IOC Report
tUs6jk0iCx.exe

loading gif

Files

File Path
Type
Category
Malicious
tUs6jk0iCx.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\tUs6jk0iCx.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\chargeable.exe.log
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\tUs6jk0iCx.exe
"C:\Users\user\Desktop\tUs6jk0iCx.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
malicious
C:\Users\user\Desktop\tUs6jk0iCx.exe
"C:\Users\user\Desktop\tUs6jk0iCx.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\Desktop\tUs6jk0iCx.exe
"C:\Users\user\Desktop\tUs6jk0iCx.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
doddyfire.linkpc.net
malicious
http://go.microsoft.
unknown
http://go.microsoft.LinkId=42127
unknown
https://www.sysinternals.com0
unknown

Domains

Name
IP
Malicious
doddyfire.linkpc.net
196.65.173.92
malicious

IPs

IP
Domain
Country
Malicious
196.65.173.92
doddyfire.linkpc.net
Morocco
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
confuse
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SysMain
malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\e1a87040f2026369a233f9ae76301b7b
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
2A41000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
34B1000
trusted library allocation
page read and write
malicious
3291000
trusted library allocation
page read and write
malicious
95E000
stack
page read and write
13DC000
heap
page read and write
64BF000
stack
page read and write
4E50000
trusted library allocation
page read and write
149F000
stack
page read and write
6FDE000
stack
page read and write
12EE000
stack
page read and write
311F000
stack
page read and write
12F0000
trusted library allocation
page read and write
1190000
heap
page execute and read and write
2EBE000
stack
page read and write
4F5E000
stack
page read and write
51C0000
trusted library allocation
page execute and read and write
161B000
trusted library allocation
page execute and read and write
1637000
heap
page read and write
1970000
heap
page read and write
14F5000
heap
page read and write
35DD000
heap
page read and write
518F000
stack
page read and write
13A3000
heap
page read and write
533E000
stack
page read and write
90DF000
stack
page read and write
131C000
trusted library allocation
page execute and read and write
1602000
trusted library allocation
page execute and read and write
3201000
trusted library allocation
page read and write
CE7000
trusted library allocation
page execute and read and write
16A2000
trusted library allocation
page execute and read and write
59CE000
stack
page read and write
E50000
heap
page read and write
59A0000
heap
page read and write
34F8000
trusted library allocation
page read and write
810000
heap
page read and write
E40000
trusted library allocation
page read and write
111E000
heap
page read and write
2990000
heap
page read and write
4C10000
heap
page read and write
1163000
heap
page read and write
584F000
stack
page read and write
98E000
heap
page read and write
672E000
stack
page read and write
C02000
trusted library allocation
page execute and read and write
CE2000
trusted library allocation
page read and write
14E0000
trusted library allocation
page read and write
42A1000
trusted library allocation
page read and write
44B1000
trusted library allocation
page read and write
59CF000
heap
page read and write
35CE000
heap
page read and write
4EE5000
heap
page read and write
5AA0000
heap
page read and write
35A8000
heap
page read and write
16F0000
trusted library allocation
page read and write
5A33000
heap
page read and write
56EB000
stack
page read and write
680000
heap
page execute and read and write
C10000
heap
page read and write
1678000
heap
page read and write
6BD0000
heap
page read and write
8F8C000
stack
page read and write
3641000
heap
page read and write
5A50000
trusted library allocation
page execute and read and write
4FCE000
stack
page read and write
70DF000
stack
page read and write
14EB000
trusted library allocation
page execute and read and write
16AA000
trusted library allocation
page execute and read and write
59C5000
heap
page read and write
35AA000
heap
page read and write
C40000
heap
page execute and read and write
3333000
stack
page read and write
6CBE000
stack
page read and write
DBA000
stack
page read and write
627E000
stack
page read and write
1890000
heap
page read and write
CCA000
trusted library allocation
page execute and read and write
55FE000
stack
page read and write
11F0000
heap
page read and write
35C0000
heap
page read and write
C90000
heap
page read and write
59C2000
heap
page read and write
3588000
heap
page read and write
8570000
heap
page read and write
2E2F000
trusted library allocation
page read and write
580E000
stack
page read and write
11D0000
heap
page read and write
2776000
trusted library allocation
page read and write
6210000
heap
page read and write
16F7000
trusted library allocation
page execute and read and write
5445000
heap
page read and write
3642000
heap
page read and write
802E000
stack
page read and write
BD2000
trusted library allocation
page execute and read and write
519E000
stack
page read and write
2A3E000
trusted library allocation
page read and write
364A000
heap
page read and write
A3F000
heap
page read and write
517F000
stack
page read and write
4BB0000
trusted library allocation
page read and write
BE6000
trusted library allocation
page execute and read and write
1115000
heap
page read and write
364E000
heap
page read and write
523C000
stack
page read and write
5A3D000
stack
page read and write
5C10000
heap
page read and write
9EE000
stack
page read and write
3590000
heap
page read and write
113C000
stack
page read and write
5B0E000
stack
page read and write
34FB000
trusted library allocation
page read and write
4F1E000
stack
page read and write
59A1000
heap
page read and write
15A0000
trusted library allocation
page read and write
1582000
trusted library allocation
page read and write
6B0E000
stack
page read and write
59C2000
heap
page read and write
6220000
heap
page read and write
56FF000
stack
page read and write
29E1000
trusted library allocation
page read and write
E3A000
stack
page read and write
557E000
stack
page read and write
70CE000
stack
page read and write
12C0000
heap
page read and write
C17000
trusted library allocation
page execute and read and write
1B50000
trusted library allocation
page read and write
35CA000
heap
page read and write
559E000
stack
page read and write
16C7000
trusted library allocation
page execute and read and write
5000000
heap
page read and write
1330000
heap
page read and write
698000
heap
page read and write
569B000
stack
page read and write
1555000
heap
page read and write
5B6000
stack
page read and write
3561000
heap
page read and write
66D0000
trusted library allocation
page read and write
8E4E000
stack
page read and write
35F1000
heap
page read and write
559E000
stack
page read and write
35F1000
heap
page read and write
1370000
heap
page read and write
35BD000
heap
page read and write
98E000
stack
page read and write
157C000
trusted library allocation
page execute and read and write
3585000
heap
page read and write
8B00000
heap
page read and write
3550000
heap
page read and write
5610000
trusted library allocation
page read and write
E58000
heap
page read and write
27E6000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
ED3000
heap
page read and write
5A90000
heap
page read and write
144E000
heap
page read and write
35DA000
heap
page read and write
855000
heap
page read and write
106A000
stack
page read and write
13E0000
heap
page read and write
5C4F000
stack
page read and write
10A0000
trusted library allocation
page read and write
8E8B000
stack
page read and write
35DC000
heap
page read and write
59D7000
heap
page read and write
6E5E000
stack
page read and write
105A000
trusted library allocation
page execute and read and write
FD5000
heap
page read and write
1572000
trusted library allocation
page execute and read and write
EBF000
heap
page read and write
4F00000
heap
page read and write
35CE000
heap
page read and write
14B2000
trusted library allocation
page execute and read and write
59CD000
heap
page read and write
5A95000
heap
page read and write
131A000
trusted library allocation
page execute and read and write
EF0000
heap
page read and write
1352000
trusted library allocation
page read and write
35AA000
heap
page read and write
1220000
heap
page read and write
9A7000
trusted library allocation
page execute and read and write
982000
trusted library allocation
page read and write
35FE000
heap
page read and write
14F0000
heap
page read and write
55C0000
trusted library allocation
page read and write
698F000
stack
page read and write
3588000
heap
page read and write
F36000
stack
page read and write
536000
stack
page read and write
59CD000
heap
page read and write
5400000
heap
page read and write
3331000
trusted library allocation
page read and write
439000
stack
page read and write
152E000
stack
page read and write
4EE0000
heap
page read and write
1517000
heap
page read and write
11A5000
heap
page read and write
1342000
trusted library allocation
page execute and read and write
14D6000
trusted library allocation
page execute and read and write
6DFE000
stack
page read and write
C7E000
stack
page read and write
35DA000
heap
page read and write
6820000
trusted library allocation
page execute and read and write
35C8000
heap
page read and write
D0B000
trusted library allocation
page execute and read and write
35FE000
heap
page read and write
8FDE000
stack
page read and write
D40000
heap
page read and write
3370000
heap
page read and write
323B000
stack
page read and write
136A000
trusted library allocation
page execute and read and write
1166000
stack
page read and write
35BC000
heap
page read and write
2E22000
trusted library allocation
page read and write
32D5000
trusted library allocation
page read and write
35D1000
heap
page read and write
35D2000
heap
page read and write
970000
trusted library allocation
page read and write
670000
trusted library allocation
page read and write
59CE000
heap
page read and write
5790000
heap
page read and write
CD2000
trusted library allocation
page execute and read and write
1062000
trusted library allocation
page execute and read and write
DCE000
stack
page read and write
35A9000
heap
page read and write
6B7E000
stack
page read and write
573E000
stack
page read and write
4DFE000
stack
page read and write
5D0000
heap
page read and write
186F000
stack
page read and write
690000
heap
page read and write
359C000
heap
page read and write
34EE000
trusted library allocation
page read and write
1870000
heap
page read and write
14D0000
trusted library allocation
page read and write
569E000
stack
page read and write
59F0000
heap
page read and write
555E000
stack
page read and write
4BCF000
trusted library allocation
page read and write
688E000
stack
page read and write
35AA000
heap
page read and write
35FF000
heap
page read and write
AFE000
stack
page read and write
35DC000
heap
page read and write
106A000
stack
page read and write
6320000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
580000
heap
page read and write
35D5000
heap
page read and write
A3A000
stack
page read and write
3570000
heap
page read and write
D10000
unkown
page readonly
6F9E000
stack
page read and write
3461000
trusted library allocation
page read and write
355B000
heap
page read and write
4B8E000
stack
page read and write
972000
trusted library allocation
page execute and read and write
8C0E000
stack
page read and write
1790000
trusted library allocation
page read and write
59C0000
heap
page read and write
4201000
trusted library allocation
page read and write
543E000
stack
page read and write
721E000
stack
page read and write
4F5B000
stack
page read and write
5120000
heap
page read and write
35D2000
heap
page read and write
142E000
stack
page read and write
173E000
stack
page read and write
CF2000
trusted library allocation
page execute and read and write
4BD0000
trusted library allocation
page execute and read and write
FCE000
stack
page read and write
850000
heap
page read and write
B6F000
stack
page read and write
68A000
stack
page read and write
2A3F000
stack
page read and write
59CD000
heap
page read and write
5640000
trusted library section
page readonly
5003000
heap
page read and write
1169000
stack
page read and write
1052000
trusted library allocation
page execute and read and write
613E000
stack
page read and write
34F1000
trusted library allocation
page read and write
1270000
heap
page read and write
1790000
heap
page read and write
35C4000
heap
page read and write
3647000
heap
page read and write
2E11000
trusted library allocation
page read and write
99A000
trusted library allocation
page execute and read and write
18C0000
heap
page read and write
35A1000
heap
page read and write
497E000
stack
page read and write
35F1000
heap
page read and write
333E000
stack
page read and write
14CA000
trusted library allocation
page execute and read and write
4F3E000
stack
page read and write
EEC000
heap
page read and write
1399000
heap
page read and write
16BA000
trusted library allocation
page execute and read and write
1310000
trusted library allocation
page read and write
4CB0000
trusted library section
page readonly
B60000
heap
page read and write
14C2000
trusted library allocation
page execute and read and write
35BC000
heap
page read and write
4A8B000
stack
page read and write
168D000
heap
page read and write
9AB000
trusted library allocation
page execute and read and write
117E000
heap
page read and write
1060000
trusted library allocation
page read and write
BE0000
trusted library allocation
page read and write
7E0000
heap
page read and write
1327000
trusted library allocation
page execute and read and write
364C000
heap
page read and write
165E000
stack
page read and write
509E000
stack
page read and write
173E000
stack
page read and write
12F0000
heap
page read and write
E84000
heap
page read and write
254E000
stack
page read and write
5A00000
trusted library allocation
page execute and read and write
5270000
trusted library section
page readonly
29B1000
trusted library allocation
page read and write
5A40000
heap
page read and write
55B0000
trusted library allocation
page read and write
32A1000
trusted library allocation
page read and write
35A1000
heap
page read and write
35D2000
heap
page read and write
186E000
stack
page read and write
1350000
trusted library allocation
page read and write
364E000
heap
page read and write
15A7000
trusted library allocation
page execute and read and write
35C6000
heap
page read and write
2DD0000
trusted library allocation
page read and write
14DA000
trusted library allocation
page execute and read and write
727E000
stack
page read and write
CB0000
trusted library allocation
page read and write
17B0000
heap
page execute and read and write
4E1D000
stack
page read and write
5F0000
heap
page read and write
5440000
heap
page read and write
35DA000
heap
page read and write
10B0000
heap
page read and write
1880000
trusted library allocation
page read and write
4ABE000
stack
page read and write
10AB000
trusted library allocation
page execute and read and write
1630000
heap
page read and write
C80000
heap
page read and write
35C8000
heap
page read and write
55BE000
stack
page read and write
D12000
unkown
page readonly
34C0000
heap
page read and write
12EE000
stack
page read and write
3600000
heap
page read and write
CEA000
trusted library allocation
page execute and read and write
9DA000
heap
page read and write
4BD0000
trusted library allocation
page read and write
35DD000
heap
page read and write
1877000
heap
page read and write
992000
trusted library allocation
page execute and read and write
59CD000
heap
page read and write
9EB000
heap
page read and write
17D8000
trusted library allocation
page read and write
5C00000
heap
page read and write
1440000
heap
page read and write
1617000
trusted library allocation
page execute and read and write
E30000
heap
page read and write
71E000
heap
page read and write
547E000
stack
page read and write
59CE000
heap
page read and write
10E8000
heap
page read and write
264E000
stack
page read and write
96A000
trusted library allocation
page execute and read and write
14C7000
trusted library allocation
page execute and read and write
173E000
stack
page read and write
35A0000
heap
page read and write
1320000
trusted library allocation
page read and write
178C000
stack
page read and write
17A0000
trusted library allocation
page execute and read and write
7F770000
trusted library allocation
page execute and read and write
4CF0000
heap
page read and write
6C7E000
stack
page read and write
6B00000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
14C2000
trusted library allocation
page read and write
156F000
stack
page read and write
E00000
heap
page read and write
14D2000
trusted library allocation
page execute and read and write
16E2000
trusted library allocation
page execute and read and write
5933000
heap
page read and write
59D0000
heap
page read and write
35A5000
heap
page read and write
EC3000
heap
page read and write
1B60000
heap
page read and write
1534000
heap
page read and write
EDD000
heap
page read and write
8030000
heap
page read and write
D10000
heap
page execute and read and write
5718000
stack
page read and write
159A000
trusted library allocation
page execute and read and write
708E000
stack
page read and write
59CD000
heap
page read and write
BC0000
trusted library allocation
page read and write
16DA000
heap
page read and write
85E000
stack
page read and write
35C3000
heap
page read and write
359D000
heap
page read and write
14BC000
trusted library allocation
page execute and read and write
F39000
stack
page read and write
32F0000
trusted library allocation
page read and write
4D10000
heap
page read and write
4EFE000
stack
page read and write
359A000
heap
page read and write
3470000
heap
page read and write
35CC000
heap
page read and write
1690000
trusted library allocation
page read and write
35A9000
heap
page read and write
639E000
stack
page read and write
69F0000
heap
page read and write
5780000
trusted library allocation
page execute and read and write
6C20000
heap
page read and write
35D5000
heap
page read and write
DEC000
stack
page read and write
352B000
trusted library allocation
page read and write
B39000
stack
page read and write
35FF000
heap
page read and write
6DC0000
trusted library section
page read and write
E37000
heap
page read and write
4BAE000
stack
page read and write
52C0000
heap
page read and write
564F000
trusted library section
page readonly
547E000
stack
page read and write
55F0000
heap
page read and write
510D000
stack
page read and write
11A0000
heap
page read and write
5293000
heap
page read and write
37E0000
heap
page read and write
14C0000
trusted library allocation
page read and write
4E40000
trusted library allocation
page execute and read and write
27A0000
trusted library allocation
page read and write
9AB000
heap
page read and write
3644000
heap
page read and write
4C70000
heap
page read and write
51B0000
trusted library allocation
page read and write
3596000
heap
page read and write
622E000
heap
page read and write
1260000
heap
page read and write
6C2E000
heap
page read and write
56A0000
trusted library allocation
page execute and read and write
333B000
stack
page read and write
114A000
heap
page read and write
1587000
trusted library allocation
page execute and read and write
35D2000
heap
page read and write
35C4000
heap
page read and write
35C9000
heap
page read and write
6CCE000
heap
page read and write
13FC000
stack
page read and write
2D81000
trusted library allocation
page read and write
35F1000
heap
page read and write
14B0000
trusted library allocation
page read and write
374F000
unkown
page read and write
3586000
heap
page read and write
48EE000
stack
page read and write
B9F000
stack
page read and write
BE2000
trusted library allocation
page execute and read and write
364D000
heap
page read and write
3596000
heap
page read and write
F8B000
stack
page read and write
4BC0000
trusted library allocation
page read and write
4F10000
heap
page read and write
800000
heap
page read and write
CD0000
trusted library allocation
page read and write
8D4E000
stack
page read and write
537E000
stack
page read and write
1610000
trusted library allocation
page read and write
16B2000
trusted library allocation
page execute and read and write
A4D000
heap
page read and write
35D2000
heap
page read and write
49A0000
heap
page read and write
507E000
stack
page read and write
35C8000
heap
page read and write
16F2000
trusted library allocation
page read and write
73C2000
trusted library allocation
page read and write
B36000
stack
page read and write
3596000
heap
page read and write
4BCE000
stack
page read and write
1350000
trusted library allocation
page read and write
590E000
stack
page read and write
BFE000
stack
page read and write
57E5000
heap
page read and write
C50000
heap
page read and write
1250000
heap
page execute and read and write
1670000
heap
page read and write
35FE000
heap
page read and write
2A85000
trusted library allocation
page read and write
5A30000
heap
page read and write
53DD000
stack
page read and write
58EB000
stack
page read and write
4461000
trusted library allocation
page read and write
35C3000
heap
page read and write
583E000
stack
page read and write
35A2000
heap
page read and write
54FE000
stack
page read and write
3506000
trusted library allocation
page read and write
123E000
stack
page read and write
5A0E000
stack
page read and write
158A000
trusted library allocation
page execute and read and write
16D6000
heap
page read and write
32C6000
trusted library allocation
page read and write
35DC000
heap
page read and write
71CE000
stack
page read and write
4D1E000
stack
page read and write
4F15000
heap
page read and write
1290000
heap
page read and write
6F8E000
stack
page read and write
98A000
trusted library allocation
page execute and read and write
962000
trusted library allocation
page execute and read and write
196E000
stack
page read and write
15AB000
trusted library allocation
page execute and read and write
15FE000
stack
page read and write
14D2000
trusted library allocation
page execute and read and write
505E000
stack
page read and write
CFA000
trusted library allocation
page execute and read and write
1893000
heap
page read and write
104E000
stack
page read and write
5B40000
heap
page read and write
14AA000
trusted library allocation
page execute and read and write
5930000
heap
page read and write
16B0000
trusted library allocation
page read and write
54B0000
heap
page read and write
51D0000
trusted library allocation
page read and write
1312000
trusted library allocation
page execute and read and write
135B000
trusted library allocation
page execute and read and write
34BE000
unkown
page read and write
3564000
heap
page read and write
53F0000
heap
page read and write
4C0E000
stack
page read and write
9A0000
heap
page read and write
5B80000
trusted library allocation
page execute and read and write
106C000
trusted library allocation
page execute and read and write
5290000
heap
page read and write
97C000
trusted library allocation
page execute and read and write
132A000
trusted library allocation
page execute and read and write
FE0000
heap
page read and write
84E000
stack
page read and write
10E0000
heap
page read and write
59CD000
heap
page read and write
39E1000
trusted library allocation
page read and write
13AE000
stack
page read and write
711E000
stack
page read and write
14DC000
trusted library allocation
page execute and read and write
44C1000
trusted library allocation
page read and write
4ED0000
heap
page read and write
1430000
trusted library allocation
page read and write
E0E000
stack
page read and write
165E000
stack
page read and write
35F1000
heap
page read and write
10F9000
stack
page read and write
35FE000
heap
page read and write
1334000
heap
page read and write
59C0000
heap
page read and write
4BBE000
stack
page read and write
16FB000
trusted library allocation
page execute and read and write
3645000
heap
page read and write
A1B000
heap
page read and write
116D000
heap
page read and write
DF0000
heap
page read and write
5460000
heap
page read and write
65DE000
stack
page read and write
4AAE000
stack
page read and write
35D6000
heap
page read and write
3475000
heap
page read and write
4DBE000
stack
page read and write
5CE000
stack
page read and write
5740000
heap
page read and write
3643000
heap
page read and write
1322000
trusted library allocation
page read and write
5600000
heap
page read and write
5650000
heap
page read and write
35FE000
heap
page read and write
3450000
heap
page read and write
332E000
stack
page read and write
181E000
stack
page read and write
14A4000
heap
page read and write
16A3000
heap
page read and write
35FE000
heap
page read and write
6FE000
heap
page read and write
6CC0000
heap
page read and write
4FF0000
heap
page read and write
6EFE000
stack
page read and write
1077000
trusted library allocation
page execute and read and write
9DF000
heap
page read and write
59CD000
heap
page read and write
35D0000
heap
page read and write
565C000
stack
page read and write
4EF0000
trusted library section
page readonly
35A6000
heap
page read and write
6ACE000
stack
page read and write
59E0000
heap
page read and write
34C1000
trusted library allocation
page read and write
114E000
heap
page read and write
14BA000
trusted library allocation
page execute and read and write
880000
heap
page read and write
6E9E000
stack
page read and write
3570000
heap
page read and write
3510000
heap
page read and write
3648000
heap
page read and write
2E53000
trusted library allocation
page read and write
130A000
trusted library allocation
page execute and read and write
358F000
heap
page read and write
B70000
heap
page read and write
CDA000
trusted library allocation
page execute and read and write
11B0000
heap
page read and write
5110000
heap
page read and write
5AB0000
heap
page read and write
C17000
heap
page read and write
1280000
trusted library allocation
page read and write
13D0000
heap
page read and write
35DF000
heap
page read and write
5C90000
heap
page read and write
9AE000
heap
page read and write
35A9000
heap
page read and write
59D7000
heap
page read and write
4BC0000
trusted library allocation
page execute and read and write
58F0000
heap
page read and write
139E000
stack
page read and write
4BB000
stack
page read and write
163F000
stack
page read and write
539000
stack
page read and write
649E000
stack
page read and write
674E000
stack
page read and write
35BC000
heap
page read and write
12F0000
heap
page read and write
59C5000
heap
page read and write
3570000
heap
page read and write
18A0000
trusted library allocation
page execute and read and write
1267000
heap
page read and write
5080000
heap
page read and write
4CE0000
heap
page read and write
1308000
heap
page read and write
D07000
trusted library allocation
page execute and read and write
7F0000
heap
page read and write
789000
stack
page read and write
1B5F000
trusted library allocation
page read and write
2751000
trusted library allocation
page read and write
5480000
trusted library allocation
page read and write
978000
heap
page read and write
35CC000
heap
page read and write
CC0000
heap
page read and write
134A000
trusted library allocation
page execute and read and write
6C4000
heap
page read and write
A1F000
heap
page read and write
27E1000
trusted library allocation
page read and write
4CAB000
stack
page read and write
39B1000
trusted library allocation
page read and write
63BE000
stack
page read and write
57E0000
heap
page read and write
588F000
stack
page read and write
10A7000
trusted library allocation
page execute and read and write
316F000
stack
page read and write
65DE000
heap
page read and write
493E000
stack
page read and write
1357000
trusted library allocation
page execute and read and write
106A000
trusted library allocation
page execute and read and write
1110000
heap
page read and write
6CD000
heap
page read and write
970000
heap
page read and write
107A000
trusted library allocation
page execute and read and write
35A6000
heap
page read and write
44C4000
trusted library allocation
page read and write
35D1000
heap
page read and write
39E4000
trusted library allocation
page read and write
16EA000
trusted library allocation
page execute and read and write
637E000
stack
page read and write
1820000
heap
page execute and read and write
35BC000
heap
page read and write
5850000
heap
page read and write
5B4E000
stack
page read and write
1362000
trusted library allocation
page execute and read and write
2E55000
trusted library allocation
page read and write
1610000
heap
page read and write
1072000
trusted library allocation
page read and write
3751000
trusted library allocation
page read and write
1140000
heap
page read and write
16D0000
heap
page read and write
14E5000
heap
page read and write
5920000
heap
page read and write
71C000
heap
page read and write
5410000
trusted library allocation
page execute and read and write
14C6000
heap
page read and write
35AA000
heap
page read and write
14CA000
heap
page read and write
FF0000
heap
page read and write
13E0000
heap
page read and write
269F000
stack
page read and write
1570000
trusted library allocation
page read and write
35BC000
heap
page read and write
5790000
unclassified section
page read and write
16CA000
trusted library allocation
page execute and read and write
BDA000
trusted library allocation
page execute and read and write
885000
heap
page read and write
1440000
heap
page read and write
13A4000
heap
page read and write
4C50000
trusted library allocation
page read and write
1082000
trusted library allocation
page execute and read and write
5720000
trusted library allocation
page read and write
599B000
stack
page read and write
EEE000
heap
page read and write
1300000
heap
page read and write
65E9000
heap
page read and write
662E000
stack
page read and write
5653000
heap
page read and write
8350000
heap
page read and write
12F6000
stack
page read and write
59D7000
heap
page read and write
5FFE000
heap
page read and write
10EE000
stack
page read and write
35D4000
heap
page read and write
245E000
stack
page read and write
37E6000
heap
page read and write
6D5E000
stack
page read and write
5B75000
heap
page read and write
578E000
stack
page read and write
146E000
stack
page read and write
684E000
stack
page read and write
55A0000
trusted library allocation
page execute and read and write
58ED000
stack
page read and write
4CBE000
stack
page read and write
1580000
trusted library allocation
page read and write
4D13000
heap
page read and write
10F6000
stack
page read and write
7BB0000
heap
page read and write
8D0E000
stack
page read and write
1525000
heap
page read and write
5B3D000
stack
page read and write
35CF000
heap
page read and write
1378000
heap
page read and write
12BE000
stack
page read and write
15FF000
stack
page read and write
11D0000
heap
page read and write
55AE000
stack
page read and write
1302000
trusted library allocation
page execute and read and write
3336000
trusted library allocation
page read and write
623F000
stack
page read and write
108A000
trusted library allocation
page execute and read and write
4EFF000
trusted library section
page readonly
9F0000
heap
page read and write
177B000
stack
page read and write
BEC000
trusted library allocation
page execute and read and write
C1B000
trusted library allocation
page execute and read and write
1521000
heap
page read and write
987000
trusted library allocation
page execute and read and write
17C0000
heap
page execute and read and write
359A000
heap
page read and write
255F000
stack
page read and write
FD0000
heap
page read and write
56DC000
stack
page read and write
EBB000
heap
page read and write
CC2000
trusted library allocation
page execute and read and write
1275000
heap
page read and write
1592000
trusted library allocation
page execute and read and write
1166000
stack
page read and write
860000
heap
page read and write
64DE000
stack
page read and write
57A0000
heap
page read and write
14E7000
trusted library allocation
page execute and read and write
59C3000
heap
page read and write
1360000
heap
page read and write
574E000
stack
page read and write
3646000
heap
page read and write
CDC000
trusted library allocation
page execute and read and write
14CA000
trusted library allocation
page execute and read and write
259E000
stack
page read and write
1070000
trusted library allocation
page read and write
503F000
stack
page read and write
5B50000
heap
page read and write
35C3000
heap
page read and write
CC5000
heap
page read and write
15B0000
heap
page read and write
5FF0000
heap
page read and write
58F0000
trusted library section
page readonly
328E000
trusted library allocation
page read and write
72BE000
stack
page read and write
63E000
stack
page read and write
786000
stack
page read and write
57B0000
trusted library allocation
page execute and read and write
F80000
heap
page read and write
121E000
stack
page read and write
D47000
heap
page read and write
1090000
heap
page read and write
5B9000
stack
page read and write
3D81000
trusted library allocation
page read and write
A17000
heap
page read and write
1403000
heap
page read and write
1550000
heap
page read and write
5450000
heap
page read and write
58CE000
stack
page read and write
19A0000
heap
page execute and read and write
570E000
stack
page read and write
35CE000
heap
page read and write
400000
remote allocation
page execute and read and write
1340000
heap
page read and write
35C3000
heap
page read and write
52DB000
stack
page read and write
4D00000
trusted library allocation
page execute and read and write
364E000
heap
page read and write
B80000
heap
page read and write
59A0000
trusted library section
page readonly
3646000
heap
page read and write
1170000
heap
page read and write
14B0000
trusted library allocation
page read and write
9A5000
heap
page read and write
C9F000
stack
page read and write
5490000
trusted library allocation
page execute and read and write
147F000
heap
page read and write
65D0000
heap
page read and write
69CE000
stack
page read and write
6DBE000
stack
page read and write
5900000
heap
page read and write
14A2000
trusted library allocation
page execute and read and write
4EF0000
heap
page read and write
4E1F000
stack
page read and write
35A7000
heap
page read and write
702000
heap
page read and write
There are 811 hidden memdumps, click here to show them.