IOC Report
NNAq3d5eQF.exe

loading gif

Files

File Path
Type
Category
Malicious
NNAq3d5eQF.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\NNAq3d5eQF.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\chargeable.exe.log
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\NNAq3d5eQF.exe
"C:\Users\user\Desktop\NNAq3d5eQF.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
malicious
C:\Users\user\Desktop\NNAq3d5eQF.exe
"C:\Users\user\Desktop\NNAq3d5eQF.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\Desktop\NNAq3d5eQF.exe
"C:\Users\user\Desktop\NNAq3d5eQF.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
doddyfire.linkpc.net
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://go.microsoft.
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://go.microsoft.LinkId=42127
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://www.sysinternals.com0
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
doddyfire.linkpc.net
198.17.56.173
malicious

IPs

IP
Domain
Country
Malicious
198.17.56.173
doddyfire.linkpc.net
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
confuse
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SysMain
malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\e1a87040f2026369a233f9ae76301b7b
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
2DB1000
trusted library allocation
page read and write
malicious
5920000
trusted library allocation
page execute and read and write
4C00000
trusted library allocation
page execute and read and write
1B60000
heap
page execute and read and write
112A000
heap
page read and write
4E10000
heap
page read and write
42A4000
trusted library allocation
page read and write
D57000
heap
page read and write
11BD000
heap
page read and write
522B000
stack
page read and write
4BFC000
stack
page read and write
1177000
heap
page read and write
579E000
stack
page read and write
1450000
heap
page read and write
677000
trusted library allocation
page execute and read and write
5930000
trusted library allocation
page read and write
4CFE000
stack
page read and write
16A0000
heap
page execute and read and write
4B00000
heap
page read and write
17FA000
trusted library allocation
page execute and read and write
5B5D000
stack
page read and write
1720000
trusted library allocation
page read and write
160A000
heap
page read and write
51D4000
trusted library section
page readonly
CB0000
heap
page read and write
65A000
trusted library allocation
page execute and read and write
4C40000
heap
page read and write
5677000
heap
page read and write
1410000
heap
page read and write
116C000
heap
page read and write
A5A000
trusted library allocation
page execute and read and write
BC0000
trusted library allocation
page execute and read and write
1128000
heap
page read and write
62BE000
stack
page read and write
11CE000
heap
page read and write
63BE000
stack
page read and write
C70000
heap
page read and write
A70000
heap
page read and write
11BE000
heap
page read and write
C10000
heap
page read and write
782000
trusted library allocation
page execute and read and write
57EE000
stack
page read and write
1B0000
heap
page read and write
5BE0000
heap
page read and write
4E00000
heap
page read and write
11BD000
heap
page read and write
BB0000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
12DA000
trusted library allocation
page execute and read and write
F8B000
stack
page read and write
11BD000
heap
page read and write
256E000
stack
page read and write
112A000
heap
page read and write
52B0000
heap
page read and write
652000
trusted library allocation
page read and write
E72000
trusted library allocation
page execute and read and write
78C000
trusted library allocation
page execute and read and write
1170000
heap
page read and write
BD0000
trusted library allocation
page read and write
990000
heap
page read and write
562E000
stack
page read and write
53DE000
stack
page read and write
C0E000
stack
page read and write
3D21000
trusted library allocation
page read and write
710000
heap
page read and write
11A2000
heap
page read and write
116A000
heap
page read and write
4EB0000
heap
page read and write
5F00000
heap
page read and write
8720000
heap
page read and write
13F9000
heap
page read and write
627E000
stack
page read and write
BCE000
stack
page read and write
1310000
trusted library allocation
page read and write
1170000
heap
page read and write
6F7E000
stack
page read and write
729E000
stack
page read and write
3592000
trusted library allocation
page read and write
5678000
heap
page read and write
ED0000
heap
page read and write
359F000
trusted library allocation
page read and write
E9A000
trusted library allocation
page execute and read and write
5A53000
heap
page read and write
53D0000
heap
page read and write
A3C000
trusted library allocation
page execute and read and write
864000
heap
page read and write
70BE000
stack
page read and write
657000
trusted library allocation
page execute and read and write
1562000
trusted library allocation
page execute and read and write
7C0000
heap
page read and write
5670000
heap
page read and write
1129000
heap
page read and write
7FDE0000
trusted library allocation
page execute and read and write
131B000
trusted library allocation
page execute and read and write
119E000
stack
page read and write
11A2000
heap
page read and write
7BB000
trusted library allocation
page execute and read and write
EC2000
trusted library allocation
page execute and read and write
5155000
heap
page read and write
4E70000
heap
page read and write
11A2000
heap
page read and write
6232000
trusted library allocation
page read and write
D60000
heap
page read and write
1166000
heap
page read and write
1702000
trusted library allocation
page read and write
52DE000
stack
page read and write
5120000
trusted library allocation
page read and write
EBE000
stack
page read and write
11A2000
heap
page read and write
1129000
heap
page read and write
96E000
stack
page read and write
81E000
heap
page read and write
4DF0000
heap
page read and write
1220000
heap
page read and write
34F1000
trusted library allocation
page read and write
565E000
stack
page read and write
28F1000
trusted library allocation
page read and write
620000
trusted library allocation
page read and write
4EB3000
heap
page read and write
5A0B000
stack
page read and write
116A000
heap
page read and write
16FC000
trusted library allocation
page execute and read and write
F83000
stack
page read and write
5490000
trusted library allocation
page read and write
4ED0000
trusted library section
page readonly
D3F000
stack
page read and write
115F000
heap
page read and write
195F000
stack
page read and write
1177000
heap
page read and write
42A1000
trusted library allocation
page read and write
F00000
heap
page read and write
141F000
stack
page read and write
28A0000
trusted library allocation
page read and write
5250000
heap
page read and write
4D40000
trusted library allocation
page read and write
1FE000
stack
page read and write
3540000
trusted library allocation
page read and write
1712000
trusted library allocation
page execute and read and write
792000
trusted library allocation
page read and write
1145000
heap
page read and write
5A14000
trusted library section
page readonly
77A000
trusted library allocation
page execute and read and write
1200000
heap
page read and write
5F13000
heap
page read and write
1520000
trusted library allocation
page read and write
4A65000
trusted library section
page readonly
1128000
heap
page read and write
FF9000
stack
page read and write
5675000
heap
page read and write
159E000
stack
page read and write
1840000
heap
page read and write
6EA0000
trusted library allocation
page read and write
C60000
heap
page execute and read and write
299F000
trusted library allocation
page read and write
AA4000
heap
page read and write
1040000
heap
page read and write
5640000
heap
page read and write
565E000
stack
page read and write
E80000
trusted library allocation
page read and write
7F0000
heap
page read and write
AF9000
stack
page read and write
16EA000
trusted library allocation
page execute and read and write
15B4000
heap
page read and write
5662000
heap
page read and write
E82000
trusted library allocation
page execute and read and write
5A0000
heap
page read and write
7F9000
heap
page read and write
5BF0000
heap
page read and write
63A000
trusted library allocation
page execute and read and write
115E000
heap
page read and write
4E9C000
stack
page read and write
34E6000
trusted library allocation
page read and write
1020000
heap
page execute and read and write
112A000
heap
page read and write
293E000
trusted library allocation
page read and write
11A6000
heap
page read and write
D01000
heap
page read and write
4D20000
trusted library allocation
page execute and read and write
1000000
heap
page read and write
113B000
heap
page read and write
160000
heap
page read and write
232000
unkown
page readonly
C90000
heap
page read and write
FBE000
heap
page read and write
115F000
heap
page read and write
5A23000
heap
page read and write
5A15000
trusted library section
page readonly
11CD000
heap
page read and write
860000
heap
page read and write
1700000
trusted library allocation
page read and write
5670000
heap
page read and write
EA2000
trusted library allocation
page execute and read and write
1817000
heap
page read and write
15F2000
heap
page read and write
54EE000
stack
page read and write
1810000
heap
page read and write
4FF0000
heap
page read and write
2940000
trusted library allocation
page read and write
4F00000
heap
page read and write
A4A000
trusted library allocation
page execute and read and write
2851000
trusted library allocation
page read and write
11A6000
heap
page read and write
115E000
heap
page read and write
177E000
stack
page read and write
14A0000
heap
page read and write
13FD000
heap
page read and write
63BE000
stack
page read and write
1330000
heap
page execute and read and write
1177000
heap
page read and write
4F10000
heap
page read and write
FD4000
heap
page read and write
A42000
trusted library allocation
page read and write
4FDE000
stack
page read and write
17DC000
trusted library allocation
page execute and read and write
71FE000
stack
page read and write
185E000
stack
page read and write
1045000
heap
page read and write
113D000
heap
page read and write
4D10000
heap
page read and write
5A40000
heap
page read and write
5BE0000
heap
page read and write
5FF0000
heap
page read and write
770000
heap
page read and write
1967000
heap
page read and write
11C0000
heap
page read and write
661E000
heap
page read and write
837E000
stack
page read and write
1807000
trusted library allocation
page execute and read and write
FFF000
stack
page read and write
D36000
heap
page read and write
7D4000
heap
page read and write
54AF000
stack
page read and write
55EF000
stack
page read and write
4F6000
stack
page read and write
680000
heap
page read and write
2948000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
1532000
trusted library allocation
page execute and read and write
1740000
heap
page read and write
6D00000
heap
page read and write
D76000
stack
page read and write
38B1000
trusted library allocation
page read and write
172B000
trusted library allocation
page execute and read and write
EBB000
trusted library allocation
page execute and read and write
6210000
trusted library allocation
page read and write
11BF000
heap
page read and write
575E000
stack
page read and write
11CE000
heap
page read and write
FA8000
heap
page read and write
140E000
stack
page read and write
3851000
trusted library allocation
page read and write
11CA000
heap
page read and write
3D6000
stack
page read and write
50A0000
trusted library allocation
page execute and read and write
3B21000
trusted library allocation
page read and write
DD0000
trusted library allocation
page read and write
129F000
stack
page read and write
1173000
heap
page read and write
12F6000
stack
page read and write
FC0000
heap
page read and write
1365000
heap
page read and write
3D9000
stack
page read and write
29DE000
stack
page read and write
5670000
heap
page read and write
540F000
trusted library allocation
page read and write
11A6000
heap
page read and write
1540000
trusted library allocation
page read and write
117E000
heap
page read and write
B1F000
stack
page read and write
58EF000
stack
page read and write
EB7000
trusted library allocation
page execute and read and write
11A6000
heap
page read and write
53D1000
heap
page read and write
4E1C000
stack
page read and write
EE7000
trusted library allocation
page execute and read and write
5260000
trusted library allocation
page execute and read and write
1800000
trusted library allocation
page read and write
52A0000
heap
page read and write
ECA000
trusted library allocation
page execute and read and write
10D0000
heap
page read and write
15BE000
heap
page read and write
551E000
stack
page read and write
5105000
heap
page read and write
11A6000
heap
page read and write
A62000
trusted library allocation
page read and write
68FF000
stack
page read and write
71C000
stack
page read and write
630000
heap
page read and write
518F000
trusted library allocation
page read and write
1398000
heap
page read and write
4A60000
heap
page read and write
4E80000
heap
page read and write
9EE000
stack
page read and write
4BF0000
heap
page read and write
1125000
heap
page read and write
A47000
trusted library allocation
page execute and read and write
1060000
heap
page read and write
4C53000
heap
page read and write
C77000
heap
page read and write
CB0000
heap
page read and write
5790000
trusted library allocation
page read and write
170A000
trusted library allocation
page execute and read and write
613E000
stack
page read and write
84FD000
stack
page read and write
17E0000
trusted library allocation
page read and write
4EC0000
heap
page read and write
66A000
trusted library allocation
page execute and read and write
AD3000
heap
page read and write
4BE0000
heap
page read and write
4A40000
trusted library allocation
page execute and read and write
1121000
heap
page read and write
44F1000
trusted library allocation
page read and write
9DE000
stack
page read and write
936000
stack
page read and write
1163000
heap
page read and write
1727000
trusted library allocation
page execute and read and write
12E2000
trusted library allocation
page execute and read and write
CCE000
heap
page read and write
A80000
heap
page read and write
63FE000
stack
page read and write
6CF0000
heap
page read and write
101F000
stack
page read and write
813E000
stack
page read and write
D3A000
heap
page read and write
49EE000
stack
page read and write
1160000
heap
page read and write
F6A000
stack
page read and write
A78000
heap
page read and write
5C10000
heap
page read and write
5540000
heap
page read and write
2981000
trusted library allocation
page read and write
4D5D000
stack
page read and write
55EF000
stack
page read and write
810000
heap
page read and write
117B000
heap
page read and write
E50000
heap
page execute and read and write
101B000
trusted library allocation
page execute and read and write
1302000
trusted library allocation
page execute and read and write
11A6000
heap
page read and write
C2E000
stack
page read and write
14AE000
stack
page read and write
707F000
stack
page read and write
116F000
heap
page read and write
4D00000
heap
page read and write
1115000
heap
page read and write
115E000
heap
page read and write
F5E000
stack
page read and write
3556000
trusted library allocation
page read and write
17E7000
trusted library allocation
page execute and read and write
4BBB000
stack
page read and write
D56000
trusted library allocation
page read and write
824000
heap
page read and write
C35000
heap
page read and write
8A0000
heap
page read and write
6A3E000
stack
page read and write
7AA000
trusted library allocation
page execute and read and write
18FB000
stack
page read and write
AEE000
stack
page read and write
1680000
heap
page read and write
63FE000
stack
page read and write
5163000
heap
page read and write
1002000
trusted library allocation
page execute and read and write
4A2E000
stack
page read and write
75E000
stack
page read and write
53AE000
stack
page read and write
CA0000
trusted library allocation
page read and write
4DEE000
stack
page read and write
5BF0000
heap
page read and write
1360000
heap
page read and write
11BD000
heap
page read and write
6DA0000
heap
page read and write
640000
heap
page read and write
11A2000
heap
page read and write
113D000
heap
page read and write
67B000
trusted library allocation
page execute and read and write
16D0000
trusted library allocation
page read and write
1390000
heap
page read and write
67FE000
stack
page read and write
1254000
heap
page read and write
FD0000
heap
page read and write
4D5B000
stack
page read and write
2941000
trusted library allocation
page read and write
1119000
heap
page read and write
62E000
stack
page read and write
1115000
heap
page read and write
1580000
heap
page read and write
5661000
heap
page read and write
693E000
stack
page read and write
17C2000
trusted library allocation
page execute and read and write
11A6000
heap
page read and write
57A0000
heap
page read and write
111E000
heap
page read and write
1542000
trusted library allocation
page execute and read and write
1590000
heap
page read and write
1126000
heap
page read and write
5350000
trusted library allocation
page execute and read and write
78A000
trusted library allocation
page execute and read and write
1175000
heap
page read and write
58AF000
stack
page read and write
5A10000
trusted library section
page readonly
116B000
heap
page read and write
4E4D000
stack
page read and write
116B000
heap
page read and write
5A20000
heap
page read and write
1166000
heap
page read and write
1165000
heap
page read and write
C6C000
stack
page read and write
1577000
trusted library allocation
page execute and read and write
1119000
heap
page read and write
154C000
trusted library allocation
page execute and read and write
1126000
heap
page read and write
E97000
trusted library allocation
page execute and read and write
1588000
heap
page read and write
576E000
stack
page read and write
12F6000
stack
page read and write
11BD000
stack
page read and write
6D0E000
heap
page read and write
B16000
heap
page read and write
1570000
trusted library allocation
page read and write
4C0E000
stack
page read and write
6BFE000
stack
page read and write
1401000
heap
page read and write
6100000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
111D000
heap
page read and write
CC0000
heap
page read and write
85FE000
stack
page read and write
5C00000
trusted library allocation
page execute and read and write
1172000
heap
page read and write
1173000
heap
page read and write
EB2000
trusted library allocation
page read and write
4D50000
trusted library allocation
page execute and read and write
1170000
heap
page read and write
719E000
stack
page read and write
579E000
stack
page read and write
54D0000
heap
page read and write
29C3000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
4B28000
trusted library allocation
page read and write
556000
stack
page read and write
4F60000
unclassified section
page read and write
45A000
stack
page read and write
1546000
trusted library allocation
page execute and read and write
E8B000
stack
page read and write
12C0000
trusted library allocation
page read and write
68CD000
stack
page read and write
6A7E000
stack
page read and write
494E000
stack
page read and write
5C20000
heap
page read and write
59AE000
stack
page read and write
2B75000
trusted library allocation
page read and write
FF5000
heap
page read and write
1123000
heap
page read and write
EDA000
trusted library allocation
page execute and read and write
5110000
heap
page read and write
38F1000
trusted library allocation
page read and write
123D000
heap
page read and write
11C9000
heap
page read and write
617E000
stack
page read and write
230000
unkown
page readonly
F10000
heap
page read and write
17D0000
trusted library allocation
page read and write
69CE000
stack
page read and write
A0F000
stack
page read and write
5F0000
heap
page read and write
501E000
stack
page read and write
171A000
trusted library allocation
page execute and read and write
1350000
heap
page read and write
13C3000
heap
page read and write
3F94000
trusted library allocation
page read and write
A40000
heap
page read and write
16FA000
trusted library allocation
page execute and read and write
11CE000
heap
page read and write
ED0000
trusted library allocation
page read and write
DE0000
trusted library allocation
page execute and read and write
525E000
stack
page read and write
B67000
heap
page read and write
116F000
heap
page read and write
64FF000
stack
page read and write
701E000
stack
page read and write
400000
remote allocation
page execute and read and write
50E0000
heap
page read and write
516E000
stack
page read and write
A32000
trusted library allocation
page execute and read and write
116C000
heap
page read and write
6610000
heap
page read and write
EC0000
heap
page read and write
141A000
heap
page read and write
EDC000
trusted library allocation
page execute and read and write
11A6000
heap
page read and write
7BE000
stack
page read and write
1173000
heap
page read and write
117E000
stack
page read and write
516F000
heap
page read and write
2992000
trusted library allocation
page read and write
DF6000
stack
page read and write
7E1000
heap
page read and write
87C000
heap
page read and write
4E5E000
stack
page read and write
5BE5000
heap
page read and write
561E000
stack
page read and write
71BE000
stack
page read and write
2DAE000
trusted library allocation
page read and write
5672000
heap
page read and write
1166000
heap
page read and write
501D000
stack
page read and write
5360000
heap
page read and write
11CE000
heap
page read and write
8690000
heap
page read and write
11A0000
heap
page read and write
BAE000
stack
page read and write
A30000
trusted library allocation
page read and write
4A30000
trusted library allocation
page read and write
53E0000
heap
page read and write
1350000
heap
page read and write
67BF000
stack
page read and write
4A60000
trusted library section
page readonly
7300000
trusted library allocation
page execute and read and write
157B000
trusted library allocation
page execute and read and write
5210000
trusted library allocation
page read and write
139E000
stack
page read and write
B60000
heap
page read and write
11A2000
heap
page read and write
57A0000
heap
page read and write
ED2000
trusted library allocation
page execute and read and write
3551000
trusted library allocation
page read and write
64C000
trusted library allocation
page execute and read and write
5672000
heap
page read and write
1050000
heap
page read and write
C7E000
stack
page read and write
572E000
stack
page read and write
112A000
heap
page read and write
5EE000
stack
page read and write
1810000
heap
page read and write
4B7E000
stack
page read and write
5670000
heap
page read and write
632000
trusted library allocation
page execute and read and write
34C1000
trusted library allocation
page read and write
4D00000
heap
page read and write
5400000
trusted library allocation
page read and write
157E000
stack
page read and write
180B000
trusted library allocation
page execute and read and write
1017000
trusted library allocation
page execute and read and write
17B0000
trusted library allocation
page read and write
7F8000
heap
page read and write
715F000
stack
page read and write
D79000
stack
page read and write
88D000
heap
page read and write
11A2000
heap
page read and write
12F9000
stack
page read and write
839000
stack
page read and write
511F000
stack
page read and write
A10000
heap
page read and write
7A2000
trusted library allocation
page execute and read and write
FF0000
heap
page read and write
6CE000
stack
page read and write
17E0000
heap
page read and write
E00000
heap
page execute and read and write
2D21000
trusted library allocation
page read and write
84BC000
stack
page read and write
1172000
heap
page read and write
4A4E000
stack
page read and write
818000
heap
page read and write
6BBE000
stack
page read and write
105E000
stack
page read and write
88D000
heap
page read and write
1109000
heap
page read and write
EF0000
heap
page read and write
66BD000
stack
page read and write
1123000
heap
page read and write
17F2000
trusted library allocation
page execute and read and write
4CEE000
stack
page read and write
2DA000
stack
page read and write
113D000
heap
page read and write
770000
heap
page read and write
1119000
heap
page read and write
CB4000
heap
page read and write
B07000
heap
page read and write
DF0000
trusted library allocation
page read and write
3F91000
trusted library allocation
page read and write
48EB000
stack
page read and write
1AE000
stack
page read and write
4E1E000
stack
page read and write
760000
trusted library allocation
page read and write
5661000
heap
page read and write
4DD0000
trusted library allocation
page read and write
4CD5000
trusted library section
page readonly
1125000
heap
page read and write
10F0000
heap
page read and write
778000
heap
page read and write
51D0000
trusted library section
page readonly
4C50000
heap
page read and write
12EC000
trusted library allocation
page execute and read and write
5670000
heap
page read and write
797000
trusted library allocation
page execute and read and write
5120000
heap
page read and write
1415000
heap
page read and write
1750000
heap
page read and write
50F0000
trusted library section
page read and write
5460000
heap
page read and write
28E6000
trusted library allocation
page read and write
53C0000
heap
page read and write
F7E000
stack
page read and write
5410000
trusted library allocation
page execute and read and write
A6B000
trusted library allocation
page execute and read and write
5A10000
trusted library section
page readonly
559000
stack
page read and write
4BAE000
stack
page read and write
1780000
heap
page read and write
1317000
trusted library allocation
page execute and read and write
EE2000
trusted library allocation
page read and write
5180000
trusted library allocation
page read and write
1165000
heap
page read and write
79A000
trusted library allocation
page execute and read and write
2B21000
trusted library allocation
page read and write
83BB000
stack
page read and write
109000
stack
page read and write
AF6000
stack
page read and write
11A6000
heap
page read and write
13CC000
heap
page read and write
640000
trusted library allocation
page read and write
139E000
unkown
page read and write
E8A000
trusted library allocation
page execute and read and write
16F0000
trusted library allocation
page read and write
7D0000
heap
page read and write
1161000
heap
page read and write
1900000
heap
page execute and read and write
59C0000
trusted library allocation
page read and write
7B0000
heap
page read and write
6009000
heap
page read and write
772000
trusted library allocation
page execute and read and write
12D2000
trusted library allocation
page execute and read and write
17D2000
trusted library allocation
page execute and read and write
17E2000
trusted library allocation
page read and write
4EBB000
stack
page read and write
506E000
stack
page read and write
A45000
heap
page read and write
115E000
heap
page read and write
1456000
heap
page read and write
5910000
trusted library allocation
page read and write
15DE000
stack
page read and write
1129000
heap
page read and write
A67000
trusted library allocation
page execute and read and write
617E000
stack
page read and write
10C0000
heap
page read and write
A2A000
trusted library allocation
page execute and read and write
DE0000
heap
page read and write
44C1000
trusted library allocation
page read and write
7A3000
heap
page read and write
11A2000
heap
page read and write
15C8000
heap
page read and write
104E000
unkown
page read and write
C30000
heap
page read and write
1130000
heap
page execute and read and write
850000
heap
page read and write
662000
trusted library allocation
page execute and read and write
88A000
heap
page read and write
F80000
heap
page read and write
5676000
heap
page read and write
4EF9000
stack
page read and write
17EA000
trusted library allocation
page execute and read and write
4EDE000
stack
page read and write
1115000
heap
page read and write
7F9E000
stack
page read and write
116A000
heap
page read and write
4E80000
trusted library allocation
page execute and read and write
566A000
heap
page read and write
116A000
heap
page read and write
11BD000
heap
page read and write
553F000
stack
page read and write
72FE000
stack
page read and write
630000
heap
page read and write
7C0000
heap
page read and write
C7B000
stack
page read and write
B2E000
stack
page read and write
4CCB000
stack
page read and write
CFB000
stack
page read and write
28B1000
trusted library allocation
page read and write
DB5000
heap
page read and write
4CAE000
stack
page read and write
49EE000
stack
page read and write
1145000
heap
page read and write
100C000
heap
page read and write
F8E000
stack
page read and write
603E000
stack
page read and write
4E65000
heap
page read and write
4E90000
heap
page read and write
4A70000
heap
page read and write
6DAE000
heap
page read and write
3510000
trusted library allocation
page read and write
4E5B000
stack
page read and write
51E0000
heap
page read and write
12F9000
stack
page read and write
5ABC000
stack
page read and write
627F000
stack
page read and write
827E000
stack
page read and write
1060000
heap
page read and write
EEA000
trusted library allocation
page execute and read and write
589E000
stack
page read and write
7D0000
heap
page read and write
F1E000
stack
page read and write
75A000
stack
page read and write
D50000
trusted library allocation
page read and write
6E3E000
stack
page read and write
117B000
heap
page read and write
53BD000
stack
page read and write
11BD000
heap
page read and write
16F2000
trusted library allocation
page execute and read and write
85C000
heap
page read and write
56EE000
stack
page read and write
1128000
heap
page read and write
775000
heap
page read and write
5BBD000
stack
page read and write
100A000
trusted library allocation
page execute and read and write
62BE000
stack
page read and write
11A2000
heap
page read and write
52B5000
heap
page read and write
1106000
heap
page read and write
11CE000
heap
page read and write
569E000
stack
page read and write
4F13000
heap
page read and write
ED6000
heap
page read and write
535E000
stack
page read and write
A52000
trusted library allocation
page execute and read and write
51E3000
heap
page read and write
11BD000
heap
page read and write
3581000
trusted library allocation
page read and write
5C30000
heap
page read and write
7B7000
trusted library allocation
page execute and read and write
11BD000
heap
page read and write
A10000
trusted library allocation
page read and write
59B0000
trusted library allocation
page execute and read and write
572E000
stack
page read and write
DAE000
stack
page read and write
1960000
heap
page read and write
E7A000
trusted library allocation
page execute and read and write
2F5F000
stack
page read and write
5C15000
heap
page read and write
31AF000
stack
page read and write
11C3000
heap
page read and write
FA0000
heap
page read and write
4D40000
heap
page read and write
1707000
trusted library allocation
page execute and read and write
5668000
heap
page read and write
7950000
heap
page read and write
115E000
heap
page read and write
6640000
trusted library allocation
page read and write
EFE000
stack
page read and write
11BD000
heap
page read and write
17DE000
stack
page read and write
11C1000
heap
page read and write
149F000
stack
page read and write
5A50000
heap
page read and write
12E6000
trusted library allocation
page execute and read and write
115F000
heap
page read and write
1228000
heap
page read and write
6B7E000
stack
page read and write
82F000
heap
page read and write
720000
heap
page read and write
780000
trusted library allocation
page read and write
250F000
stack
page read and write
16E2000
trusted library allocation
page execute and read and write
4CD0000
trusted library section
page readonly
1123000
heap
page read and write
6F3F000
stack
page read and write
4EA0000
trusted library allocation
page execute and read and write
4E70000
trusted library allocation
page read and write
179E000
stack
page read and write
4F9000
stack
page read and write
6F1E000
stack
page read and write
823F000
stack
page read and write
5100000
heap
page read and write
151E000
stack
page read and write
2F91000
trusted library allocation
page read and write
642000
trusted library allocation
page execute and read and write
A22000
trusted library allocation
page execute and read and write
151F000
stack
page read and write
5190000
trusted library allocation
page execute and read and write
1116000
heap
page read and write
17CA000
trusted library allocation
page execute and read and write
9E0000
heap
page read and write
2876000
trusted library allocation
page read and write
DB0000
heap
page read and write
4D43000
heap
page read and write
705E000
stack
page read and write
4AEF000
stack
page read and write
B5E000
stack
page read and write
685000
heap
page read and write
1530000
heap
page read and write
5131000
heap
page read and write
D0E000
heap
page read and write
5670000
heap
page read and write
5C00000
heap
page read and write
D5C000
heap
page read and write
B8F000
stack
page read and write
4DF5000
heap
page read and write
EAA000
trusted library allocation
page execute and read and write
1B4B000
stack
page read and write
11BD000
heap
page read and write
32A1000
trusted library allocation
page read and write
4B6F000
stack
page read and write
1370000
heap
page read and write
10DA000
heap
page read and write
169F000
stack
page read and write
6A8E000
stack
page read and write
119D000
heap
page read and write
64FE000
stack
page read and write
5673000
heap
page read and write
6540000
heap
page read and write
A3A000
trusted library allocation
page execute and read and write
D6E000
stack
page read and write
153A000
trusted library allocation
page execute and read and write
4E80000
heap
page read and write
7AE000
heap
page read and write
1179000
heap
page read and write
11A6000
heap
page read and write
7E0000
heap
page read and write
11A2000
heap
page read and write
4E60000
heap
page read and write
1166000
heap
page read and write
35C3000
trusted library allocation
page read and write
7DD000
heap
page read and write
51C0000
heap
page read and write
4E5E000
stack
page read and write
112A000
heap
page read and write
There are 816 hidden memdumps, click here to show them.