IOC Report
foljNJ4bug.exe

loading gif

Files

File Path
Type
Category
Malicious
foljNJ4bug.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\0eYBs6_09
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\prophetesses
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\foljNJ4bug.exe
"C:\Users\user\Desktop\foljNJ4bug.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\foljNJ4bug.exe"
malicious
C:\Program Files (x86)\eNBWORsxNPPbckVMLflmySkNuvuVtmDXumyYuKDJR\YKSXcXcWryn.exe
"C:\Program Files (x86)\eNBWORsxNPPbckVMLflmySkNuvuVtmDXumyYuKDJR\YKSXcXcWryn.exe"
malicious
C:\Windows\SysWOW64\sc.exe
"C:\Windows\SysWOW64\sc.exe"
malicious
C:\Program Files (x86)\eNBWORsxNPPbckVMLflmySkNuvuVtmDXumyYuKDJR\YKSXcXcWryn.exe
"C:\Program Files (x86)\eNBWORsxNPPbckVMLflmySkNuvuVtmDXumyYuKDJR\YKSXcXcWryn.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.aaavvejibej.bond/m3ct/?5vc=zEwq1iaMF/uCsqziz8qMUhXCXmUco/L+vi+T8f7QvA3w3jxbUYr6DIVUG7Wad/XDR1ZvfFtvoxN1EeB5BAcej8YfbKSiuNBAZGSPTmsYajwE5YNxObykffmIIzNg2h0GVq7a1DE=&lLYL=kvUX
172.67.181.150
malicious
http://www.takitoon.xyz/4qpg/?lLYL=kvUX&5vc=7YL4gquCN0E55MFUOU9pAg/pZfkwLQQKii7X4zB1/APnuYQ63ytlc9rdDU84d9EdPhCMcrEauI5xN2RdLzEruIlUX3fWqfOqjWcwC1p6yjm3sUGyC92I8On0vrGkOogLmLiKp0c=
3.33.130.190
malicious
http://www.gutpox.life/bcpd/?5vc=00X9d/BTKK5R5e14wWEt126s+mdVGBYlWg3KruQB0GNMBll6v3rooUlUxbesnPMHDrwLyGZxaHgZZw9MEvoNzTeh6b+sdgkolwxMs8g4smMKoeawjyQiJRB92JfMM9Rn76Nc6Cg=&lLYL=kvUX
67.223.117.189
malicious
http://www.nng65.top/g9xe/?5vc=MLCfwq0OLzOW6QPmgLFQnuGoPPrQyzTDS43mRmpffLpQSwrMWSBFbGoKeLq/FK43j0+k/VozFS/nBlsWqz4m9kWG5HZt62rlPRgv7u+rlw8JrCSD2NF9WC2SMGJleFo1CnmOFq8=&lLYL=kvUX
38.47.233.65
malicious
http://www.myjiorooms.services/7ts8/?lLYL=kvUX&5vc=VgfHXYqklmOf3gIY6JX4+MSwLZFx3fC4t3URmGvQc8lOLOm3On7tbGBltUCUb2EMakaNsP50tNqrd0nnNZuXCCSXzQ7vSeHOGGO1wR7Laf4A+YuB3YDb13HLVs/KWc3twln2EFc=
3.33.130.190
malicious
http://www.gutpox.life/bcpd/
67.223.117.189
malicious
http://www.aaavvejibej.bond/m3ct/
172.67.181.150
malicious
http://www.myjiorooms.services/7ts8/
3.33.130.190
malicious
http://www.rmgltd.services/4q0i/
3.33.130.190
malicious
http://www.turbonotes.app/7u7b/
217.70.184.50
malicious
http://www.takeun.club/ow7w/?lLYL=kvUX&5vc=p1G8XVp3dTmrBOooBHOazFGeIrxM1J3oyb4/irL+UWW2iE7BpWwBAaQNTChmqclkWYPZ2V3tJwkqHmUMbW57TcftwINdn5ScJT94TdCNnEqMkWAGcRU1jqFlvrtrVO/HPFIHZdo=
3.33.130.190
malicious
http://www.takitoon.xyz/4qpg/
3.33.130.190
malicious
http://www.nng65.top/g9xe/
38.47.233.65
malicious
http://www.ultraleap.net/9iab/
217.70.184.50
malicious
http://www.bayarcepat19.click/fxts/?5vc=KBrNmZFmj0ul2oD2qgnroh/wQ2h5AjW2d9F4abtF0F4CaovzTwTYRyu6DykZf8dcdN4xXWNYZBLXZ4+qzslzTuV7y9B6gd/Ri+hABrjyhRVbSEt0nKDUfa/P8q39BOk9hsMan7o=&lLYL=kvUX
188.114.97.3
malicious
http://www.turbonotes.app/7u7b/?lLYL=kvUX&5vc=2Z5kGOkuv5pVGp5caE9S+AlLzK7psx26l1r4OVTTo/mJv8+h8gvJJdoe4aGwZK+fAJooQPvCRx2bg5uJuIXMrI8i6EsIC7ECcfl7eR40SkVxjNn20IyYqrUIILkrtqNDTrCWbBw=
217.70.184.50
malicious
http://www.patioprojex.africa/x557/?5vc=giAstKbG1JvvSEHvPZxdSSM3KyfVinJMbmE6i5V8cuPr9HW8zP8h8UUcUfsu4P3tPpyGgBHfZyFCt865pXgydxC+b0QJblKsDInl9u5dqfz1OH+RWteaPpXHUBQMRwPVkFLc/Ks=&lLYL=kvUX
197.189.237.186
malicious
http://www.crochetpets.online/8l0y/?5vc=gpZ7O9wJuofu6jQ+zhbQfshngqVv9cE5kPyoFYRIcR03yvbe/BOPGk6xXKz30nptSiLZCe/Z5fLwL00E8raoZSt1+2D0KaGk+ev1JjVnWNJk73VZkcb+ifONmJiX1s5MbYZXBXE=&lLYL=kvUX
208.91.197.27
malicious
http://www.patioprojex.africa/x557/
197.189.237.186
malicious
http://www.crochetpets.online/8l0y/
208.91.197.27
malicious
http://www.shanhaiguan.net/54aa/?lLYL=kvUX&5vc=YMphRbBqYD1qziPfcxWfV7OUDSA3QU5FUkSnoqDZt26OzjZirNwjAGjBpWvuubqos1AuwzhTz+mW7CpJxDFhVa/HfUjNfzfl4NcBItZkd8PY3xDlIjidjox4juNb6YkC0urLz9Q=
156.242.132.82
malicious
http://www.kx507981.shop/2i23/
54.67.42.145
malicious
http://www.kx507981.shop/2i23/?5vc=bKA+uOpFda5dGdFXdnTLNkRmhJBOP9S0HCpQNG3UnGEkxT/oTZLAjGTvHx4TKdTffd9QN0N/OlpfyxtP6tcBddlohGt5l/spne/Xm9eGrkU+7BisppRJ0X6uxZ9HBJ4oDTdSaxo=&lLYL=kvUX
54.67.42.145
malicious
http://www.ultraleap.net/9iab/?5vc=Y4kDenUp1gO2Q0jRiZUxMqowayno9Xsk2AlmB9dDBLZOc6V7t85yetNjHcmH7slMwyaAfgZ0o1D1+bSHqn/hHAccGgPOonKwLb4ZCbzMyRuUgcD/rdhA1bXMlxtgx1iShR1I/OE=&lLYL=kvUX
217.70.184.50
malicious
http://www.takeun.club/ow7w/
3.33.130.190
malicious
http://www.tempmai.lol/m2fa/
45.33.18.44
malicious
http://www.bayarcepat19.click/fxts/
188.114.97.3
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://dts.gnpge.com
unknown
https://duckduckgo.com/ac/?q=
unknown
https://whois.gandi.net/en/results?search=ultraleap.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www70.tempmai.lol/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.crochetpets.online/sk-logabpstatus.php?a=N1hkU2g1d01yTW5xcHU0dEhSdTg5bTZpTnJKR2xVNFNMQ2hU
unknown
http://patioprojex.africa/x557/?5vc=giAstKbG1JvvSEHvPZxdSSM3KyfVinJMbmE6i5V8cuPr9HW8zP8h8UUcUfsu4P3t
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.tempmai.lol/m2fa?gp=1&js=1&uuid=1728557616.0093649002&other_args=eyJ1cmkiOiAiL20yZmEiLCAi
unknown
https://www.bayarcepat19.click/fxts/?5vc=KBrNmZFmj0ul2oD2qgnroh/wQ2h5AjW2d9F4abtF0F4CaovzTwTYRyu6Dyk
unknown
https://www.gandi.net/en/domain
unknown
https://www.ecosia.org/newtab/
unknown
http://kx507945.shop
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.365seo.cc
unknown
https://whois.gandi.net/en/results?search=turbonotes.app
unknown
http://www.crochetpets.online
unknown
http://www.crochetpets.online/px.js?ch=2
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.crochetpets.online/px.js?ch=1
unknown
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
webredir.vip.gandi.net
217.70.184.50
malicious
rmgltd.services
3.33.130.190
malicious
takitoon.xyz
3.33.130.190
malicious
takeun.club
3.33.130.190
malicious
www.tempmai.lol
45.33.18.44
malicious
www.aaavvejibej.bond
172.67.181.150
malicious
patioprojex.africa
197.189.237.186
malicious
www.gutpox.life
67.223.117.189
malicious
www.kx507981.shop
54.67.42.145
malicious
www.crochetpets.online
208.91.197.27
malicious
www.bayarcepat19.click
188.114.97.3
malicious
myjiorooms.services
3.33.130.190
malicious
www.shanhaiguan.net
156.242.132.82
malicious
nng65.top
38.47.233.65
malicious
www.useanecdotenow.tech
unknown
malicious
www.takitoon.xyz
unknown
malicious
www.ultraleap.net
unknown
malicious
www.turbonotes.app
unknown
malicious
www.rmgltd.services
unknown
malicious
www.myjiorooms.services
unknown
malicious
www.patioprojex.africa
unknown
malicious
www.takeun.club
unknown
malicious
www.nng65.top
unknown
malicious
There are 13 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
38.47.233.65
nng65.top
United States
malicious
156.242.132.82
www.shanhaiguan.net
Seychelles
malicious
67.223.117.189
www.gutpox.life
United States
malicious
188.114.97.3
www.bayarcepat19.click
European Union
malicious
197.189.237.186
patioprojex.africa
South Africa
malicious
172.67.181.150
www.aaavvejibej.bond
United States
malicious
217.70.184.50
webredir.vip.gandi.net
France
malicious
208.91.197.27
www.crochetpets.online
Virgin Islands (BRITISH)
malicious
3.33.130.190
rmgltd.services
United States
malicious
54.67.42.145
www.kx507981.shop
United States
malicious
45.33.18.44
www.tempmai.lol
United States
malicious
There are 1 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4F80000
system
page execute and read and write
malicious
2B70000
system
page execute and read and write
malicious
39A0000
unclassified section
page execute and read and write
malicious
2350000
unkown
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
3020000
trusted library allocation
page read and write
malicious
30C0000
trusted library allocation
page read and write
malicious
4200000
unclassified section
page execute and read and write
malicious
40EA000
heap
page read and write
3202000
heap
page read and write
900000
unkown
page readonly
34E000
unkown
page readonly
3221000
heap
page read and write
3C2D000
direct allocation
page execute and read and write
3213000
heap
page read and write
2670000
heap
page read and write
50A6000
system
page execute and read and write
4ADE000
direct allocation
page read and write
3221000
heap
page read and write
40EA000
heap
page read and write
406D000
heap
page read and write
B4A000
heap
page read and write
C30000
heap
page read and write
22002300000
trusted library allocation
page read and write
3221000
heap
page read and write
370000
unkown
page read and write
40EA000
heap
page read and write
AB0000
heap
page read and write
355000
unkown
page read and write
3501000
heap
page read and write
3502000
heap
page read and write
3221000
heap
page read and write
3B00000
direct allocation
page execute and read and write
100000
unkown
page readonly
C20000
unkown
page read and write
22000625000
system
page execute and read and write
3221000
heap
page read and write
3E42000
direct allocation
page execute and read and write
3221000
heap
page read and write
406D000
heap
page read and write
1200000
unkown
page readonly
3070000
trusted library allocation
page read and write
3221000
heap
page read and write
355000
unkown
page read and write
22002090000
trusted library allocation
page read and write
3221000
heap
page read and write
7EE0000
heap
page read and write
406D000
heap
page read and write
444A000
unclassified section
page read and write
406D000
heap
page read and write
404A000
heap
page read and write
40EB000
heap
page read and write
4A69000
direct allocation
page read and write
3213000
heap
page read and write
7EE6000
heap
page read and write
406D000
heap
page read and write
2B4C000
unkown
page read and write
51FC000
unkown
page read and write
3F0000
unkown
page readonly
3221000
heap
page read and write
3DCD000
direct allocation
page execute and read and write
2674000
heap
page read and write
3221000
heap
page read and write
40EA000
heap
page read and write
406D000
heap
page read and write
3221000
heap
page read and write
2260000
unkown
page readonly
2C0000
unkown
page readonly
3221000
heap
page read and write
602000
system
page read and write
5034000
system
page execute and read and write
4A69000
direct allocation
page read and write
3EE8000
unkown
page read and write
3A32000
unkown
page read and write
406D000
heap
page read and write
B0C000
heap
page read and write
C78000
heap
page read and write
7E0000
unkown
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
3A9E000
heap
page read and write
C30000
heap
page read and write
343B000
heap
page read and write
340000
unkown
page readonly
4167000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
16CF000
stack
page read and write
A34000
heap
page read and write
3221000
heap
page read and write
22002203000
trusted library allocation
page read and write
3221000
heap
page read and write
22002080000
heap
page read and write
40EA000
heap
page read and write
3221000
heap
page read and write
47A0000
direct allocation
page read and write
3213000
heap
page read and write
380F000
stack
page read and write
3992000
unclassified section
page read and write
2E0000
unkown
page readonly
33EA000
unkown
page read and write
406D000
heap
page read and write
3400000
heap
page read and write
3221000
heap
page read and write
2ECE000
heap
page read and write
406D000
heap
page read and write
3200000
heap
page read and write
22000837000
heap
page read and write
76B0BFC000
stack
page read and write
22002100000
trusted library allocation
page read and write
3221000
heap
page read and write
406D000
heap
page read and write
3221000
heap
page read and write
3258000
unkown
page read and write
4A6D000
direct allocation
page read and write
40BA000
heap
page read and write
3221000
heap
page read and write
34E000
unkown
page readonly
4167000
heap
page read and write
40EA000
heap
page read and write
3221000
heap
page read and write
490000
unkown
page read and write
4167000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
B46000
heap
page read and write
2E0000
unkown
page readonly
48C3000
direct allocation
page read and write
2FB4000
heap
page read and write
7F0000
heap
page read and write
780000
unkown
page readonly
41C0000
unkown
page execute and read and write
3000000
heap
page read and write
4F48000
unclassified section
page read and write
415F000
heap
page read and write
AFC000
stack
page read and write
B44000
heap
page read and write
AFC000
stack
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
22002213000
trusted library allocation
page read and write
3221000
heap
page read and write
3213000
heap
page read and write
4A92000
unclassified section
page read and write
220005B0000
system
page execute and read and write
7EB1000
heap
page read and write
220023CE000
trusted library allocation
page read and write
3221000
heap
page read and write
40EA000
heap
page read and write
3200000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
31F0000
heap
page read and write
46C2000
unkown
page read and write
7C0000
unkown
page read and write
C78000
heap
page read and write
3F6C000
heap
page read and write
3213000
heap
page read and write
31DD000
heap
page read and write
7A0000
unkown
page read and write
47A0000
direct allocation
page read and write
7EEA000
heap
page read and write
E6F000
stack
page read and write
3221000
heap
page read and write
2FD0000
heap
page read and write
3221000
heap
page read and write
3C29000
direct allocation
page execute and read and write
3221000
heap
page read and write
341000
unkown
page execute read
357C000
unkown
page read and write
420C000
unkown
page read and write
3221000
heap
page read and write
4A6D000
direct allocation
page read and write
406D000
heap
page read and write
400000
unkown
page readonly
3221000
heap
page read and write
5722000
unclassified section
page read and write
3221000
heap
page read and write
406D000
heap
page read and write
40EA000
heap
page read and write
4AB000
unkown
page readonly
6440000
trusted library allocation
page read and write
4DB6000
unclassified section
page read and write
40E9000
heap
page read and write
34E000
unkown
page readonly
490000
unkown
page write copy
3221000
heap
page read and write
406D000
heap
page read and write
2B38000
stack
page read and write
3213000
heap
page read and write
3221000
heap
page read and write
100000
unkown
page readonly
3DD1000
direct allocation
page execute and read and write
4167000
heap
page read and write
2200220E000
trusted library allocation
page read and write
406D000
heap
page read and write
6B0000
unkown
page readonly
770000
unkown
page readonly
3221000
heap
page read and write
760000
unkown
page readonly
2BF0000
heap
page read and write
28C000
stack
page read and write
110000
unkown
page readonly
3221000
heap
page read and write
406D000
heap
page read and write
401000
unkown
page execute read
3221000
heap
page read and write
3015000
heap
page read and write
406D000
heap
page read and write
3221000
heap
page read and write
4167000
heap
page read and write
22000860000
heap
page read and write
4167000
heap
page read and write
110000
unkown
page readonly
648000
heap
page read and write
6A0000
unkown
page readonly
7EF5000
heap
page read and write
E70000
unkown
page readonly
31A1000
heap
page read and write
7F70000
trusted library allocation
page read and write
7ED9000
heap
page read and write
5670000
unclassified section
page execute and read and write
4167000
heap
page read and write
4ADE000
direct allocation
page read and write
3221000
heap
page read and write
7EEC000
heap
page read and write
A90000
heap
page read and write
406D000
heap
page read and write
3221000
heap
page read and write
4A8000
unkown
page read and write
3352000
heap
page read and write
31BA000
heap
page read and write
8A4000
stack
page read and write
5050000
system
page execute and read and write
50FC000
unkown
page read and write
37C0000
unkown
page execute and read and write
3A2D000
heap
page read and write
3900000
heap
page read and write
384E000
stack
page read and write
2B4C000
unkown
page read and write
3221000
heap
page read and write
4167000
heap
page read and write
401000
unkown
page execute read
357000
unkown
page readonly
4167000
heap
page read and write
2F90000
heap
page read and write
3221000
heap
page read and write
406D000
heap
page read and write
3B5F000
stack
page read and write
7EF8000
heap
page read and write
22000621000
system
page execute and read and write
4167000
heap
page read and write
2D4E000
unkown
page execute and read and write
A30000
heap
page read and write
4120000
heap
page read and write
340000
unkown
page readonly
8EE000
stack
page read and write
4001000
heap
page read and write
3221000
heap
page read and write
4167000
heap
page read and write
7EF5000
heap
page read and write
3221000
heap
page read and write
7ED0000
heap
page read and write
40EA000
heap
page read and write
482000
unkown
page readonly
3213000
heap
page read and write
100000
heap
page read and write
3221000
heap
page read and write
406D000
heap
page read and write
B48000
heap
page read and write
22002200000
trusted library allocation
page read and write
C40000
unkown
page read and write
3221000
heap
page read and write
4C24000
unclassified section
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
2FB4000
heap
page read and write
4038000
heap
page read and write
4167000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
4167000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
76B23FE000
stack
page read and write
3127000
heap
page read and write
3F70000
heap
page read and write
40EA000
heap
page read and write
34E000
unkown
page readonly
406D000
heap
page read and write
381000
unkown
page readonly
3221000
heap
page read and write
406D000
heap
page read and write
220007A0000
heap
page read and write
3EE000
stack
page read and write
22000863000
heap
page read and write
4A6D000
direct allocation
page read and write
3221000
heap
page read and write
C20000
unkown
page read and write
357000
unkown
page readonly
A95000
heap
page read and write
4167000
heap
page read and write
7E7B000
heap
page read and write
3221000
heap
page read and write
7EFE000
heap
page read and write
406D000
heap
page read and write
40EA000
heap
page read and write
3F78000
heap
page read and write
407D000
heap
page read and write
4167000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
21B0000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
2FC0000
heap
page read and write
6070000
unclassified section
page execute and read and write
22000830000
heap
page read and write
47A0000
direct allocation
page read and write
2F41000
heap
page read and write
7E76000
heap
page read and write
4167000
heap
page read and write
319B000
heap
page read and write
3213000
heap
page read and write
3F0000
unkown
page readonly
370E000
unkown
page read and write
4167000
heap
page read and write
3221000
heap
page read and write
314B000
heap
page read and write
344C000
heap
page read and write
C90000
unkown
page readonly
4940000
direct allocation
page read and write
4C70000
unclassified section
page execute and read and write
3221000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
355000
unkown
page read and write
3221000
heap
page read and write
3950000
direct allocation
page read and write
4075000
heap
page read and write
4167000
heap
page read and write
7B1000
unkown
page readonly
40EA000
heap
page read and write
3221000
heap
page read and write
4A6D000
direct allocation
page read and write
322F000
heap
page read and write
3221000
heap
page read and write
4145000
heap
page read and write
930000
heap
page read and write
3221000
heap
page read and write
5590000
unclassified section
page read and write
C50000
unkown
page read and write
3221000
heap
page read and write
40EA000
heap
page read and write
3221000
heap
page read and write
4167000
heap
page read and write
341000
unkown
page execute read
C70000
heap
page read and write
3221000
heap
page read and write
2872000
unkown
page read and write
40BF000
heap
page read and write
33D9000
heap
page read and write
3221000
heap
page read and write
2200220A000
trusted library allocation
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
491000
unkown
page write copy
3221000
heap
page read and write
3221000
heap
page read and write
780000
unkown
page readonly
12CF000
stack
page read and write
21B4000
heap
page read and write
120000
unkown
page readonly
48C3000
direct allocation
page read and write
3221000
heap
page read and write
3213000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
2F0E000
stack
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
4167000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
34FE000
stack
page read and write
3221000
heap
page read and write
7E88000
heap
page read and write
7B1000
unkown
page readonly
40EB000
heap
page read and write
900000
unkown
page readonly
406D000
heap
page read and write
3221000
heap
page read and write
648000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
3010000
heap
page read and write
3221000
heap
page read and write
47A0000
direct allocation
page read and write
3221000
heap
page read and write
4ADE000
direct allocation
page read and write
ADA000
heap
page read and write
4167000
heap
page read and write
3213000
heap
page read and write
3700000
heap
page read and write
406D000
heap
page read and write
312E000
heap
page read and write
39A0000
direct allocation
page read and write
7EBB000
heap
page read and write
40EA000
heap
page read and write
3221000
heap
page read and write
406D000
heap
page read and write
120000
unkown
page readonly
40AA000
heap
page read and write
B86000
heap
page read and write
406D000
heap
page read and write
3221000
heap
page read and write
2780000
unkown
page readonly
3221000
heap
page read and write
220007E0000
heap
page read and write
9A000
stack
page read and write
3221000
heap
page read and write
40B1000
heap
page read and write
C0E000
stack
page read and write
4038000
heap
page read and write
3BAC000
unclassified section
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
76B1BFE000
stack
page read and write
400000
unkown
page readonly
7E80000
heap
page read and write
7F0000
unkown
page readonly
4001000
heap
page read and write
618000
heap
page read and write
3221000
heap
page read and write
790000
heap
page read and write
406D000
heap
page read and write
3221000
heap
page read and write
3130000
heap
page read and write
3187000
heap
page read and write
406D000
heap
page read and write
7D0000
heap
page read and write
40E7000
heap
page read and write
357000
unkown
page readonly
48C3000
direct allocation
page read and write
770000
unkown
page readonly
4AB000
unkown
page readonly
3221000
heap
page read and write
40EA000
heap
page read and write
3577000
heap
page read and write
40EA000
heap
page read and write
2F90000
heap
page read and write
340000
unkown
page readonly
3221000
heap
page read and write
38C2000
direct allocation
page execute and read and write
40EA000
heap
page read and write
312F000
heap
page read and write
2D0000
unkown
page readonly
21B4000
heap
page read and write
31F6000
heap
page read and write
2DC0000
unkown
page execute and read and write
3221000
heap
page read and write
4A69000
direct allocation
page read and write
31AE000
heap
page read and write
3320000
trusted library allocation
page read and write
2F70000
heap
page read and write
3198000
heap
page read and write
3412000
heap
page read and write
40EA000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
3188000
heap
page read and write
3823000
heap
page read and write
406D000
heap
page read and write
B10000
heap
page read and write
357000
unkown
page readonly
618000
heap
page read and write
48C3000
direct allocation
page read and write
856E000
stack
page read and write
3221000
heap
page read and write
8FF000
stack
page read and write
2FB4000
heap
page read and write
B52000
heap
page read and write
4167000
heap
page read and write
3F7B000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
4ADE000
direct allocation
page read and write
4167000
heap
page read and write
3221000
heap
page read and write
4167000
heap
page read and write
4167000
heap
page read and write
3221000
heap
page read and write
B86000
heap
page read and write
6A0000
unkown
page readonly
219F000
stack
page read and write
542000
system
page read and write
3221000
heap
page read and write
381000
unkown
page readonly
3221000
heap
page read and write
3120000
heap
page read and write
384D000
direct allocation
page execute and read and write
CA0000
heap
page read and write
7E60000
trusted library allocation
page read and write
7EE3000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
ADE000
heap
page read and write
50DA000
unclassified section
page read and write
453D000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
4A69000
direct allocation
page read and write
406D000
heap
page read and write
3221000
heap
page read and write
406D000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
40EA000
heap
page read and write
3221000
heap
page read and write
2F0000
heap
page read and write
4BFE000
unclassified section
page execute and read and write
3F67000
heap
page read and write
4167000
heap
page read and write
406D000
heap
page read and write
3A29000
heap
page read and write
4029000
heap
page read and write
40EA000
heap
page read and write
318D000
heap
page read and write
7E70000
heap
page read and write
3221000
heap
page read and write
4167000
heap
page read and write
3221000
heap
page read and write
760000
unkown
page readonly
7E85000
heap
page read and write
40EB000
heap
page read and write
2AFB000
stack
page read and write
3B60000
heap
page read and write
406D000
heap
page read and write
220006C0000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
492000
unkown
page read and write
3221000
heap
page read and write
2670000
heap
page read and write
3F85000
heap
page read and write
42B8000
unclassified section
page read and write
375E000
stack
page read and write
3851000
direct allocation
page execute and read and write
3221000
heap
page read and write
2D0000
unkown
page readonly
31AE000
heap
page read and write
610000
heap
page read and write
40EB000
heap
page read and write
7E94000
heap
page read and write
344A000
heap
page read and write
40EA000
heap
page read and write
3213000
heap
page read and write
C70000
heap
page read and write
7EE8000
heap
page read and write
40BD000
heap
page read and write
6C0000
unkown
page readonly
2FB0000
heap
page read and write
3D40000
heap
page read and write
64D000
unkown
page read and write
3213000
heap
page read and write
81C000
system
page read and write
7D5000
heap
page read and write
3221000
heap
page read and write
64C000
unkown
page read and write
40EA000
heap
page read and write
31D0000
heap
page read and write
4040000
heap
page read and write
3E40000
heap
page read and write
2260000
unkown
page readonly
22002090000
trusted library allocation
page read and write
76B2BFE000
stack
page read and write
3221000
heap
page read and write
85AF000
stack
page read and write
4940000
direct allocation
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
22002301000
trusted library allocation
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
277F000
stack
page read and write
28C000
stack
page read and write
82E000
unkown
page read and write
3221000
heap
page read and write
6C0000
unkown
page readonly
34BE000
stack
page read and write
4167000
heap
page read and write
40EB000
heap
page read and write
B48000
heap
page read and write
7EB6000
heap
page read and write
40EA000
heap
page read and write
406D000
heap
page read and write
2250000
heap
page read and write
3221000
heap
page read and write
8160000
heap
page read and write
30B0000
heap
page read and write
2C0000
unkown
page readonly
40EB000
heap
page read and write
18A8000
heap
page read and write
62B000
heap
page read and write
3221000
heap
page read and write
45DC000
unclassified section
page read and write
40EB000
heap
page read and write
E6F000
stack
page read and write
B44000
heap
page read and write
3221000
heap
page read and write
2200085B000
heap
page read and write
72A000
stack
page read and write
40E2000
heap
page read and write
3187000
heap
page read and write
3221000
heap
page read and write
38A0000
unkown
page read and write
2932000
unkown
page read and write
7EAB000
heap
page read and write
340000
unkown
page readonly
264E000
stack
page read and write
3221000
heap
page read and write
1E0000
heap
page read and write
7ED3000
heap
page read and write
406D000
heap
page read and write
22002221000
trusted library allocation
page read and write
31CB000
heap
page read and write
406D000
heap
page read and write
B06000
heap
page read and write
3221000
heap
page read and write
476E000
unclassified section
page read and write
72A000
stack
page read and write
89F000
stack
page read and write
7F03000
heap
page read and write
3405000
heap
page read and write
406D000
heap
page read and write
7F0000
unkown
page readonly
2EFC000
stack
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
4167000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
40EA000
heap
page read and write
3B65000
heap
page read and write
18A0000
heap
page read and write
40D9000
heap
page read and write
B4A000
heap
page read and write
4900000
unclassified section
page read and write
40EA000
heap
page read and write
3221000
heap
page read and write
48C3000
direct allocation
page read and write
4A69000
direct allocation
page read and write
40EA000
heap
page read and write
7E68000
heap
page read and write
417C000
heap
page read and write
3221000
heap
page read and write
31C6000
heap
page read and write
3198000
heap
page read and write
3221000
heap
page read and write
4167000
heap
page read and write
36A9000
direct allocation
page execute and read and write
2F43000
heap
page read and write
31C0000
heap
page read and write
3221000
heap
page read and write
7E0000
unkown
page read and write
40EB000
heap
page read and write
2FB4000
heap
page read and write
341A000
heap
page read and write
40EA000
heap
page read and write
92E000
stack
page read and write
B46000
heap
page read and write
3221000
heap
page read and write
4167000
heap
page read and write
406D000
heap
page read and write
40C2000
heap
page read and write
3221000
heap
page read and write
38D2000
unclassified section
page read and write
2250000
heap
page read and write
4167000
heap
page read and write
9F0000
heap
page read and write
7EF3000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
7F0000
heap
page read and write
4167000
heap
page read and write
3213000
heap
page read and write
6B0000
unkown
page readonly
3221000
heap
page read and write
407A000
unkown
page read and write
502B000
system
page execute and read and write
4940000
direct allocation
page read and write
22002217000
trusted library allocation
page read and write
7A0000
unkown
page read and write
3221000
heap
page read and write
1201000
unkown
page readonly
40EA000
heap
page read and write
39A0000
direct allocation
page read and write
3221000
heap
page read and write
40EB000
heap
page read and write
40EA000
heap
page read and write
48C3000
direct allocation
page read and write
3221000
heap
page read and write
3125000
heap
page read and write
4A6D000
direct allocation
page read and write
3F76000
heap
page read and write
3221000
heap
page read and write
220023AF000
trusted library allocation
page read and write
4167000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
18A000
stack
page read and write
406D000
heap
page read and write
3221000
heap
page read and write
3506000
heap
page read and write
3221000
heap
page read and write
40EA000
heap
page read and write
C91000
unkown
page readonly
3130000
heap
page read and write
B52000
heap
page read and write
33D0000
trusted library allocation
page execute and read and write
40EB000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
4ADE000
direct allocation
page read and write
526C000
unclassified section
page read and write
4A6D000
direct allocation
page read and write
3580000
direct allocation
page execute and read and write
3221000
heap
page read and write
2200084C000
heap
page read and write
4940000
direct allocation
page read and write
406D000
heap
page read and write
790000
heap
page read and write
4A69000
direct allocation
page read and write
3221000
heap
page read and write
2F4F000
stack
page read and write
4ADE000
direct allocation
page read and write
3213000
heap
page read and write
40C7000
heap
page read and write
7C0000
unkown
page read and write
40EA000
heap
page read and write
394F000
stack
page read and write
2F40000
direct allocation
page read and write
4167000
heap
page read and write
406D000
heap
page read and write
406D000
heap
page read and write
406D000
heap
page read and write
3D56000
unkown
page read and write
3220000
heap
page read and write
40B2000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
47A0000
direct allocation
page read and write
4167000
heap
page read and write
3213000
heap
page read and write
3070000
trusted library allocation
page read and write
482000
unkown
page readonly
3221000
heap
page read and write
3221000
heap
page read and write
39A0000
direct allocation
page read and write
3221000
heap
page read and write
31FA000
heap
page read and write
220023BE000
trusted library allocation
page read and write
3221000
heap
page read and write
3C9E000
direct allocation
page execute and read and write
3221000
heap
page read and write
31A1000
heap
page read and write
40EA000
heap
page read and write
40CF000
heap
page read and write
36AD000
direct allocation
page execute and read and write
3221000
heap
page read and write
2F3B000
stack
page read and write
4167000
heap
page read and write
3213000
heap
page read and write
406D000
heap
page read and write
406D000
heap
page read and write
3417000
heap
page read and write
E70000
unkown
page readonly
3070000
trusted library allocation
page read and write
18A000
stack
page read and write
4940000
direct allocation
page read and write
406D000
heap
page read and write
5044000
system
page execute and read and write
C0E000
stack
page read and write
610000
heap
page read and write
53FE000
unclassified section
page read and write
3221000
heap
page read and write
439E000
unkown
page read and write
21B0000
heap
page read and write
406D000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
220023C4000
trusted library allocation
page read and write
390000
unkown
page read and write
406D000
heap
page read and write
C8F000
heap
page read and write
76B13FE000
stack
page read and write
4167000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
4940000
direct allocation
page read and write
40EA000
heap
page read and write
3221000
heap
page read and write
33E000
stack
page read and write
371E000
direct allocation
page execute and read and write
4636000
heap
page read and write
99E000
stack
page read and write
3BC4000
unkown
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
341000
unkown
page execute read
9EE000
stack
page read and write
370000
unkown
page read and write
2780000
unkown
page readonly
370E000
stack
page read and write
2872000
unkown
page read and write
4167000
heap
page read and write
3221000
heap
page read and write
3215000
heap
page read and write
36D0000
direct allocation
page read and write
341000
unkown
page execute read
3417000
heap
page read and write
7D0000
heap
page read and write
4530000
unkown
page read and write
B10000
heap
page read and write
40EA000
heap
page read and write
639000
heap
page read and write
40EB000
heap
page read and write
3221000
heap
page read and write
47A0000
direct allocation
page read and write
AD0000
heap
page read and write
312A000
heap
page read and write
319B000
heap
page read and write
2F0000
heap
page read and write
7EEF000
heap
page read and write
A10000
heap
page read and write
3000000
trusted library allocation
page read and write
403B000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
4167000
heap
page read and write
3221000
heap
page read and write
2674000
heap
page read and write
390000
unkown
page read and write
3405000
heap
page read and write
3221000
heap
page read and write
4037000
heap
page execute and read and write
B06000
heap
page read and write
355000
unkown
page read and write
3221000
heap
page read and write
There are 852 hidden memdumps, click here to show them.