
page read and write
36AE000
stack
page read and write
76E000
heap
page read and write
33D1000
heap
page read and write
3869000
direct allocation
page execute and read and write
33D1000
heap
page read and write
1CFE0C0F000
trusted library allocation
page read and write
3ECE000
heap
page read and write
1F0000
heap
page read and write
33D1000
heap
page read and write
2D08000
stack
page read and write
7194000
system
page execute and read and write
47C9000
direct allocation
page read and write
3213000
heap
page read and write
2DE0000
heap
page read and write
33D1000
heap
page read and write
401000
unkown
page execute read
730000
unkown
page read and write
1F2CC000
system
page read and write
46A0000
direct allocation
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
47CD000
direct allocation
page read and write
33D1000
heap
page read and write
1F0000
unkown
page readonly
218F000
stack
page read and write
33D1000
heap
page read and write
3B39000
heap
page read and write
4500000
direct allocation
page read and write
33D1000
heap
page read and write
202C000
unkown
page read and write
5E0000
unkown
page readonly
33D1000
heap
page read and write
3CA0000
heap
page read and write
850000
unkown
page readonly
4A7000
unkown
page readonly
33D1000
heap
page read and write
33D1000
heap
page read and write
1F9D8000
system
page read and write
460000
unkown
page read and write
3929000
heap
page read and write
70F000
stack
page read and write
3412000
heap
page read and write
7FBF000
heap
page read and write
7FB5000
heap
page read and write
4500000
direct allocation
page read and write
33D1000
heap
page read and write
7FF0000
heap
page read and write
33D1000
heap
page read and write
31BE000
heap
page read and write
2FB0000
direct allocation
page read and write
31AC000
heap
page read and write
33D1000
heap
page read and write
3EE4000
heap
page read and write
1E0000
unkown
page readonly
490000
unkown
page read and write
33D1000
heap
page read and write
492E000
unclassified section
page read and write
2DC0000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
410000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
4CEA1FE000
stack
page read and write
33D1000
heap
page read and write
1CFE0B00000
trusted library allocation
page read and write
479C000
unclassified section
page read and write
5E0000
unkown
page readonly
483E000
direct allocation
page read and write
76B000
heap
page read and write
7F83000
heap
page read and write
D1C000
stack
page read and write
3420000
heap
page read and write
4A7000
unkown
page readonly
446E000
heap
page read and write
30000
unkown
page readonly
33D1000
heap
page read and write
3B3B000
heap
page read and write
3405000
heap
page read and write
750000
heap
page read and write
31BC000
heap
page read and write
1CFE0DC4000
trusted library allocation
page read and write
1F0B2000
system
page read and write
33D1000
heap
page read and write
3D6C000
unclassified section
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
2FB0000
direct allocation
page read and write
7FD3000
heap
page read and write
955000
heap
page read and write
33D1000
heap
page read and write
4AB000
unkown
page readonly
3A92000
unclassified section
page read and write
5F0A000
unclassified section
page execute and read and write
3213000
heap
page read and write
4DE4000
unclassified section
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
492000
unkown
page read and write
40D2000
heap
page read and write
49E000
unkown
page readonly
31D0000
heap
page read and write
33D1000
heap
page read and write
8AF000
stack
page read and write
559A000
system
page read and write
2080000
heap
page read and write
33D1000
heap
page read and write
7FB9000
heap
page read and write
7F90000
heap
page read and write
45E000
stack
page read and write
33D1000
heap
page read and write
DF0000
heap
page read and write
47C9000
direct allocation
page read and write
33D1000
heap
page read and write
7FF7000
heap
page read and write
1CFDF1D0000
heap
page read and write
33D1000
heap
page read and write
34F7000
heap
page read and write
123E000
stack
page read and write
7FAE000
heap
page read and write
3213000
heap
page read and write
33D1000
heap
page read and write
1EFF2000
system
page read and write
33D1000
heap
page read and write
49E000
unkown
page readonly
33D1000
heap
page read and write
33D1000
heap
page read and write
341A000
heap
page read and write
480000
unkown
page read and write
3D50000
unclassified section
page execute and read and write
2F60000
direct allocation
page read and write
7FEB000
heap
page read and write
94E000
stack
page read and write
1CFE0D00000
trusted library allocation
page read and write
3800000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
1AC000
stack
page read and write
7F95000
heap
page read and write
21E0000
heap
page read and write
1CFDF1FB000
heap
page read and write
5408000
system
page read and write
3CCD000
direct allocation
page execute and read and write
33D1000
heap
page read and write
3213000
heap
page read and write
1C0000
heap
page read and write
399E000
heap
page read and write
4500000
direct allocation
page read and write
3CD1000
direct allocation
page execute and read and write
318B000
heap
page read and write
39BF000
stack
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
33D1000
heap
page read and write
47CD000
direct allocation
page read and write
9A000
stack
page read and write
33D1000
heap
page read and write
3405000
heap
page read and write
3127000
heap
page read and write
2080000
heap
page read and write
490000
unkown
page readonly
33D1000
heap
page read and write
4500000
direct allocation
page read and write
3B29000
direct allocation
page execute and read and write
4152000
heap
page read and write
40D2000
heap
page read and write
30F4000
heap
page read and write
BE1000
unkown
page readonly
There are 631 hidden memdumps, click here to show them.