IOC Report
2P2XFVtixh.exe

loading gif

Files

File Path
Type
Category
Malicious
2P2XFVtixh.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\2P2XFVtixh.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\chargeable.exe.log
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\2P2XFVtixh.exe
"C:\Users\user\Desktop\2P2XFVtixh.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
malicious
C:\Users\user\Desktop\2P2XFVtixh.exe
"C:\Users\user\Desktop\2P2XFVtixh.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\Desktop\2P2XFVtixh.exe
"C:\Users\user\Desktop\2P2XFVtixh.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
doddyfire.linkpc.net
malicious

Domains

Name
IP
Malicious
doddyfire.linkpc.net
160.177.56.173
malicious

IPs

IP
Domain
Country
Malicious
160.177.56.173
doddyfire.linkpc.net
Morocco
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
confuse
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SysMain
malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\e1a87040f2026369a233f9ae76301b7b
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
2C51000
trusted library allocation
page read and write
malicious
2A81000
trusted library allocation
page read and write
malicious
DB0000
heap
page execute and read and write
F20000
trusted library allocation
page read and write
108E000
stack
page read and write
5600000
heap
page read and write
3581000
trusted library allocation
page read and write
B70000
trusted library allocation
page read and write
3585000
heap
page read and write
16B0000
heap
page read and write
5882000
trusted library section
page readonly
358C000
heap
page read and write
8C4000
heap
page read and write
53B0000
heap
page read and write
DA0000
heap
page read and write
869E000
stack
page read and write
1690000
trusted library allocation
page execute and read and write
19B0000
heap
page execute and read and write
E2F000
stack
page read and write
4581000
trusted library allocation
page read and write
2C84000
trusted library allocation
page read and write
5350000
heap
page read and write
62FE000
stack
page read and write
898000
heap
page read and write
12FC000
trusted library allocation
page execute and read and write
123E000
stack
page read and write
8A7000
trusted library allocation
page execute and read and write
892000
trusted library allocation
page execute and read and write
3591000
heap
page read and write
2FD2000
trusted library allocation
page read and write
1490000
heap
page read and write
14D2000
trusted library allocation
page execute and read and write
2920000
trusted library allocation
page read and write
57E0000
heap
page read and write
64F0000
trusted library allocation
page execute and read and write
11F0000
heap
page read and write
6BF0000
trusted library allocation
page execute and read and write
1330000
trusted library allocation
page read and write
357E000
heap
page read and write
3582000
heap
page read and write
18E7000
trusted library allocation
page execute and read and write
3511000
heap
page read and write
150E000
stack
page read and write
1030000
trusted library allocation
page execute and read and write
5A9F000
stack
page read and write
1420000
heap
page execute and read and write
6110000
heap
page read and write
354A000
heap
page read and write
DE0000
trusted library allocation
page read and write
562E000
stack
page read and write
359B000
heap
page read and write
D45000
heap
page read and write
35EE000
heap
page read and write
755000
heap
page read and write
3549000
heap
page read and write
C90000
heap
page read and write
14E7000
trusted library allocation
page execute and read and write
132B000
trusted library allocation
page execute and read and write
5790000
heap
page read and write
3548000
heap
page read and write
6D9E000
stack
page read and write
B82000
trusted library allocation
page read and write
3582000
heap
page read and write
B6A000
trusted library allocation
page execute and read and write
B43000
heap
page read and write
359C000
heap
page read and write
57F8000
heap
page read and write
B9A000
trusted library allocation
page execute and read and write
C96000
heap
page read and write
7880000
heap
page read and write
BAB000
trusted library allocation
page execute and read and write
67FE000
stack
page read and write
F10000
heap
page read and write
1359000
stack
page read and write
3580000
heap
page read and write
3589000
heap
page read and write
1580000
heap
page execute and read and write
290E000
stack
page read and write
38D1000
trusted library allocation
page read and write
35EB000
heap
page read and write
3595000
heap
page read and write
1120000
trusted library allocation
page read and write
DCE000
unkown
page read and write
820000
heap
page read and write
35EE000
heap
page read and write
357E000
heap
page read and write
3631000
trusted library allocation
page read and write
5200000
trusted library section
page readonly
4C60000
heap
page read and write
1610000
heap
page read and write
138E000
stack
page read and write
357E000
heap
page read and write
11B3000
heap
page read and write
53C0000
heap
page read and write
53B5000
heap
page read and write
4B1B000
stack
page read and write
3545000
heap
page read and write
970000
heap
page read and write
B70000
heap
page read and write
3595000
heap
page read and write
1150000
trusted library allocation
page read and write
C6E000
heap
page read and write
ECA000
heap
page read and write
35EE000
heap
page read and write
3591000
heap
page read and write
4F69000
stack
page read and write
63CE000
stack
page read and write
19E0000
trusted library allocation
page execute and read and write
BE0000
heap
page read and write
36C6000
trusted library allocation
page read and write
18B0000
trusted library allocation
page read and write
14B6000
trusted library allocation
page execute and read and write
5470000
heap
page read and write
2F31000
trusted library allocation
page read and write
359B000
heap
page read and write
7A6000
stack
page read and write
66FE000
stack
page read and write
F92000
heap
page read and write
F80000
heap
page read and write
3C0000
heap
page read and write
359A000
heap
page read and write
1290000
heap
page read and write
19F0000
trusted library allocation
page read and write
845000
heap
page read and write
57E5000
heap
page read and write
4B20000
trusted library allocation
page read and write
353F000
heap
page read and write
3193000
stack
page read and write
B4A000
trusted library allocation
page execute and read and write
3541000
heap
page read and write
12BE000
stack
page read and write
ECD000
heap
page read and write
CB0000
heap
page read and write
6690000
trusted library allocation
page read and write
319B000
stack
page read and write
4F20000
heap
page read and write
1060000
heap
page read and write
4EE0000
heap
page read and write
4A6E000
stack
page read and write
831B000
stack
page read and write
61BE000
stack
page read and write
12E2000
trusted library allocation
page execute and read and write
35C1000
heap
page read and write
1020000
trusted library allocation
page read and write
82E000
heap
page read and write
1690000
trusted library allocation
page read and write
BA2000
trusted library allocation
page read and write
BA2000
heap
page read and write
11A0000
trusted library section
page readonly
870000
trusted library allocation
page read and write
58C0000
trusted library allocation
page execute and read and write
14B2000
trusted library allocation
page execute and read and write
5E4E000
heap
page read and write
1570000
trusted library allocation
page read and write
94D000
heap
page read and write
1320000
heap
page read and write
D7B000
stack
page read and write
DD0000
heap
page read and write
6812000
trusted library allocation
page read and write
8AA000
trusted library allocation
page execute and read and write
4F0E000
stack
page read and write
12C3000
heap
page read and write
357E000
heap
page read and write
16C0000
heap
page read and write
57CE000
stack
page read and write
357C000
heap
page read and write
552F000
stack
page read and write
6A8E000
stack
page read and write
965000
heap
page read and write
3544000
heap
page read and write
3598000
heap
page read and write
F12000
trusted library allocation
page execute and read and write
1680000
trusted library allocation
page read and write
2961000
trusted library allocation
page read and write
1734000
heap
page read and write
B50000
trusted library allocation
page read and write
61BE000
stack
page read and write
176D000
stack
page read and write
15FE000
stack
page read and write
566F000
stack
page read and write
12EA000
trusted library allocation
page execute and read and write
C30000
heap
page read and write
4AEE000
stack
page read and write
4D40000
heap
page read and write
5110000
trusted library allocation
page execute and read and write
4B20000
trusted library section
page readonly
3527000
heap
page read and write
58D0000
heap
page read and write
1298000
heap
page read and write
13B0000
heap
page read and write
3584000
heap
page read and write
4ED0000
trusted library allocation
page execute and read and write
3594000
heap
page read and write
820000
heap
page read and write
6A9000
stack
page read and write
3565000
heap
page read and write
4C58000
trusted library allocation
page read and write
11F5000
heap
page read and write
80E000
stack
page read and write
B52000
trusted library allocation
page execute and read and write
35A1000
heap
page read and write
57C0000
heap
page read and write
B18000
heap
page read and write
B8A000
trusted library allocation
page execute and read and write
F2F000
stack
page read and write
5210000
heap
page read and write
BB0000
heap
page read and write
5340000
heap
page read and write
6EDF000
stack
page read and write
2CA8000
trusted library allocation
page read and write
949000
heap
page read and write
125A000
stack
page read and write
715E000
stack
page read and write
14A2000
trusted library allocation
page execute and read and write
30B5000
trusted library allocation
page read and write
8AB000
stack
page read and write
6590000
heap
page read and write
CBF000
stack
page read and write
1090000
trusted library allocation
page execute and read and write
358B000
heap
page read and write
DE0000
heap
page read and write
4D30000
heap
page read and write
E6E000
heap
page read and write
57C7000
heap
page read and write
1180000
heap
page read and write
358B000
heap
page read and write
2FE1000
trusted library allocation
page read and write
3003000
trusted library allocation
page read and write
E30000
heap
page read and write
3584000
heap
page read and write
1370000
trusted library allocation
page read and write
840000
heap
page read and write
163E000
stack
page read and write
1340000
heap
page read and write
542F000
stack
page read and write
88A000
trusted library allocation
page execute and read and write
EF0000
trusted library allocation
page read and write
14AA000
trusted library allocation
page execute and read and write
57EC000
heap
page read and write
4D35000
heap
page read and write
CC0000
heap
page read and write
F02000
trusted library allocation
page read and write
6F6000
stack
page read and write
18AE000
stack
page read and write
358F000
heap
page read and write
3510000
heap
page read and write
11B0000
heap
page read and write
35EE000
heap
page read and write
12F9000
heap
page read and write
111A000
trusted library allocation
page execute and read and write
4E8C000
stack
page read and write
12AD000
heap
page read and write
35E4000
heap
page read and write
1530000
heap
page read and write
577E000
stack
page read and write
936000
stack
page read and write
7FCB0000
trusted library allocation
page execute and read and write
18BC000
trusted library allocation
page execute and read and write
E37000
trusted library allocation
page execute and read and write
7F90000
trusted library section
page read and write
855E000
stack
page read and write
148E000
stack
page read and write
1380000
trusted library allocation
page execute and read and write
939000
stack
page read and write
197C000
stack
page read and write
354A000
heap
page read and write
2A7E000
trusted library allocation
page read and write
3539000
heap
page read and write
35E4000
heap
page read and write
3535000
heap
page read and write
77A0000
heap
page read and write
66BE000
stack
page read and write
2D7E000
trusted library allocation
page read and write
D89000
stack
page read and write
3591000
heap
page read and write
EE4000
heap
page read and write
130E000
stack
page read and write
3548000
heap
page read and write
58E000
unkown
page readonly
8C7000
trusted library allocation
page execute and read and write
3C51000
trusted library allocation
page read and write
353C000
heap
page read and write
57E1000
heap
page read and write
630E000
stack
page read and write
67BF000
stack
page read and write
F8C000
stack
page read and write
E68000
heap
page read and write
C80000
trusted library allocation
page read and write
1302000
trusted library allocation
page read and write
7FE000
stack
page read and write
51FB000
stack
page read and write
E7E000
stack
page read and write
B20000
heap
page read and write
29F1000
trusted library allocation
page read and write
E06000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
358B000
heap
page read and write
4BFB000
stack
page read and write
35EE000
heap
page read and write
3595000
heap
page read and write
3595000
heap
page read and write
ED0000
trusted library allocation
page read and write
3501000
heap
page read and write
54A0000
heap
page read and write
165E000
stack
page read and write
D86000
stack
page read and write
127E000
stack
page read and write
B67000
trusted library allocation
page execute and read and write
3524000
heap
page read and write
750000
heap
page read and write
355D000
heap
page read and write
130A000
trusted library allocation
page execute and read and write
3FE1000
trusted library allocation
page read and write
4C15000
heap
page read and write
100C000
stack
page read and write
1307000
trusted library allocation
page execute and read and write
3535000
heap
page read and write
F0A000
trusted library allocation
page execute and read and write
36C1000
trusted library allocation
page read and write
3BE000
stack
page read and write
323E000
stack
page read and write
192E000
stack
page read and write
A9E000
stack
page read and write
1356000
stack
page read and write
F37000
trusted library allocation
page execute and read and write
14EB000
trusted library allocation
page execute and read and write
358F000
heap
page read and write
914000
heap
page read and write
89C000
heap
page read and write
863000
heap
page read and write
BDE000
stack
page read and write
11A0000
heap
page execute and read and write
3590000
heap
page read and write
3565000
heap
page read and write
3588000
heap
page read and write
2FC1000
trusted library allocation
page read and write
10B0000
heap
page read and write
5120000
trusted library allocation
page read and write
6540000
heap
page read and write
308F000
trusted library allocation
page read and write
527E000
stack
page read and write
353B000
heap
page read and write
18C7000
trusted library allocation
page execute and read and write
1080000
heap
page execute and read and write
829000
heap
page read and write
3549000
heap
page read and write
1A40000
heap
page read and write
39F1000
trusted library allocation
page read and write
4DEE000
stack
page read and write
572000
unkown
page readonly
3F0000
heap
page read and write
8B7000
heap
page read and write
4F80000
heap
page read and write
14BC000
trusted library allocation
page execute and read and write
3FA000
stack
page read and write
C1E000
stack
page read and write
1620000
heap
page read and write
26AE000
stack
page read and write
C8E000
stack
page read and write
510E000
stack
page read and write
11F0000
heap
page read and write
1736000
heap
page read and write
8B2000
trusted library allocation
page execute and read and write
4584000
trusted library allocation
page read and write
3583000
heap
page read and write
57F7000
heap
page read and write
4ECB000
stack
page read and write
4C10000
heap
page read and write
DE0000
heap
page read and write
EF2000
trusted library allocation
page execute and read and write
3547000
heap
page read and write
CB8000
heap
page read and write
18B2000
trusted library allocation
page execute and read and write
6DDE000
stack
page read and write
11E0000
heap
page read and write
1B9E000
stack
page read and write
CEC000
heap
page read and write
11C0000
heap
page read and write
C90000
heap
page read and write
35EE000
heap
page read and write
14E0000
trusted library allocation
page read and write
11BF000
stack
page read and write
18EB000
trusted library allocation
page execute and read and write
599F000
stack
page read and write
1390000
heap
page read and write
B62000
trusted library allocation
page read and write
CA7000
heap
page read and write
57F5000
heap
page read and write
104F000
stack
page read and write
8CB000
trusted library allocation
page execute and read and write
F90000
heap
page read and write
5F7D000
stack
page read and write
EE2000
trusted library allocation
page execute and read and write
57E0000
heap
page read and write
17C0000
heap
page execute and read and write
4B90000
heap
page read and write
53A0000
heap
page read and write
1300000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
168F000
trusted library allocation
page read and write
B10000
heap
page read and write
5360000
trusted library allocation
page execute and read and write
53D0000
heap
page read and write
F18000
heap
page read and write
3586000
heap
page read and write
3505000
heap
page read and write
12FA000
trusted library allocation
page execute and read and write
57ED000
heap
page read and write
3590000
heap
page read and write
ADD000
stack
page read and write
3C77000
trusted library allocation
page read and write
4C40000
heap
page read and write
617E000
stack
page read and write
C4E000
stack
page read and write
6559000
heap
page read and write
3591000
heap
page read and write
59DD000
stack
page read and write
3340000
heap
page read and write
500C000
stack
page read and write
EC6000
heap
page read and write
4EE3000
heap
page read and write
156E000
stack
page read and write
353F000
heap
page read and write
4DEE000
stack
page read and write
127E000
stack
page read and write
BB1000
heap
page read and write
57ED000
heap
page read and write
B82000
trusted library allocation
page execute and read and write
B97000
trusted library allocation
page execute and read and write
348E000
stack
page read and write
59E0000
heap
page read and write
355B000
heap
page read and write
2D3E000
stack
page read and write
355E000
heap
page read and write
CC5000
heap
page read and write
30B3000
trusted library allocation
page read and write
14C5000
heap
page read and write
3588000
heap
page read and write
3510000
heap
page read and write
58B0000
heap
page read and write
3545000
heap
page read and write
319E000
stack
page read and write
1A00000
heap
page read and write
152E000
stack
page read and write
57EC000
heap
page read and write
E50000
heap
page read and write
B10000
heap
page read and write
845E000
stack
page read and write
5E40000
heap
page read and write
D80000
heap
page read and write
64CE000
stack
page read and write
4FD0000
unclassified section
page read and write
89F000
heap
page read and write
52A0000
trusted library section
page readonly
1312000
trusted library allocation
page execute and read and write
89C000
trusted library allocation
page execute and read and write
9A6000
stack
page read and write
1130000
heap
page read and write
1040000
heap
page read and write
F1A000
trusted library allocation
page execute and read and write
4B60000
heap
page read and write
35E0000
heap
page read and write
11B7000
heap
page read and write
6F9000
stack
page read and write
12F2000
trusted library allocation
page execute and read and write
6100000
heap
page read and write
35E0000
heap
page read and write
57E9000
heap
page read and write
CF6000
stack
page read and write
7F80000
heap
page read and write
7BE000
stack
page read and write
670E000
stack
page read and write
358B000
heap
page read and write
11B0000
heap
page read and write
4C50000
heap
page read and write
C3E000
heap
page read and write
355B000
heap
page read and write
18DA000
trusted library allocation
page execute and read and write
3F31000
trusted library allocation
page read and write
16A2000
trusted library allocation
page execute and read and write
258E000
stack
page read and write
DFE000
stack
page read and write
6F6000
stack
page read and write
3548000
heap
page read and write
E2E000
stack
page read and write
6F1E000
stack
page read and write
3598000
heap
page read and write
E94000
heap
page read and write
CF0000
heap
page read and write
58D5000
heap
page read and write
3005000
trusted library allocation
page read and write
B5A000
trusted library allocation
page execute and read and write
798E000
stack
page read and write
4B50000
heap
page read and write
370000
heap
page read and write
57EC000
heap
page read and write
AF0000
heap
page read and write
EFC000
trusted library allocation
page execute and read and write
DFA000
trusted library allocation
page execute and read and write
12A0000
trusted library allocation
page read and write
11F5000
heap
page read and write
CA3000
heap
page read and write
698E000
stack
page read and write
F22000
trusted library allocation
page execute and read and write
3540000
heap
page read and write
1713000
heap
page read and write
C4E000
stack
page read and write
18C2000
trusted library allocation
page read and write
E30000
trusted library allocation
page execute and read and write
BC4000
heap
page read and write
B72000
trusted library allocation
page execute and read and write
640E000
stack
page read and write
1050000
trusted library allocation
page read and write
4E7B000
stack
page read and write
B7A000
trusted library allocation
page execute and read and write
4F90000
heap
page read and write
5870000
heap
page read and write
35E7000
heap
page read and write
F00000
trusted library allocation
page read and write
882000
trusted library allocation
page execute and read and write
5320000
heap
page read and write
6000000
trusted library allocation
page read and write
3D0000
heap
page read and write
319000
stack
page read and write
3589000
heap
page read and write
3082000
trusted library allocation
page read and write
1200000
heap
page read and write
701E000
stack
page read and write
3545000
heap
page read and write
4D70000
heap
page read and write
5570000
heap
page read and write
EEF000
heap
page read and write
CAA000
heap
page read and write
E58000
heap
page read and write
BA7000
trusted library allocation
page execute and read and write
B42000
trusted library allocation
page execute and read and write
3081000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
5490000
heap
page read and write
57F6000
heap
page read and write
35E0000
heap
page read and write
EEA000
trusted library allocation
page execute and read and write
AF0000
heap
page read and write
DD0000
heap
page read and write
607E000
stack
page read and write
1350000
heap
page read and write
8E0000
heap
page read and write
5480000
heap
page read and write
D40000
heap
page read and write
3590000
heap
page read and write
3536000
heap
page read and write
FCE000
stack
page read and write
AEF000
stack
page read and write
1127000
trusted library allocation
page execute and read and write
867000
heap
page read and write
B7C000
trusted library allocation
page execute and read and write
2F80000
trusted library allocation
page read and write
643F000
stack
page read and write
644E000
stack
page read and write
3582000
heap
page read and write
2C9F000
stack
page read and write
3538000
heap
page read and write
B50000
trusted library allocation
page read and write
3542000
heap
page read and write
3587000
heap
page read and write
F57000
trusted library allocation
page execute and read and write
3535000
heap
page read and write
84E0000
heap
page read and write
F60000
heap
page read and write
355D000
heap
page read and write
4D50000
heap
page read and write
355B000
heap
page read and write
1717000
heap
page read and write
4631000
trusted library allocation
page read and write
5670000
heap
page read and write
4E8F000
stack
page read and write
2D81000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
3565000
heap
page read and write
567F000
stack
page read and write
528B000
stack
page read and write
E3B000
trusted library allocation
page execute and read and write
10A7000
heap
page read and write
1397000
heap
page read and write
4C9D000
stack
page read and write
10F6000
stack
page read and write
5540000
heap
page read and write
2FDF000
trusted library allocation
page read and write
28D1000
trusted library allocation
page read and write
51BE000
stack
page read and write
5530000
heap
page read and write
E80000
heap
page read and write
1A03000
heap
page read and write
16AA000
trusted library allocation
page execute and read and write
680E000
stack
page read and write
3595000
heap
page read and write
E70000
heap
page read and write
60BE000
stack
page read and write
1BDE000
stack
page read and write
12CE000
stack
page read and write
4B93000
heap
page read and write
3598000
heap
page read and write
C3A000
heap
page read and write
684E000
stack
page read and write
3540000
heap
page read and write
1080000
heap
page read and write
140E000
stack
page read and write
4084000
trusted library allocation
page read and write
1980000
heap
page read and write
1070000
trusted library allocation
page read and write
C5B000
stack
page read and write
358B000
heap
page read and write
1720000
trusted library allocation
page read and write
F65000
heap
page read and write
4C00000
trusted library section
page readonly
34F0000
heap
page read and write
9FA000
stack
page read and write
586B000
stack
page read and write
B6A000
trusted library allocation
page execute and read and write
4C63000
heap
page read and write
B8A000
trusted library allocation
page execute and read and write
DE0000
heap
page read and write
57E0000
heap
page read and write
318E000
stack
page read and write
B92000
trusted library allocation
page execute and read and write
4B70000
trusted library allocation
page execute and read and write
841C000
stack
page read and write
2AC5000
trusted library allocation
page read and write
F4A000
trusted library allocation
page execute and read and write
344F000
unkown
page read and write
5293000
heap
page read and write
A50000
heap
page read and write
160F000
stack
page read and write
14B0000
trusted library allocation
page read and write
3545000
heap
page read and write
106C000
stack
page read and write
3593000
heap
page read and write
7F10000
heap
page read and write
358C000
heap
page read and write
15F0000
heap
page read and write
7A9000
stack
page read and write
633E000
stack
page read and write
66BE000
stack
page read and write
12B0000
trusted library allocation
page execute and read and write
5350000
heap
page read and write
3680000
trusted library allocation
page read and write
C00000
heap
page read and write
2966000
trusted library allocation
page read and write
E02000
trusted library allocation
page execute and read and write
7F5000
heap
page read and write
4F2C000
stack
page read and write
19D0000
trusted library allocation
page read and write
17AE000
stack
page read and write
1327000
trusted library allocation
page execute and read and write
6C9E000
stack
page read and write
8E8000
heap
page read and write
4FB0000
heap
page read and write
667F000
stack
page read and write
3541000
heap
page read and write
28F6000
trusted library allocation
page read and write
18E0000
trusted library allocation
page read and write
F3A000
trusted library allocation
page execute and read and write
102E000
stack
page read and write
18CA000
trusted library allocation
page execute and read and write
6B60000
heap
page read and write
3D7000
heap
page read and write
770000
heap
page read and write
355D000
heap
page read and write
6A3F000
stack
page read and write
E0C000
trusted library allocation
page execute and read and write
3594000
heap
page read and write
1A44000
heap
page read and write
35C0000
heap
page read and write
1112000
trusted library allocation
page execute and read and write
355B000
heap
page read and write
16B7000
heap
page read and write
4F10000
heap
page read and write
131A000
trusted library allocation
page execute and read and write
5290000
heap
page read and write
F07000
trusted library allocation
page execute and read and write
FA2000
heap
page read and write
3583000
heap
page read and write
4F7D000
stack
page read and write
3583000
heap
page read and write
57EC000
heap
page read and write
5385000
heap
page read and write
57C2000
heap
page read and write
F2A000
trusted library allocation
page execute and read and write
548D000
stack
page read and write
B87000
trusted library allocation
page execute and read and write
DF2000
trusted library allocation
page execute and read and write
3590000
heap
page read and write
5360000
heap
page read and write
1060000
heap
page execute and read and write
83A000
stack
page read and write
18D2000
trusted library allocation
page execute and read and write
357E000
heap
page read and write
5370000
trusted library allocation
page execute and read and write
116E000
stack
page read and write
D60000
heap
page read and write
62BF000
stack
page read and write
B9B000
trusted library allocation
page execute and read and write
760000
heap
page read and write
705E000
stack
page read and write
14C0000
heap
page read and write
B5C000
trusted library allocation
page execute and read and write
35E0000
heap
page read and write
2CF1000
trusted library allocation
page read and write
C2E000
stack
page read and write
123F000
stack
page read and write
B15000
heap
page read and write
5EFE000
heap
page read and write
CF9000
stack
page read and write
18C0000
trusted library allocation
page read and write
A10000
heap
page read and write
1066000
heap
page read and write
C90000
heap
page execute and read and write
2BEF000
stack
page read and write
E22000
trusted library allocation
page execute and read and write
355D000
heap
page read and write
3549000
heap
page read and write
50BC000
stack
page read and write
10A0000
heap
page read and write
F42000
trusted library allocation
page execute and read and write
7F0000
heap
page read and write
693E000
stack
page read and write
68FE000
stack
page read and write
3071000
trusted library allocation
page read and write
B62000
trusted library allocation
page execute and read and write
517E000
stack
page read and write
59F1000
heap
page read and write
57EC000
heap
page read and write
E60000
heap
page read and write
3030000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
819F000
stack
page read and write
F5B000
trusted library allocation
page execute and read and write
112B000
trusted library allocation
page execute and read and write
ADE000
stack
page read and write
357C000
heap
page read and write
4B10000
trusted library allocation
page execute and read and write
589E000
stack
page read and write
35E0000
heap
page read and write
C8A000
stack
page read and write
B77000
heap
page read and write
F74000
heap
page read and write
607E000
stack
page read and write
12D0000
trusted library allocation
page read and write
F43000
heap
page read and write
859E000
stack
page read and write
4E40000
trusted library allocation
page read and write
3565000
heap
page read and write
5380000
heap
page read and write
110E000
stack
page read and write
3596000
heap
page read and write
6F9000
stack
page read and write
357C000
heap
page read and write
53C0000
trusted library allocation
page execute and read and write
3547000
heap
page read and write
6640000
trusted library allocation
page read and write
890000
trusted library allocation
page read and write
EFA000
trusted library allocation
page execute and read and write
1680000
heap
page read and write
657E000
stack
page read and write
35E3000
heap
page read and write
3547000
heap
page read and write
5700000
heap
page read and write
81DE000
stack
page read and write
F07000
trusted library allocation
page read and write
13CE000
stack
page read and write
8A2000
trusted library allocation
page read and write
1640000
heap
page read and write
4081000
trusted library allocation
page read and write
82DE000
stack
page read and write
EBA000
heap
page read and write
4B00000
trusted library allocation
page read and write
358A000
heap
page read and write
4D6D000
stack
page read and write
1D2F000
stack
page read and write
5880000
trusted library section
page readonly
4D80000
heap
page read and write
2D88000
trusted library allocation
page read and write
809F000
stack
page read and write
1490000
trusted library allocation
page read and write
3565000
heap
page read and write
3656000
trusted library allocation
page read and write
353B000
heap
page read and write
8BA000
trusted library allocation
page execute and read and write
32EF000
stack
page read and write
3345000
heap
page read and write
F52000
trusted library allocation
page read and write
D1B000
stack
page read and write
CFE000
stack
page read and write
353E000
heap
page read and write
16E4000
heap
page read and write
570000
unkown
page readonly
107E000
stack
page read and write
531D000
stack
page read and write
F78000
heap
page read and write
57E2000
heap
page read and write
694F000
stack
page read and write
E84000
heap
page read and write
C71000
heap
page read and write
3CF1000
trusted library allocation
page read and write
5EF0000
heap
page read and write
5213000
heap
page read and write
57EF000
heap
page read and write
12AF000
trusted library allocation
page read and write
61FE000
stack
page read and write
E40000
trusted library allocation
page read and write
There are 802 hidden memdumps, click here to show them.