IOC Report
wzHH1r6YOi.exe

loading gif

Files

File Path
Type
Category
Malicious
wzHH1r6YOi.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\wzHH1r6YOi.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\chargeable.exe.log
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\wzHH1r6YOi.exe
"C:\Users\user\Desktop\wzHH1r6YOi.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
malicious
C:\Users\user\Desktop\wzHH1r6YOi.exe
"C:\Users\user\Desktop\wzHH1r6YOi.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\Desktop\wzHH1r6YOi.exe
"C:\Users\user\Desktop\wzHH1r6YOi.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
doddyfire.linkpc.net
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://go.microsoft.
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://go.microsoft.LinkId=42127
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
There are 18 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
doddyfire.linkpc.net
226.85.155.175
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
confuse
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SysMain
malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\e1a87040f2026369a233f9ae76301b7b
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
28B1000
trusted library allocation
page read and write
malicious
124C000
heap
page read and write
586D000
stack
page read and write
61DE000
stack
page read and write
1255000
heap
page read and write
BE0000
heap
page read and write
15AA000
trusted library allocation
page execute and read and write
5660000
trusted library section
page readonly
5690000
heap
page read and write
DC2000
trusted library allocation
page execute and read and write
56D0000
heap
page read and write
127F000
heap
page read and write
1472000
trusted library allocation
page execute and read and write
5567000
heap
page read and write
118E000
stack
page read and write
E70000
trusted library allocation
page read and write
9FA000
trusted library allocation
page execute and read and write
4B70000
heap
page read and write
87DC000
stack
page read and write
690000
heap
page read and write
12D0000
heap
page read and write
9DA000
trusted library allocation
page execute and read and write
562E000
stack
page read and write
610000
heap
page read and write
9B2000
trusted library allocation
page execute and read and write
1260000
heap
page read and write
543E000
stack
page read and write
121B000
heap
page read and write
12CE000
heap
page read and write
5562000
heap
page read and write
17DA000
trusted library allocation
page execute and read and write
1245000
heap
page read and write
1057000
trusted library allocation
page execute and read and write
5578000
heap
page read and write
960000
heap
page read and write
4D10000
heap
page read and write
5567000
heap
page read and write
EBA000
trusted library allocation
page execute and read and write
539000
stack
page read and write
31B6000
trusted library allocation
page read and write
64A0000
heap
page read and write
521E000
stack
page read and write
51BE000
stack
page read and write
6C0000
heap
page read and write
E8A000
trusted library allocation
page execute and read and write
121E000
heap
page read and write
147A000
trusted library allocation
page execute and read and write
1050000
heap
page read and write
6C4000
heap
page read and write
1118000
heap
page read and write
1420000
trusted library allocation
page execute and read and write
1688000
heap
page read and write
10AF000
trusted library allocation
page read and write
6CFE000
stack
page read and write
6BBE000
stack
page read and write
3781000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
5755000
heap
page read and write
12AF000
stack
page read and write
169D000
heap
page read and write
BEE000
stack
page read and write
2B9000
stack
page read and write
9C2000
trusted library allocation
page read and write
123C000
heap
page read and write
553E000
stack
page read and write
C15000
heap
page read and write
A17000
trusted library allocation
page execute and read and write
1420000
heap
page read and write
15E0000
trusted library allocation
page read and write
124C000
heap
page read and write
1020000
trusted library allocation
page read and write
69AE000
stack
page read and write
1390000
heap
page read and write
15C2000
trusted library allocation
page execute and read and write
5577000
heap
page read and write
1032000
trusted library allocation
page execute and read and write
12D0000
heap
page read and write
F32000
trusted library allocation
page execute and read and write
122B000
heap
page read and write
A37000
heap
page read and write
5664000
trusted library section
page readonly
1248000
heap
page read and write
660000
heap
page read and write
990000
trusted library allocation
page read and write
127F000
heap
page read and write
175E000
stack
page read and write
9CA000
trusted library allocation
page execute and read and write
6A70000
trusted library allocation
page read and write
1281000
heap
page read and write
11E1000
heap
page read and write
6452000
trusted library allocation
page read and write
12F0000
trusted library allocation
page execute and read and write
1215000
heap
page read and write
F40000
trusted library allocation
page read and write
71C000
heap
page read and write
1273000
heap
page read and write
7D0000
unkown
page readonly
619E000
stack
page read and write
7E20000
heap
page read and write
123F000
heap
page read and write
12C5000
heap
page read and write
9F2000
trusted library allocation
page read and write
9A2000
trusted library allocation
page execute and read and write
4940000
trusted library allocation
page read and write
D6E000
stack
page read and write
13CB000
stack
page read and write
4DF0000
heap
page read and write
4B5D000
stack
page read and write
4C1D000
stack
page read and write
9EB000
trusted library allocation
page execute and read and write
6A40000
heap
page read and write
563E000
stack
page read and write
5567000
heap
page read and write
B2B000
stack
page read and write
9D0000
heap
page read and write
D20000
heap
page read and write
4AC0000
trusted library section
page readonly
1430000
heap
page execute and read and write
D20000
heap
page read and write
F84000
heap
page read and write
609E000
stack
page read and write
50C0000
heap
page read and write
9C7000
trusted library allocation
page execute and read and write
5880000
heap
page read and write
1259000
heap
page read and write
5765000
trusted library section
page readonly
12C6000
heap
page read and write
5260000
heap
page read and write
1257000
heap
page read and write
3081000
trusted library allocation
page read and write
180B000
trusted library allocation
page execute and read and write
F46000
trusted library allocation
page execute and read and write
1229000
heap
page read and write
1242000
heap
page read and write
1248000
heap
page read and write
FF2000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
3541000
trusted library allocation
page read and write
B0C000
stack
page read and write
53FE000
stack
page read and write
1277000
trusted library allocation
page execute and read and write
121A000
heap
page read and write
1170000
heap
page read and write
6EA000
heap
page read and write
15B7000
trusted library allocation
page execute and read and write
13C4000
heap
page read and write
E82000
trusted library allocation
page execute and read and write
FC0000
heap
page read and write
9C2000
trusted library allocation
page execute and read and write
6970000
heap
page read and write
131E000
stack
page read and write
5540000
heap
page read and write
13C4000
heap
page read and write
135E000
stack
page read and write
13A4000
heap
page read and write
6A59000
heap
page read and write
6E3E000
stack
page read and write
DBA000
trusted library allocation
page execute and read and write
6C7E000
stack
page read and write
34A0000
trusted library allocation
page read and write
1216000
heap
page read and write
15BA000
trusted library allocation
page execute and read and write
4084000
trusted library allocation
page read and write
5270000
trusted library section
page read and write
10B8000
heap
page read and write
126E000
stack
page read and write
5576000
heap
page read and write
631E000
stack
page read and write
99A000
stack
page read and write
9AA000
trusted library allocation
page execute and read and write
1253000
heap
page read and write
5650000
trusted library allocation
page execute and read and write
FDE000
stack
page read and write
A5E000
stack
page read and write
E3E000
stack
page read and write
5450000
trusted library allocation
page execute and read and write
56D0000
trusted library allocation
page read and write
5440000
heap
page read and write
1253000
heap
page read and write
243E000
stack
page read and write
7D0000
trusted library allocation
page read and write
52B0000
heap
page read and write
51C0000
trusted library allocation
page read and write
1237000
heap
page read and write
BDE000
unkown
page read and write
10B0000
heap
page read and write
1241000
heap
page read and write
52BE000
stack
page read and write
49F3000
heap
page read and write
400000
remote allocation
page execute and read and write
B37000
heap
page read and write
F3A000
trusted library allocation
page execute and read and write
C2C000
stack
page read and write
1426000
heap
page read and write
4121000
trusted library allocation
page read and write
124D000
heap
page read and write
1243000
heap
page read and write
FE0000
heap
page read and write
1209000
heap
page read and write
6B40000
trusted library allocation
page read and write
5561000
heap
page read and write
12A0000
heap
page read and write
350F000
trusted library allocation
page read and write
2E1E000
trusted library allocation
page read and write
13A8000
heap
page read and write
3D91000
trusted library allocation
page read and write
1260000
heap
page read and write
DD2000
trusted library allocation
page read and write
2816000
trusted library allocation
page read and write
34F1000
trusted library allocation
page read and write
121B000
heap
page read and write
65A000
heap
page read and write
125A000
heap
page read and write
127F000
heap
page read and write
15B2000
trusted library allocation
page read and write
9E0000
trusted library allocation
page read and write
5568000
heap
page read and write
154D000
stack
page read and write
3461000
trusted library allocation
page read and write
124F000
heap
page read and write
E67000
heap
page read and write
517E000
stack
page read and write
CF6000
stack
page read and write
162E000
stack
page read and write
6C2E000
stack
page read and write
5567000
heap
page read and write
6330000
trusted library allocation
page execute and read and write
1390000
heap
page read and write
82E0000
heap
page read and write
F4C000
trusted library allocation
page execute and read and write
1270000
heap
page read and write
5870000
heap
page read and write
83D0000
heap
page read and write
891F000
stack
page read and write
D50000
heap
page read and write
2811000
trusted library allocation
page read and write
16B3000
heap
page read and write
2E28000
trusted library allocation
page read and write
6BEE000
stack
page read and write
305F000
trusted library allocation
page read and write
58B0000
heap
page read and write
F3B000
stack
page read and write
24DE000
stack
page read and write
1273000
heap
page read and write
DA0000
heap
page read and write
127F000
heap
page read and write
5D30000
heap
page read and write
4B60000
heap
page read and write
EAA000
trusted library allocation
page execute and read and write
4A1E000
stack
page read and write
12B0000
trusted library allocation
page read and write
5E2E000
heap
page read and write
510E000
stack
page read and write
4950000
trusted library allocation
page execute and read and write
1253000
heap
page read and write
5750000
heap
page read and write
1035000
heap
page read and write
D2E000
stack
page read and write
EB2000
trusted library allocation
page execute and read and write
9F0000
heap
page read and write
1040000
trusted library allocation
page read and write
1000000
heap
page read and write
2CDF000
stack
page read and write
113F000
unkown
page read and write
12A2000
heap
page read and write
940000
heap
page read and write
19E0000
trusted library allocation
page read and write
17D0000
trusted library allocation
page read and write
121B000
heap
page read and write
4F6E000
stack
page read and write
ED0000
heap
page read and write
148C000
trusted library allocation
page execute and read and write
310E000
stack
page read and write
17EA000
trusted library allocation
page execute and read and write
1257000
heap
page read and write
F58000
heap
page read and write
12E8000
trusted library allocation
page read and write
12EE000
stack
page read and write
127F000
heap
page read and write
1230000
heap
page read and write
5760000
heap
page read and write
FF7000
trusted library allocation
page execute and read and write
6CBE000
stack
page read and write
49F0000
heap
page read and write
FBE000
stack
page read and write
17A0000
trusted library allocation
page read and write
2DDF000
stack
page read and write
1420000
trusted library allocation
page execute and read and write
5123000
heap
page read and write
59BE000
stack
page read and write
FE0000
heap
page read and write
11F1000
heap
page read and write
EA0000
heap
page read and write
35B2000
trusted library allocation
page read and write
5330000
heap
page read and write
1186000
heap
page read and write
6ACE000
stack
page read and write
855F000
stack
page read and write
5670000
trusted library allocation
page read and write
628E000
stack
page read and write
2821000
trusted library allocation
page read and write
5080000
trusted library section
page readonly
1206000
heap
page read and write
B65000
heap
page read and write
5660000
trusted library allocation
page execute and read and write
123F000
heap
page read and write
6DE000
heap
page read and write
2781000
trusted library allocation
page read and write
FD0000
heap
page read and write
EFB000
stack
page read and write
5E20000
heap
page read and write
1630000
heap
page read and write
17CA000
trusted library allocation
page execute and read and write
52FF000
heap
page read and write
5730000
heap
page read and write
2D3F000
stack
page read and write
1830000
trusted library allocation
page execute and read and write
12A3000
heap
page read and write
1240000
heap
page read and write
121B000
heap
page read and write
6D2F000
stack
page read and write
1380000
trusted library allocation
page read and write
B90000
heap
page read and write
52C0000
heap
page read and write
3073000
trusted library allocation
page read and write
1256000
heap
page read and write
600000
heap
page execute and read and write
F6A000
stack
page read and write
718000
heap
page read and write
12CA000
heap
page read and write
522D000
stack
page read and write
57A3000
heap
page read and write
3121000
trusted library allocation
page read and write
7E0000
heap
page read and write
105A000
trusted library allocation
page execute and read and write
A02000
trusted library allocation
page execute and read and write
3502000
trusted library allocation
page read and write
6E3000
heap
page read and write
F50000
heap
page read and write
56D5000
heap
page read and write
122A000
heap
page read and write
CD0000
trusted library allocation
page execute and read and write
1410000
trusted library allocation
page read and write
1180000
heap
page read and write
B60000
heap
page read and write
EC0000
heap
page read and write
DC0000
trusted library allocation
page read and write
A1B000
trusted library allocation
page execute and read and write
9BA000
trusted library allocation
page execute and read and write
4451000
trusted library allocation
page read and write
104C000
trusted library allocation
page execute and read and write
736000
heap
page read and write
1030000
heap
page read and write
124C000
heap
page read and write
C30000
heap
page read and write
14B0000
heap
page read and write
15DB000
trusted library allocation
page execute and read and write
521D000
stack
page read and write
17F2000
trusted library allocation
page execute and read and write
5F5D000
stack
page read and write
15EB000
trusted library allocation
page execute and read and write
1273000
heap
page read and write
12CE000
heap
page read and write
123C000
heap
page read and write
4F90000
trusted library allocation
page execute and read and write
ED5000
heap
page read and write
65E000
heap
page read and write
549B000
stack
page read and write
6830000
heap
page read and write
BD0000
heap
page read and write
1360000
heap
page read and write
10A4000
heap
page read and write
309C000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
3B6000
stack
page read and write
3146000
trusted library allocation
page read and write
13BA000
heap
page read and write
1195000
heap
page read and write
11F1000
heap
page read and write
1807000
trusted library allocation
page execute and read and write
3021000
trusted library allocation
page read and write
E92000
trusted library allocation
page execute and read and write
5640000
trusted library allocation
page read and write
1059000
stack
page read and write
FF0000
heap
page read and write
12A3000
heap
page read and write
53E8000
stack
page read and write
1281000
heap
page read and write
3451000
trusted library allocation
page read and write
13DE000
stack
page read and write
5566000
heap
page read and write
4CE0000
heap
page read and write
1592000
trusted library allocation
page execute and read and write
5FBE000
stack
page read and write
12D0000
trusted library allocation
page read and write
12C0000
trusted library allocation
page execute and read and write
1156000
stack
page read and write
A30000
heap
page read and write
4D30000
heap
page read and write
13FD000
heap
page read and write
125D000
heap
page read and write
68F000
heap
page read and write
34F2000
trusted library allocation
page read and write
125A000
heap
page read and write
2D70000
heap
page read and write
52FE000
stack
page read and write
123E000
heap
page read and write
9F7000
trusted library allocation
page execute and read and write
15B0000
trusted library allocation
page read and write
5ABE000
stack
page read and write
1325000
trusted library section
page readonly
1320000
trusted library section
page readonly
672E000
stack
page read and write
5D20000
heap
page read and write
124C000
heap
page read and write
1415000
heap
page read and write
FBC000
heap
page read and write
50B0000
heap
page read and write
686E000
stack
page read and write
FEE000
stack
page read and write
5220000
heap
page read and write
D55000
heap
page read and write
696F000
stack
page read and write
1243000
heap
page read and write
9BC000
trusted library allocation
page execute and read and write
1860000
heap
page execute and read and write
13F9000
heap
page read and write
4C60000
trusted library section
page readonly
13E0000
heap
page read and write
1215000
heap
page read and write
34E1000
trusted library allocation
page read and write
E40000
heap
page read and write
15C2000
trusted library allocation
page execute and read and write
52F4000
heap
page read and write
CE0000
trusted library allocation
page read and write
487F000
stack
page read and write
D40000
heap
page read and write
D3E000
stack
page read and write
1920000
heap
page read and write
1410000
heap
page read and write
583F000
stack
page read and write
DFE000
heap
page read and write
9D2000
trusted library allocation
page execute and read and write
4A5B000
stack
page read and write
5320000
heap
page read and write
5E40000
trusted library allocation
page read and write
311E000
stack
page read and write
F1E000
stack
page read and write
12F9000
stack
page read and write
5B0000
heap
page read and write
27D0000
trusted library allocation
page read and write
610F000
stack
page read and write
1010000
heap
page read and write
1410000
heap
page execute and read and write
15D0000
trusted library allocation
page read and write
491E000
stack
page read and write
57A0000
heap
page read and write
149F000
stack
page read and write
2CDE000
stack
page read and write
EEE000
stack
page read and write
AC0000
heap
page execute and read and write
1273000
heap
page read and write
4B13000
heap
page read and write
12A2000
heap
page read and write
E50000
heap
page execute and read and write
650000
heap
page read and write
4D10000
heap
page read and write
1224000
heap
page read and write
5579000
heap
page read and write
17E2000
trusted library allocation
page read and write
EF6000
stack
page read and write
121D000
heap
page read and write
4E6C000
stack
page read and write
B76000
stack
page read and write
15AC000
trusted library allocation
page execute and read and write
4B00000
heap
page read and write
7D2000
unkown
page readonly
122A000
heap
page read and write
1220000
heap
page read and write
5541000
heap
page read and write
5460000
unclassified section
page read and write
1215000
heap
page read and write
125E000
stack
page read and write
E74000
heap
page read and write
4541000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
2D91000
trusted library allocation
page read and write
65E000
stack
page read and write
17FA000
trusted library allocation
page execute and read and write
1107000
heap
page read and write
124A000
heap
page read and write
17B0000
heap
page read and write
5790000
heap
page read and write
1270000
trusted library allocation
page read and write
34B0000
trusted library allocation
page read and write
125C000
heap
page read and write
F30000
heap
page read and write
159A000
trusted library allocation
page execute and read and write
1190000
heap
page read and write
56B0000
trusted library allocation
page execute and read and write
CF6000
stack
page read and write
124F000
heap
page read and write
BA0000
heap
page read and write
1062000
trusted library allocation
page execute and read and write
15CA000
trusted library allocation
page execute and read and write
F42000
trusted library allocation
page execute and read and write
507B000
stack
page read and write
9CB000
stack
page read and write
FD7000
heap
page read and write
15A2000
trusted library allocation
page execute and read and write
1229000
heap
page read and write
DE2000
trusted library allocation
page execute and read and write
1243000
heap
page read and write
F62000
trusted library allocation
page execute and read and write
F1E000
stack
page read and write
1242000
heap
page read and write
1277000
heap
page read and write
EDB000
trusted library allocation
page execute and read and write
FF7000
heap
page read and write
565B000
stack
page read and write
4D20000
heap
page read and write
9CA000
trusted library allocation
page execute and read and write
1228000
heap
page read and write
587E000
stack
page read and write
10A0000
trusted library allocation
page read and write
A0A000
trusted library allocation
page execute and read and write
FB8000
heap
page read and write
121D000
heap
page read and write
1430000
heap
page read and write
1229000
heap
page read and write
1078000
heap
page read and write
DF0000
heap
page read and write
7E5000
heap
page read and write
E90000
heap
page read and write
B20000
trusted library allocation
page read and write
124D000
heap
page read and write
614E000
stack
page read and write
1259000
heap
page read and write
4CA0000
trusted library allocation
page execute and read and write
1246000
heap
page read and write
17C2000
trusted library allocation
page execute and read and write
1124000
heap
page read and write
1256000
heap
page read and write
64E000
stack
page read and write
103A000
trusted library allocation
page execute and read and write
DB2000
trusted library allocation
page execute and read and write
56A0000
heap
page read and write
536C000
stack
page read and write
5A5000
heap
page read and write
BF0000
heap
page read and write
3523000
trusted library allocation
page read and write
17E0000
trusted library allocation
page read and write
4960000
trusted library allocation
page read and write
9BF000
stack
page read and write
1660000
heap
page read and write
6A30000
heap
page read and write
E63000
heap
page read and write
A2E000
stack
page read and write
125B000
heap
page read and write
4461000
trusted library allocation
page read and write
BE0000
heap
page read and write
100E000
stack
page read and write
51D0000
trusted library allocation
page read and write
14B5000
heap
page read and write
AAE000
stack
page read and write
13D4000
heap
page read and write
12A0000
heap
page read and write
1348000
heap
page read and write
571E000
stack
page read and write
28AE000
trusted library allocation
page read and write
FFB000
trusted library allocation
page execute and read and write
127B000
stack
page read and write
161E000
stack
page read and write
6D7E000
stack
page read and write
1249000
heap
page read and write
77CF000
stack
page read and write
124C000
heap
page read and write
1219000
heap
page read and write
557A000
heap
page read and write
4CFE000
stack
page read and write
4ABB000
stack
page read and write
B3F000
stack
page read and write
1840000
heap
page execute and read and write
6DBE000
stack
page read and write
133E000
stack
page read and write
1480000
trusted library allocation
page read and write
531D000
stack
page read and write
5120000
heap
page read and write
869E000
stack
page read and write
4AC5000
trusted library section
page readonly
559E000
stack
page read and write
123C000
heap
page read and write
1550000
heap
page read and write
1460000
trusted library allocation
page read and write
7E1E000
stack
page read and write
5568000
heap
page read and write
124D000
heap
page read and write
30B3000
trusted library allocation
page read and write
1800000
trusted library allocation
page read and write
2E21000
trusted library allocation
page read and write
10FF000
heap
page read and write
103E000
stack
page read and write
605E000
stack
page read and write
6D6E000
stack
page read and write
6BCE000
stack
page read and write
C10000
heap
page read and write
EA7000
trusted library allocation
page execute and read and write
1330000
heap
page execute and read and write
5763000
heap
page read and write
EA2000
trusted library allocation
page read and write
65ED000
stack
page read and write
62DF000
stack
page read and write
15E7000
trusted library allocation
page execute and read and write
27A6000
trusted library allocation
page read and write
700E000
stack
page read and write
10D9000
heap
page read and write
12BE000
stack
page read and write
58C0000
heap
page read and write
4D30000
heap
page read and write
1340000
heap
page read and write
511F000
stack
page read and write
1226000
heap
page read and write
58AD000
stack
page read and write
590000
heap
page read and write
4D15000
heap
page read and write
11F1000
heap
page read and write
5561000
heap
page read and write
10CE000
heap
page read and write
104A000
trusted library allocation
page execute and read and write
1490000
heap
page execute and read and write
122B000
heap
page read and write
DCA000
trusted library allocation
page execute and read and write
5110000
trusted library allocation
page execute and read and write
1118000
heap
page read and write
1216000
heap
page read and write
10E4000
heap
page read and write
536000
stack
page read and write
12C7000
heap
page read and write
1482000
trusted library allocation
page execute and read and write
53AC000
stack
page read and write
123C000
heap
page read and write
17DC000
trusted library allocation
page execute and read and write
1249000
heap
page read and write
1390000
heap
page read and write
F90000
heap
page read and write
167E000
stack
page read and write
12C5000
heap
page read and write
7EE000
unkown
page readonly
6DFE000
stack
page read and write
11C0000
heap
page read and write
552B000
stack
page read and write
121D000
heap
page read and write
52A5000
heap
page read and write
6F3E000
stack
page read and write
4021000
trusted library allocation
page read and write
91E000
stack
page read and write
A7A000
stack
page read and write
1400000
heap
page read and write
31FE000
stack
page read and write
697E000
heap
page read and write
4544000
trusted library allocation
page read and write
15D0000
heap
page read and write
4AF0000
heap
page read and write
12F9000
stack
page read and write
EF3000
stack
page read and write
31B1000
trusted library allocation
page read and write
FA0000
heap
page read and write
121D000
heap
page read and write
1950000
heap
page read and write
1667000
heap
page read and write
4A10000
heap
page read and write
E90000
trusted library allocation
page read and write
125B000
heap
page read and write
1680000
heap
page read and write
1280000
heap
page read and write
624E000
stack
page read and write
556D000
heap
page read and write
845E000
stack
page read and write
11D8000
heap
page read and write
1A00000
heap
page read and write
11E4000
heap
page read and write
1280000
heap
page read and write
1216000
heap
page read and write
3533000
trusted library allocation
page read and write
106A000
trusted library allocation
page execute and read and write
6B0000
heap
page read and write
4081000
trusted library allocation
page read and write
1245000
heap
page read and write
682E000
stack
page read and write
1820000
trusted library allocation
page read and write
5566000
heap
page read and write
6E6F000
stack
page read and write
881D000
stack
page read and write
439000
stack
page read and write
15D7000
trusted library allocation
page execute and read and write
5576000
heap
page read and write
F7B000
trusted library allocation
page execute and read and write
5EBE000
stack
page read and write
6B8000
heap
page read and write
E9C000
trusted library allocation
page execute and read and write
125B000
heap
page read and write
140E000
stack
page read and write
176F000
stack
page read and write
B30000
heap
page read and write
B3A000
stack
page read and write
115E000
stack
page read and write
12F6000
stack
page read and write
184E000
stack
page read and write
DDA000
trusted library allocation
page execute and read and write
597E000
stack
page read and write
E5F000
heap
page read and write
6DFE000
stack
page read and write
5560000
heap
page read and write
564F000
trusted library allocation
page read and write
1486000
trusted library allocation
page execute and read and write
17D2000
trusted library allocation
page execute and read and write
158F000
stack
page read and write
B79000
stack
page read and write
6430000
trusted library allocation
page read and write
E2F000
heap
page read and write
CF9000
stack
page read and write
34FF000
trusted library allocation
page read and write
13F0000
heap
page read and write
12CE000
heap
page read and write
66EF000
stack
page read and write
76C0000
heap
page read and write
1398000
heap
page read and write
7040000
trusted library allocation
page execute and read and write
859E000
stack
page read and write
4C64000
trusted library section
page readonly
5FE000
stack
page read and write
DD7000
trusted library allocation
page execute and read and write
5760000
trusted library section
page readonly
1159000
stack
page read and write
641F000
stack
page read and write
121B000
heap
page read and write
9EC000
trusted library allocation
page execute and read and write
D90000
trusted library allocation
page read and write
F77000
trusted library allocation
page execute and read and write
114F000
stack
page read and write
4B10000
heap
page read and write
86DC000
stack
page read and write
1243000
heap
page read and write
140B000
heap
page read and write
6AEE000
stack
page read and write
FB4000
heap
page read and write
9B0000
trusted library allocation
page read and write
543F000
stack
page read and write
EFE000
stack
page read and write
DF8000
heap
page read and write
187F000
stack
page read and write
9E2000
trusted library allocation
page execute and read and write
574B000
stack
page read and write
1042000
trusted library allocation
page execute and read and write
1373000
heap
page read and write
ED7000
trusted library allocation
page execute and read and write
3088000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
17E7000
trusted library allocation
page execute and read and write
165F000
stack
page read and write
DCC000
trusted library allocation
page execute and read and write
52A0000
heap
page read and write
5562000
heap
page read and write
1272000
trusted library allocation
page read and write
DEA000
trusted library allocation
page execute and read and write
4A15000
heap
page read and write
5A0000
heap
page read and write
1225000
heap
page read and write
3821000
trusted library allocation
page read and write
11D0000
heap
page read and write
1070000
heap
page read and write
600E000
stack
page read and write
5567000
heap
page read and write
125B000
heap
page read and write
4F80000
trusted library allocation
page read and write
35B4000
trusted library allocation
page read and write
1415000
heap
page read and write
12F6000
stack
page read and write
13CE000
stack
page read and write
125C000
heap
page read and write
127B000
trusted library allocation
page execute and read and write
1248000
heap
page read and write
3B9000
stack
page read and write
9E7000
trusted library allocation
page execute and read and write
15BF000
stack
page read and write
There are 777 hidden memdumps, click here to show them.