IOC Report
CMV610942X6UI.exe

loading gif

Files

File Path
Type
Category
Malicious
CMV610942X6UI.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\CMV610942X6UI.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\382-I9W6
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\CMV610942X6UI.exe
"C:\Users\user\Desktop\CMV610942X6UI.exe"
malicious
C:\Users\user\Desktop\CMV610942X6UI.exe
"C:\Users\user\Desktop\CMV610942X6UI.exe"
malicious
C:\Program Files (x86)\qmyTqsyASmnirROrrGPUAVVuMokfPsDJosPLtapXkJcNKzqCUrbJkLLlFHKY\ZkqZZBQxQqm.exe
"C:\Program Files (x86)\qmyTqsyASmnirROrrGPUAVVuMokfPsDJosPLtapXkJcNKzqCUrbJkLLlFHKY\ZkqZZBQxQqm.exe"
malicious
C:\Windows\SysWOW64\systray.exe
"C:\Windows\SysWOW64\systray.exe"
malicious
C:\Program Files (x86)\qmyTqsyASmnirROrrGPUAVVuMokfPsDJosPLtapXkJcNKzqCUrbJkLLlFHKY\ZkqZZBQxQqm.exe
"C:\Program Files (x86)\qmyTqsyASmnirROrrGPUAVVuMokfPsDJosPLtapXkJcNKzqCUrbJkLLlFHKY\ZkqZZBQxQqm.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.kwytruband.cloud
unknown
http://www.kwytruband.cloud/siy1/?Efup=K3jVd2QwvP/vE5bLqRwLiG/ouCi2dCf8HcrsXZX+iIcvtfjJNCMaZ4cNZ/78hy4DUFhEXV0DZOcTULe6zQ1rJbzjmaVovzYps5hxNWqkCnG6IikFfqhaq5tMJN6I5yDLJQ==&5X=Wrl4wnYP
124.156.180.97
https://www.herplaatsingscoach.com/wwqg/?Efup=cPWBLmqfYdwFLm3BEseWSNTw863lhs9YSZmOJUbUOjzc/4eC4u1GiX
unknown
http://www.aotuqiye.com/kyls/
104.21.10.169
http://www.marinestoreng.com/w7zx/
131.153.148.82
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.kwytruband.cloud/siy1/
124.156.180.97
https://www.ecosia.org/newtab/
unknown
http://www.tutoringservices-jp.space/7kq8/
64.190.62.22
http://www.zethcraft.info/d5d3/?Efup=XQbeRjD/PDdWBh12NU+ykUl2F4dvHc6VXEhqzGSjB3wJSjcs0xwI8Icac1G5+8QpiM7OSYRY7+DwwJfqawKXGWKHnDunR+LM5fl2Yw480JpoJUWygYqvECbW/AkZxLcv1w==&5X=Wrl4wnYP
203.161.62.199
http://www.thirstythursdaywines.com/bakr/?Efup=XDoTgsrtu8W4rBGfVFPBe+VTMhp4aj1fDDoEglHaJ5OOwDCoRETt6EMOwV71ZOd09KZu8+ugWGfmhcxQhERPkTRicN45Uigraquu8zuJ3nqxw5c62M4XByCrclFahX0wxg==&5X=Wrl4wnYP
38.207.228.45
http://www.aotuqiye.com/kyls/?Efup=rBqEkS5/F5fti2d01GsRL+09s9Yw9GfL+xb/bd6jjd9iqmgZJUglXlxIaQ37OHsjGQRRYNPuqH7W49E+lFfrzONNxRCWpYpdl2nohzXrMm+ut6S054Q8wZKBKIXyn1qR4w==&5X=Wrl4wnYP
104.21.10.169
https://www.sedo.com/services/parking.php3
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com
unknown
http://www.zethcraft.info/d5d3/
203.161.62.199
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.mommysdaycare.net/9tym/?Efup=0S/ZPq6i4295YU31CGsIF3+6CX49wr8UBlIPMbX3EHvT6GYfIlkKvIaQUZZ23gNfBRY92LbOf61zdN1D+KaxZKPZCNQTzZg2JqvKwBvhTNR6FU45NnpKZwAnu57SnFRcaQ==&5X=Wrl4wnYP
199.59.243.226
http://www.marinestoreng.com/w7zx/?Efup=4nFzxviigBNCR0XnJkvhNhUb0o3qDKAKJVt5c0EBpnWfgFZ7hCzAhg6W/oCSYblqABe344EIzDMItVaOjGR7QKZXmGlK5CURSd3zTznCfgDClaltbyP35QucHh8Re5qnMA==&5X=Wrl4wnYP
131.153.148.82
http://www.herplaatsingscoach.com/wwqg/?Efup=cPWBLmqfYdwFLm3BEseWSNTw863lhs9YSZmOJUbUOjzc/4eC4u1GiXOWq2hFnbSrpYq5tfQM8qwnGlhpBH7wUMA2rqYfQo8R+3WIcA6o0TPRBDA7dTlRc+xV9X/9AN+Ulg==&5X=Wrl4wnYP
35.214.213.30
http://www.herplaatsingscoach.com/wwqg/
35.214.213.30
http://www.tutoringservices-jp.space/7kq8/?Efup=gtM5/A+y2ZoJWEDfDaE+2w6kJ8M6pgUfoEVlPe5CjlMa7apflPEeb4hE3FwUuugxFTbEVrAuO+b6prDKuBbSe95OhQpk0L9IAVb1ZHk0JEw5+OIIQunEo+vX5ya5UUiI4w==&5X=Wrl4wnYP
64.190.62.22
http://www.mommysdaycare.net/9tym/
199.59.243.226
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 17 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.tapnly.online
unknown
malicious
www.marinestoreng.com
unknown
malicious
www.mommysdaycare.net
199.59.243.226
marinestoreng.com
131.153.148.82
www.tutoringservices-jp.space
64.190.62.22
www.kwytruband.cloud
124.156.180.97
www.thirstythursdaywines.com
38.207.228.45
www.zethcraft.info
203.161.62.199
www.aotuqiye.com
104.21.10.169
www.herplaatsingscoach.com
35.214.213.30

IPs

IP
Domain
Country
Malicious
38.207.228.45
www.thirstythursdaywines.com
United States
124.156.180.97
www.kwytruband.cloud
Singapore
199.59.243.226
www.mommysdaycare.net
United States
203.161.62.199
www.zethcraft.info
Malaysia
64.190.62.22
www.tutoringservices-jp.space
United States
104.21.10.169
www.aotuqiye.com
United States
131.153.148.82
marinestoreng.com
United States
35.214.213.30
www.herplaatsingscoach.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
4ED0000
trusted library allocation
page read and write
malicious
1360000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
4E90000
trusted library allocation
page read and write
malicious
A20000
unclassified section
page execute and read and write
malicious
3230000
system
page execute and read and write
malicious
2BA0000
unkown
page execute and read and write
malicious
1110000
unkown
page readonly
4D61000
heap
page read and write
CC0000
heap
page read and write
29FF000
stack
page read and write
5C60000
heap
page read and write
150A2EBE000
trusted library allocation
page read and write
34C0000
unkown
page execute and read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
4EA0000
heap
page read and write
CE0000
unkown
page readonly
CE1000
unkown
page execute read
28BB000
stack
page read and write
4D61000
heap
page read and write
CEE000
unkown
page readonly
4D61000
heap
page read and write
4D61000
heap
page read and write
C10000
trusted library allocation
page read and write
113E000
heap
page read and write
CC0000
unkown
page read and write
8314000
heap
page read and write
2850000
trusted library allocation
page read and write
894E000
stack
page read and write
4D61000
heap
page read and write
3550000
heap
page read and write
4F10000
trusted library allocation
page read and write
4D61000
heap
page read and write
CA0000
trusted library allocation
page read and write
500000
heap
page read and write
52F9000
direct allocation
page execute and read and write
28B4000
heap
page read and write
CE1000
unkown
page execute read
CD0000
unkown
page readonly
4FC0000
trusted library allocation
page execute and read and write
C40000
trusted library allocation
page read and write
14A0000
unkown
page readonly
4D61000
heap
page read and write
150A2D18000
trusted library allocation
page read and write
27D0000
trusted library allocation
page read and write
1110000
unkown
page readonly
C27000
trusted library allocation
page execute and read and write
4EB6000
trusted library allocation
page read and write
150A12F7000
heap
page read and write
536E000
direct allocation
page execute and read and write
591E000
stack
page read and write
3517000
heap
page read and write
D8E000
stack
page read and write
6CA000
stack
page read and write
D40000
unkown
page read and write
4D61000
heap
page read and write
D57000
heap
page read and write
795E000
stack
page read and write
5365000
heap
page read and write
4D61000
heap
page read and write
CE1000
unkown
page execute read
52F0000
heap
page read and write
4D61000
heap
page read and write
BD0000
heap
page read and write
3898000
unkown
page read and write
4D61000
heap
page read and write
150A2D0F000
trusted library allocation
page read and write
4D61000
heap
page read and write
39E1000
trusted library allocation
page read and write
28EEFFD000
stack
page read and write
21072000
system
page read and write
2BAA000
trusted library allocation
page read and write
66E2000
unclassified section
page read and write
4D61000
heap
page read and write
C0D000
trusted library allocation
page execute and read and write
4D61000
heap
page read and write
CEE000
unkown
page readonly
5310000
trusted library allocation
page read and write
CF7000
unkown
page readonly
4D61000
heap
page read and write
4D61000
heap
page read and write
D10000
unkown
page readonly
4D61000
heap
page read and write
4EC0000
trusted library allocation
page execute and read and write
9A0000
unkown
page readonly
5BE4000
unclassified section
page read and write
4D61000
heap
page read and write
4E70000
trusted library allocation
page read and write
DCE000
stack
page read and write
4D61000
heap
page read and write
7FDE0000
trusted library allocation
page execute and read and write
4D61000
heap
page read and write
100E000
stack
page read and write
5025000
heap
page read and write
150A2D03000
trusted library allocation
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
C3A000
stack
page read and write
71D0000
trusted library section
page read and write
8334000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
8305000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
27C0000
trusted library allocation
page read and write
5152000
heap
page read and write
28B0000
heap
page read and write
4D61000
heap
page read and write
CBE000
stack
page read and write
150A130C000
heap
page read and write
4D61000
heap
page read and write
ECF000
stack
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
113A000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
CF5000
unkown
page read and write
110F000
stack
page read and write
4D61000
heap
page read and write
2F72000
unkown
page read and write
55C0000
system
page execute and read and write
B5E000
stack
page read and write
4D61000
heap
page read and write
1069000
direct allocation
page execute and read and write
356E000
heap
page read and write
3499000
heap
page read and write
3274000
heap
page read and write
4D61000
heap
page read and write
A30000
heap
page read and write
4D61000
heap
page read and write
990000
unkown
page readonly
C60000
unkown
page readonly
4D61000
heap
page read and write
82FB000
heap
page read and write
5300000
trusted library allocation
page read and write
2AB0000
unkown
page readonly
144F000
stack
page read and write
5C4F000
stack
page read and write
4204000
unkown
page read and write
F59000
unkown
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
4ADC000
stack
page read and write
1550000
unkown
page readonly
1130000
heap
page read and write
6874000
unclassified section
page read and write
2CF0000
unkown
page readonly
150A2D0D000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
51D0000
heap
page read and write
34E5000
heap
page read and write
5A1F000
stack
page read and write
A10000
heap
page read and write
4D61000
heap
page read and write
BE0000
trusted library allocation
page read and write
150A2ECE000
trusted library allocation
page read and write
150A1290000
heap
page read and write
3706000
unkown
page read and write
CF5000
unkown
page read and write
2FBB000
stack
page read and write
CEE000
unkown
page readonly
4D61000
heap
page read and write
2A20000
unkown
page read and write
150A131F000
heap
page read and write
3410000
heap
page read and write
4D61000
heap
page read and write
2CEA000
trusted library allocation
page read and write
CF5000
unkown
page read and write
3274000
heap
page read and write
58C000
stack
page read and write
154F000
stack
page read and write
58DF000
stack
page read and write
C10000
unkown
page readonly
4D61000
heap
page read and write
C50000
unkown
page readonly
609A000
unclassified section
page read and write
4D61000
heap
page read and write
34F9000
heap
page read and write
569F000
system
page execute and read and write
1350000
heap
page read and write
4D61000
heap
page read and write
150A2EAF000
trusted library allocation
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
C03000
trusted library allocation
page read and write
1120000
unkown
page read and write
28B0000
heap
page read and write
CD0000
unkown
page readonly
4D61000
heap
page read and write
348A000
heap
page read and write
4D61000
heap
page read and write
28FE000
stack
page read and write
C50000
unkown
page readonly
C9A000
stack
page read and write
D10000
heap
page read and write
28EFFFE000
stack
page read and write
B9D000
stack
page read and write
348F000
heap
page read and write
D20000
unkown
page readonly
43BE000
trusted library allocation
page read and write
E0C000
stack
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
CF5000
unkown
page read and write
CC0000
unkown
page read and write
D44000
heap
page read and write
33CE000
stack
page read and write
4285000
trusted library allocation
page read and write
8378000
heap
page read and write
4D61000
heap
page read and write
8375000
heap
page read and write
4D61000
heap
page read and write
BF0000
trusted library allocation
page read and write
4D61000
heap
page read and write
8364000
heap
page read and write
4D61000
heap
page read and write
4FF0000
trusted library allocation
page execute and read and write
503E000
stack
page read and write
150A11B0000
heap
page read and write
630000
unkown
page readonly
4D61000
heap
page read and write
2E54000
heap
page read and write
52ED000
stack
page read and write
C3A000
stack
page read and write
4D61000
heap
page read and write
106D000
direct allocation
page execute and read and write
4D61000
heap
page read and write
150A2E01000
trusted library allocation
page read and write
824C000
heap
page read and write
4D61000
heap
page read and write
4E60000
trusted library allocation
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
AD8000
heap
page read and write
4D61000
heap
page read and write
5070000
trusted library allocation
page read and write
C20000
unkown
page readonly
1100000
unkown
page readonly
4D61000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
34E1000
heap
page read and write
C70000
heap
page read and write
4E60000
heap
page read and write
283E000
stack
page read and write
4D61000
heap
page read and write
42D3000
trusted library allocation
page read and write
563C000
system
page execute and read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
5C50000
heap
page read and write
29E1000
trusted library allocation
page read and write
5FE000
stack
page read and write
4ED0000
trusted library allocation
page read and write
4D61000
heap
page read and write
3492000
heap
page read and write
8308000
heap
page read and write
4D61000
heap
page read and write
4FDB000
stack
page read and write
CF7000
unkown
page readonly
4E46000
trusted library allocation
page read and write
D1A000
heap
page read and write
4E3E000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
4D61000
heap
page read and write
34E1000
heap
page read and write
11F1000
direct allocation
page execute and read and write
CF7000
unkown
page readonly
D150000
trusted library section
page read and write
4D61000
heap
page read and write
2E1C000
unkown
page read and write
4E41000
trusted library allocation
page read and write
1C80000
unclassified section
page execute and read and write
6F0E000
stack
page read and write
3534000
heap
page read and write
82F0000
heap
page read and write
C16000
trusted library allocation
page execute and read and write
351E000
heap
page read and write
4D61000
heap
page read and write
556E000
stack
page read and write
4D61000
heap
page read and write
5648000
system
page execute and read and write
4D61000
heap
page read and write
3EE0000
unkown
page read and write
150A2E00000
trusted library allocation
page read and write
355A000
heap
page read and write
4D61000
heap
page read and write
4EB2000
trusted library allocation
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
C40000
unkown
page readonly
28EF7FE000
stack
page read and write
8330000
heap
page read and write
836D000
heap
page read and write
4D61000
heap
page read and write
2A00000
unkown
page readonly
34A5000
heap
page read and write
4D61000
heap
page read and write
2FF8000
stack
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
EE0000
unkown
page read and write
1270000
heap
page read and write
4F9E000
heap
page read and write
4D61000
heap
page read and write
5090000
heap
page execute and read and write
18E0000
unkown
page readonly
3554000
heap
page read and write
CEE000
unkown
page readonly
4FE000
stack
page read and write
F0E000
stack
page read and write
10FC000
stack
page read and write
2870000
heap
page execute and read and write
4D61000
heap
page read and write
2AA0000
heap
page read and write
4D61000
heap
page read and write
340F000
stack
page read and write
C40000
unkown
page readonly
C90000
trusted library allocation
page read and write
2A26000
trusted library allocation
page read and write
BC5000
heap
page read and write
5512000
direct allocation
page execute and read and write
21132000
system
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
3274000
heap
page read and write
57DC000
unkown
page read and write
4D61000
heap
page read and write
BF4000
trusted library allocation
page read and write
150A131B000
heap
page read and write
4E4D000
trusted library allocation
page read and write
4D61000
heap
page read and write
DD1000
unkown
page readonly
150A10E0000
system
page execute and read and write
4D61000
heap
page read and write
4072000
unkown
page read and write
150A2BA0000
trusted library allocation
page read and write
150A1122000
system
page execute and read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
F40000
direct allocation
page execute and read and write
833A000
heap
page read and write
834E000
heap
page read and write
4D61000
heap
page read and write
BC0000
heap
page read and write
150A2D11000
trusted library allocation
page read and write
34F4000
heap
page read and write
4D61000
heap
page read and write
540000
unkown
page readonly
4D61000
heap
page read and write
2EB2000
unkown
page read and write
2855000
trusted library allocation
page read and write
CE0000
unkown
page readonly
4D61000
heap
page read and write
4D60000
heap
page read and write
3BBC000
unkown
page read and write
4D61000
heap
page read and write
990000
unkown
page readonly
4D61000
heap
page read and write
2E50000
heap
page read and write
10FC000
stack
page read and write
4D61000
heap
page read and write
CE1000
unkown
page execute read
55E2000
unclassified section
page read and write
C60000
unkown
page readonly
1550000
unkown
page readonly
113E000
heap
page read and write
3506000
heap
page read and write
F5C000
unkown
page read and write
3574000
unkown
page read and write
50EE000
stack
page read and write
DD1000
unkown
page readonly
D0E000
stack
page read and write
5570000
trusted library section
page read and write
4D61000
heap
page read and write
F56000
unkown
page read and write
D30000
heap
page read and write
4D61000
heap
page read and write
4FE0000
heap
page read and write
710E000
stack
page read and write
8244000
heap
page read and write
CD1000
unkown
page readonly
150A111F000
system
page execute and read and write
8FB000
stack
page read and write
4D61000
heap
page read and write
835D000
heap
page read and write
5522000
unclassified section
page read and write
113A000
heap
page read and write
34F4000
heap
page read and write
C20000
unkown
page readonly
4D61000
heap
page read and write
27B0000
trusted library allocation
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
144F000
stack
page read and write
4D61000
heap
page read and write
27F0000
trusted library allocation
page execute and read and write
4E70000
heap
page read and write
9D0000
direct allocation
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
4FE3000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
34E5000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
D20000
unkown
page readonly
CE0000
unkown
page readonly
C2B000
trusted library allocation
page execute and read and write
C1A000
trusted library allocation
page execute and read and write
980000
unkown
page readonly
1206000
direct allocation
page execute and read and write
150A12D0000
heap
page read and write
7A5E000
stack
page read and write
5070000
trusted library allocation
page read and write
C22000
trusted library allocation
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
F10000
heap
page read and write
622C000
unclassified section
page read and write
4D61000
heap
page read and write
F281000
trusted library allocation
page read and write
4D61000
heap
page read and write
F10000
heap
page read and write
2E9E000
stack
page read and write
150A1322000
heap
page read and write
32B0000
heap
page read and write
4D61000
heap
page read and write
1120000
unkown
page read and write
4D61000
heap
page read and write
150A2EC4000
trusted library allocation
page read and write
2E54000
heap
page read and write
980000
unkown
page readonly
4B0000
heap
page read and write
C50000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
150A2D14000
trusted library allocation
page read and write
BFD000
trusted library allocation
page execute and read and write
4D61000
heap
page read and write
563C000
unclassified section
page read and write
CF7000
unkown
page readonly
2A00000
unkown
page readonly
4D61000
heap
page read and write
C70000
trusted library allocation
page execute and read and write
150A2BA0000
trusted library allocation
page read and write
39E9000
trusted library allocation
page read and write
4D61000
heap
page read and write
562C000
system
page execute and read and write
5F08000
unclassified section
page read and write
4D61000
heap
page read and write
74D2000
trusted library allocation
page read and write
BF3000
trusted library allocation
page execute and read and write
52FD000
direct allocation
page execute and read and write
2AA0000
heap
page read and write
2AB0000
unkown
page readonly
4D61000
heap
page read and write
51C3000
heap
page read and write
2860000
trusted library allocation
page read and write
D53000
heap
page read and write
4D61000
heap
page read and write
51E0000
heap
page read and write
AD0000
heap
page read and write
C30000
unkown
page readonly
150A2D21000
trusted library allocation
page read and write
3506000
heap
page read and write
898F000
stack
page read and write
2E50000
heap
page read and write
5590000
trusted library section
page read and write
71E0000
trusted library allocation
page read and write
C70000
heap
page read and write
2EA0000
heap
page read and write
354A000
heap
page read and write
C00000
trusted library allocation
page read and write
7C7000
stack
page read and write
9A0000
unkown
page readonly
4D61000
heap
page read and write
4D61000
heap
page read and write
C88000
heap
page read and write
4D61000
heap
page read and write
2CF0000
unkown
page readonly
4D61000
heap
page read and write
28EE7FB000
stack
page read and write
507E000
stack
page read and write
150A2D00000
trusted library allocation
page read and write
3A2A000
unkown
page read and write
2FCC000
unkown
page read and write
4D61000
heap
page read and write
150A12F0000
heap
page read and write
51D0000
direct allocation
page execute and read and write
549D000
direct allocation
page execute and read and write
4D61000
heap
page read and write
348D000
heap
page read and write
C30000
unkown
page readonly
DE0000
unkown
page read and write
4D61000
heap
page read and write
1288000
direct allocation
page execute and read and write
4D61000
heap
page read and write
54A1000
direct allocation
page execute and read and write
546F000
stack
page read and write
DE0000
unkown
page read and write
F18000
heap
page read and write
EF0000
heap
page read and write
D8E000
stack
page read and write
8357000
heap
page read and write
3511000
heap
page read and write
4D61000
heap
page read and write
4237000
trusted library allocation
page read and write
4D61000
heap
page read and write
1C13000
unclassified section
page execute and read and write
34F9000
heap
page read and write
E0C000
stack
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
8300000
heap
page read and write
EE0000
unkown
page read and write
C80000
heap
page read and write
C12000
trusted library allocation
page read and write
28B4000
heap
page read and write
4D61000
heap
page read and write
2A20000
unkown
page read and write
D40000
unkown
page read and write
2EA0000
heap
page read and write
120D000
direct allocation
page execute and read and write
3521000
heap
page read and write
4D61000
heap
page read and write
29DE000
stack
page read and write
3270000
heap
page read and write
5350000
trusted library allocation
page execute and read and write
4D61000
heap
page read and write
8240000
heap
page read and write
4D61000
heap
page read and write
27BE000
trusted library allocation
page read and write
4E7B000
heap
page read and write
1270000
heap
page read and write
7FC0000
trusted library allocation
page read and write
4D61000
heap
page read and write
82F6000
heap
page read and write
6550000
unclassified section
page read and write
28D0000
heap
page read and write
DAA000
heap
page read and write
1100000
unkown
page readonly
4D61000
heap
page read and write
34F0000
heap
page read and write
4D61000
heap
page read and write
B10000
heap
page read and write
700E000
stack
page read and write
82E0000
trusted library allocation
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
51C0000
trusted library allocation
page read and write
3498000
heap
page read and write
514E000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
1275000
heap
page read and write
51CE000
stack
page read and write
8329000
heap
page read and write
34F0000
heap
page read and write
14A0000
unkown
page readonly
4D61000
heap
page read and write
4D61000
heap
page read and write
4E24000
trusted library allocation
page read and write
3453000
unkown
page execute and read and write
4D61000
heap
page read and write
4E20000
trusted library allocation
page read and write
6DD0000
heap
page read and write
150A2B90000
heap
page read and write
CE0000
unkown
page readonly
5070000
trusted library allocation
page read and write
4D61000
heap
page read and write
150A1322000
heap
page read and write
F18000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
542000
unkown
page readonly
3480000
heap
page read and write
3528000
heap
page read and write
4D61000
heap
page read and write
D10000
unkown
page readonly
DCF000
stack
page read and write
21734000
system
page read and write
1130000
heap
page read and write
DA8000
heap
page read and write
C9A000
stack
page read and write
18E0000
unkown
page readonly
4D61000
heap
page read and write
1240000
unkown
page read and write
CD1000
unkown
page readonly
1159000
heap
page read and write
5360000
heap
page read and write
27D8000
trusted library allocation
page read and write
1230000
unkown
page read and write
7A60000
heap
page read and write
D30000
heap
page read and write
5624000
system
page execute and read and write
10DE000
direct allocation
page execute and read and write
4D61000
heap
page read and write
D51000
heap
page read and write
4D61000
heap
page read and write
150A2D16000
trusted library allocation
page read and write
5080000
trusted library section
page readonly
4D61000
heap
page read and write
4D61000
heap
page read and write
51A0000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
2EB2000
unkown
page read and write
5C84000
heap
page read and write
4D61000
heap
page read and write
5D76000
unclassified section
page read and write
C10000
unkown
page readonly
D1E000
heap
page read and write
4D61000
heap
page read and write
4D61000
heap
page read and write
EF0000
heap
page read and write
512E000
stack
page read and write
150A2C00000
trusted library allocation
page read and write
There are 620 hidden memdumps, click here to show them.