IOC Report
PXe2j6taKw.exe

loading gif

Files

File Path
Type
Category
Malicious
PXe2j6taKw.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\PXe2j6taKw.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\chargeable.exe.log
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PXe2j6taKw.exe
"C:\Users\user\Desktop\PXe2j6taKw.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
malicious
C:\Users\user\Desktop\PXe2j6taKw.exe
"C:\Users\user\Desktop\PXe2j6taKw.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\Desktop\PXe2j6taKw.exe
"C:\Users\user\Desktop\PXe2j6taKw.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
doddyfire.linkpc.net
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://go.microsoft.
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://go.microsoft.LinkId=42127
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://www.sysinternals.com0
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
doddyfire.linkpc.net
160.177.56.173
malicious

IPs

IP
Domain
Country
Malicious
160.177.56.173
doddyfire.linkpc.net
Morocco
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
confuse
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SysMain
malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\e1a87040f2026369a233f9ae76301b7b
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
2821000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3461000
trusted library allocation
page read and write
malicious
15DE000
stack
page read and write
17A0000
trusted library allocation
page read and write
101A000
trusted library allocation
page execute and read and write
4E90000
heap
page read and write
1007000
trusted library allocation
page execute and read and write
4D83000
heap
page read and write
F48000
heap
page read and write
5B7E000
stack
page read and write
56DC000
stack
page read and write
2E70000
trusted library allocation
page read and write
4B60000
trusted library section
page readonly
127A000
trusted library allocation
page execute and read and write
F69000
heap
page read and write
EF0000
trusted library allocation
page read and write
3371000
trusted library allocation
page read and write
2C81000
trusted library allocation
page read and write
FE0000
heap
page read and write
4C20000
heap
page read and write
590000
heap
page read and write
693E000
stack
page read and write
63BE000
stack
page read and write
51DE000
stack
page read and write
10F6000
stack
page read and write
5E90000
heap
page read and write
1230000
heap
page read and write
131E000
stack
page read and write
5D7000
trusted library allocation
page execute and read and write
99E000
stack
page read and write
516F000
stack
page read and write
644E000
stack
page read and write
2D16000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page execute and read and write
14A0000
heap
page read and write
FC2000
heap
page read and write
30B1000
trusted library allocation
page read and write
10C7000
trusted library allocation
page execute and read and write
5A3F000
stack
page read and write
5FB000
heap
page read and write
F9E000
heap
page read and write
10BC000
stack
page read and write
4B00000
heap
page read and write
30D6000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
920000
trusted library allocation
page read and write
183C000
stack
page read and write
E90000
trusted library allocation
page read and write
5B0000
heap
page read and write
592000
trusted library allocation
page execute and read and write
4BF5000
heap
page read and write
FDE000
heap
page read and write
9BE000
stack
page read and write
4C70000
heap
page read and write
1820000
heap
page execute and read and write
400000
remote allocation
page execute and read and write
5FFE000
stack
page read and write
E82000
trusted library allocation
page execute and read and write
5410000
heap
page read and write
1600000
heap
page read and write
F12000
heap
page read and write
EF2000
trusted library allocation
page execute and read and write
2CD0000
trusted library allocation
page read and write
1A70000
trusted library allocation
page execute and read and write
57E0000
heap
page read and write
620E000
stack
page read and write
1297000
trusted library allocation
page execute and read and write
54A5000
heap
page read and write
5DB000
trusted library allocation
page execute and read and write
FE7000
heap
page read and write
1860000
heap
page read and write
4F7E000
stack
page read and write
52A0000
heap
page read and write
5CA000
trusted library allocation
page execute and read and write
8B6E000
stack
page read and write
17FE000
stack
page read and write
5271000
heap
page read and write
F0A000
trusted library allocation
page execute and read and write
F95000
heap
page read and write
137E000
stack
page read and write
2D11000
trusted library allocation
page read and write
5504000
trusted library section
page readonly
8CE000
stack
page read and write
5980000
heap
page read and write
19FC000
stack
page read and write
EF0000
heap
page execute and read and write
F3C000
heap
page read and write
A20000
trusted library allocation
page read and write
13BA000
heap
page read and write
D00000
trusted library allocation
page execute and read and write
F6C000
heap
page read and write
5270000
heap
page read and write
55BD000
stack
page read and write
577B000
stack
page read and write
6430000
heap
page read and write
60CE000
stack
page read and write
F6B000
heap
page read and write
12DF000
stack
page read and write
1230000
heap
page read and write
F95000
heap
page read and write
190E000
stack
page read and write
F3D000
heap
page read and write
8C6E000
stack
page read and write
40B1000
trusted library allocation
page read and write
78EF000
stack
page read and write
B66000
heap
page read and write
ECE000
stack
page read and write
11D0000
heap
page read and write
50BF000
stack
page read and write
F46000
heap
page read and write
18AE000
stack
page read and write
7F740000
trusted library allocation
page execute and read and write
937000
trusted library allocation
page execute and read and write
109A000
trusted library allocation
page execute and read and write
5C2000
trusted library allocation
page execute and read and write
7DAF000
stack
page read and write
658E000
stack
page read and write
EE2000
trusted library allocation
page read and write
182C000
trusted library allocation
page execute and read and write
F1B000
trusted library allocation
page execute and read and write
6F0E000
heap
page read and write
529A000
heap
page read and write
5293000
heap
page read and write
F6B000
heap
page read and write
598000
heap
page read and write
4BCE000
stack
page read and write
F71000
heap
page read and write
1740000
trusted library allocation
page read and write
26DF000
trusted library allocation
page read and write
F3D000
heap
page read and write
6B22000
trusted library allocation
page read and write
33FE000
trusted library allocation
page read and write
4BCF000
stack
page read and write
15DE000
stack
page read and write
22EF000
stack
page read and write
B39000
stack
page read and write
F6D000
heap
page read and write
9B3000
stack
page read and write
179A000
trusted library allocation
page execute and read and write
FC2000
heap
page read and write
C7A000
trusted library allocation
page execute and read and write
139000
stack
page read and write
F67000
heap
page read and write
1270000
trusted library allocation
page read and write
9AE000
stack
page read and write
FF6000
stack
page read and write
1A10000
heap
page read and write
4DFE000
stack
page read and write
1800000
trusted library allocation
page read and write
DAD000
stack
page read and write
4F5E000
stack
page read and write
F9F000
heap
page read and write
13AE000
heap
page read and write
C62000
unkown
page readonly
61CF000
stack
page read and write
4C0E000
stack
page read and write
EDC000
trusted library allocation
page execute and read and write
3B31000
trusted library allocation
page read and write
957000
trusted library allocation
page execute and read and write
5200000
heap
page read and write
F4B000
heap
page read and write
17F0000
trusted library allocation
page execute and read and write
4487000
trusted library allocation
page read and write
10AA000
trusted library allocation
page execute and read and write
1663000
heap
page read and write
65E000
heap
page read and write
1290000
trusted library allocation
page read and write
EEB000
heap
page read and write
55C0000
heap
page read and write
1277000
trusted library allocation
page execute and read and write
1630000
heap
page read and write
4D40000
trusted library allocation
page execute and read and write
1090000
trusted library allocation
page read and write
1820000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
AD0000
heap
page read and write
1337000
heap
page read and write
2631000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
F7B000
heap
page read and write
49A0000
trusted library section
page readonly
3146000
trusted library allocation
page read and write
529A000
heap
page read and write
F90000
heap
page read and write
15F0000
heap
page read and write
1370000
trusted library allocation
page execute and read and write
FE2000
heap
page read and write
9BB000
stack
page read and write
4D30000
trusted library allocation
page read and write
B00000
heap
page read and write
5630000
heap
page read and write
699E000
stack
page read and write
4D80000
heap
page read and write
57A0000
trusted library allocation
page execute and read and write
EFC000
trusted library allocation
page execute and read and write
4E8D000
stack
page read and write
E92000
trusted library allocation
page execute and read and write
A3A000
stack
page read and write
4C85000
heap
page read and write
989000
stack
page read and write
10A0000
trusted library allocation
page read and write
DFE000
stack
page read and write
1950000
trusted library allocation
page read and write
5900000
heap
page read and write
EFA000
heap
page read and write
4820000
heap
page read and write
8BB000
stack
page read and write
529A000
heap
page read and write
912000
trusted library allocation
page execute and read and write
12DE000
heap
page read and write
6ADE000
stack
page read and write
EB0000
trusted library allocation
page read and write
10C0000
trusted library allocation
page read and write
922000
trusted library allocation
page execute and read and write
50DE000
stack
page read and write
ABF000
stack
page read and write
F00000
heap
page read and write
9B9000
stack
page read and write
52B0000
heap
page read and write
F64000
heap
page read and write
F9F000
heap
page read and write
135E000
stack
page read and write
8A2E000
stack
page read and write
2B31000
trusted library allocation
page read and write
C0F000
stack
page read and write
66BE000
stack
page read and write
C3E000
stack
page read and write
4F9E000
stack
page read and write
5E80000
heap
page read and write
FDE000
heap
page read and write
159E000
stack
page read and write
2EF3000
trusted library allocation
page read and write
F11000
heap
page read and write
EF0000
heap
page read and write
4DA0000
heap
page read and write
4B65000
trusted library section
page readonly
4E80000
heap
page read and write
ECB000
trusted library allocation
page execute and read and write
FDE000
heap
page read and write
E8A000
trusted library allocation
page execute and read and write
53E000
stack
page read and write
66C0000
heap
page read and write
F44000
heap
page read and write
5798000
stack
page read and write
4E30000
trusted library allocation
page execute and read and write
B08000
heap
page read and write
F3B000
heap
page read and write
570000
trusted library allocation
page read and write
58F0000
heap
page read and write
D0E000
stack
page read and write
1C9000
stack
page read and write
69C000
heap
page read and write
128A000
trusted library allocation
page execute and read and write
685E000
stack
page read and write
9EC000
stack
page read and write
F69000
heap
page read and write
496E000
stack
page read and write
F7A000
heap
page read and write
FE8000
heap
page read and write
2703000
trusted library allocation
page read and write
93A000
trusted library allocation
page execute and read and write
DD2000
trusted library allocation
page execute and read and write
D60000
heap
page read and write
4E40000
trusted library allocation
page read and write
4E85000
heap
page read and write
546E000
stack
page read and write
181A000
trusted library allocation
page execute and read and write
F63000
heap
page read and write
130F000
heap
page read and write
CA0000
heap
page read and write
85C000
stack
page read and write
1272000
trusted library allocation
page read and write
4ACE000
stack
page read and write
F29000
heap
page read and write
3571000
trusted library allocation
page read and write
244E000
stack
page read and write
F48000
heap
page read and write
4FBE000
stack
page read and write
9F0000
heap
page read and write
9B6000
stack
page read and write
1361000
heap
page read and write
EAE000
stack
page read and write
1752000
trusted library allocation
page execute and read and write
4EA5000
trusted library section
page readonly
1460000
heap
page read and write
11F0000
heap
page read and write
5CD000
heap
page read and write
C9000
stack
page read and write
60FE000
stack
page read and write
1234000
heap
page read and write
514C000
stack
page read and write
F6B000
heap
page read and write
8B0000
heap
page read and write
1092000
trusted library allocation
page execute and read and write
480E000
stack
page read and write
5C3000
heap
page read and write
FBE000
heap
page read and write
17AB000
trusted library allocation
page execute and read and write
1360000
trusted library allocation
page read and write
135D000
heap
page read and write
58CE000
stack
page read and write
1800000
trusted library allocation
page read and write
B36000
stack
page read and write
F5D000
heap
page read and write
2680000
trusted library allocation
page read and write
9E0000
heap
page read and write
1760000
trusted library allocation
page read and write
4A70000
trusted library allocation
page read and write
B60000
heap
page read and write
FC2000
heap
page read and write
D10000
trusted library allocation
page read and write
4A80000
heap
page read and write
D30000
heap
page read and write
18B0000
heap
page read and write
F0E000
heap
page read and write
980000
heap
page read and write
1C6000
stack
page read and write
2ADE000
stack
page read and write
5170000
heap
page read and write
66C0000
heap
page read and write
8EEE000
stack
page read and write
B37000
heap
page read and write
643E000
heap
page read and write
936000
stack
page read and write
52A7000
heap
page read and write
1090000
heap
page read and write
F69000
heap
page read and write
5783000
heap
page read and write
59A3000
heap
page read and write
52A9000
heap
page read and write
F43000
heap
page read and write
ED2000
trusted library allocation
page execute and read and write
F95000
heap
page read and write
67FE000
stack
page read and write
5F90000
heap
page read and write
109C000
trusted library allocation
page execute and read and write
1850000
trusted library allocation
page read and write
F6E000
heap
page read and write
4E3E000
stack
page read and write
A30000
heap
page read and write
5340000
heap
page read and write
529C000
heap
page read and write
27EE000
stack
page read and write
52AA000
heap
page read and write
4D10000
heap
page read and write
1282000
trusted library allocation
page execute and read and write
D30000
heap
page read and write
C80000
heap
page read and write
2ECF000
trusted library allocation
page read and write
EE0000
heap
page read and write
5960000
trusted library section
page read and write
ED0000
trusted library allocation
page read and write
F95000
heap
page read and write
53AE000
stack
page read and write
B80000
heap
page read and write
440000
heap
page read and write
108F000
stack
page read and write
52A7000
heap
page read and write
1762000
trusted library allocation
page execute and read and write
746E000
stack
page read and write
DDA000
trusted library allocation
page execute and read and write
5A2000
trusted library allocation
page read and write
13C0000
heap
page read and write
FE4000
heap
page read and write
55D0000
heap
page read and write
195F000
trusted library allocation
page read and write
C72000
trusted library allocation
page execute and read and write
6180000
heap
page read and write
C60000
unkown
page readonly
6B5000
heap
page read and write
507F000
stack
page read and write
932000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
F71000
heap
page read and write
736E000
stack
page read and write
D00000
heap
page read and write
3100000
trusted library allocation
page read and write
6B00000
trusted library allocation
page read and write
DE5000
heap
page read and write
AD0000
heap
page execute and read and write
26EE000
stack
page read and write
F6C000
heap
page read and write
1235000
heap
page read and write
2EC2000
trusted library allocation
page read and write
F46000
heap
page read and write
C9E000
heap
page read and write
13B0000
heap
page read and write
4371000
trusted library allocation
page read and write
F39000
heap
page read and write
67FE000
stack
page read and write
5620000
trusted library section
page readonly
EC2000
trusted library allocation
page execute and read and write
5F10000
heap
page read and write
907000
heap
page read and write
2E21000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
2D6E000
stack
page read and write
F17000
trusted library allocation
page execute and read and write
57E3000
heap
page read and write
16E0000
heap
page read and write
4571000
trusted library allocation
page read and write
5B8E000
unkown
page read and write
D60000
heap
page read and write
F70000
heap
page read and write
6B7E000
stack
page read and write
F78000
heap
page read and write
4EA1000
heap
page read and write
13E3000
heap
page read and write
177A000
trusted library allocation
page execute and read and write
D2E000
stack
page read and write
D40000
heap
page read and write
16D0000
trusted library allocation
page read and write
F2D000
heap
page read and write
47CE000
stack
page read and write
146B000
stack
page read and write
F37000
heap
page read and write
4C20000
heap
page read and write
3E21000
trusted library allocation
page read and write
F68000
heap
page read and write
6A7E000
stack
page read and write
C10000
heap
page read and write
5950000
heap
page read and write
61B000
heap
page read and write
3631000
trusted library allocation
page read and write
D7E000
stack
page read and write
1634000
heap
page read and write
1002000
trusted library allocation
page read and write
689E000
stack
page read and write
F74000
heap
page read and write
5B5000
heap
page read and write
F9E000
heap
page read and write
E80000
heap
page read and write
7DB0000
heap
page read and write
B00000
heap
page read and write
145E000
stack
page read and write
4D0F000
stack
page read and write
1770000
trusted library allocation
page read and write
B05000
heap
page read and write
38E6000
trusted library allocation
page read and write
1012000
trusted library allocation
page execute and read and write
693E000
stack
page read and write
FE3000
heap
page read and write
52FB000
stack
page read and write
95B000
trusted library allocation
page execute and read and write
66E0000
trusted library allocation
page read and write
66CE000
heap
page read and write
F76000
heap
page read and write
4C30000
trusted library allocation
page execute and read and write
5500000
trusted library section
page readonly
E7F000
stack
page read and write
5E80000
heap
page read and write
1230000
trusted library allocation
page read and write
F71000
heap
page read and write
F73000
heap
page read and write
5A7E000
stack
page read and write
593E000
stack
page read and write
17EE000
stack
page read and write
488E000
stack
page read and write
F46000
heap
page read and write
942000
trusted library allocation
page execute and read and write
EC4000
heap
page read and write
F7A000
heap
page read and write
5223000
heap
page read and write
DC0000
trusted library allocation
page read and write
10EF000
stack
page read and write
10CB000
trusted library allocation
page execute and read and write
C4E000
stack
page read and write
72BE000
stack
page read and write
1359000
heap
page read and write
F5F000
heap
page read and write
F02000
trusted library allocation
page execute and read and write
D3F000
stack
page read and write
1960000
heap
page read and write
FEC000
heap
page read and write
582000
trusted library allocation
page execute and read and write
4C0B000
stack
page read and write
1A00000
heap
page execute and read and write
1442000
heap
page read and write
14CF000
stack
page read and write
571B000
stack
page read and write
7CE000
stack
page read and write
10A2000
trusted library allocation
page read and write
F3D000
heap
page read and write
492E000
stack
page read and write
C9E000
stack
page read and write
D0A000
stack
page read and write
4D70000
trusted library allocation
page read and write
3B34000
trusted library allocation
page read and write
6F00000
heap
page read and write
E98000
heap
page read and write
173D000
stack
page read and write
FEC000
heap
page read and write
1220000
heap
page execute and read and write
53FD000
stack
page read and write
F73000
heap
page read and write
107C000
stack
page read and write
8DAC000
stack
page read and write
889000
stack
page read and write
4BA0000
heap
page read and write
293E000
stack
page read and write
1027000
trusted library allocation
page execute and read and write
5C10000
trusted library allocation
page execute and read and write
3791000
trusted library allocation
page read and write
F5D000
heap
page read and write
4BF0000
heap
page read and write
49A4000
trusted library section
page readonly
FEB000
heap
page read and write
F3D000
heap
page read and write
55AE000
stack
page read and write
FC2000
heap
page read and write
DE0000
heap
page read and write
161E000
stack
page read and write
F5F000
heap
page read and write
4DBE000
stack
page read and write
5A7000
trusted library allocation
page execute and read and write
5220000
heap
page read and write
1166000
heap
page read and write
1EE000
stack
page read and write
F70000
heap
page read and write
F75000
heap
page read and write
1371000
heap
page read and write
74EE000
stack
page read and write
4990000
heap
page read and write
594E000
unkown
page read and write
FDE000
heap
page read and write
986000
stack
page read and write
F68000
heap
page read and write
124A000
trusted library allocation
page execute and read and write
F5E000
stack
page read and write
5C70000
heap
page read and write
61E000
stack
page read and write
ECA000
trusted library allocation
page execute and read and write
4810000
trusted library allocation
page execute and read and write
1242000
trusted library allocation
page execute and read and write
131E000
heap
page read and write
51BE000
stack
page read and write
573E000
stack
page read and write
13C7000
heap
page read and write
694000
heap
page read and write
51F0000
heap
page read and write
69DE000
stack
page read and write
CC5000
heap
page read and write
1100000
heap
page read and write
5910000
trusted library allocation
page execute and read and write
F6D000
heap
page read and write
54AE000
stack
page read and write
55FE000
stack
page read and write
83B000
stack
page read and write
8B2E000
stack
page read and write
CC0000
heap
page read and write
126C000
trusted library allocation
page execute and read and write
4E5C000
stack
page read and write
EC7000
trusted library allocation
page execute and read and write
890000
trusted library allocation
page read and write
5780000
heap
page read and write
5680000
trusted library allocation
page read and write
F6E000
heap
page read and write
ECE000
heap
page read and write
2791000
trusted library allocation
page read and write
B71000
heap
page read and write
1236000
heap
page read and write
529C000
heap
page read and write
F9E000
heap
page read and write
4D7E000
stack
page read and write
575C000
stack
page read and write
6A3E000
stack
page read and write
5E99000
heap
page read and write
CB3000
heap
page read and write
3401000
trusted library allocation
page read and write
52FE000
stack
page read and write
10C0000
heap
page read and write
185B000
trusted library allocation
page execute and read and write
12D8000
heap
page read and write
52B5000
heap
page read and write
144E000
heap
page read and write
55E000
stack
page read and write
E70000
trusted library allocation
page read and write
16E4000
heap
page read and write
65C0000
heap
page read and write
DBE000
stack
page read and write
A40000
heap
page execute and read and write
1210000
trusted library allocation
page read and write
14C0000
heap
page read and write
12F6000
stack
page read and write
FA1000
heap
page read and write
51F0000
trusted library allocation
page read and write
1255000
heap
page read and write
E5F000
unkown
page read and write
54A0000
heap
page read and write
65D9000
heap
page read and write
FC2000
heap
page read and write
F26000
heap
page read and write
B34000
heap
page read and write
EEF000
stack
page read and write
B8C000
heap
page read and write
78F000
stack
page read and write
5292000
heap
page read and write
10B2000
trusted library allocation
page execute and read and write
1A0000
heap
page read and write
5291000
heap
page read and write
6E10000
heap
page read and write
C20000
heap
page read and write
FC0000
heap
page read and write
F49000
heap
page read and write
F4B000
heap
page read and write
6E20000
heap
page read and write
648E000
stack
page read and write
4D3F000
trusted library allocation
page read and write
58DD000
stack
page read and write
FDE000
heap
page read and write
190000
heap
page read and write
52AB000
heap
page read and write
FED000
heap
page read and write
B64000
heap
page read and write
15BB000
stack
page read and write
627E000
stack
page read and write
5F9E000
heap
page read and write
4574000
trusted library allocation
page read and write
4D00000
heap
page read and write
1A6E000
stack
page read and write
509E000
stack
page read and write
59C000
trusted library allocation
page execute and read and write
311E000
stack
page read and write
1340000
heap
page read and write
1608000
heap
page read and write
FDF000
heap
page read and write
26D2000
trusted library allocation
page read and write
2EB1000
trusted library allocation
page read and write
5990000
heap
page read and write
FDE000
heap
page read and write
176A000
trusted library allocation
page execute and read and write
3585000
trusted library allocation
page read and write
F7D000
heap
page read and write
C88000
heap
page read and write
F22000
heap
page read and write
1380000
trusted library allocation
page read and write
5F80000
trusted library allocation
page read and write
F71000
heap
page read and write
620000
heap
page read and write
F46000
heap
page read and write
E9C000
trusted library allocation
page execute and read and write
65B0000
heap
page read and write
14D0000
heap
page read and write
62E000
heap
page read and write
94A000
trusted library allocation
page execute and read and write
10A7000
trusted library allocation
page execute and read and write
800000
heap
page read and write
106E000
stack
page read and write
92A000
trusted library allocation
page execute and read and write
FC2000
heap
page read and write
CEB000
heap
page read and write
68FE000
stack
page read and write
126A000
trusted library allocation
page execute and read and write
52AE000
stack
page read and write
10F9000
stack
page read and write
102B000
trusted library allocation
page execute and read and write
8F0000
trusted library allocation
page read and write
8CAB000
stack
page read and write
5AA000
trusted library allocation
page execute and read and write
1846000
heap
page read and write
F37000
heap
page read and write
92C000
trusted library allocation
page execute and read and write
54B3000
heap
page read and write
4EA0000
trusted library section
page readonly
4B90000
heap
page read and write
590000
trusted library allocation
page read and write
67BE000
stack
page read and write
5975000
heap
page read and write
EE7000
trusted library allocation
page execute and read and write
F70000
heap
page read and write
11E0000
heap
page read and write
14B0000
heap
page read and write
68FE000
stack
page read and write
667E000
stack
page read and write
1777000
trusted library allocation
page execute and read and write
420000
heap
page read and write
5291000
heap
page read and write
1842000
trusted library allocation
page execute and read and write
FEE000
heap
page read and write
F75000
heap
page read and write
49C0000
heap
page read and write
17A2000
trusted library allocation
page read and write
1822000
trusted library allocation
page execute and read and write
175A000
trusted library allocation
page execute and read and write
34B7000
trusted library allocation
page read and write
1857000
trusted library allocation
page execute and read and write
F08000
heap
page read and write
529D000
heap
page read and write
152B000
stack
page read and write
1490000
heap
page read and write
EB2000
trusted library allocation
page execute and read and write
5210000
trusted library allocation
page execute and read and write
F60000
heap
page read and write
57B0000
unclassified section
page read and write
12D0000
heap
page read and write
110E000
stack
page read and write
1470000
trusted library section
page readonly
F97000
heap
page read and write
11F0000
heap
page read and write
529A000
heap
page read and write
50BE000
stack
page read and write
48CE000
stack
page read and write
1792000
trusted library allocation
page execute and read and write
675E000
stack
page read and write
F7B000
heap
page read and write
129B000
trusted library allocation
page execute and read and write
623E000
stack
page read and write
281E000
trusted library allocation
page read and write
9BE000
stack
page read and write
F74000
heap
page read and write
1262000
trusted library allocation
page execute and read and write
657E000
stack
page read and write
4A6E000
stack
page read and write
529A000
heap
page read and write
B40000
heap
page read and write
65CE000
heap
page read and write
26C1000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
8A0000
heap
page execute and read and write
3141000
trusted library allocation
page read and write
5970000
heap
page read and write
58A000
trusted library allocation
page execute and read and write
77D0000
heap
page read and write
580000
heap
page read and write
637E000
stack
page read and write
5400000
heap
page read and write
59AA000
heap
page read and write
490E000
stack
page read and write
10F0000
heap
page execute and read and write
F00000
heap
page read and write
59CE000
heap
page read and write
F0A000
heap
page read and write
51E0000
trusted library allocation
page execute and read and write
13B8000
heap
page read and write
62A000
heap
page read and write
1790000
trusted library allocation
page read and write
6AB000
heap
page read and write
2CA6000
trusted library allocation
page read and write
1826000
trusted library allocation
page execute and read and write
FEB000
stack
page read and write
AA0000
heap
page read and write
5330000
heap
page read and write
4F3F000
stack
page read and write
11C0000
heap
page read and write
9E5000
heap
page read and write
698000
heap
page read and write
57CE000
stack
page read and write
E4E000
stack
page read and write
613E000
stack
page read and write
D15000
heap
page read and write
430000
heap
page read and write
1A80000
heap
page execute and read and write
4C80000
heap
page read and write
17EF000
stack
page read and write
E90000
heap
page read and write
F33000
heap
page read and write
D20000
heap
page read and write
161D000
heap
page read and write
5FF000
heap
page read and write
1475000
trusted library section
page readonly
52A8000
heap
page read and write
51AE000
stack
page read and write
1260000
heap
page read and write
4B03000
heap
page read and write
1250000
heap
page read and write
166A000
heap
page read and write
D5E000
unkown
page read and write
F37000
heap
page read and write
F49000
heap
page read and write
4D20000
trusted library allocation
page read and write
1495000
heap
page read and write
F9E000
heap
page read and write
F5D000
heap
page read and write
A9E000
stack
page read and write
17A7000
trusted library allocation
page execute and read and write
1910000
heap
page read and write
1840000
heap
page read and write
55EE000
stack
page read and write
6BC0000
trusted library allocation
page execute and read and write
8DED000
stack
page read and write
EFA000
stack
page read and write
5290000
heap
page read and write
D70000
heap
page read and write
54B0000
heap
page read and write
F11000
heap
page read and write
630E000
stack
page read and write
532D000
stack
page read and write
5610000
trusted library allocation
page execute and read and write
E96000
trusted library allocation
page execute and read and write
100A000
trusted library allocation
page execute and read and write
10BA000
trusted library allocation
page execute and read and write
4EB0000
heap
page read and write
4CFD000
stack
page read and write
F67000
heap
page read and write
E60000
heap
page read and write
5FA8000
heap
page read and write
8B9000
stack
page read and write
3C81000
trusted library allocation
page read and write
AF0000
heap
page read and write
51FE000
stack
page read and write
5470000
heap
page read and write
1780000
heap
page read and write
1160000
heap
page read and write
91A000
trusted library allocation
page execute and read and write
59A000
trusted library allocation
page execute and read and write
1292000
trusted library allocation
page read and write
EEA000
trusted library allocation
page execute and read and write
3408000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
4F9000
stack
page read and write
D10000
heap
page read and write
634E000
stack
page read and write
F76000
heap
page read and write
4F6000
stack
page read and write
4B5B000
stack
page read and write
71BE000
stack
page read and write
F76000
heap
page read and write
1380000
heap
page read and write
1812000
trusted library allocation
page execute and read and write
5600000
trusted library allocation
page read and write
74AE000
stack
page read and write
F62000
heap
page read and write
900000
heap
page read and write
FC2000
heap
page read and write
570E000
stack
page read and write
5430000
trusted library allocation
page execute and read and write
5610000
heap
page read and write
F7C000
heap
page read and write
4461000
trusted library allocation
page read and write
F48000
heap
page read and write
FDE000
heap
page read and write
There are 822 hidden memdumps, click here to show them.