Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
CMV610942X6UI.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\CMV610942X6UI.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\382-I9W6
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie
0x36, schema 4, UTF-8, version-valid-for 7
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\CMV610942X6UI.exe
|
"C:\Users\user\Desktop\CMV610942X6UI.exe"
|
||
C:\Users\user\Desktop\CMV610942X6UI.exe
|
"C:\Users\user\Desktop\CMV610942X6UI.exe"
|
||
C:\Program Files (x86)\qmyTqsyASmnirROrrGPUAVVuMokfPsDJosPLtapXkJcNKzqCUrbJkLLlFHKY\ZkqZZBQxQqm.exe
|
"C:\Program Files (x86)\qmyTqsyASmnirROrrGPUAVVuMokfPsDJosPLtapXkJcNKzqCUrbJkLLlFHKY\ZkqZZBQxQqm.exe"
|
||
C:\Windows\SysWOW64\systray.exe
|
"C:\Windows\SysWOW64\systray.exe"
|
||
C:\Program Files (x86)\qmyTqsyASmnirROrrGPUAVVuMokfPsDJosPLtapXkJcNKzqCUrbJkLLlFHKY\ZkqZZBQxQqm.exe
|
"C:\Program Files (x86)\qmyTqsyASmnirROrrGPUAVVuMokfPsDJosPLtapXkJcNKzqCUrbJkLLlFHKY\ZkqZZBQxQqm.exe"
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\Firefox.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://www.kwytruband.cloud
|
unknown
|
||
http://www.kwytruband.cloud/siy1/?Efup=K3jVd2QwvP/vE5bLqRwLiG/ouCi2dCf8HcrsXZX+iIcvtfjJNCMaZ4cNZ/78hy4DUFhEXV0DZOcTULe6zQ1rJbzjmaVovzYps5hxNWqkCnG6IikFfqhaq5tMJN6I5yDLJQ==&5X=Wrl4wnYP
|
124.156.180.97
|
||
https://www.herplaatsingscoach.com/wwqg/?Efup=cPWBLmqfYdwFLm3BEseWSNTw863lhs9YSZmOJUbUOjzc/4eC4u1GiX
|
unknown
|
||
http://www.aotuqiye.com/kyls/
|
104.21.10.169
|
||
http://www.marinestoreng.com/w7zx/
|
131.153.148.82
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://www.kwytruband.cloud/siy1/
|
124.156.180.97
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://www.tutoringservices-jp.space/7kq8/
|
64.190.62.22
|
||
http://www.zethcraft.info/d5d3/?Efup=XQbeRjD/PDdWBh12NU+ykUl2F4dvHc6VXEhqzGSjB3wJSjcs0xwI8Icac1G5+8QpiM7OSYRY7+DwwJfqawKXGWKHnDunR+LM5fl2Yw480JpoJUWygYqvECbW/AkZxLcv1w==&5X=Wrl4wnYP
|
203.161.62.199
|
||
http://www.thirstythursdaywines.com/bakr/?Efup=XDoTgsrtu8W4rBGfVFPBe+VTMhp4aj1fDDoEglHaJ5OOwDCoRETt6EMOwV71ZOd09KZu8+ugWGfmhcxQhERPkTRicN45Uigraquu8zuJ3nqxw5c62M4XByCrclFahX0wxg==&5X=Wrl4wnYP
|
38.207.228.45
|
||
http://www.aotuqiye.com/kyls/?Efup=rBqEkS5/F5fti2d01GsRL+09s9Yw9GfL+xb/bd6jjd9iqmgZJUglXlxIaQ37OHsjGQRRYNPuqH7W49E+lFfrzONNxRCWpYpdl2nohzXrMm+ut6S054Q8wZKBKIXyn1qR4w==&5X=Wrl4wnYP
|
104.21.10.169
|
||
https://www.sedo.com/services/parking.php3
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://www.google.com
|
unknown
|
||
http://www.zethcraft.info/d5d3/
|
203.161.62.199
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://www.mommysdaycare.net/9tym/?Efup=0S/ZPq6i4295YU31CGsIF3+6CX49wr8UBlIPMbX3EHvT6GYfIlkKvIaQUZZ23gNfBRY92LbOf61zdN1D+KaxZKPZCNQTzZg2JqvKwBvhTNR6FU45NnpKZwAnu57SnFRcaQ==&5X=Wrl4wnYP
|
199.59.243.226
|
||
http://www.marinestoreng.com/w7zx/?Efup=4nFzxviigBNCR0XnJkvhNhUb0o3qDKAKJVt5c0EBpnWfgFZ7hCzAhg6W/oCSYblqABe344EIzDMItVaOjGR7QKZXmGlK5CURSd3zTznCfgDClaltbyP35QucHh8Re5qnMA==&5X=Wrl4wnYP
|
131.153.148.82
|
||
http://www.herplaatsingscoach.com/wwqg/?Efup=cPWBLmqfYdwFLm3BEseWSNTw863lhs9YSZmOJUbUOjzc/4eC4u1GiXOWq2hFnbSrpYq5tfQM8qwnGlhpBH7wUMA2rqYfQo8R+3WIcA6o0TPRBDA7dTlRc+xV9X/9AN+Ulg==&5X=Wrl4wnYP
|
35.214.213.30
|
||
http://www.herplaatsingscoach.com/wwqg/
|
35.214.213.30
|
||
http://www.tutoringservices-jp.space/7kq8/?Efup=gtM5/A+y2ZoJWEDfDaE+2w6kJ8M6pgUfoEVlPe5CjlMa7apflPEeb4hE3FwUuugxFTbEVrAuO+b6prDKuBbSe95OhQpk0L9IAVb1ZHk0JEw5+OIIQunEo+vX5ya5UUiI4w==&5X=Wrl4wnYP
|
64.190.62.22
|
||
http://www.mommysdaycare.net/9tym/
|
199.59.243.226
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 17 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.tapnly.online
|
unknown
|
||
www.marinestoreng.com
|
unknown
|
||
www.mommysdaycare.net
|
199.59.243.226
|
||
marinestoreng.com
|
131.153.148.82
|
||
www.tutoringservices-jp.space
|
64.190.62.22
|
||
www.kwytruband.cloud
|
124.156.180.97
|
||
www.thirstythursdaywines.com
|
38.207.228.45
|
||
www.zethcraft.info
|
203.161.62.199
|
||
www.aotuqiye.com
|
104.21.10.169
|
||
www.herplaatsingscoach.com
|
35.214.213.30
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
38.207.228.45
|
www.thirstythursdaywines.com
|
United States
|
||
124.156.180.97
|
www.kwytruband.cloud
|
Singapore
|
||
199.59.243.226
|
www.mommysdaycare.net
|
United States
|
||
203.161.62.199
|
www.zethcraft.info
|
Malaysia
|
||
64.190.62.22
|
www.tutoringservices-jp.space
|
United States
|
||
104.21.10.169
|
www.aotuqiye.com
|
United States
|
||
131.153.148.82
|
marinestoreng.com
|
United States
|
||
35.214.213.30
|
www.herplaatsingscoach.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4ED0000
|
trusted library allocation
|
page read and write
|
||
1360000
|
unclassified section
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
A20000
|
unclassified section
|
page execute and read and write
|
||
3230000
|
system
|
page execute and read and write
|
||
2BA0000
|
unkown
|
page execute and read and write
|
||
1110000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
29FF000
|
stack
|
page read and write
|
||
5C60000
|
heap
|
page read and write
|
||
150A2EBE000
|
trusted library allocation
|
page read and write
|
||
34C0000
|
unkown
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4EA0000
|
heap
|
page read and write
|
||
CE0000
|
unkown
|
page readonly
|
||
CE1000
|
unkown
|
page execute read
|
||
28BB000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
CEE000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
113E000
|
heap
|
page read and write
|
||
CC0000
|
unkown
|
page read and write
|
||
8314000
|
heap
|
page read and write
|
||
2850000
|
trusted library allocation
|
page read and write
|
||
894E000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
3550000
|
heap
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
CA0000
|
trusted library allocation
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
52F9000
|
direct allocation
|
page execute and read and write
|
||
28B4000
|
heap
|
page read and write
|
||
CE1000
|
unkown
|
page execute read
|
||
CD0000
|
unkown
|
page readonly
|
||
4FC0000
|
trusted library allocation
|
page execute and read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
14A0000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
150A2D18000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
trusted library allocation
|
page read and write
|
||
1110000
|
unkown
|
page readonly
|
||
C27000
|
trusted library allocation
|
page execute and read and write
|
||
4EB6000
|
trusted library allocation
|
page read and write
|
||
150A12F7000
|
heap
|
page read and write
|
||
536E000
|
direct allocation
|
page execute and read and write
|
||
591E000
|
stack
|
page read and write
|
||
3517000
|
heap
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
6CA000
|
stack
|
page read and write
|
||
D40000
|
unkown
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
D57000
|
heap
|
page read and write
|
||
795E000
|
stack
|
page read and write
|
||
5365000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
CE1000
|
unkown
|
page execute read
|
||
52F0000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
3898000
|
unkown
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
150A2D0F000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
39E1000
|
trusted library allocation
|
page read and write
|
||
28EEFFD000
|
stack
|
page read and write
|
||
21072000
|
system
|
page read and write
|
||
2BAA000
|
trusted library allocation
|
page read and write
|
||
66E2000
|
unclassified section
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
C0D000
|
trusted library allocation
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
CEE000
|
unkown
|
page readonly
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
CF7000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page execute and read and write
|
||
9A0000
|
unkown
|
page readonly
|
||
5BE4000
|
unclassified section
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
7FDE0000
|
trusted library allocation
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
5025000
|
heap
|
page read and write
|
||
150A2D03000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
C3A000
|
stack
|
page read and write
|
||
71D0000
|
trusted library section
|
page read and write
|
||
8334000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
8305000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
27C0000
|
trusted library allocation
|
page read and write
|
||
5152000
|
heap
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
150A130C000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
ECF000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
113A000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
CF5000
|
unkown
|
page read and write
|
||
110F000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2F72000
|
unkown
|
page read and write
|
||
55C0000
|
system
|
page execute and read and write
|
||
B5E000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1069000
|
direct allocation
|
page execute and read and write
|
||
356E000
|
heap
|
page read and write
|
||
3499000
|
heap
|
page read and write
|
||
3274000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
990000
|
unkown
|
page readonly
|
||
C60000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
82FB000
|
heap
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
unkown
|
page readonly
|
||
144F000
|
stack
|
page read and write
|
||
5C4F000
|
stack
|
page read and write
|
||
4204000
|
unkown
|
page read and write
|
||
F59000
|
unkown
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4ADC000
|
stack
|
page read and write
|
||
1550000
|
unkown
|
page readonly
|
||
1130000
|
heap
|
page read and write
|
||
6874000
|
unclassified section
|
page read and write
|
||
2CF0000
|
unkown
|
page readonly
|
||
150A2D0D000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
heap
|
page read and write
|
||
34E5000
|
heap
|
page read and write
|
||
5A1F000
|
stack
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
150A2ECE000
|
trusted library allocation
|
page read and write
|
||
150A1290000
|
heap
|
page read and write
|
||
3706000
|
unkown
|
page read and write
|
||
CF5000
|
unkown
|
page read and write
|
||
2FBB000
|
stack
|
page read and write
|
||
CEE000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
2A20000
|
unkown
|
page read and write
|
||
150A131F000
|
heap
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2CEA000
|
trusted library allocation
|
page read and write
|
||
CF5000
|
unkown
|
page read and write
|
||
3274000
|
heap
|
page read and write
|
||
58C000
|
stack
|
page read and write
|
||
154F000
|
stack
|
page read and write
|
||
58DF000
|
stack
|
page read and write
|
||
C10000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
C50000
|
unkown
|
page readonly
|
||
609A000
|
unclassified section
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
34F9000
|
heap
|
page read and write
|
||
569F000
|
system
|
page execute and read and write
|
||
1350000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
150A2EAF000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
C03000
|
trusted library allocation
|
page read and write
|
||
1120000
|
unkown
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
CD0000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
348A000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
28FE000
|
stack
|
page read and write
|
||
C50000
|
unkown
|
page readonly
|
||
C9A000
|
stack
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
28EFFFE000
|
stack
|
page read and write
|
||
B9D000
|
stack
|
page read and write
|
||
348F000
|
heap
|
page read and write
|
||
D20000
|
unkown
|
page readonly
|
||
43BE000
|
trusted library allocation
|
page read and write
|
||
E0C000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
CF5000
|
unkown
|
page read and write
|
||
CC0000
|
unkown
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
4285000
|
trusted library allocation
|
page read and write
|
||
8378000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
8375000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
8364000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page execute and read and write
|
||
503E000
|
stack
|
page read and write
|
||
150A11B0000
|
heap
|
page read and write
|
||
630000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
2E54000
|
heap
|
page read and write
|
||
52ED000
|
stack
|
page read and write
|
||
C3A000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
106D000
|
direct allocation
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
150A2E01000
|
trusted library allocation
|
page read and write
|
||
824C000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
AD8000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
5070000
|
trusted library allocation
|
page read and write
|
||
C20000
|
unkown
|
page readonly
|
||
1100000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
42D3000
|
trusted library allocation
|
page read and write
|
||
563C000
|
system
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
5C50000
|
heap
|
page read and write
|
||
29E1000
|
trusted library allocation
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
3492000
|
heap
|
page read and write
|
||
8308000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4FDB000
|
stack
|
page read and write
|
||
CF7000
|
unkown
|
page readonly
|
||
4E46000
|
trusted library allocation
|
page read and write
|
||
D1A000
|
heap
|
page read and write
|
||
4E3E000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
11F1000
|
direct allocation
|
page execute and read and write
|
||
CF7000
|
unkown
|
page readonly
|
||
D150000
|
trusted library section
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2E1C000
|
unkown
|
page read and write
|
||
4E41000
|
trusted library allocation
|
page read and write
|
||
1C80000
|
unclassified section
|
page execute and read and write
|
||
6F0E000
|
stack
|
page read and write
|
||
3534000
|
heap
|
page read and write
|
||
82F0000
|
heap
|
page read and write
|
||
C16000
|
trusted library allocation
|
page execute and read and write
|
||
351E000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
5648000
|
system
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
3EE0000
|
unkown
|
page read and write
|
||
150A2E00000
|
trusted library allocation
|
page read and write
|
||
355A000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4EB2000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
C40000
|
unkown
|
page readonly
|
||
28EF7FE000
|
stack
|
page read and write
|
||
8330000
|
heap
|
page read and write
|
||
836D000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2A00000
|
unkown
|
page readonly
|
||
34A5000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2FF8000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
EE0000
|
unkown
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
4F9E000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
5090000
|
heap
|
page execute and read and write
|
||
18E0000
|
unkown
|
page readonly
|
||
3554000
|
heap
|
page read and write
|
||
CEE000
|
unkown
|
page readonly
|
||
4FE000
|
stack
|
page read and write
|
||
F0E000
|
stack
|
page read and write
|
||
10FC000
|
stack
|
page read and write
|
||
2870000
|
heap
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
C40000
|
unkown
|
page readonly
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
2A26000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
5512000
|
direct allocation
|
page execute and read and write
|
||
21132000
|
system
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
3274000
|
heap
|
page read and write
|
||
57DC000
|
unkown
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
BF4000
|
trusted library allocation
|
page read and write
|
||
150A131B000
|
heap
|
page read and write
|
||
4E4D000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
DD1000
|
unkown
|
page readonly
|
||
150A10E0000
|
system
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4072000
|
unkown
|
page read and write
|
||
150A2BA0000
|
trusted library allocation
|
page read and write
|
||
150A1122000
|
system
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
F40000
|
direct allocation
|
page execute and read and write
|
||
833A000
|
heap
|
page read and write
|
||
834E000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
150A2D11000
|
trusted library allocation
|
page read and write
|
||
34F4000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
2EB2000
|
unkown
|
page read and write
|
||
2855000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
4D60000
|
heap
|
page read and write
|
||
3BBC000
|
unkown
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
990000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
10FC000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
CE1000
|
unkown
|
page execute read
|
||
55E2000
|
unclassified section
|
page read and write
|
||
C60000
|
unkown
|
page readonly
|
||
1550000
|
unkown
|
page readonly
|
||
113E000
|
heap
|
page read and write
|
||
3506000
|
heap
|
page read and write
|
||
F5C000
|
unkown
|
page read and write
|
||
3574000
|
unkown
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
DD1000
|
unkown
|
page readonly
|
||
D0E000
|
stack
|
page read and write
|
||
5570000
|
trusted library section
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
F56000
|
unkown
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
710E000
|
stack
|
page read and write
|
||
8244000
|
heap
|
page read and write
|
||
CD1000
|
unkown
|
page readonly
|
||
150A111F000
|
system
|
page execute and read and write
|
||
8FB000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
835D000
|
heap
|
page read and write
|
||
5522000
|
unclassified section
|
page read and write
|
||
113A000
|
heap
|
page read and write
|
||
34F4000
|
heap
|
page read and write
|
||
C20000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
27B0000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
144F000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
27F0000
|
trusted library allocation
|
page execute and read and write
|
||
4E70000
|
heap
|
page read and write
|
||
9D0000
|
direct allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4FE3000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
34E5000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
D20000
|
unkown
|
page readonly
|
||
CE0000
|
unkown
|
page readonly
|
||
C2B000
|
trusted library allocation
|
page execute and read and write
|
||
C1A000
|
trusted library allocation
|
page execute and read and write
|
||
980000
|
unkown
|
page readonly
|
||
1206000
|
direct allocation
|
page execute and read and write
|
||
150A12D0000
|
heap
|
page read and write
|
||
7A5E000
|
stack
|
page read and write
|
||
5070000
|
trusted library allocation
|
page read and write
|
||
C22000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
622C000
|
unclassified section
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
F281000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
150A1322000
|
heap
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1120000
|
unkown
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
150A2EC4000
|
trusted library allocation
|
page read and write
|
||
2E54000
|
heap
|
page read and write
|
||
980000
|
unkown
|
page readonly
|
||
4B0000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
150A2D14000
|
trusted library allocation
|
page read and write
|
||
BFD000
|
trusted library allocation
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
563C000
|
unclassified section
|
page read and write
|
||
CF7000
|
unkown
|
page readonly
|
||
2A00000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
C70000
|
trusted library allocation
|
page execute and read and write
|
||
150A2BA0000
|
trusted library allocation
|
page read and write
|
||
39E9000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
562C000
|
system
|
page execute and read and write
|
||
5F08000
|
unclassified section
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
74D2000
|
trusted library allocation
|
page read and write
|
||
BF3000
|
trusted library allocation
|
page execute and read and write
|
||
52FD000
|
direct allocation
|
page execute and read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
2AB0000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
51C3000
|
heap
|
page read and write
|
||
2860000
|
trusted library allocation
|
page read and write
|
||
D53000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
C30000
|
unkown
|
page readonly
|
||
150A2D21000
|
trusted library allocation
|
page read and write
|
||
3506000
|
heap
|
page read and write
|
||
898F000
|
stack
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
5590000
|
trusted library section
|
page read and write
|
||
71E0000
|
trusted library allocation
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
354A000
|
heap
|
page read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
7C7000
|
stack
|
page read and write
|
||
9A0000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
C88000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2CF0000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
28EE7FB000
|
stack
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
150A2D00000
|
trusted library allocation
|
page read and write
|
||
3A2A000
|
unkown
|
page read and write
|
||
2FCC000
|
unkown
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
150A12F0000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
549D000
|
direct allocation
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
348D000
|
heap
|
page read and write
|
||
C30000
|
unkown
|
page readonly
|
||
DE0000
|
unkown
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1288000
|
direct allocation
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
54A1000
|
direct allocation
|
page execute and read and write
|
||
546F000
|
stack
|
page read and write
|
||
DE0000
|
unkown
|
page read and write
|
||
F18000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
8357000
|
heap
|
page read and write
|
||
3511000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4237000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1C13000
|
unclassified section
|
page execute and read and write
|
||
34F9000
|
heap
|
page read and write
|
||
E0C000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
8300000
|
heap
|
page read and write
|
||
EE0000
|
unkown
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
C12000
|
trusted library allocation
|
page read and write
|
||
28B4000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2A20000
|
unkown
|
page read and write
|
||
D40000
|
unkown
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
120D000
|
direct allocation
|
page execute and read and write
|
||
3521000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
5350000
|
trusted library allocation
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
8240000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
27BE000
|
trusted library allocation
|
page read and write
|
||
4E7B000
|
heap
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
7FC0000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
82F6000
|
heap
|
page read and write
|
||
6550000
|
unclassified section
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
DAA000
|
heap
|
page read and write
|
||
1100000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
700E000
|
stack
|
page read and write
|
||
82E0000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
3498000
|
heap
|
page read and write
|
||
514E000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
51CE000
|
stack
|
page read and write
|
||
8329000
|
heap
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
14A0000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4E24000
|
trusted library allocation
|
page read and write
|
||
3453000
|
unkown
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
heap
|
page read and write
|
||
150A2B90000
|
heap
|
page read and write
|
||
CE0000
|
unkown
|
page readonly
|
||
5070000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
150A1322000
|
heap
|
page read and write
|
||
F18000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
542000
|
unkown
|
page readonly
|
||
3480000
|
heap
|
page read and write
|
||
3528000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
DCF000
|
stack
|
page read and write
|
||
21734000
|
system
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
DA8000
|
heap
|
page read and write
|
||
C9A000
|
stack
|
page read and write
|
||
18E0000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
CD1000
|
unkown
|
page readonly
|
||
1159000
|
heap
|
page read and write
|
||
5360000
|
heap
|
page read and write
|
||
27D8000
|
trusted library allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
7A60000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
5624000
|
system
|
page execute and read and write
|
||
10DE000
|
direct allocation
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
D51000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
150A2D16000
|
trusted library allocation
|
page read and write
|
||
5080000
|
trusted library section
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2EB2000
|
unkown
|
page read and write
|
||
5C84000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
5D76000
|
unclassified section
|
page read and write
|
||
C10000
|
unkown
|
page readonly
|
||
D1E000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
512E000
|
stack
|
page read and write
|
||
150A2C00000
|
trusted library allocation
|
page read and write
|
There are 620 hidden memdumps, click here to show them.