IOC Report
3jaa8Fm1tg.exe

loading gif

Files

File Path
Type
Category
Malicious
3jaa8Fm1tg.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\3jaa8Fm1tg.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\chargeable.exe.log
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\3jaa8Fm1tg.exe
"C:\Users\user\Desktop\3jaa8Fm1tg.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
malicious
C:\Users\user\Desktop\3jaa8Fm1tg.exe
"C:\Users\user\Desktop\3jaa8Fm1tg.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\Desktop\3jaa8Fm1tg.exe
"C:\Users\user\Desktop\3jaa8Fm1tg.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
doddyfire.linkpc.net
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://www.sysinternals.com0
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
There are 17 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
doddyfire.linkpc.net
105.157.150.238
malicious

IPs

IP
Domain
Country
Malicious
105.157.150.238
doddyfire.linkpc.net
Morocco
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
confuse
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SysMain
malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\e1a87040f2026369a233f9ae76301b7b
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
2DD1000
trusted library allocation
page read and write
malicious
2B21000
trusted library allocation
page read and write
malicious
AB7000
trusted library allocation
page execute and read and write
53E4000
heap
page read and write
55FF000
stack
page read and write
DC6000
heap
page read and write
A1C000
trusted library allocation
page execute and read and write
51D0000
heap
page read and write
6290000
heap
page read and write
32C6000
trusted library allocation
page read and write
56FE000
stack
page read and write
5740000
heap
page read and write
3336000
trusted library allocation
page read and write
1210000
heap
page read and write
AF6000
stack
page read and write
1500000
heap
page read and write
53B0000
heap
page read and write
E46000
trusted library allocation
page execute and read and write
1258000
heap
page read and write
53E9000
heap
page read and write
E6A000
heap
page read and write
668E000
stack
page read and write
EF7000
trusted library allocation
page execute and read and write
120E000
stack
page read and write
C30000
heap
page read and write
50DE000
stack
page read and write
F30000
heap
page execute and read and write
12BD000
heap
page read and write
E5E000
heap
page read and write
56EE000
stack
page read and write
DBD000
heap
page read and write
DBA000
heap
page read and write
6AA0000
heap
page read and write
C62000
heap
page read and write
15FB000
trusted library allocation
page execute and read and write
5720000
trusted library section
page readonly
DDC000
heap
page read and write
5AAE000
stack
page read and write
D7B000
heap
page read and write
14EE000
stack
page read and write
8C7E000
stack
page read and write
57AE000
stack
page read and write
55CE000
stack
page read and write
12F0000
trusted library allocation
page read and write
1510000
heap
page read and write
A02000
trusted library allocation
page execute and read and write
DB6000
heap
page read and write
DE0000
heap
page read and write
4F70000
heap
page read and write
3B51000
trusted library allocation
page read and write
5200000
heap
page read and write
580000
heap
page read and write
E43000
heap
page read and write
EEA000
heap
page read and write
654E000
stack
page read and write
4EC0000
trusted library allocation
page execute and read and write
DE9000
heap
page read and write
DC5000
heap
page read and write
14B0000
trusted library allocation
page read and write
6BDE000
stack
page read and write
5A80000
heap
page read and write
4EEE000
stack
page read and write
52E0000
trusted library allocation
page read and write
C60000
heap
page read and write
DE6000
heap
page read and write
10F9000
stack
page read and write
CF9000
stack
page read and write
E80000
heap
page read and write
4CBE000
stack
page read and write
DE0000
heap
page read and write
DE0000
heap
page read and write
5AA000
stack
page read and write
5360000
heap
page read and write
DC6000
heap
page read and write
5050000
trusted library allocation
page execute and read and write
4ED0000
trusted library allocation
page read and write
3E74000
trusted library allocation
page read and write
5130000
heap
page read and write
529000
stack
page read and write
5260000
heap
page read and write
DA7000
trusted library allocation
page execute and read and write
3B21000
trusted library allocation
page read and write
E1E000
heap
page read and write
BA0000
heap
page read and write
2B51000
trusted library allocation
page read and write
99E000
stack
page read and write
960000
heap
page read and write
15FD000
heap
page read and write
C2C000
heap
page read and write
DF9000
heap
page read and write
2CD0000
trusted library allocation
page read and write
F20000
heap
page execute and read and write
DF1000
heap
page read and write
1510000
heap
page read and write
688E000
stack
page read and write
68CE000
stack
page read and write
640E000
stack
page read and write
14E0000
trusted library allocation
page read and write
576E000
stack
page read and write
128D000
heap
page read and write
55FF000
stack
page read and write
DA0000
unkown
page readonly
5395000
heap
page read and write
E88000
heap
page read and write
C20000
heap
page read and write
E43000
heap
page read and write
1340000
heap
page read and write
4CD0000
trusted library allocation
page read and write
5E0000
heap
page read and write
B64000
heap
page read and write
63A0000
trusted library allocation
page read and write
5725000
trusted library section
page readonly
678F000
stack
page read and write
1130000
trusted library allocation
page read and write
52C0000
trusted library allocation
page execute and read and write
E10000
heap
page read and write
2BE1000
trusted library allocation
page read and write
E22000
trusted library allocation
page execute and read and write
11F0000
heap
page read and write
1270000
heap
page read and write
5134000
trusted library section
page readonly
AA2000
trusted library allocation
page execute and read and write
DF9000
heap
page read and write
E7B000
trusted library allocation
page execute and read and write
12DA000
heap
page read and write
525F000
stack
page read and write
780000
heap
page read and write
56A0000
heap
page read and write
DF9000
heap
page read and write
1472000
trusted library allocation
page execute and read and write
177F000
stack
page read and write
5220000
heap
page read and write
53EA000
heap
page read and write
E9F000
stack
page read and write
7050000
heap
page read and write
167E000
stack
page read and write
DB6000
heap
page read and write
536F000
stack
page read and write
62DE000
heap
page read and write
EDC000
stack
page read and write
5970000
heap
page read and write
1140000
heap
page read and write
DFD000
heap
page read and write
5990000
heap
page read and write
EBE000
stack
page read and write
DE7000
heap
page read and write
4DEF000
stack
page read and write
665E000
stack
page read and write
DE4000
trusted library allocation
page read and write
CC0000
heap
page read and write
DF1000
heap
page read and write
DE6000
heap
page read and write
691E000
stack
page read and write
E0A000
trusted library allocation
page execute and read and write
E2E000
stack
page read and write
2E71000
trusted library allocation
page read and write
8F6000
stack
page read and write
10AE000
stack
page read and write
2A40000
trusted library allocation
page read and write
137B000
heap
page read and write
D6E000
unkown
page read and write
314E000
stack
page read and write
E1A000
trusted library allocation
page execute and read and write
E63000
heap
page read and write
CB0000
trusted library allocation
page read and write
AD0000
heap
page read and write
6F9E000
stack
page read and write
68D0000
trusted library allocation
page execute and read and write
900000
heap
page read and write
E1E000
heap
page read and write
93B000
stack
page read and write
17CE000
stack
page read and write
50D0000
trusted library allocation
page read and write
DB0000
heap
page read and write
A9A000
trusted library allocation
page execute and read and write
4B8E000
stack
page read and write
E68000
heap
page read and write
E6B000
heap
page read and write
DE5000
heap
page read and write
2BE6000
trusted library allocation
page read and write
FB6000
heap
page read and write
C10000
heap
page read and write
1280000
heap
page read and write
A12000
trusted library allocation
page execute and read and write
4CC0000
trusted library allocation
page read and write
144F000
stack
page read and write
E02000
trusted library allocation
page execute and read and write
1156000
stack
page read and write
72FD000
stack
page read and write
7EE000
stack
page read and write
3C81000
trusted library allocation
page read and write
1310000
heap
page read and write
DC6000
heap
page read and write
DA9000
heap
page read and write
E10000
heap
page read and write
A0D000
stack
page read and write
10E0000
heap
page read and write
4491000
trusted library allocation
page read and write
147C000
trusted library allocation
page execute and read and write
1144000
heap
page read and write
AC0000
heap
page read and write
E5F000
heap
page read and write
1060000
heap
page read and write
4ED0000
unclassified section
page read and write
5210000
heap
page read and write
1930000
heap
page execute and read and write
4D8E000
stack
page read and write
2B77000
trusted library allocation
page read and write
5440000
heap
page read and write
12EE000
stack
page read and write
4D7E000
stack
page read and write
DF2000
heap
page read and write
1318000
heap
page read and write
E64000
heap
page read and write
5D0000
heap
page read and write
1276000
heap
page read and write
FC6000
stack
page read and write
57A0000
heap
page read and write
1870000
heap
page execute and read and write
4ECE000
stack
page read and write
E17000
trusted library allocation
page execute and read and write
684E000
stack
page read and write
E60000
heap
page read and write
C9E000
heap
page read and write
C77000
trusted library allocation
page execute and read and write
12D0000
trusted library allocation
page read and write
650F000
stack
page read and write
1680000
heap
page read and write
53E8000
heap
page read and write
5980000
heap
page read and write
E6C000
heap
page read and write
B20000
heap
page read and write
EEA000
trusted library allocation
page execute and read and write
C50000
heap
page read and write
5320000
trusted library allocation
page execute and read and write
CB8000
heap
page read and write
C4A000
trusted library allocation
page execute and read and write
D91000
heap
page read and write
3E71000
trusted library allocation
page read and write
62AE000
heap
page read and write
AAC000
trusted library allocation
page execute and read and write
FAC000
stack
page read and write
980000
heap
page read and write
DCA000
heap
page read and write
DF9000
heap
page read and write
1450000
trusted library allocation
page read and write
1210000
heap
page read and write
DAB000
trusted library allocation
page execute and read and write
AE7000
trusted library allocation
page execute and read and write
E2A000
trusted library allocation
page execute and read and write
BFF000
stack
page read and write
502E000
stack
page read and write
DA2000
unkown
page readonly
4E59000
stack
page read and write
2DCE000
trusted library allocation
page read and write
5AF0000
heap
page read and write
1090000
heap
page read and write
D9A000
trusted library allocation
page execute and read and write
5145000
heap
page read and write
185C000
stack
page read and write
3521000
trusted library allocation
page read and write
511E000
stack
page read and write
500B000
stack
page read and write
1630000
heap
page read and write
58EB000
stack
page read and write
521E000
stack
page read and write
EDA000
trusted library allocation
page execute and read and write
ECE000
heap
page read and write
53E6000
heap
page read and write
1370000
trusted library allocation
page read and write
AE0000
heap
page read and write
B04000
heap
page read and write
29FF000
stack
page read and write
1282000
heap
page read and write
503E000
stack
page read and write
53E4000
heap
page read and write
A4B000
trusted library allocation
page execute and read and write
53E4000
heap
page read and write
14E2000
trusted library allocation
page read and write
E93000
heap
page read and write
32F0000
trusted library allocation
page read and write
4BB0000
heap
page read and write
660E000
stack
page read and write
11EE000
stack
page read and write
15F7000
trusted library allocation
page execute and read and write
9D8000
heap
page read and write
AF0000
heap
page read and write
53E6000
heap
page read and write
132E000
stack
page read and write
5170000
trusted library allocation
page execute and read and write
770000
heap
page read and write
53E4000
heap
page read and write
A32000
trusted library allocation
page execute and read and write
985000
heap
page read and write
1450000
heap
page read and write
6C20000
heap
page read and write
DC9000
heap
page read and write
6D1E000
stack
page read and write
DEC000
heap
page read and write
E3F000
heap
page read and write
E6E000
heap
page read and write
1A20000
trusted library allocation
page read and write
E5F000
heap
page read and write
4C4E000
stack
page read and write
14DA000
trusted library allocation
page execute and read and write
5380000
trusted library allocation
page read and write
3331000
trusted library allocation
page read and write
E5A000
heap
page read and write
5150000
heap
page read and write
1295000
heap
page read and write
5085000
heap
page read and write
D81000
heap
page read and write
15B8000
heap
page read and write
5CE000
stack
page read and write
5120000
heap
page read and write
E77000
trusted library allocation
page execute and read and write
DCA000
heap
page read and write
572E000
stack
page read and write
698F000
stack
page read and write
54BE000
stack
page read and write
510D000
stack
page read and write
27DE000
stack
page read and write
A5B000
heap
page read and write
AEB000
trusted library allocation
page execute and read and write
5430000
heap
page read and write
14EB000
trusted library allocation
page execute and read and write
AC0000
heap
page read and write
4E7E000
stack
page read and write
ACA000
trusted library allocation
page execute and read and write
53B0000
heap
page read and write
AD0000
heap
page execute and read and write
126E000
stack
page read and write
526E000
stack
page read and write
1687000
heap
page read and write
1490000
trusted library allocation
page read and write
DEE000
heap
page read and write
DF6000
heap
page read and write
DEF000
heap
page read and write
CA2000
trusted library allocation
page execute and read and write
A25000
heap
page read and write
CAA000
trusted library allocation
page execute and read and write
5B3E000
heap
page read and write
7C60000
heap
page read and write
5743000
heap
page read and write
29F1000
trusted library allocation
page read and write
518D000
stack
page read and write
177E000
stack
page read and write
8F9000
stack
page read and write
DDC000
heap
page read and write
6C30000
trusted library section
page read and write
4F4E000
stack
page read and write
DFA000
heap
page read and write
DDC000
heap
page read and write
2A81000
trusted library allocation
page read and write
10F6000
stack
page read and write
BA8000
heap
page read and write
E43000
heap
page read and write
2C81000
trusted library allocation
page read and write
75EE000
stack
page read and write
32A1000
trusted library allocation
page read and write
E3A000
trusted library allocation
page execute and read and write
154E000
heap
page read and write
9AE000
stack
page read and write
C7A000
trusted library allocation
page execute and read and write
DCE000
stack
page read and write
5070000
heap
page read and write
53A000
stack
page read and write
A10000
trusted library allocation
page read and write
CF6000
stack
page read and write
1270000
heap
page read and write
DFA000
heap
page read and write
A0E000
heap
page read and write
59C0000
heap
page read and write
C6E000
heap
page read and write
ECF000
stack
page read and write
DC5000
heap
page read and write
4EBE000
stack
page read and write
14BA000
trusted library allocation
page execute and read and write
DB9000
heap
page read and write
DE0000
heap
page read and write
DAF000
heap
page read and write
1344000
heap
page read and write
7A0000
heap
page read and write
51C0000
heap
page read and write
DE0000
heap
page read and write
679F000
stack
page read and write
AD8000
heap
page read and write
6E1E000
stack
page read and write
1159000
stack
page read and write
AA0000
trusted library allocation
page read and write
1250000
heap
page read and write
18F0000
heap
page read and write
14A2000
trusted library allocation
page execute and read and write
753F000
stack
page read and write
5DE000
stack
page read and write
A0A000
trusted library allocation
page execute and read and write
DBC000
heap
page read and write
2AC3000
trusted library allocation
page read and write
CC1000
heap
page read and write
E62000
trusted library allocation
page execute and read and write
1860000
trusted library allocation
page read and write
B8B000
stack
page read and write
511B000
stack
page read and write
668E000
stack
page read and write
A22000
trusted library allocation
page read and write
A20000
heap
page read and write
A3A000
trusted library allocation
page execute and read and write
F6E000
stack
page read and write
11A0000
heap
page read and write
14C7000
trusted library allocation
page execute and read and write
4E3E000
stack
page read and write
4D40000
trusted library allocation
page read and write
B98000
heap
page read and write
719000
stack
page read and write
A60000
heap
page execute and read and write
E6D000
heap
page read and write
E6D000
heap
page read and write
5AE5000
heap
page read and write
531D000
stack
page read and write
EB4000
heap
page read and write
A40000
heap
page read and write
D09000
stack
page read and write
1059000
stack
page read and write
C55000
heap
page read and write
674E000
stack
page read and write
E4C000
trusted library allocation
page execute and read and write
CA2000
heap
page read and write
4421000
trusted library allocation
page read and write
E00000
heap
page read and write
8F9000
stack
page read and write
4EFE000
stack
page read and write
C5C000
trusted library allocation
page execute and read and write
12E2000
trusted library allocation
page execute and read and write
E42000
trusted library allocation
page execute and read and write
49CE000
stack
page read and write
E43000
heap
page read and write
160F000
stack
page read and write
4EBE000
stack
page read and write
51A0000
heap
page read and write
DFD000
heap
page read and write
DCA000
heap
page read and write
BD4000
heap
page read and write
5E7000
heap
page read and write
87A000
stack
page read and write
53E4000
heap
page read and write
DE7000
heap
page read and write
DF2000
heap
page read and write
53EB000
heap
page read and write
E10000
heap
page read and write
EE2000
trusted library allocation
page execute and read and write
5B1A000
heap
page read and write
B71000
heap
page read and write
E32000
trusted library allocation
page read and write
DDD000
heap
page read and write
5213000
heap
page read and write
1470000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
669E000
stack
page read and write
5AE0000
heap
page read and write
1482000
trusted library allocation
page read and write
EFE000
stack
page read and write
9F0000
heap
page read and write
DFD000
heap
page read and write
ECA000
heap
page read and write
FB0000
heap
page read and write
2D11000
trusted library allocation
page read and write
A27000
trusted library allocation
page execute and read and write
4B28000
trusted library allocation
page read and write
59B0000
heap
page read and write
280E000
stack
page read and write
67CE000
stack
page read and write
D91000
heap
page read and write
E20000
heap
page read and write
107F000
stack
page read and write
975000
heap
page read and write
5F0000
heap
page read and write
E1E000
heap
page read and write
51B0000
heap
page read and write
53D2000
heap
page read and write
AD0000
heap
page read and write
A1A000
trusted library allocation
page execute and read and write
DED000
heap
page read and write
1345000
heap
page read and write
E32000
trusted library allocation
page execute and read and write
FB4000
heap
page read and write
6A1E000
stack
page read and write
58AE000
stack
page read and write
DC8000
heap
page read and write
C20000
trusted library allocation
page execute and read and write
14C2000
trusted library allocation
page read and write
1A10000
trusted library allocation
page execute and read and write
5360000
heap
page read and write
D70000
heap
page read and write
6A90000
heap
page read and write
2A9F000
trusted library allocation
page read and write
4ED0000
heap
page read and write
4DDC000
stack
page read and write
ECB000
stack
page read and write
CBC000
trusted library allocation
page execute and read and write
E9E000
heap
page read and write
C72000
trusted library allocation
page read and write
C0E000
stack
page read and write
3421000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
A92000
trusted library allocation
page execute and read and write
70A0000
trusted library allocation
page execute and read and write
DBF000
heap
page read and write
D9E000
stack
page read and write
4D9C000
stack
page read and write
8F6000
stack
page read and write
50E0000
trusted library allocation
page read and write
5ACD000
stack
page read and write
DA6000
heap
page read and write
1487000
trusted library allocation
page execute and read and write
A2A000
trusted library allocation
page execute and read and write
53E4000
heap
page read and write
4FC3000
heap
page read and write
5140000
heap
page read and write
903E000
stack
page read and write
18CF000
stack
page read and write
DB2000
heap
page read and write
547E000
stack
page read and write
146A000
trusted library allocation
page execute and read and write
53D1000
heap
page read and write
C80000
heap
page read and write
12F2000
trusted library allocation
page execute and read and write
125E000
stack
page read and write
DFC000
heap
page read and write
DF1000
heap
page read and write
E37000
trusted library allocation
page execute and read and write
D8E000
stack
page read and write
DE6000
heap
page read and write
ED2000
trusted library allocation
page read and write
DBD000
heap
page read and write
157F000
heap
page read and write
2D22000
trusted library allocation
page read and write
53D1000
heap
page read and write
5190000
heap
page read and write
59C3000
heap
page read and write
1462000
trusted library allocation
page execute and read and write
DFC000
heap
page read and write
4F20000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
DB7000
heap
page read and write
14A7000
trusted library allocation
page execute and read and write
B50000
heap
page read and write
1610000
heap
page read and write
8430000
heap
page read and write
F00000
heap
page read and write
3B47000
trusted library allocation
page read and write
8DFC000
stack
page read and write
4EC0000
trusted library allocation
page execute and read and write
DE0000
heap
page read and write
AB2000
trusted library allocation
page read and write
104F000
stack
page read and write
12A0000
heap
page read and write
4C8E000
stack
page read and write
5900000
trusted library section
page readonly
4CFE000
stack
page read and write
670E000
stack
page read and write
DCA000
heap
page read and write
12E0000
heap
page execute and read and write
ED7000
trusted library allocation
page execute and read and write
E70000
heap
page read and write
B1E000
stack
page read and write
1910000
trusted library allocation
page execute and read and write
E50000
heap
page read and write
A5E000
heap
page read and write
190F000
trusted library allocation
page read and write
58F0000
heap
page read and write
5B00000
heap
page read and write
1820000
trusted library allocation
page read and write
54F0000
heap
page read and write
64D0000
heap
page read and write
8F6000
stack
page read and write
664F000
stack
page read and write
9A3000
stack
page read and write
4F30000
heap
page read and write
12C1000
heap
page read and write
655E000
stack
page read and write
1900000
trusted library allocation
page read and write
E67000
heap
page read and write
E5F000
heap
page read and write
ABA000
trusted library allocation
page execute and read and write
112B000
stack
page read and write
4F73000
heap
page read and write
135F000
stack
page read and write
E43000
heap
page read and write
E5F000
heap
page read and write
743E000
stack
page read and write
54C0000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
678E000
stack
page read and write
9AB000
stack
page read and write
558E000
stack
page read and write
15F0000
trusted library allocation
page read and write
F6E000
unkown
page read and write
DF2000
trusted library allocation
page execute and read and write
4F00000
trusted library allocation
page read and write
E7E000
stack
page read and write
293E000
stack
page read and write
EFB000
trusted library allocation
page execute and read and write
4FC5000
trusted library section
page readonly
53DA000
heap
page read and write
62A0000
heap
page read and write
15CE000
heap
page read and write
641E000
stack
page read and write
14AA000
trusted library allocation
page execute and read and write
2F5E000
stack
page read and write
5160000
heap
page read and write
AC6000
heap
page read and write
762E000
stack
page read and write
4E1C000
stack
page read and write
DFA000
heap
page read and write
A80000
trusted library allocation
page read and write
1830000
trusted library allocation
page execute and read and write
4FA0000
trusted library section
page readonly
1380000
heap
page execute and read and write
DEF000
heap
page read and write
4EF0000
trusted library allocation
page execute and read and write
DC8000
heap
page read and write
51D0000
trusted library section
page readonly
173E000
stack
page read and write
1230000
heap
page execute and read and write
4DCE000
stack
page read and write
4FC0000
trusted library section
page readonly
5390000
heap
page read and write
E40000
trusted library allocation
page read and write
A47000
trusted library allocation
page execute and read and write
DF9000
heap
page read and write
DF5000
heap
page read and write
148A000
trusted library allocation
page execute and read and write
53A0000
heap
page read and write
E43000
heap
page read and write
2B76000
trusted library allocation
page read and write
DC8000
heap
page read and write
4FA5000
trusted library section
page readonly
D92000
trusted library allocation
page execute and read and write
1220000
heap
page read and write
AC2000
trusted library allocation
page execute and read and write
DF5000
heap
page read and write
1290000
heap
page read and write
12F6000
trusted library allocation
page execute and read and write
5040000
trusted library allocation
page read and write
1840000
heap
page read and write
8AB000
stack
page read and write
E6A000
heap
page read and write
59AF000
stack
page read and write
DDC000
heap
page read and write
4CCE000
stack
page read and write
A3E000
heap
page read and write
FAE000
stack
page read and write
DF4000
heap
page read and write
DF2000
heap
page read and write
14AB000
trusted library allocation
page execute and read and write
53E4000
heap
page read and write
6A5E000
stack
page read and write
504E000
stack
page read and write
5345000
heap
page read and write
E6C000
stack
page read and write
B00000
heap
page read and write
950000
heap
page read and write
DB6000
heap
page read and write
144E000
stack
page read and write
10BE000
stack
page read and write
D84000
heap
page read and write
42A1000
trusted library allocation
page read and write
73FE000
stack
page read and write
DF4000
heap
page read and write
351E000
trusted library allocation
page read and write
A41000
heap
page read and write
57DC000
stack
page read and write
15DF000
stack
page read and write
56AE000
stack
page read and write
C10000
heap
page read and write
2A92000
trusted library allocation
page read and write
6CDF000
stack
page read and write
5120000
heap
page read and write
14E7000
trusted library allocation
page execute and read and write
EE0000
heap
page read and write
68CE000
stack
page read and write
14B2000
trusted library allocation
page execute and read and write
2D53000
trusted library allocation
page read and write
DE9000
heap
page read and write
590000
heap
page read and write
C85000
heap
page read and write
58DD000
stack
page read and write
3528000
trusted library allocation
page read and write
8EFC000
stack
page read and write
14A0000
trusted library allocation
page read and write
B4D000
stack
page read and write
F23000
heap
page read and write
979000
stack
page read and write
DFA000
trusted library allocation
page execute and read and write
14BC000
trusted library allocation
page execute and read and write
53AE000
stack
page read and write
51D4000
trusted library section
page readonly
1A30000
heap
page read and write
DEE000
stack
page read and write
12B9000
heap
page read and write
DC5000
heap
page read and write
5480000
heap
page read and write
3491000
trusted library allocation
page read and write
4FC0000
heap
page read and write
DED000
heap
page read and write
8DBE000
stack
page read and write
67CE000
stack
page read and write
1492000
trusted library allocation
page execute and read and write
F60000
heap
page read and write
7F100000
trusted library allocation
page execute and read and write
9F0000
trusted library allocation
page read and write
137F000
trusted library allocation
page read and write
E90000
heap
page read and write
164B000
stack
page read and write
4424000
trusted library allocation
page read and write
DC9000
heap
page read and write
DF6000
heap
page read and write
5340000
heap
page read and write
BD0000
heap
page read and write
C6E000
stack
page read and write
4FDE000
stack
page read and write
E20000
trusted library allocation
page read and write
DB7000
heap
page read and write
DE6000
heap
page read and write
E5F000
heap
page read and write
6C50000
trusted library allocation
page read and write
976000
stack
page read and write
15BC000
heap
page read and write
E6D000
heap
page read and write
68A0000
trusted library allocation
page execute and read and write
51BB000
stack
page read and write
1540000
heap
page read and write
14D2000
trusted library allocation
page execute and read and write
39F1000
trusted library allocation
page read and write
6520000
heap
page read and write
2B9B000
trusted library allocation
page read and write
1514000
heap
page read and write
DEC000
heap
page read and write
1548000
heap
page read and write
2D41000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
5610000
heap
page read and write
C42000
trusted library allocation
page execute and read and write
8B7F000
stack
page read and write
5160000
heap
page read and write
4DBE000
stack
page read and write
D60000
heap
page read and write
C38000
heap
page read and write
DE4000
heap
page read and write
5660000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
51D3000
heap
page read and write
3D41000
trusted library allocation
page read and write
7F6F000
stack
page read and write
9EE000
stack
page read and write
62D0000
heap
page read and write
149A000
trusted library allocation
page execute and read and write
A04000
heap
page read and write
9D0000
heap
page read and write
DEC000
heap
page read and write
54AF000
stack
page read and write
5975000
heap
page read and write
F20000
heap
page read and write
C5A000
trusted library allocation
page execute and read and write
CBA000
trusted library allocation
page execute and read and write
52DD000
stack
page read and write
651F000
stack
page read and write
CB2000
trusted library allocation
page execute and read and write
AF9000
stack
page read and write
C30000
heap
page read and write
DE0000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
8CBE000
stack
page read and write
1480000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
4CE0000
heap
page read and write
15E2000
trusted library allocation
page execute and read and write
4F2E000
stack
page read and write
5130000
trusted library section
page readonly
C52000
trusted library allocation
page execute and read and write
709E000
stack
page read and write
6C72000
trusted library allocation
page read and write
543E000
stack
page read and write
DAE000
stack
page read and write
DF7000
heap
page read and write
54FE000
stack
page read and write
14CA000
trusted library allocation
page execute and read and write
4D10000
heap
page read and write
E3B000
trusted library allocation
page execute and read and write
C50000
trusted library allocation
page read and write
6F5F000
stack
page read and write
DE9000
heap
page read and write
DEF000
heap
page read and write
12FC000
trusted library allocation
page execute and read and write
5510000
heap
page read and write
1780000
heap
page read and write
E5F000
heap
page read and write
D91000
heap
page read and write
7C30000
heap
page read and write
F07000
heap
page read and write
4CD0000
trusted library allocation
page execute and read and write
58AE000
stack
page read and write
970000
heap
page read and write
6E5E000
stack
page read and write
64E9000
heap
page read and write
53EB000
heap
page read and write
2D2F000
trusted library allocation
page read and write
4ACE000
stack
page read and write
560E000
stack
page read and write
4C8E000
stack
page read and write
DE3000
heap
page read and write
8F3D000
stack
page read and write
4FBB000
stack
page read and write
5350000
heap
page read and write
DBC000
heap
page read and write
DF5000
heap
page read and write
B55000
heap
page read and write
53DB000
heap
page read and write
DF0000
heap
page read and write
5AD0000
trusted library allocation
page execute and read and write
4F10000
trusted library allocation
page read and write
DFC000
heap
page read and write
5BAE000
stack
page read and write
9A0000
heap
page read and write
5080000
heap
page read and write
12EA000
trusted library allocation
page execute and read and write
E00000
heap
page read and write
132D000
heap
page read and write
AAE000
stack
page read and write
There are 820 hidden memdumps, click here to show them.