IOC Report
OpenWebStart_windows-x64_1_9_1.exe

loading gif

Files

File Path
Type
Category
Malicious
OpenWebStart_windows-x64_1_9_1.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\java.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\MessagesDefault
ASCII text, with very long lines (363)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_0_1mu2pq3.utf8
ASCII text, with very long lines (363)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_10_1mu2pq3_wnegrj.png
PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_11_1mu2pq3.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_12_1mu2pq3_ctpfum.icns
Mac OS X icon, 130099 bytes, "ic09" type
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_13_1mu2pq3_1l2apw7.ico
MS Windows icon resource - 1 icon, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_14_1mu2pq3_x7nby6.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_15_1mu2pq3_vd2dea.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_16_1mu2pq3_un9apv.png
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_17_1mu2pq3_1xth8wx.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_18_1mu2pq3_259ij1.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_19_1mu2pq3_1w6mnzb.png
PNG image data, 79 x 53, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_19_1mu2pq3_1w6mnzb@2x.png
PNG image data, 157 x 106, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_1_1mu2pq3.utf8
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_2_1mu2pq3.utf8
Unicode text, UTF-8 text, with very long lines (470)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_3_1mu2pq3.utf8
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_4_1mu2pq3_1qcjq5g.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_5_1mu2pq3_14adzqr.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_6_1mu2pq3_1bf9cql.png
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_7_1mu2pq3_njuzm5.png
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_8_1mu2pq3_1reef1z.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_9_1mu2pq3_fwd21f.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4jparams.conf
XML 1.0 document, ASCII text, with very long lines (565), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4jruntime.jar
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\installer.ico
MS Windows icon resource - 12 icons, 16x16, 8 bits/pixel, 16x16, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre.tar.gz
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 101785600
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\ASSEMBLY_EXCEPTION
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\THIRD_PARTY_README
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\JAWTAccessBridge-64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\JavaAccessBridge-64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\WindowsAccessBridge-64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-console-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-datetime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-debug-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-errorhandling-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-file-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-file-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-file-l2-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-handle-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-interlocked-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-libraryloader-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-localization-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-memory-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-namedpipe-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-processenvironment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-processthreads-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-processthreads-l1-1-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-profile-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-synch-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-synch-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-sysinfo-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-timezone-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-util-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-conio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-convert-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-environment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-filesystem-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-locale-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-math-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-multibyte-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-private-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-process-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-runtime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-stdio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-time-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-utility-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\attach.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\awt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\dt_shmem.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\dt_socket.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\fontmanager.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\freetype.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\hprof.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\instrument.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\j2gss.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\j2pcsc.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\j2pkcs11.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\jaas_nt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\jabswitch.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\java-rmi.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\java.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\java_crw_demo.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\javaw.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\jawt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\jdwp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\jjs.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\jli.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\jpeg.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\jsdt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\jsound.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\jsoundds.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\keytool.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\kinit.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\klist.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\ktab.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\lcms.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\management.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\mlib_image.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\msvcp140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\net.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\nio.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\npt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\orbd.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\pack200.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\policytool.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\rmid.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\rmiregistry.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\sawindbg.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\server\Xusage.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\server\jvm.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\servertool.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\splashscreen.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\sspi_bridge.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\sunec.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\sunmscapi.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\tnameserv.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\ucrtbase.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\unpack.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\unpack200.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\vcruntime140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\verify.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\w2k_lsa_auth.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\zip.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\accessibility.properties
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\amd64\jvm.cfg
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\calendars.properties
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\charsets.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\classlist
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\cmm\CIEXYZ.pf
Microsoft color profile 2.3, type lcms, XYZ/XYZ-abst device by lcms, 784 bytes, 28-12-2006 18:07:22, no copyright tag "lcms XYZ identity"
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\cmm\GRAY.pf
Microsoft color profile 2.3, type lcms, GRAY/XYZ-mntr device by lcms, 556 bytes, 28-12-2006 18:07:22, no copyright tag "lcms gray virtual profile"
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\cmm\LINEAR_RGB.pf
ColorSync color profile 2.3, type lcms, RGB/XYZ-mntr device by lcms, 488 bytes, 28-3-2008 14:24:37, transparent, relative colorimetric "linear sRGB"
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\cmm\PYCC.pf
ColorSync color profile 4.0, type lcms, 3CLR/XYZ-spac device by lcms, 234080 bytes, 10-4-2008 10:24:22, transparent, relative colorimetric, 0xf0e75c55d21e4d8c MD5 'PYCC from PCD 045'
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\cmm\sRGB.pf
Microsoft color profile 2.3, type lcms, RGB/XYZ-mntr device by lcms, 6876 bytes, 28-12-2006 18:07:22, no copyright tag "sRGB built-in"
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\content-types.properties
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\currency.data
data
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\access-bridge-64.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\cldrdata.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\dnsns.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\jaccess.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\localedata.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\meta-index
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\nashorn.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\sunec.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\sunjce_provider.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\sunmscapi.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\sunpkcs11.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\zipfs.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\flavormap.properties
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\fontconfig.bfc
raw G3 (Group 3) FAX
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\fontconfig.properties.src
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\hijrah-config-umalqura.properties
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\images\cursors\cursors.properties
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\images\cursors\invalid32x32.gif
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\images\cursors\win32_CopyDrop32x32.gif
GIF image data, version 89a, 31 x 32
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\images\cursors\win32_CopyNoDrop32x32.gif
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\images\cursors\win32_LinkDrop32x32.gif
GIF image data, version 89a, 31 x 32
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\images\cursors\win32_LinkNoDrop32x32.gif
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\images\cursors\win32_MoveDrop32x32.gif
GIF image data, version 89a, 31 x 32
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\images\cursors\win32_MoveNoDrop32x32.gif
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\jce.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\jfr.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\jfr\default.jfc
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\jfr\profile.jfc
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\jsse.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\jvm.hprof.txt
Algol 68 source, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\logging.properties
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\management-agent.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\management\jmxremote.access
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\management\jmxremote.password.template
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\management\management.properties
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\management\snmp.acl.template
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\meta-index
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\net.properties
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\psfont.properties.ja
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\psfontj2d.properties
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\resources.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\rt.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\security\blacklisted.certs
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\security\cacerts
Java KeyStore
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\security\java.policy
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\security\java.security
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\security\policy\limited\US_export_policy.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\security\policy\limited\local_policy.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\security\policy\unlimited\US_export_policy.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\security\policy\unlimited\local_policy.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\sound.properties
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\tzdb.dat
data
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\tzmappings
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\release
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\stats.properties
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\user.jar
Zip archive data, at least v1.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\e4j771B.tmp
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\hsperfdata_user\7276
data
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\7352
data
dropped
C:\Users\user\AppData\Local\Temp\i4j_log_OpenWebStart_6227722212339928138.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\i4j_nlog_1.log
Unicode text, UTF-8 (with BOM) text, with very long lines (409), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\83aa4cc77f591dfc2374580bbd95f6ba_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
There are 195 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\java.exe
c:\users\user\appdata\local\temp\E4J5D2~1.TMP\jre\bin\java.exe -version
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\user\Desktop\OpenWebStart_windows-x64_1_9_1.exe
"C:\Users\user\Desktop\OpenWebStart_windows-x64_1_9_1.exe"

URLs

Name
IP
Malicious
http://apache.org/xml/features/dom/create-entity-ref-nodes
unknown
http://apache.org/xml/features/validation/dynamic
unknown
http://apache.org/xml/features/validation/schema/augment-psvi
unknown
http://apache.org/xml/xmlschema/1.0/anonymousTypesDocume
unknown
https://adoptium.net/
unknown
http://java.sun.com/xml/schema/features/
unknown
http://apache.org/xml/properties/internal/validator/dtd
unknown
http://apache.org/xml/properties/localeF
unknown
http://apache.org/xml/properties/input-buffer-size
unknown
http://apache.org/xml/properties/internal/datatype-validator-factory
unknown
http://apache.org/xml/properties/internal/validator/schema
unknown
http://xml.org/sax/features/allow-dtd-events-after-endDTD7
unknown
http://timestamp.sectigo.com
unknown
http://apache.org/xml/properties/dom/document-class-name3
unknown
http://apache.org/xml/features/internal/tolerate-duplicatesO
unknown
http://apache.org/xml/features/validate-annotations
unknown
http://javax.xml.transform.stream.StreamSource/feature6
unknown
http://xml.org/sax/features/namespace-prefixes
unknown
https://openwebstart.com/
unknown
http://apache.org/xml/properties/internal/entity-manager
unknown
http://java.sun.com/xml/stream/properties/reader-in-defined-state.org/do
unknown
http://apache.org/xml/properties/internal/dtd-processor
unknown
http://apache.org/xml/features/namespace-growth
unknown
http://xml.org/sax/features/string-interning
unknown
http://apache.org/xml/features/internal/parser-settings
unknown
http://apache.org/xml/features/dom/include-ignorable-whitespace
unknown
http://apache.org/xml/features/create-cdata-nodes
unknown
http://java.sun.com/xml/dom/properties/
unknown
http://apache.org/xml/properties/internal/stax-entity-resolver
unknown
https://adoptium.net/java.vendor.url.bughttps://github.com/adoptium/adoptium-support/issues%d.%djava
unknown
https://github.com/adoptium/temurin-build.git
unknown
http://apache.org/xml/features/xinclude/fixup-base-uris6
unknown
http://javax.xml.XMLConstants/feature/secure-processing
unknown
http://apache.org/xml/features/xinclude/fixup-base-uris
unknown
http://xml.org/sax/properties/dom-nodet
unknown
http://apache.org/xml/properties/schema/external-noNamespaceSchemaLocation
unknown
http://www.freedesktop.org/standards/shared-mime-info
unknown
http://apache.org/xml/properties/internal/error-reporter
unknown
http://apache.org/xml/properties/internal/namespace-context
unknown
http://apache.org/xml/features/warn-on-duplicate-entitydef
unknown
http://xml.org/sax/features/string-interning0(&
unknown
http://javax.xml.XMLConstants/property/accessExternalStylesheet;
unknown
http://javax.xml.XMLConstants/property/accessExternalSchema
unknown
http://apache.org/xml/features/include-comments
unknown
http://apache.org/xml/features/scanner/notify-char-refs
unknown
http://apache.org/xml/properties/internal/symbol-table6
unknown
http://java.sun.com/xml/stream/properties/report-cdata-event
unknown
http://apache.org/xml/features/scanner/notify-char-refs:
unknown
http://apache.org/xml/properties/dom/current-element-node7
unknown
http://javax.xml.transform.stax.StAXSource/feature
unknown
http://apache.org/xml/features/continue-after-fatal-error
unknown
http://apache.org/xml/features/standard-uri-conformant
unknown
http://apache.org/xml/properties/internal/document-scanner
unknown
http://apache.org/xml/properties/input-buffer-sizedtd/XM
unknown
http://www.ej-technologies.com/shared-mime-info-ext
unknown
http://apache.org/xml/properties/internal/validation/schema/dv-factory8
unknown
http://apache.org/xml/properties/internal/namespace-binderFfA
unknown
http://xml.org/sax/features/use-entity-resolver2
unknown
http://apache.org/xml/properties/internal/entity-resolver
unknown
http://apache.org/xml/features/
unknown
http://apache.org/xml/features/dom/create-entity-ref-nodesp
unknown
http://apache.org/xml/features/generate-synthetic-annotations
unknown
http://xml.org/sax/features/allow-dtd-events-after-endDTD
unknown
http://apache.org/xml/features/validation/balance-syntax-trees
unknown
http://apache.org/xml/features/internal/validation/schema/use-grammar-pool-only
unknown
http://apache.org/xml/features/include-comments1
unknown
http://apache.org/xml/features/namespace-growth;
unknown
http://apache.org/xml/properties/internal/namespace-binder
unknown
http://javax.xml.XMLConstants/property/accessExternalDTD;
unknown
http://apache.org/xml/features/validate-annotations9
unknown
http://www.oracle.com/xml/is-standalone
unknown
http://javax.xml.transform.sax.SAXTransformerFactory/feature
unknown
http://xml.org/sax/features/validation
unknown
http://javax.xml.XMLConstants/property/accessExternalStylesheet
unknown
http://apache.org/xml/properties/internal/xinclude-handler
unknown
http://apache.org/xml/properties/security-manager
unknown
http://java.sun.com/xml/dom/properties/ancestor-check
unknown
http://xml.apache.org/xslt
unknown
http://java.sun.com/xml/stream/properties/
unknown
http://xml.org/sax/features/erces/intern
unknown
http://apache.org/xml/features/validation/schemapl
unknown
http://java.sun.com/xml/stream/properties/ache/xerces/in
unknown
http://apache.org/xml/features/validation/schema
unknown
http://javax.xml.transform.stax.StAXResult/feature
unknown
http://java.sun.com/xml/dom/properties/t
unknown
http://apache.org/xml/properties/internal/dtd-scanner
unknown
http://xml.org/sax/properties/lexical-handler
unknown
http://apache.org/xml/features/xinclude/fixup-language:
unknown
http://apache.org/xml/properties/schema/external-schemaLocation
unknown
http://apache.org/xml/features/dom/include-ignorable-whitespace:
unknown
http://xml.org/sax/features/
unknown
http://apache.org/xml/properties/internal/error-handler
unknown
https://github.com/adoptium/adoptium-
unknown
http://apache.org/xml/features/xinclude
unknown
http://apache.org/xml/properties/internal/xinclude-handler;
unknown
http://javax.xml.transform.sax.SAXTransformerFactory/featureF
unknown
http://apache.org/xml/features/validation/schema/element-default
unknown
https://github.com/ad
unknown
http://apache.org/xml/features/validation/schema-full-checking
unknown
http://javax.xml.XMLConstants/property/
unknown
There are 90 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\ej-technologies\exe4j\pids
c:\users\user\desktop\openwebstart_windows-x64_1_9_1.exe
HKEY_CURRENT_USER\SOFTWARE\ej-technologies\exe4j\jvms\c:/users/user/appdata/local/temp/e4j5d2a.tmp_dir1713545260/jre/bin/java.exe
LastWriteTime
HKEY_CURRENT_USER\SOFTWARE\ej-technologies\exe4j\jvms\c:/users/user/appdata/local/temp/e4j5d2a.tmp_dir1713545260/jre/bin/java.exe
Version
HKEY_CURRENT_USER\SOFTWARE\ej-technologies\exe4j
InstallStarted_7276
HKEY_CURRENT_USER\SOFTWARE\ej-technologies\exe4j
InstallStarted
HKEY_CURRENT_USER\SOFTWARE\ej-technologies\exe4j
InstallStarted_7276
HKEY_CURRENT_USER\SOFTWARE\ej-technologies\exe4j
InstallStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
1B63F000
heap
page read and write
2629000
heap
page read and write
1BF6F000
heap
page read and write
D6859000
direct allocation
page read and write
7FFDFF301000
unkown
page read and write
19779000
heap
page read and write
1D552000
heap
page read and write
1BB8D000
heap
page read and write
1B698000
heap
page read and write
1D34C000
heap
page read and write
D55A4000
direct allocation
page read and write
B87000
heap
page read and write
1B90B000
heap
page read and write
1BDF2000
heap
page read and write
1D2D0000
heap
page read and write
1B951000
heap
page read and write
1BC79000
heap
page read and write
1BEDE000
heap
page read and write
1BBE6000
heap
page read and write
7FF743C59000
unkown
page readonly
D56CC000
direct allocation
page read and write
4F21000
direct allocation
page execute and read and write
19909000
heap
page read and write
1D309000
heap
page read and write
D55AC000
direct allocation
page read and write
1BCCC000
heap
page read and write
1BBF6000
heap
page read and write
21D3E475000
direct allocation
page execute and read and write
1E390000
direct allocation
page read and write
D6B27000
direct allocation
page read and write
1D4D5000
heap
page read and write
1EE3F000
stack
page read and write
1BF3E000
heap
page read and write
D66BF000
direct allocation
page read and write
1BCD4000
heap
page read and write
D677C000
direct allocation
page read and write
1BC62000
heap
page read and write
1D332000
heap
page read and write
1488E000
stack
page read and write
1BB82000
heap
page read and write
1AF7E000
unkown
page read and write
21D52B30000
heap
page read and write
1B649000
heap
page read and write
D6353000
direct allocation
page read and write
1B99B000
heap
page read and write
1C8C1000
heap
page read and write
1BD4B000
heap
page read and write
1D4D2000
heap
page read and write
1B8E2000
heap
page read and write
1BB82000
heap
page read and write
1B8E4000
heap
page read and write
1BB7C000
heap
page read and write
1BCCD000
heap
page read and write
1BC27000
heap
page read and write
1D552000
heap
page read and write
1BCCC000
heap
page read and write
7FFE126E0000
unkown
page readonly
1D366000
heap
page read and write
1BB53000
heap
page read and write
1BC93000
heap
page read and write
1D48F000
heap
page read and write
1D5E5000
heap
page read and write
1BB6B000
heap
page read and write
2612000
heap
page read and write
261F000
heap
page read and write
1B904000
heap
page read and write
1BCF5000
heap
page read and write
D654B000
direct allocation
page read and write
1BC31000
heap
page read and write
1B904000
heap
page read and write
1AE7E000
unkown
page read and write
1D555000
heap
page read and write
21D3CBD7000
heap
page read and write
21D3E4BE000
direct allocation
page execute and read and write
1BF95000
heap
page read and write
D6414000
direct allocation
page read and write
1BC9D000
heap
page read and write
65EC1000
unkown
page execute read
1D309000
heap
page read and write
1BCD0000
heap
page read and write
21D3E578000
direct allocation
page execute and read and write
1BE48000
heap
page read and write
1BB10000
heap
page read and write
D65ED000
direct allocation
page read and write
1BE48000
heap
page read and write
7FF743C10000
unkown
page readonly
4FBB000
direct allocation
page execute and read and write
1B609000
heap
page read and write
1BC8A000
heap
page read and write
1BAC0000
heap
page read and write
1B8DA000
heap
page read and write
D5B82000
direct allocation
page read and write
1BB20000
heap
page read and write
D5F43000
direct allocation
page read and write
375E000
stack
page read and write
7FFE1324D000
unkown
page readonly
1B98F000
heap
page read and write
1D565000
heap
page read and write
1B974000
heap
page read and write
7FFDFF2C2000
unkown
page readonly
19795000
heap
page read and write
2612000
heap
page read and write
66634000
unkown
page read and write
21D533B0000
heap
page read and write
7FF743C4F000
unkown
page write copy
21D3E4B9000
direct allocation
page execute and read and write
1D36B000
heap
page read and write
1BEDE000
heap
page read and write
1D5EC000
heap
page read and write
2629000
heap
page read and write
D63DA000
direct allocation
page read and write
1B96D000
heap
page read and write
1B5B4000
heap
page read and write
3560000
heap
page read and write
1993C000
heap
page read and write
1BEE0000
heap
page read and write
1B8FD000
heap
page read and write
1BC92000
heap
page read and write
1B8FC000
heap
page read and write
1BBAE000
heap
page read and write
1B994000
heap
page read and write
1BCF6000
heap
page read and write
D640F000
direct allocation
page read and write
1BEE0000
heap
page read and write
1B8DB000
heap
page read and write
1B65F000
heap
page read and write
2629000
heap
page read and write
D5C19000
direct allocation
page read and write
7FF75B8C9000
unkown
page write copy
1D1B8000
unkown
page read and write
D5848000
direct allocation
page read and write
A00000
heap
page read and write
4F0E000
direct allocation
page execute and read and write
14A8D000
stack
page read and write
1B951000
heap
page read and write
D63F7000
direct allocation
page read and write
2620000
heap
page read and write
7FFE1322A000
unkown
page readonly
21D5335A000
heap
page read and write
2630000
heap
page read and write
D643D000
direct allocation
page read and write
1D34B000
heap
page read and write
21D3CCB9000
heap
page read and write
1D374000
heap
page read and write
D693B000
direct allocation
page read and write
1B872000
heap
page read and write
6646B000
unkown
page readonly
1968F000
direct allocation
page read and write
1BEF5000
heap
page read and write
21D53250000
heap
page read and write
1BD8F000
heap
page read and write
1BEAC000
heap
page read and write
1BCF6000
heap
page read and write
1D4CB000
heap
page read and write
D69A5000
direct allocation
page read and write
1BAB8000
heap
page read and write
1D3D1000
heap
page read and write
2628000
heap
page read and write
1BD01000
heap
page read and write
1BEE0000
heap
page read and write
21D3CB95000
heap
page read and write
B30000
heap
page read and write
7FDCEFE000
stack
page read and write
1B90E000
heap
page read and write
66630000
unkown
page write copy
1AC7E000
unkown
page read and write
1B92D000
heap
page read and write
D6A76000
direct allocation
page read and write
1D3BB000
heap
page read and write
1B831000
heap
page read and write
1BE9A000
heap
page read and write
2616000
heap
page read and write
1CCC0000
direct allocation
page read and write
1D5F2000
heap
page read and write
6663D000
unkown
page read and write
1B96D000
heap
page read and write
D6090000
direct allocation
page read and write
1C7A5000
unkown
page read and write
262B000
heap
page read and write
7FFE13210000
unkown
page readonly
7FDD1FE000
stack
page read and write
1BCA6000
heap
page read and write
1BFC1000
heap
page read and write
1D5A5000
heap
page read and write
1BC17000
heap
page read and write
1E3F0000
direct allocation
page read and write
7FFE13211000
unkown
page execute read
1B8DA000
heap
page read and write
1BC9D000
heap
page read and write
7FFE1324C000
unkown
page read and write
7FF743C3E000
unkown
page readonly
1D47D000
heap
page read and write
1B951000
heap
page read and write
1B933000
heap
page read and write
1BDA2000
heap
page read and write
1BAE7000
heap
page read and write
21D52AF0000
heap
page read and write
1B4D9000
heap
page read and write
21D522F0000
direct allocation
page read and write
2760000
heap
page read and write
7FF75B914000
unkown
page readonly
2629000
heap
page read and write
1D4CB000
heap
page read and write
66652000
unkown
page read and write
1BE54000
heap
page read and write
1B993000
heap
page read and write
1BE4D000
heap
page read and write
1BE44000
heap
page read and write
66637000
unkown
page read and write
1BC53000
heap
page read and write
1BE08000
heap
page read and write
1D5B6000
heap
page read and write
7FFE126F5000
unkown
page readonly
1CEC6000
heap
page read and write
1BAB8000
heap
page read and write
1BB8D000
heap
page read and write
1C042000
heap
page read and write
1D574000
heap
page read and write
1BBDE000
heap
page read and write
1BB8E000
heap
page read and write
1BCA8000
heap
page read and write
1BC92000
heap
page read and write
1B7A0000
heap
page read and write
1BCCC000
heap
page read and write
1BCA8000
heap
page read and write
1BB2A000
heap
page read and write
D6426000
direct allocation
page read and write
1B8F4000
heap
page read and write
1B799000
heap
page read and write
1BC7B000
heap
page read and write
6646B000
unkown
page readonly
D55A8000
direct allocation
page read and write
1BC63000
heap
page read and write
3949000
unkown
page read and write
7FDCCFC000
stack
page read and write
1BB33000
heap
page read and write
65EC1000
unkown
page execute read
D5CA7000
direct allocation
page read and write
262A000
heap
page read and write
1C07A000
heap
page read and write
1BE5C000
heap
page read and write
1C014000
heap
page read and write
1BC92000
heap
page read and write
1B8D7000
heap
page read and write
1BC79000
heap
page read and write
D5E7B000
direct allocation
page read and write
1BE93000
heap
page read and write
1BB2B000
heap
page read and write
1BFED000
heap
page read and write
19850000
heap
page read and write
1D3DB000
heap
page read and write
1BF45000
heap
page read and write
1B880000
heap
page read and write
1BE48000
heap
page read and write
1D45C000
heap
page read and write
21D3CB90000
heap
page read and write
7FF743C52000
unkown
page readonly
1BE90000
heap
page read and write
7FFE13239000
unkown
page readonly
66697000
unkown
page read and write
1B938000
heap
page read and write
7FFE13241000
unkown
page execute read
1BB97000
heap
page read and write
1C8C0000
heap
page read and write
1BD01000
heap
page read and write
1D4D3000
heap
page read and write
1B5BA000
heap
page read and write
1BB44000
heap
page read and write
1BCB1000
heap
page read and write
D691D000
direct allocation
page read and write
1C04D000
heap
page read and write
1BDAF000
heap
page read and write
1BE87000
heap
page read and write
1BCF6000
heap
page read and write
D617B000
direct allocation
page read and write
1BB67000
heap
page read and write
1BD53000
heap
page read and write
7FDDDFE000
unkown
page read and write
1BA8C000
heap
page read and write
13EC0000
direct allocation
page read and write
1478D000
stack
page read and write
1B938000
heap
page read and write
1B8FC000
heap
page read and write
1BCA2000
heap
page read and write
7FFDFF2FF000
unkown
page read and write
1B90E000
heap
page read and write
1BB67000
heap
page read and write
1BDA2000
heap
page read and write
1B7B0000
heap
page read and write
1D5BD000
heap
page read and write
1D403000
heap
page read and write
198D4000
heap
page read and write
1BD29000
heap
page read and write
D58A3000
direct allocation
page read and write
1D3C4000
heap
page read and write
D595B000
direct allocation
page read and write
1BC0F000
heap
page read and write
D6A7A000
direct allocation
page read and write
2765000
heap
page read and write
1BC92000
heap
page read and write
1C4BE000
unkown
page read and write
1B92D000
heap
page read and write
1BF95000
heap
page read and write
4FCD000
direct allocation
page execute and read and write
1B4D4000
heap
page read and write
1BAE7000
heap
page read and write
D610E000
direct allocation
page read and write
1BF0D000
heap
page read and write
1B8E8000
heap
page read and write
66635000
unkown
page write copy
1BDA2000
heap
page read and write
1C05B000
heap
page read and write
19943000
heap
page read and write
1BCFA000
heap
page read and write
1B994000
heap
page read and write
D647B000
direct allocation
page read and write
1C03D000
heap
page read and write
7FF743C55000
unkown
page readonly
1BB8D000
heap
page read and write
1B5EA000
heap
page read and write
1B8E8000
heap
page read and write
1BE4D000
heap
page read and write
1D2C1000
heap
page read and write
1BE87000
heap
page read and write
D64DF000
direct allocation
page read and write
1BCF6000
heap
page read and write
66697000
unkown
page read and write
356E000
heap
page read and write
1D474000
heap
page read and write
1BC4F000
heap
page read and write
1D464000
heap
page read and write
1BE87000
heap
page read and write
1B98B000
heap
page read and write
1D35B000
heap
page read and write
1BC33000
heap
page read and write
1BAF0000
heap
page read and write
1BF8D000
heap
page read and write
1BBF6000
heap
page read and write
1B738000
heap
page read and write
7FFE1330D000
unkown
page readonly
1BC34000
heap
page read and write
1D332000
heap
page read and write
D5E3A000
direct allocation
page read and write
7FDD7FE000
unkown
page read and write
1BF10000
heap
page read and write
1BEA4000
heap
page read and write
1BCB8000
heap
page read and write
7FF743C10000
unkown
page readonly
1B933000
heap
page read and write
1B838000
heap
page read and write
1B938000
heap
page read and write
1BCC1000
heap
page read and write
2617000
heap
page read and write
1BEDE000
heap
page read and write
1BF95000
heap
page read and write
1D3C4000
heap
page read and write
2629000
heap
page read and write
D64DB000
direct allocation
page read and write
1D2F1000
heap
page read and write
1D379000
heap
page read and write
1D34B000
heap
page read and write
D57DB000
direct allocation
page read and write
1D3BB000
heap
page read and write
1B959000
heap
page read and write
1BD01000
heap
page read and write
1B8E8000
heap
page read and write
1BF27000
heap
page read and write
1B8C2000
heap
page read and write
1D4D2000
heap
page read and write
6663F000
unkown
page write copy
1BD42000
heap
page read and write
1D45C000
heap
page read and write
1B951000
heap
page read and write
6669F000
unkown
page read and write
1BF27000
heap
page read and write
1B924000
heap
page read and write
4F05000
direct allocation
page execute and read and write
1BB0E000
heap
page read and write
1BB84000
heap
page read and write
1D5C6000
heap
page read and write
6663F000
unkown
page write copy
356A000
heap
page read and write
66656000
unkown
page read and write
1BDA2000
heap
page read and write
1BECD000
heap
page read and write
1BCA3000
heap
page read and write
1B98C000
heap
page read and write
1D5C6000
heap
page read and write
7FDCDFE000
stack
page read and write
1B741000
heap
page read and write
1D589000
heap
page read and write
B54000
heap
page read and write
D55BB000
direct allocation
page read and write
1D5EC000
heap
page read and write
1B47D000
stack
page read and write
1BF95000
heap
page read and write
D5B7A000
direct allocation
page read and write
1BB8B000
heap
page read and write
1BF27000
heap
page read and write
1BBA7000
heap
page read and write
1BFE4000
heap
page read and write
1BD01000
heap
page read and write
D6883000
direct allocation
page read and write
1BC79000
heap
page read and write
21D533A7000
heap
page read and write
1C7AA000
unkown
page read and write
261A000
heap
page read and write
7FFE126E1000
unkown
page execute read
1B924000
heap
page read and write
1D4C6000
heap
page read and write
1D5E6000
heap
page read and write
1BC3C000
heap
page read and write
1BC9D000
heap
page read and write
6662E000
unkown
page read and write
1BC6A000
heap
page read and write
1BC92000
heap
page read and write
1BC73000
heap
page read and write
D661F000
direct allocation
page read and write
1BD3B000
heap
page read and write
1D403000
heap
page read and write
1B924000
heap
page read and write
D5E36000
direct allocation
page read and write
1B8CA000
heap
page read and write
1BE44000
heap
page read and write
1BA9F000
heap
page read and write
D579B000
direct allocation
page read and write
1C5BE000
unkown
page read and write
1BB2A000
heap
page read and write
1BB2A000
heap
page read and write
D6404000
direct allocation
page read and write
1BD71000
heap
page read and write
1BBFD000
heap
page read and write
21D3CC13000
heap
page read and write
1B90E000
heap
page read and write
1D49C000
heap
page read and write
21D52B4C000
heap
page read and write
1B8D2000
heap
page read and write
1B078000
unkown
page read and write
7FDDAFA000
unkown
page read and write
21D3CCB0000
heap
page read and write
21D53368000
heap
page read and write
1BF75000
heap
page read and write
21D3E4C8000
direct allocation
page execute and read and write
21D52B0C000
heap
page read and write
B82000
heap
page read and write
28F0000
unkown
page read and write
D63FD000
direct allocation
page read and write
1B751000
heap
page read and write
1BC8B000
heap
page read and write
1BCEC000
heap
page read and write
261D000
heap
page read and write
1BCD0000
heap
page read and write
1C04C000
heap
page read and write
7FFDFF300000
unkown
page write copy
1C042000
heap
page read and write
D67E9000
direct allocation
page read and write
1D5C5000
heap
page read and write
1498D000
stack
page read and write
1BC49000
heap
page read and write
D5898000
direct allocation
page read and write
1B924000
heap
page read and write
21D3CA00000
heap
page read and write
1BFB0000
heap
page read and write
1BCA8000
heap
page read and write
1BB93000
heap
page read and write
1D494000
heap
page read and write
1B728000
heap
page read and write
261F000
heap
page read and write
21D3E470000
direct allocation
page execute and read and write
21D3CBD0000
heap
page read and write
1BB9B000
heap
page read and write
1BE08000
heap
page read and write
D5580000
direct allocation
page read and write
1D3C9000
heap
page read and write
1B888000
heap
page read and write
1BDA2000
heap
page read and write
21D52B65000
heap
page read and write
D6A73000
direct allocation
page read and write
1BB8D000
heap
page read and write
D5C8C000
direct allocation
page read and write
7FFE13235000
unkown
page read and write
7FFE13237000
unkown
page readonly
1B974000
heap
page read and write
1BCD0000
heap
page read and write
1BAE9000
heap
page read and write
1B94E000
heap
page read and write
1BD01000
heap
page read and write
1D5F2000
heap
page read and write
1D5C5000
heap
page read and write
1BD90000
heap
page read and write
1BF95000
heap
page read and write
2612000
heap
page read and write
1CCBE000
direct allocation
page read and write
1B949000
heap
page read and write
1D48F000
heap
page read and write
B8B000
heap
page read and write
1BF85000
heap
page read and write
D55B6000
direct allocation
page read and write
1BA16000
heap
page read and write
1B7F9000
heap
page read and write
1BFE4000
heap
page read and write
666A4000
unkown
page readonly
198D4000
heap
page read and write
1BAF8000
heap
page read and write
1BEDE000
heap
page read and write
1BFC1000
heap
page read and write
D6409000
direct allocation
page read and write
19771000
heap
page read and write
1BF46000
heap
page read and write
7FF743C11000
unkown
page execute read
1BBB7000
heap
page read and write
1C044000
heap
page read and write
1BE48000
heap
page read and write
1ED3F000
stack
page read and write
1B768000
heap
page read and write
D5593000
direct allocation
page read and write
1BCC8000
heap
page read and write
1BB2A000
heap
page read and write
1D5F5000
heap
page read and write
18E90000
direct allocation
page read and write
1BE02000
heap
page read and write
D5F4D000
direct allocation
page read and write
66630000
unkown
page write copy
1C054000
heap
page read and write
1BC49000
heap
page read and write
1B639000
heap
page read and write
1BDAE000
heap
page read and write
1D57C000
heap
page read and write
1BC62000
heap
page read and write
1C03D000
heap
page read and write
4EC5000
direct allocation
page execute and read and write
1BD3A000
heap
page read and write
1BC3B000
heap
page read and write
1BCD2000
heap
page read and write
1B951000
heap
page read and write
1D5C5000
heap
page read and write
1B27B000
unkown
page read and write
1BF8D000
heap
page read and write
6663A000
unkown
page write copy
7FDD2FE000
stack
page read and write
1BEE0000
heap
page read and write
21D3E4EC000
direct allocation
page execute and read and write
66692000
unkown
page read and write
66651000
unkown
page write copy
1B8E2000
heap
page read and write
D6095000
direct allocation
page read and write
1BC2F000
heap
page read and write
1BCA6000
heap
page read and write
1BCF6000
heap
page read and write
7FDCFFE000
stack
page read and write
66692000
unkown
page read and write
1BC82000
heap
page read and write
1BB82000
heap
page read and write
1B85B000
heap
page read and write
1CAC8000
heap
page read and write
1BB8D000
heap
page read and write
7FF743C4F000
unkown
page read and write
1BCA8000
heap
page read and write
66676000
unkown
page read and write
1BFE5000
heap
page read and write
1B821000
heap
page read and write
D6A70000
direct allocation
page read and write
D63DC000
direct allocation
page read and write
1CEBF000
direct allocation
page read and write
1BCD0000
heap
page read and write
1BCB8000
heap
page read and write
1B5F7000
heap
page read and write
1BCF6000
heap
page read and write
7FDDBFE000
unkown
page read and write
21D52B11000
heap
page read and write
1BE5C000
heap
page read and write
1B904000
heap
page read and write
1D5E6000
heap
page read and write
1BBA7000
heap
page read and write
1B8D2000
heap
page read and write
1BBF7000
heap
page read and write
1BE60000
heap
page read and write
1CE50000
direct allocation
page read and write
1BE5C000
heap
page read and write
1B90E000
heap
page read and write
1D4CB000
heap
page read and write
1BCA6000
heap
page read and write
1BDF2000
heap
page read and write
AE0000
heap
page read and write
1B8DB000
heap
page read and write
1BD73000
heap
page read and write
21D5339F000
heap
page read and write
D5A9A000
direct allocation
page read and write
1D3DD000
heap
page read and write
1BAF8000
heap
page read and write
1BEDD000
heap
page read and write
7FDD3FD000
stack
page read and write
1BDFB000
heap
page read and write
1BE48000
heap
page read and write
1C015000
heap
page read and write
D61A3000
direct allocation
page read and write
1D59E000
heap
page read and write
1BD11000
heap
page read and write
1B5C2000
heap
page read and write
1D328000
heap
page read and write
1BFEC000
heap
page read and write
1B178000
unkown
page read and write
D57C8000
direct allocation
page read and write
1BDF0000
heap
page read and write
6669F000
unkown
page read and write
1D5C5000
heap
page read and write
1B924000
heap
page read and write
1BCF6000
heap
page read and write
2860000
heap
page read and write
66633000
unkown
page write copy
1B85B000
heap
page read and write
1BCB8000
heap
page read and write
1B7D0000
heap
page read and write
1B8FC000
heap
page read and write
B38000
heap
page read and write
1BD01000
heap
page read and write
1BAB9000
heap
page read and write
D5F9F000
direct allocation
page read and write
1BB97000
heap
page read and write
7FDD4FD000
stack
page read and write
1BC33000
heap
page read and write
1BC1E000
heap
page read and write
1BAB1000
heap
page read and write
1D5C5000
heap
page read and write
1BE4D000
heap
page read and write
1C02C000
heap
page read and write
3748000
stack
page read and write
1BB53000
heap
page read and write
D641C000
direct allocation
page read and write
1B8F5000
heap
page read and write
261A000
heap
page read and write
2623000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
D6642000
direct allocation
page read and write
21D5337C000
heap
page read and write
1BCCC000
heap
page read and write
1B828000
heap
page read and write
1BB0E000
heap
page read and write
1D48F000
heap
page read and write
1BCDD000
heap
page read and write
7FF743C3E000
unkown
page readonly
1BB9B000
heap
page read and write
1BD71000
heap
page read and write
66654000
unkown
page write copy
1D45C000
heap
page read and write
D67D2000
direct allocation
page read and write
7FF75B860000
unkown
page readonly
D5BD4000
direct allocation
page read and write
1BCCC000
heap
page read and write
7FDD6FE000
unkown
page read and write
1BB64000
heap
page read and write
1BEDC000
heap
page read and write
1BE44000
heap
page read and write
1BCD2000
heap
page read and write
21D52BF5000
heap
page read and write
1BC33000
heap
page read and write
1BCD4000
heap
page read and write
1BF5A000
heap
page read and write
1B951000
heap
page read and write
1BFEC000
heap
page read and write
21D53386000
heap
page read and write
1CAC0000
direct allocation
page read and write
1BEDE000
heap
page read and write
D55A5000
direct allocation
page read and write
276A000
heap
page read and write
100000000
direct allocation
page read and write
1B904000
heap
page read and write
7FFE126F4000
unkown
page read and write
D58D4000
direct allocation
page read and write
D6411000
direct allocation
page read and write
1BADD000
heap
page read and write
1BF82000
heap
page read and write
65EC0000
unkown
page readonly
1BD01000
heap
page read and write
1BC82000
heap
page read and write
1CCB2000
direct allocation
page read and write
66654000
unkown
page write copy
1BE66000
heap
page read and write
7FFDFF270000
unkown
page readonly
1EF3E000
stack
page read and write
1BC9A000
heap
page read and write
1BCD0000
heap
page read and write
1BAF8000
heap
page read and write
1B7A0000
heap
page read and write
1B8E4000
heap
page read and write
7FF75B861000
unkown
page execute read
D55A1000
direct allocation
page read and write
1BCD4000
heap
page read and write
1B7A0000
heap
page read and write
1BAC1000
heap
page read and write
D6547000
direct allocation
page read and write
1BCCC000
heap
page read and write
66651000
unkown
page write copy
1B523000
heap
page read and write
D641A000
direct allocation
page read and write
1B951000
heap
page read and write
1BC62000
heap
page read and write
1D332000
heap
page read and write
1B90F000
heap
page read and write
1BFE4000
heap
page read and write
D6338000
direct allocation
page read and write
1BC5A000
heap
page read and write
1BB82000
heap
page read and write
D587A000
direct allocation
page read and write
1BF18000
heap
page read and write
21D52B5E000
heap
page read and write
2629000
heap
page read and write
66659000
unkown
page write copy
2629000
heap
page read and write
1B4CC000
heap
page read and write
1B881000
heap
page read and write
1C3BE000
direct allocation
page read and write
1D3C9000
heap
page read and write
7FF743C52000
unkown
page readonly
D5F81000
direct allocation
page read and write
D588D000
direct allocation
page read and write
1BDF0000
heap
page read and write
262C000
heap
page read and write
1D40C000
heap
page read and write
D6894000
direct allocation
page read and write
25D0000
heap
page read and write
198B0000
heap
page read and write
1D5F5000
heap
page read and write
66633000
unkown
page write copy
1D34B000
heap
page read and write
D5FC2000
direct allocation
page read and write
1BCCC000
heap
page read and write
1BECC000
heap
page read and write
1BCF6000
heap
page read and write
D5626000
direct allocation
page read and write
D5887000
direct allocation
page read and write
1BCD4000
heap
page read and write
1B90B000
heap
page read and write
D6B3C000
direct allocation
page read and write
1B94E000
heap
page read and write
7AD000
stack
page read and write
1BCD2000
heap
page read and write
1BFC1000
heap
page read and write
2612000
heap
page read and write
2614000
heap
page read and write
1BAA9000
heap
page read and write
1C6B6000
unkown
page read and write
1B854000
heap
page read and write
1B705000
heap
page read and write
1D3D1000
heap
page read and write
1B629000
heap
page read and write
1D5EC000
heap
page read and write
1BD6A000
heap
page read and write
21D532F0000
heap
page read and write
1B905000
heap
page read and write
1BE13000
heap
page read and write
1BCB8000
heap
page read and write
1BE8E000
heap
page read and write
1BE27000
heap
page read and write
1D3F0000
heap
page read and write
1D328000
heap
page read and write
1BF85000
heap
page read and write
1BE44000
heap
page read and write
1BB97000
heap
page read and write
1BAD9000
heap
page read and write
1D328000
heap
page read and write
1BB8E000
heap
page read and write
261D000
heap
page read and write
1980E000
heap
page read and write
1BE12000
heap
page read and write
2913000
heap
page read and write
D5BF6000
direct allocation
page read and write
1B8E8000
heap
page read and write
1BCD2000
heap
page read and write
1BCCC000
heap
page read and write
66635000
unkown
page write copy
1D5F5000
heap
page read and write
1B951000
heap
page read and write
1B5BA000
heap
page read and write
1B5E3000
heap
page read and write
1B6A7000
heap
page read and write
1D5C5000
heap
page read and write
1CEBB000
direct allocation
page read and write
1BBFD000
heap
page read and write
1BB5B000
heap
page read and write
1B670000
heap
page read and write
1D2C0000
heap
page read and write
1BBBE000
heap
page read and write
1BE8C000
heap
page read and write
1D57F000
heap
page read and write
2629000
heap
page read and write
1BDA2000
heap
page read and write
1B8D7000
heap
page read and write
1B949000
heap
page read and write
1B759000
heap
page read and write
2618000
heap
page read and write
1BCD0000
heap
page read and write
1BF85000
heap
page read and write
1AA7E000
stack
page read and write
1BCCC000
heap
page read and write
1B8ED000
heap
page read and write
1BBB6000
heap
page read and write
66676000
unkown
page read and write
2743000
heap
page read and write
274B000
heap
page read and write
D5B7D000
direct allocation
page read and write
1BC9D000
heap
page read and write
1D49D000
heap
page read and write
1BBCF000
heap
page read and write
D57B7000
direct allocation
page read and write
1BFCA000
heap
page read and write
1B9D5000
heap
page read and write
66659000
unkown
page write copy
1D2C3000
heap
page read and write
1B90B000
heap
page read and write
D5923000
direct allocation
page read and write
1B8E2000
heap
page read and write
21D3E4B5000
direct allocation
page execute and read and write
6663A000
unkown
page write copy
1BCD2000
heap
page read and write
7FFE13240000
unkown
page readonly
1B8FC000
heap
page read and write
1BB2B000
heap
page read and write
1BE44000
heap
page read and write
1BD32000
heap
page read and write
1BE48000
heap
page read and write
1BC9D000
heap
page read and write
1B8AA000
heap
page read and write
D55B7000
direct allocation
page read and write
1BBB6000
heap
page read and write
1BE44000
heap
page read and write
1B760000
heap
page read and write
1BF6F000
heap
page read and write
666A4000
unkown
page readonly
1BF50000
heap
page read and write
7FFDFF309000
unkown
page readonly
3945000
unkown
page read and write
D6630000
direct allocation
page read and write
1D48F000
heap
page read and write
1B994000
heap
page read and write
1B4DB000
heap
page read and write
1BF76000
heap
page read and write
2740000
heap
page read and write
D60DD000
direct allocation
page read and write
D641F000
direct allocation
page read and write
21D52B1D000
heap
page read and write
1B889000
heap
page read and write
1D332000
heap
page read and write
1D33C000
heap
page read and write
1D58D000
heap
page read and write
7FF75B8AA000
unkown
page readonly
1BEAC000
heap
page read and write
7FF743C59000
unkown
page readonly
1BC92000
heap
page read and write
1BAE7000
heap
page read and write
1BE27000
heap
page read and write
1BCFA000
heap
page read and write
1BFB0000
heap
page read and write
7FFE13300000
unkown
page readonly
1C014000
heap
page read and write
1D2D0000
heap
page read and write
1BB6B000
heap
page read and write
D667D000
direct allocation
page read and write
7FFE13301000
unkown
page execute read
D5876000
direct allocation
page read and write
1B736000
heap
page read and write
1D2C7000
heap
page read and write
1B99B000
heap
page read and write
7FFDFF271000
unkown
page execute read
21D3E56B000
direct allocation
page execute and read and write
1D5BD000
heap
page read and write
D5B89000
direct allocation
page read and write
1B7F0000
heap
page read and write
1BB08000
heap
page read and write
7FFE13311000
unkown
page read and write
1B4C2000
heap
page read and write
1BE48000
heap
page read and write
1BB01000
heap
page read and write
1D5F2000
heap
page read and write
7FDD9FE000
unkown
page read and write
1AB7D000
unkown
page read and write
7FF743C55000
unkown
page readonly
1B917000
heap
page read and write
1BE44000
heap
page read and write
2624000
heap
page read and write
1BF95000
heap
page read and write
2614000
heap
page read and write
1B71A000
heap
page read and write
D6A6E000
direct allocation
page read and write
6664F000
unkown
page read and write
1BE27000
heap
page read and write
21D53315000
heap
page read and write
1B940000
heap
page read and write
1BD01000
heap
page read and write
1CEC0000
direct allocation
page read and write
1D3C6000
heap
page read and write
7FFE126ED000
unkown
page readonly
1C01D000
heap
page read and write
1B620000
heap
page read and write
7B3000
stack
page read and write
1B687000
heap
page read and write
1D5C5000
heap
page read and write
1BCFA000
heap
page read and write
1B924000
heap
page read and write
D63F9000
direct allocation
page read and write
1B610000
heap
page read and write
21D3CAE0000
heap
page read and write
1B924000
heap
page read and write
6663D000
unkown
page read and write
1BF33000
heap
page read and write
1D3C6000
heap
page read and write
B85000
heap
page read and write
1B904000
heap
page read and write
D65D7000
direct allocation
page read and write
D6431000
direct allocation
page read and write
B7C000
heap
page read and write
198C4000
heap
page read and write
1B780000
heap
page read and write
1D40C000
heap
page read and write
1B771000
heap
page read and write
1BCA6000
heap
page read and write
7FDDCFC000
unkown
page read and write
2D60000
trusted library allocation
page read and write
66652000
unkown
page read and write
1D332000
heap
page read and write
B50000
heap
page read and write
4F18000
direct allocation
page execute and read and write
2624000
heap
page read and write
7FF743C11000
unkown
page execute read
1B5FE000
heap
page read and write
4FAD000
direct allocation
page execute and read and write
1B949000
heap
page read and write
7FFE13248000
unkown
page readonly
1BCCC000
heap
page read and write
1B951000
heap
page read and write
1D3C9000
heap
page read and write
1D5F5000
heap
page read and write
7FFDFF303000
unkown
page readonly
D5580000
direct allocation
page read and write
1B37E000
unkown
page read and write
1BFC8000
heap
page read and write
1B90E000
heap
page read and write
1B993000
heap
page read and write
1BFCC000
heap
page read and write
1C044000
heap
page read and write
21D3E4D1000
direct allocation
page execute and read and write
2629000
heap
page read and write
2910000
heap
page read and write
1B938000
heap
page read and write
D5C33000
direct allocation
page read and write
1BCF6000
heap
page read and write
1D589000
heap
page read and write
1C044000
heap
page read and write
D6406000
direct allocation
page read and write
1B4D7000
heap
page read and write
1BDA2000
heap
page read and write
1BB28000
heap
page read and write
BAA000
heap
page read and write
1B918000
heap
page read and write
1D4D2000
heap
page read and write
1B924000
heap
page read and write
D58FC000
direct allocation
page read and write
1BF8D000
heap
page read and write
1BCCC000
heap
page read and write
1BC2E000
heap
page read and write
1D2E5000
heap
page read and write
1C04C000
heap
page read and write
1D403000
heap
page read and write
2618000
heap
page read and write
2629000
heap
page read and write
1D5DE000
heap
page read and write
D5592000
direct allocation
page read and write
198C5000
heap
page read and write
1D46D000
heap
page read and write
1BF10000
heap
page read and write
21D52AF6000
heap
page read and write
1BCD4000
heap
page read and write
1B7E9000
heap
page read and write
1C01D000
heap
page read and write
6662E000
unkown
page read and write
65EC0000
unkown
page readonly
D5CD4000
direct allocation
page read and write
1B9FE000
heap
page read and write
D55EC000
direct allocation
page read and write
1BC31000
heap
page read and write
1D5E6000
heap
page read and write
D55AB000
direct allocation
page read and write
21D5334A000
heap
page read and write
1BC31000
heap
page read and write
1B90F000
heap
page read and write
6664F000
unkown
page read and write
1BB8D000
heap
page read and write
2616000
heap
page read and write
1BDA2000
heap
page read and write
1BF0B000
heap
page read and write
2623000
heap
page read and write
1B8FC000
heap
page read and write
1BFEC000
heap
page read and write
66634000
unkown
page read and write
1BEE0000
heap
page read and write
21D3CB70000
unkown
page read and write
2624000
heap
page read and write
1B677000
heap
page read and write
1B8CA000
heap
page read and write
1B939000
heap
page read and write
1C044000
heap
page read and write
2614000
heap
page read and write
1B480000
heap
page read and write
1B4CB000
heap
page read and write
1BD8F000
heap
page read and write
19690000
heap
page read and write
B10000
heap
page read and write
D6466000
direct allocation
page read and write
D55A0000
direct allocation
page read and write
1B8F4000
heap
page read and write
1C1C0000
direct allocation
page read and write
1BDAE000
heap
page read and write
1B958000
heap
page read and write
1C062000
heap
page read and write
1B94E000
heap
page read and write
1BB82000
heap
page read and write
19790000
heap
page read and write
1D5F5000
heap
page read and write
1BAF1000
heap
page read and write
1BFEC000
heap
page read and write
7FF75B8DD000
unkown
page readonly
1BFC1000
heap
page read and write
21D3CB00000
heap
page read and write
1BD6A000
heap
page read and write
7FFE13312000
unkown
page readonly
D60FD000
direct allocation
page read and write
6669A000
unkown
page read and write
1BE02000
heap
page read and write
1B951000
heap
page read and write
1BB0E000
heap
page read and write
1BCFA000
heap
page read and write
21D4D470000
direct allocation
page read and write
1BE67000
heap
page read and write
66637000
unkown
page read and write
1BDF2000
heap
page read and write
1B951000
heap
page read and write
1B7B9000
heap
page read and write
2629000
heap
page read and write
D55E8000
direct allocation
page read and write
1987B000
heap
page read and write
1BFCA000
heap
page read and write
1B905000
heap
page read and write
19518000
direct allocation
page read and write
1BAC8000
heap
page read and write
1BCCC000
heap
page read and write
1D49C000
heap
page read and write
1BB0E000
heap
page read and write
D6B10000
direct allocation
page read and write
66632000
unkown
page read and write
D55BA000
direct allocation
page read and write
66632000
unkown
page read and write
2610000
heap
page read and write
1BFA7000
heap
page read and write
1BAC8000
heap
page read and write
6669A000
unkown
page read and write
66656000
unkown
page read and write
1BCD0000
heap
page read and write
There are 1047 hidden memdumps, click here to show them.