Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PO-000041522.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\709e7t17
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie
0x36, schema 4, UTF-8, version-valid-for 7
|
modified
|
||
C:\Users\user\AppData\Local\Temp\iodization
|
data
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\PO-000041522.exe
|
"C:\Users\user\Desktop\PO-000041522.exe"
|
||
C:\Windows\SysWOW64\svchost.exe
|
"C:\Users\user\Desktop\PO-000041522.exe"
|
||
C:\Program Files (x86)\HEvAARzhkXrZERryNkGaMvGJkmRDhyqRvfdxQskzWjdtrLrntNyCod\mRCAFaTTtF.exe
|
"C:\Program Files (x86)\HEvAARzhkXrZERryNkGaMvGJkmRDhyqRvfdxQskzWjdtrLrntNyCod\mRCAFaTTtF.exe"
|
||
C:\Windows\SysWOW64\netsh.exe
|
"C:\Windows\SysWOW64\netsh.exe"
|
||
C:\Program Files (x86)\HEvAARzhkXrZERryNkGaMvGJkmRDhyqRvfdxQskzWjdtrLrntNyCod\mRCAFaTTtF.exe
|
"C:\Program Files (x86)\HEvAARzhkXrZERryNkGaMvGJkmRDhyqRvfdxQskzWjdtrLrntNyCod\mRCAFaTTtF.exe"
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\Firefox.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.gcast.video/zt7d/?OReh1rq=gioIZrJHQSo5Twa9TT6znS2fp8FeqxYG9swkBqqgC+UipwurX93lliJtQqPWuIS6ZmF33XYXd2mTI6MGqYLGA7aepf23dKNnGtvBjHiHmMvjQtNcQ1gpkcMaXgjsQjVZxJ4sA2oNNTmX&CvQl=nrm0ZhFpzl
|
98.124.224.17
|
||
http://www.redlakedispensery.net/6u21/?OReh1rq=GVaOaFQ3d6G7AfxQOk7ieruxm+gnm5VVlXgM851fWwwgRz3TVn5fGEzA+wYxrv63HQoUWQChgi2b21NIV41GwDduJOaUHEyhnv8phiPJCKVCCwApj4Ws0eCXeq4Y+t0YLUqTKnAz4x3T&CvQl=nrm0ZhFpzl
|
217.70.184.50
|
||
http://www.kartal-nakliyat.xyz/m55w/
|
85.159.66.93
|
||
http://www.bybitexchange.click/13ne/?OReh1rq=5f/xJzU+yNg+ckMqn3hIiphO517DsQ6C3a9UOIr4Am4abyoaRTootrA/Lbkip0rySLyDMLCpGQATty8VEy6JVvIDO149vjHOqC6Vt6M5zWl7l6vPUmUwE3Hu2vtdv9tSmFj1n1eMQI0X&CvQl=nrm0ZhFpzl
|
45.252.249.43
|
||
http://www.launchdreamidea.xyz/2b9b/?CvQl=nrm0ZhFpzl&OReh1rq=cGufOJH0xlNic3+8ylCPTRRPYDBZneW0GcYDw7JK4Ijf+YRDc8nYj/foYKrurxlxMPIBZUG8OdJWDJilyjG8KsiFsJaKJojJJc8folsNnUfsqIHZ9MXgGXoTKP3Wf+FrY268bUo4cMTQ
|
188.114.97.3
|
||
http://www.bybitexchange.click/13ne/
|
45.252.249.43
|
||
http://www.freedietbuilder.online/nnla/
|
188.114.97.3
|
||
http://www.elektromontaze.online/2amq/
|
37.9.175.163
|
||
http://www.redlakedispensery.net/6u21/
|
217.70.184.50
|
||
http://www.elektromontaze.online/2amq/?OReh1rq=TrqYGwWaHxniF7eNSKDkgIUevCh1dc5tnDDYGpgsaE/mtn8diYV+ickL9IcoZLc+jgEWqYyaPiUJOg0jMzRcZMH4Po/VVtmSjhfWTZt8/sN4EXefuBThivk80qQven1R3gWiVtinhRVX&CvQl=nrm0ZhFpzl
|
37.9.175.163
|
||
http://www.kartal-nakliyat.xyz/m55w/?OReh1rq=9llqS7l5r2fZE2qKLahaIkLgunrNzhdfh2Fa8uGkHzeY69X6DmW7eYPfa18EH489ndWHoC7ISC9XGeCzxUHdefh+2UUEydNUM+R9LWmaUjMU6yBTHkWVZyPnnhgR6zjaK6ylcCAOGnqo&CvQl=nrm0ZhFpzl
|
85.159.66.93
|
||
http://www.launchdreamidea.xyz/2b9b/
|
188.114.97.3
|
||
http://www.freedietbuilder.online/nnla/?OReh1rq=CqIQGQ0o8+jhRdpyYLS2Ou54wXZmDhGBl2CfLfjcYft2NeK1a5UMcHptbiGPm/AWvx7/GdfV8RGwRyU2PymhnZZ7RowUctSqrqn8UFFkmP+DJHtVFd6xywEuosIKzWdoXOs+sf4OzNSo&CvQl=nrm0ZhFpzl
|
188.114.97.3
|
||
https://cdn.active24.eu/fonts/OTF/Active24-Bold.otf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.active24.cz/support/
|
unknown
|
||
https://cdn.active24.eu/fonts/OTF/Active24-Regular.woff2
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://www.gandi.net/en/domain
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://admin.active24.cz/
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://whois.gandi.net/en/results?search=redlakedispensery.net
|
unknown
|
||
https://cdn.active24.eu/fonts/OTF/Active24-Medium.otf
|
unknown
|
||
https://cdn.active24.eu/fonts/OTF/Active24-Bold.woff2
|
unknown
|
||
http://www.elektromontaze.online
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://www.active24.cz/
|
unknown
|
||
https://cdn.active24.eu/fonts/OTF/Active24-Regular.otf
|
unknown
|
||
https://www.active24.cz/cart/domain-checker
|
unknown
|
||
https://cdn.active24.eu/fonts/OTF/Active24-Medium.woff2
|
unknown
|
||
https://admin.active24.cz/en
|
unknown
|
||
https://cloudways-static-content.s3.us-east-1.amazonaws.com/error_page/maintenance-domain-mapping.ht
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://cdn.active24.eu
|
unknown
|
There are 27 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.gcast.video
|
98.124.224.17
|
||
webredir.vip.gandi.net
|
217.70.184.50
|
||
www.elektromontaze.online
|
37.9.175.163
|
||
www.royapop.online
|
209.74.64.190
|
||
www.launchdreamidea.xyz
|
188.114.97.3
|
||
www.freedietbuilder.online
|
188.114.97.3
|
||
bybitexchange.click
|
45.252.249.43
|
||
www.18kwatch.com
|
202.87.223.248
|
||
natroredirect.natrocdn.com
|
85.159.66.93
|
||
www.redlakedispensery.net
|
unknown
|
||
www.bybitexchange.click
|
unknown
|
||
www.kartal-nakliyat.xyz
|
unknown
|
There are 2 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.252.249.43
|
bybitexchange.click
|
Viet Nam
|
||
188.114.97.3
|
www.launchdreamidea.xyz
|
European Union
|
||
37.9.175.163
|
www.elektromontaze.online
|
Slovakia (SLOVAK Republic)
|
||
217.70.184.50
|
webredir.vip.gandi.net
|
France
|
||
85.159.66.93
|
natroredirect.natrocdn.com
|
Turkey
|
||
98.124.224.17
|
www.gcast.video
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
33E0000
|
unclassified section
|
page execute and read and write
|
||
1190000
|
trusted library allocation
|
page read and write
|
||
81F0000
|
unclassified section
|
page execute and read and write
|
||
2DF0000
|
unkown
|
page execute and read and write
|
||
3A0000
|
system
|
page execute and read and write
|
||
B00000
|
system
|
page execute and read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
unkown
|
page readonly
|
||
47B9000
|
direct allocation
|
page read and write
|
||
C65000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
163E000
|
stack
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
5AE000
|
unkown
|
page readonly
|
||
3E22000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
FA0000
|
unkown
|
page readonly
|
||
2A4A000
|
heap
|
page read and write
|
||
2A17000
|
heap
|
page read and write
|
||
2B4B9C1F000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
11FB000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
FC0000
|
unkown
|
page readonly
|
||
3E2F000
|
heap
|
page read and write
|
||
4453000
|
direct allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
4330000
|
direct allocation
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
3E1C000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2CF4000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
319E000
|
direct allocation
|
page execute and read and write
|
||
C80000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2D00000
|
unkown
|
page readonly
|
||
4453000
|
direct allocation
|
page read and write
|
||
D3B000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
3E54000
|
unclassified section
|
page read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
3E2D000
|
heap
|
page read and write
|
||
5AE000
|
unkown
|
page readonly
|
||
2932000
|
unkown
|
page read and write
|
||
4505000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
2A4A000
|
heap
|
page read and write
|
||
E8C000
|
unkown
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
3F31000
|
heap
|
page read and write
|
||
1310000
|
unkown
|
page readonly
|
||
C60000
|
heap
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
2B30000
|
unkown
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
FB0000
|
unkown
|
page readonly
|
||
FC0000
|
unkown
|
page readonly
|
||
7CB3000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
39D5C000
|
system
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
39B9C000
|
system
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
101E000
|
stack
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
2B4BB6B0000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
47B9000
|
direct allocation
|
page read and write
|
||
EBF000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2F2D000
|
heap
|
page read and write
|
||
C69000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
505C000
|
unclassified section
|
page execute and read and write
|
||
1670000
|
heap
|
page read and write
|
||
7C8B000
|
heap
|
page read and write
|
||
14D9000
|
direct allocation
|
page execute and read and write
|
||
13B0000
|
direct allocation
|
page execute and read and write
|
||
CE877FF000
|
stack
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2E01000
|
heap
|
page read and write
|
||
A0E000
|
heap
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
3EA7000
|
heap
|
page read and write
|
||
750000
|
unkown
|
page readonly
|
||
406C000
|
unkown
|
page execute and read and write
|
||
B20000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
7D80000
|
trusted library allocation
|
page read and write
|
||
430A000
|
unclassified section
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2A2E000
|
heap
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
FD0000
|
trusted library allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1681000
|
direct allocation
|
page execute and read and write
|
||
2B30000
|
unkown
|
page read and write
|
||
CB6000
|
heap
|
page read and write
|
||
2B4BB9C4000
|
trusted library allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1290000
|
trusted library allocation
|
page execute and read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
2B4B9C3B000
|
heap
|
page read and write
|
||
4330000
|
direct allocation
|
page read and write
|
||
3DBF000
|
heap
|
page read and write
|
||
2B4B9C60000
|
heap
|
page read and write
|
||
1031000
|
unkown
|
page readonly
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
79B000
|
stack
|
page read and write
|
||
3ED9000
|
heap
|
page read and write
|
||
5A5C000
|
unclassified section
|
page execute and read and write
|
||
D31000
|
heap
|
page read and write
|
||
7D16000
|
heap
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
47BD000
|
direct allocation
|
page read and write
|
||
D2B000
|
heap
|
page read and write
|
||
7CE4000
|
heap
|
page read and write
|
||
C69000
|
heap
|
page read and write
|
||
3C30000
|
heap
|
page read and write
|
||
2B4BB80A000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
7CCA000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
C77000
|
heap
|
page read and write
|
||
130F000
|
stack
|
page read and write
|
||
108D000
|
unkown
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
C6F000
|
heap
|
page read and write
|
||
16C0000
|
heap
|
page read and write
|
||
2AB0000
|
unkown
|
page read and write
|
||
47B9000
|
direct allocation
|
page read and write
|
||
FB0000
|
unkown
|
page readonly
|
||
1041000
|
heap
|
page read and write
|
||
5E6C000
|
unkown
|
page execute and read and write
|
||
E8F000
|
stack
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
CB3000
|
heap
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
CE857FC000
|
stack
|
page read and write
|
||
C40000
|
unkown
|
page read and write
|
||
D36000
|
heap
|
page read and write
|
||
5B5000
|
unkown
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
AFC000
|
stack
|
page read and write
|
||
3E20000
|
heap
|
page read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
882F000
|
stack
|
page read and write
|
||
C5E000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2B4BB9AB000
|
trusted library allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2B01000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
3342000
|
direct allocation
|
page execute and read and write
|
||
1330000
|
unkown
|
page readonly
|
||
C60000
|
unkown
|
page read and write
|
||
7D06000
|
heap
|
page read and write
|
||
1020000
|
unkown
|
page read and write
|
||
4A6C000
|
unkown
|
page execute and read and write
|
||
1041000
|
heap
|
page read and write
|
||
3DC2000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
7D0B000
|
heap
|
page read and write
|
||
4453000
|
direct allocation
|
page read and write
|
||
B00000
|
unkown
|
page readonly
|
||
2B4B9C10000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2B4B9B82000
|
system
|
page execute and read and write
|
||
39B42000
|
system
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
47BD000
|
direct allocation
|
page read and write
|
||
4330000
|
direct allocation
|
page read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
2F5C000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2B4BB540000
|
trusted library allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
15FF000
|
stack
|
page read and write
|
||
2B10000
|
unkown
|
page readonly
|
||
2E75000
|
heap
|
page read and write
|
||
C40000
|
unkown
|
page read and write
|
||
CE867FE000
|
stack
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1DE000
|
stack
|
page read and write
|
||
4453000
|
direct allocation
|
page read and write
|
||
482E000
|
direct allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
750000
|
unkown
|
page readonly
|
||
FD0000
|
heap
|
page read and write
|
||
2932000
|
unkown
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
2A12000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2B4BB813000
|
trusted library allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
3F31000
|
heap
|
page read and write
|
||
2C0C000
|
unkown
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
105B000
|
heap
|
page read and write
|
||
482E000
|
direct allocation
|
page read and write
|
||
312D000
|
direct allocation
|
page execute and read and write
|
||
3E28000
|
heap
|
page read and write
|
||
1310000
|
unkown
|
page readonly
|
||
A0A000
|
heap
|
page read and write
|
||
5040000
|
system
|
page execute and read and write
|
||
1041000
|
heap
|
page read and write
|
||
7D09000
|
heap
|
page read and write
|
||
47BD000
|
direct allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
5B5000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page readonly
|
||
1041000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
2F45000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
7F0000
|
unkown
|
page readonly
|
||
1041000
|
heap
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
E10000
|
unkown
|
page read and write
|
||
E00000
|
unkown
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
C69000
|
heap
|
page read and write
|
||
F90000
|
unkown
|
page readonly
|
||
16A0000
|
unkown
|
page readonly
|
||
CFE000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
3F3E000
|
heap
|
page read and write
|
||
283F000
|
stack
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
7CA8000
|
heap
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
7CED000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
3BEA000
|
unclassified section
|
page execute and read and write
|
||
1041000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
5AE000
|
unkown
|
page readonly
|
||
1041000
|
heap
|
page read and write
|
||
E5A000
|
stack
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
C5E000
|
heap
|
page read and write
|
||
7CFA000
|
heap
|
page read and write
|
||
3186000
|
unkown
|
page read and write
|
||
2B4B9C42000
|
heap
|
page read and write
|
||
462E000
|
unclassified section
|
page read and write
|
||
3E24000
|
heap
|
page read and write
|
||
482E000
|
direct allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2B4BB9CE000
|
trusted library allocation
|
page read and write
|
||
30E4000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
7BA000
|
stack
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
7D11000
|
heap
|
page read and write
|
||
34AA000
|
unkown
|
page read and write
|
||
CCE000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
3960000
|
unkown
|
page read and write
|
||
3E0F000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
4330000
|
direct allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
4330000
|
direct allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2FF4000
|
unkown
|
page read and write
|
||
2D00000
|
unkown
|
page readonly
|
||
1324000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
50D9000
|
system
|
page execute and read and write
|
||
5B5000
|
unkown
|
page read and write
|
||
35FA000
|
unkown
|
page execute and read and write
|
||
2D23000
|
heap
|
page read and write
|
||
730000
|
direct allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1048000
|
heap
|
page read and write
|
||
2840000
|
unkown
|
page readonly
|
||
C6F000
|
heap
|
page read and write
|
||
108A000
|
heap
|
page read and write
|
||
7D16000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
32C000
|
stack
|
page read and write
|
||
3129000
|
direct allocation
|
page execute and read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
FA0000
|
unkown
|
page readonly
|
||
2F9E000
|
heap
|
page read and write
|
||
D18000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
4330000
|
direct allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
BE0000
|
unkown
|
page readonly
|
||
47BD000
|
direct allocation
|
page read and write
|
||
47BD000
|
direct allocation
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
2B4BB821000
|
trusted library allocation
|
page read and write
|
||
47B9000
|
direct allocation
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
47BD000
|
direct allocation
|
page read and write
|
||
4330000
|
direct allocation
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
F90000
|
unkown
|
page readonly
|
||
5A1000
|
unkown
|
page execute read
|
||
CE86FFE000
|
stack
|
page read and write
|
||
2B4BB700000
|
trusted library allocation
|
page read and write
|
||
AFC000
|
stack
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
167D000
|
direct allocation
|
page execute and read and write
|
||
1041000
|
heap
|
page read and write
|
||
1330000
|
unkown
|
page readonly
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2B10000
|
unkown
|
page readonly
|
||
3E11000
|
heap
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
11FF000
|
stack
|
page read and write
|
||
2B4BB901000
|
trusted library allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
C63000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
512D000
|
system
|
page execute and read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
47BD000
|
direct allocation
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1020000
|
unkown
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2B4BB540000
|
trusted library allocation
|
page read and write
|
||
3F5C000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2A47000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
3F32000
|
heap
|
page execute and read and write
|
||
B00000
|
unkown
|
page readonly
|
||
BD0000
|
unkown
|
page readonly
|
||
366C000
|
unkown
|
page execute and read and write
|
||
3000000
|
direct allocation
|
page execute and read and write
|
||
2B4BB9BE000
|
trusted library allocation
|
page read and write
|
||
43FA000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1041000
|
heap
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
5A1000
|
unkown
|
page execute read
|
||
2A05000
|
heap
|
page read and write
|
||
7D00000
|
heap
|
page read and write
|
||
7D09000
|
heap
|
page read and write
|
||
CE5000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
155000
|
heap
|
page read and write
|
||
4178000
|
unclassified section
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2B4B9C42000
|
heap
|
page read and write
|
||
5A1000
|
unkown
|
page execute read
|
||
1041000
|
heap
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
3F36000
|
heap
|
page read and write
|
||
5A1000
|
unkown
|
page execute read
|
||
5B5000
|
unkown
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
3A144000
|
system
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
C60000
|
unkown
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
2F29000
|
heap
|
page read and write
|
||
449C000
|
unclassified section
|
page read and write
|
||
1165000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
E5A000
|
stack
|
page read and write
|
||
3792000
|
unclassified section
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
F5C000
|
stack
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
5B7000
|
unkown
|
page readonly
|
||
1041000
|
heap
|
page read and write
|
||
2B4BB817000
|
trusted library allocation
|
page read and write
|
||
E00000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
89F000
|
stack
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1048000
|
heap
|
page read and write
|
||
482E000
|
direct allocation
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
3E3A000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
526C000
|
unkown
|
page read and write
|
||
27EE000
|
stack
|
page read and write
|
||
50CA000
|
system
|
page execute and read and write
|
||
1041000
|
heap
|
page read and write
|
||
C51000
|
unkown
|
page readonly
|
||
1041000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
33A0000
|
direct allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2B4B9D50000
|
heap
|
page read and write
|
||
482E000
|
direct allocation
|
page read and write
|
||
33A0000
|
direct allocation
|
page read and write
|
||
C6A000
|
heap
|
page read and write
|
||
A3A000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1041000
|
heap
|
page read and write
|
||
2A1A000
|
heap
|
page read and write
|
||
2B4B9C2C000
|
heap
|
page read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
2813000
|
heap
|
page read and write
|
||
130000
|
heap
|
page read and write
|
||
5B7000
|
unkown
|
page readonly
|
||
FD0000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
16F2000
|
direct allocation
|
page execute and read and write
|
||
465C000
|
unclassified section
|
page execute and read and write
|
||
3F30000
|
heap
|
page read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
4453000
|
direct allocation
|
page read and write
|
||
50B1000
|
system
|
page execute and read and write
|
||
1041000
|
heap
|
page read and write
|
||
137D000
|
stack
|
page read and write
|
||
3FE6000
|
unclassified section
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
7D90000
|
trusted library allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
CD1000
|
heap
|
page read and write
|
||
740000
|
unkown
|
page readonly
|
||
5AE000
|
unkown
|
page readonly
|
||
2813000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
3E75000
|
heap
|
page read and write
|
||
37CE000
|
unkown
|
page read and write
|
||
2B4BB803000
|
trusted library allocation
|
page read and write
|
||
2802000
|
heap
|
page read and write
|
||
3D30000
|
heap
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
2C4F000
|
stack
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
6160000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
3E19000
|
heap
|
page read and write
|
||
C51000
|
unkown
|
page readonly
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
CE5000
|
heap
|
page read and write
|
||
3E76000
|
heap
|
page read and write
|
||
2CF4000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
CF3000
|
heap
|
page read and write
|
||
106E000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
1087000
|
heap
|
page read and write
|
||
7CAB000
|
heap
|
page read and write
|
||
7CF3000
|
heap
|
page read and write
|
||
645C000
|
unclassified section
|
page execute and read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2A05000
|
heap
|
page read and write
|
||
2B4BB520000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
7FE0000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
BF0000
|
unkown
|
page readonly
|
||
3C5C000
|
unclassified section
|
page execute and read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
B50000
|
heap
|
page read and write
|
||
2C0C000
|
unkown
|
page read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
47B9000
|
direct allocation
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
D02000
|
heap
|
page read and write
|
||
2A47000
|
heap
|
page read and write
|
||
5B7000
|
unkown
|
page readonly
|
||
47B9000
|
direct allocation
|
page read and write
|
||
7C93000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
AF8000
|
stack
|
page read and write
|
||
7BA000
|
stack
|
page read and write
|
||
CCE000
|
heap
|
page read and write
|
||
106B000
|
heap
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
7CFD000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
7CFB000
|
heap
|
page read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
36B000
|
stack
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
64DE000
|
stack
|
page read and write
|
||
CD1000
|
heap
|
page read and write
|
||
3F31000
|
heap
|
page read and write
|
||
2B4BB540000
|
trusted library allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
2A17000
|
heap
|
page read and write
|
||
7F0000
|
unkown
|
page readonly
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2B4BB800000
|
trusted library allocation
|
page read and write
|
||
7C9B000
|
heap
|
page read and write
|
||
3F4F000
|
heap
|
page read and write
|
||
1399000
|
heap
|
page read and write
|
||
4453000
|
direct allocation
|
page read and write
|
||
7CCE000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
DBF000
|
stack
|
page read and write
|
||
47C0000
|
unclassified section
|
page read and write
|
||
7CC5000
|
heap
|
page read and write
|
||
3350000
|
direct allocation
|
page read and write
|
||
2840000
|
unkown
|
page readonly
|
||
1041000
|
heap
|
page read and write
|
||
BF0000
|
unkown
|
page readonly
|
||
730000
|
unkown
|
page readonly
|
||
1041000
|
heap
|
page read and write
|
||
7CA1000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
546C000
|
unkown
|
page execute and read and write
|
||
7CF6000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
DC0000
|
stack
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
CF8000
|
heap
|
page read and write
|
||
CE85FFE000
|
stack
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
29F2000
|
unkown
|
page read and write
|
||
50BA000
|
system
|
page execute and read and write
|
||
1041000
|
heap
|
page read and write
|
||
1087000
|
heap
|
page read and write
|
||
BE0000
|
unkown
|
page readonly
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
3852000
|
unclassified section
|
page read and write
|
||
3ED8000
|
heap
|
page read and write
|
||
3E76000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
C69000
|
heap
|
page read and write
|
||
C69000
|
heap
|
page read and write
|
||
108A000
|
heap
|
page read and write
|
||
872E000
|
stack
|
page read and write
|
||
363C000
|
unkown
|
page read and write
|
||
32D1000
|
direct allocation
|
page execute and read and write
|
||
640000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
CBF000
|
heap
|
page read and write
|
||
1031000
|
unkown
|
page readonly
|
||
2813000
|
heap
|
page read and write
|
||
2B4B9AF0000
|
system
|
page execute and read and write
|
||
1328000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
4453000
|
direct allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2AB0000
|
unkown
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
7CE7000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
E20000
|
unkown
|
page read and write
|
||
5B7000
|
unkown
|
page readonly
|
||
610000
|
heap
|
page read and write
|
||
16A0000
|
unkown
|
page readonly
|
||
482E000
|
direct allocation
|
page read and write
|
||
7CAE000
|
heap
|
page read and write
|
||
4690000
|
direct allocation
|
page read and write
|
||
CD8000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2A1B000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
154E000
|
direct allocation
|
page execute and read and write
|
||
1041000
|
heap
|
page read and write
|
||
F5C000
|
stack
|
page read and write
|
||
CD8000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2A2B000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
7CA6000
|
heap
|
page read and write
|
||
3A6C000
|
unclassified section
|
page read and write
|
||
2B4B9C1A000
|
heap
|
page read and write
|
||
D06000
|
heap
|
page read and write
|
||
32CD000
|
direct allocation
|
page execute and read and write
|
||
C5B000
|
heap
|
page read and write
|
||
50D6000
|
system
|
page execute and read and write
|
||
14DD000
|
direct allocation
|
page execute and read and write
|
||
47B9000
|
direct allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
2B4BB80F000
|
trusted library allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
3318000
|
unkown
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
39A82000
|
system
|
page read and write
|
||
7CBF000
|
heap
|
page read and write
|
||
2EF0000
|
direct allocation
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
33A0000
|
direct allocation
|
page read and write
|
||
482E000
|
direct allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
1042000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
B10000
|
unkown
|
page readonly
|
||
1041000
|
heap
|
page read and write
|
||
B10000
|
unkown
|
page readonly
|
||
1041000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
D0C000
|
heap
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
4339000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
7D03000
|
heap
|
page read and write
|
There are 709 hidden memdumps, click here to show them.