IOC Report
7sdQR7cAGL.exe

loading gif

Files

File Path
Type
Category
Malicious
7sdQR7cAGL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\7sdQR7cAGL.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\chargeable.exe.log
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\7sdQR7cAGL.exe
"C:\Users\user\Desktop\7sdQR7cAGL.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
malicious
C:\Users\user\Desktop\7sdQR7cAGL.exe
"C:\Users\user\Desktop\7sdQR7cAGL.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\Desktop\7sdQR7cAGL.exe
"C:\Users\user\Desktop\7sdQR7cAGL.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
doddyfire.linkpc.net
malicious

Domains

Name
IP
Malicious
doddyfire.linkpc.net
105.157.150.238
malicious
56.126.166.20.in-addr.arpa
unknown
malicious

IPs

IP
Domain
Country
Malicious
105.157.150.238
doddyfire.linkpc.net
Morocco
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
confuse
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SysMain
malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\e1a87040f2026369a233f9ae76301b7b
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
29E1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3591000
trusted library allocation
page read and write
malicious
C7A000
heap
page read and write
CAF000
heap
page read and write
56B000
heap
page read and write
48FB000
stack
page read and write
17CA000
trusted library allocation
page execute and read and write
F80000
heap
page read and write
1170000
heap
page read and write
69A000
trusted library allocation
page execute and read and write
2852000
trusted library allocation
page read and write
6A2E000
stack
page read and write
D1C000
heap
page read and write
13A5000
heap
page read and write
588E000
stack
page read and write
2841000
trusted library allocation
page read and write
B4A000
stack
page read and write
25FE000
stack
page read and write
C74000
heap
page read and write
3041000
trusted library allocation
page read and write
753000
heap
page read and write
576C000
stack
page read and write
CB5000
heap
page read and write
1028000
heap
page read and write
961000
heap
page read and write
C6A000
heap
page read and write
247A000
trusted library allocation
page execute and read and write
69EF000
stack
page read and write
2DE1000
trusted library allocation
page read and write
58E000
stack
page read and write
1230000
heap
page read and write
5FAF000
stack
page read and write
5280000
heap
page read and write
C76000
heap
page read and write
1802000
trusted library allocation
page execute and read and write
4A60000
trusted library allocation
page execute and read and write
6670000
heap
page read and write
FDE000
heap
page read and write
57AF000
trusted library allocation
page read and write
FBE000
stack
page read and write
F20000
heap
page read and write
C69000
heap
page read and write
1523000
heap
page read and write
5ECE000
stack
page read and write
5840000
trusted library allocation
page read and write
4F60000
heap
page read and write
F5A000
heap
page read and write
115E000
stack
page read and write
6250000
heap
page read and write
4B2E000
stack
page read and write
1292000
trusted library allocation
page execute and read and write
285F000
trusted library allocation
page read and write
B50000
trusted library allocation
page execute and read and write
146E000
stack
page read and write
E50000
heap
page read and write
5D8E000
stack
page read and write
6E6E000
stack
page read and write
4FCE000
heap
page read and write
589000
heap
page read and write
C91000
heap
page read and write
B20000
heap
page read and write
31C6000
trusted library allocation
page read and write
17E6000
trusted library allocation
page execute and read and write
D10000
heap
page read and write
142B000
trusted library allocation
page execute and read and write
52DE000
stack
page read and write
11C0000
trusted library allocation
page read and write
61EE000
stack
page read and write
866C000
stack
page read and write
81C000
trusted library allocation
page execute and read and write
17FA000
trusted library allocation
page execute and read and write
660E000
stack
page read and write
4A2B000
stack
page read and write
CBF000
heap
page read and write
739000
heap
page read and write
3141000
trusted library allocation
page read and write
C6A000
heap
page read and write
AF9000
stack
page read and write
15C0000
heap
page read and write
C68000
heap
page read and write
12A7000
trusted library allocation
page execute and read and write
4FCD000
heap
page read and write
2E6E000
trusted library allocation
page read and write
AF6000
stack
page read and write
CB8000
heap
page read and write
58C0000
trusted library allocation
page execute and read and write
CBF000
heap
page read and write
ACF000
stack
page read and write
1817000
trusted library allocation
page execute and read and write
F89000
heap
page read and write
4D0000
heap
page read and write
86AE000
stack
page read and write
2497000
trusted library allocation
page execute and read and write
790000
heap
page read and write
4FCD000
heap
page read and write
C8D000
heap
page read and write
1420000
trusted library allocation
page read and write
6B2F000
stack
page read and write
C6A000
heap
page read and write
558E000
stack
page read and write
36B1000
trusted library allocation
page read and write
1412000
trusted library allocation
page execute and read and write
618B000
stack
page read and write
450000
heap
page read and write
4930000
heap
page read and write
1580000
heap
page read and write
5160000
heap
page read and write
CB6000
heap
page read and write
CB0000
trusted library allocation
page read and write
CD0000
heap
page read and write
C66000
heap
page read and write
1520000
heap
page read and write
57AB000
stack
page read and write
1812000
trusted library allocation
page read and write
7DE000
stack
page read and write
AFB000
stack
page read and write
14E0000
heap
page read and write
BA5000
heap
page read and write
83A000
trusted library allocation
page execute and read and write
4131000
trusted library allocation
page read and write
5ED0000
heap
page read and write
5CE000
stack
page read and write
17E2000
trusted library allocation
page execute and read and write
1083000
heap
page read and write
5290000
trusted library allocation
page read and write
CAF000
heap
page read and write
FE0000
heap
page read and write
54C0000
heap
page read and write
4B70000
trusted library allocation
page execute and read and write
CBC000
heap
page read and write
4A50000
heap
page read and write
5F0000
heap
page read and write
BA0000
heap
page read and write
B70000
heap
page read and write
1870000
heap
page execute and read and write
CB0000
heap
page read and write
4FA0000
heap
page read and write
60ED000
stack
page read and write
CAE000
heap
page read and write
48E000
stack
page read and write
91E000
heap
page read and write
14D2000
trusted library allocation
page execute and read and write
5210000
trusted library allocation
page execute and read and write
81E0000
trusted library section
page read and write
27B1000
trusted library allocation
page read and write
C40000
heap
page read and write
181B000
trusted library allocation
page execute and read and write
1282000
trusted library allocation
page execute and read and write
7F0000
trusted library allocation
page read and write
440000
heap
page read and write
C8A000
trusted library allocation
page execute and read and write
4F80000
trusted library allocation
page execute and read and write
49F0000
trusted library section
page readonly
1427000
trusted library allocation
page execute and read and write
544E000
stack
page read and write
CBE000
heap
page read and write
6B2E000
stack
page read and write
C76000
heap
page read and write
5FD0000
heap
page read and write
83EF000
stack
page read and write
4C40000
heap
page read and write
CB8000
heap
page read and write
F28000
heap
page read and write
5435000
heap
page read and write
248C000
trusted library allocation
page execute and read and write
8DE000
stack
page read and write
363C000
trusted library allocation
page read and write
D1F000
heap
page read and write
1382000
trusted library allocation
page execute and read and write
C77000
heap
page read and write
24AA000
trusted library allocation
page execute and read and write
CC9000
heap
page read and write
C73000
heap
page read and write
8FB000
stack
page read and write
BE0000
heap
page read and write
FF4000
heap
page read and write
16DF000
stack
page read and write
C5A000
trusted library allocation
page execute and read and write
8F4000
stack
page read and write
142E000
stack
page read and write
415000
heap
page read and write
12C0000
trusted library allocation
page read and write
1252000
trusted library allocation
page execute and read and write
13DE000
stack
page read and write
770000
heap
page read and write
847000
trusted library allocation
page execute and read and write
F90000
trusted library allocation
page execute and read and write
1480000
heap
page read and write
CAF000
heap
page read and write
11E0000
trusted library allocation
page read and write
5180000
heap
page read and write
FA000
stack
page read and write
5890000
unclassified section
page read and write
35C5000
trusted library allocation
page read and write
C6D000
heap
page read and write
1A70000
trusted library allocation
page read and write
BF6000
stack
page read and write
109B000
stack
page read and write
5270000
trusted library allocation
page read and write
FA0000
heap
page read and write
189E000
stack
page read and write
539B000
stack
page read and write
CCD000
heap
page read and write
4FC9000
heap
page read and write
BFE000
stack
page read and write
1444000
heap
page read and write
FAA000
heap
page read and write
8CF000
stack
page read and write
554F000
stack
page read and write
1800000
trusted library allocation
page read and write
26B1000
trusted library allocation
page read and write
572E000
stack
page read and write
810000
trusted library allocation
page read and write
C6D000
heap
page read and write
EF9000
stack
page read and write
C20000
heap
page read and write
F80000
trusted library allocation
page read and write
173F000
stack
page read and write
545000
heap
page read and write
524000
heap
page read and write
AB0000
heap
page read and write
530000
heap
page read and write
4A30000
heap
page read and write
B79000
stack
page read and write
CAF000
heap
page read and write
5C10000
heap
page read and write
5D6E000
stack
page read and write
8E9000
heap
page read and write
249A000
trusted library allocation
page execute and read and write
181B000
trusted library allocation
page execute and read and write
5342000
trusted library section
page readonly
9C7000
heap
page read and write
3DE1000
trusted library allocation
page read and write
1817000
trusted library allocation
page execute and read and write
11DA000
trusted library allocation
page execute and read and write
EF6000
stack
page read and write
1F9000
stack
page read and write
C73000
heap
page read and write
3131000
trusted library allocation
page read and write
CC5000
heap
page read and write
80A000
trusted library allocation
page execute and read and write
C91000
heap
page read and write
7580000
heap
page read and write
7F740000
trusted library allocation
page execute and read and write
D8E000
heap
page read and write
57EC000
stack
page read and write
1A80000
trusted library allocation
page read and write
CC4000
heap
page read and write
CD4000
heap
page read and write
32BF000
stack
page read and write
14DA000
trusted library allocation
page execute and read and write
9C0000
heap
page read and write
90E000
stack
page read and write
CC9000
heap
page read and write
4FCD000
heap
page read and write
579E000
stack
page read and write
5D4E000
stack
page read and write
1810000
trusted library allocation
page read and write
CB9000
heap
page read and write
650E000
stack
page read and write
4A3D000
stack
page read and write
631B000
heap
page read and write
C7A000
trusted library allocation
page execute and read and write
D27000
heap
page read and write
C91000
heap
page read and write
4A90000
heap
page read and write
127E000
stack
page read and write
CBE000
heap
page read and write
2951000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
140A000
trusted library allocation
page execute and read and write
A0E000
unkown
page read and write
534B000
stack
page read and write
856B000
stack
page read and write
1260000
heap
page read and write
C72000
trusted library allocation
page execute and read and write
97F000
heap
page read and write
31BE000
trusted library allocation
page read and write
10AE000
stack
page read and write
B00000
heap
page execute and read and write
CAE000
heap
page read and write
65A000
stack
page read and write
82A000
trusted library allocation
page execute and read and write
103B000
heap
page read and write
4B60000
heap
page read and write
5C4E000
stack
page read and write
51DF000
stack
page read and write
4FA5000
heap
page read and write
5E0000
heap
page read and write
692000
trusted library allocation
page execute and read and write
D19000
heap
page read and write
1D9000
stack
page read and write
5540000
heap
page read and write
8B0000
heap
page read and write
756000
stack
page read and write
17B0000
trusted library allocation
page read and write
70A8000
heap
page read and write
1AA0000
heap
page read and write
2490000
trusted library allocation
page read and write
5040000
heap
page read and write
CF3000
heap
page read and write
13A0000
heap
page read and write
640000
heap
page read and write
832000
trusted library allocation
page execute and read and write
5043000
heap
page read and write
EF9000
stack
page read and write
CF5000
heap
page read and write
CC8000
heap
page read and write
C71000
heap
page read and write
1574000
heap
page read and write
6C6E000
stack
page read and write
4DA0000
heap
page read and write
CEF000
heap
page read and write
CBC000
heap
page read and write
5200000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
5650000
heap
page read and write
14BB000
stack
page read and write
1418000
heap
page read and write
633E000
stack
page read and write
410000
heap
page read and write
735000
heap
page read and write
CAB000
trusted library allocation
page execute and read and write
16A0000
trusted library allocation
page read and write
3951000
trusted library allocation
page read and write
C0E000
stack
page read and write
5E10000
heap
page read and write
ABF000
stack
page read and write
45B7000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
1802000
trusted library allocation
page execute and read and write
FD0000
heap
page read and write
67BE000
stack
page read and write
70A0000
heap
page read and write
1020000
heap
page read and write
125C000
trusted library allocation
page execute and read and write
62DB000
stack
page read and write
1A90000
trusted library allocation
page execute and read and write
1240000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
CAF000
heap
page read and write
5C29000
heap
page read and write
1410000
heap
page read and write
2482000
trusted library allocation
page execute and read and write
F86000
heap
page read and write
1690000
trusted library allocation
page execute and read and write
1087000
heap
page read and write
A4D000
stack
page read and write
C28000
heap
page read and write
30B1000
trusted library allocation
page read and write
4A60000
heap
page read and write
C69000
heap
page read and write
6310000
heap
page read and write
6BA0000
heap
page read and write
CC5000
heap
page read and write
702000
heap
page read and write
C8B000
heap
page read and write
17E0000
trusted library allocation
page read and write
17EA000
trusted library allocation
page execute and read and write
31BE000
stack
page read and write
1A1E000
stack
page read and write
57B000
stack
page read and write
8EE000
heap
page read and write
827000
trusted library allocation
page execute and read and write
D1A000
heap
page read and write
1242000
trusted library allocation
page execute and read and write
CB5000
heap
page read and write
D19000
heap
page read and write
30D6000
trusted library allocation
page read and write
6070000
trusted library allocation
page read and write
CB9000
heap
page read and write
35E9000
trusted library allocation
page read and write
35EE000
trusted library allocation
page read and write
C56000
heap
page read and write
4591000
trusted library allocation
page read and write
4A85000
heap
page read and write
A50000
heap
page read and write
5FCF000
stack
page read and write
147B000
heap
page read and write
2CFF000
stack
page read and write
CA2000
trusted library allocation
page read and write
C78000
heap
page read and write
CC0000
heap
page read and write
630000
trusted library allocation
page read and write
4EDE000
stack
page read and write
1450000
heap
page execute and read and write
14F0000
heap
page execute and read and write
CBE000
heap
page read and write
12E0000
heap
page read and write
647E000
stack
page read and write
812000
trusted library allocation
page execute and read and write
CB3000
heap
page read and write
5410000
heap
page read and write
54BD000
stack
page read and write
37B1000
trusted library allocation
page read and write
CC9000
heap
page read and write
C52000
trusted library allocation
page execute and read and write
67FE000
stack
page read and write
78D0000
heap
page read and write
8FE000
stack
page read and write
2885000
trusted library allocation
page read and write
484E000
stack
page read and write
3156000
trusted library allocation
page read and write
108B000
heap
page read and write
5FEE000
stack
page read and write
1750000
heap
page read and write
59CE000
stack
page read and write
E70000
heap
page read and write
B40000
trusted library allocation
page read and write
12CB000
trusted library allocation
page execute and read and write
775000
heap
page read and write
2480000
trusted library allocation
page read and write
C65000
heap
page read and write
12AA000
trusted library allocation
page execute and read and write
C60000
heap
page read and write
CF5000
heap
page read and write
553D000
stack
page read and write
B1E000
stack
page read and write
124A000
trusted library allocation
page execute and read and write
682000
trusted library allocation
page read and write
13FE000
stack
page read and write
57CE000
stack
page read and write
94C000
stack
page read and write
EAF000
stack
page read and write
CAE000
heap
page read and write
5EAE000
stack
page read and write
4C8B000
stack
page read and write
C66000
heap
page read and write
163D000
stack
page read and write
C8C000
heap
page read and write
C7A000
heap
page read and write
4FA0000
heap
page read and write
1810000
trusted library allocation
page read and write
29DE000
trusted library allocation
page read and write
D1B000
heap
page read and write
C90000
heap
page execute and read and write
987000
heap
page read and write
5E8E000
stack
page read and write
54D0000
heap
page read and write
142D000
heap
page read and write
628D000
stack
page read and write
CC0000
heap
page read and write
D19000
heap
page read and write
138F000
stack
page read and write
17D0000
heap
page read and write
CB5000
heap
page read and write
5350000
trusted library section
page readonly
960000
heap
page execute and read and write
4FD9000
heap
page read and write
1407000
trusted library allocation
page execute and read and write
2800000
trusted library allocation
page read and write
ADF000
stack
page read and write
4FCD000
heap
page read and write
6B6E000
stack
page read and write
1525000
heap
page read and write
236F000
stack
page read and write
687000
trusted library allocation
page execute and read and write
CCB000
heap
page read and write
4F30000
trusted library section
page readonly
514D000
stack
page read and write
1287000
heap
page read and write
564E000
heap
page read and write
CC2000
heap
page read and write
4FC1000
heap
page read and write
C25000
heap
page read and write
D0F000
heap
page read and write
C8B000
heap
page read and write
FAC000
heap
page read and write
AF0000
heap
page read and write
56F000
heap
page read and write
D0F000
heap
page read and write
1910000
heap
page execute and read and write
5640000
heap
page read and write
4604000
trusted library allocation
page read and write
CBF000
heap
page read and write
4F8000
heap
page read and write
4A80000
heap
page read and write
5430000
heap
page read and write
759000
stack
page read and write
D23000
heap
page read and write
524E000
stack
page read and write
154F000
stack
page read and write
68EE000
stack
page read and write
D12000
heap
page read and write
56CE000
stack
page read and write
CA7000
trusted library allocation
page execute and read and write
11BF000
stack
page read and write
400000
remote allocation
page execute and read and write
7560000
heap
page read and write
2DEF000
stack
page read and write
1256000
trusted library allocation
page execute and read and write
158C000
stack
page read and write
CC5000
heap
page read and write
C7A000
heap
page read and write
7B0000
heap
page read and write
65A000
trusted library allocation
page execute and read and write
C78000
heap
page read and write
C7A000
heap
page read and write
4FD7000
heap
page read and write
360D000
trusted library allocation
page read and write
248A000
trusted library allocation
page execute and read and write
D15000
heap
page read and write
5829000
stack
page read and write
970000
trusted library allocation
page read and write
2A25000
trusted library allocation
page read and write
E75000
heap
page read and write
965000
heap
page read and write
EF6000
stack
page read and write
F10000
heap
page read and write
14E0000
trusted library allocation
page read and write
540000
heap
page read and write
5D10000
trusted library allocation
page read and write
2492000
trusted library allocation
page read and write
62E0000
heap
page execute and read and write
4C10000
trusted library section
page readonly
637E000
stack
page read and write
FC0000
heap
page read and write
683E000
stack
page read and write
53B0000
heap
page read and write
1160000
trusted library allocation
page read and write
1196000
stack
page read and write
980000
trusted library allocation
page execute and read and write
1480000
heap
page read and write
5400000
heap
page read and write
C78000
heap
page read and write
48EC000
stack
page read and write
1250000
trusted library allocation
page read and write
5C1E000
heap
page read and write
4B80000
trusted library allocation
page read and write
C70000
trusted library allocation
page read and write
142E000
stack
page read and write
CF5000
heap
page read and write
E60000
heap
page read and write
CC7000
heap
page read and write
17F7000
trusted library allocation
page execute and read and write
17E2000
trusted library allocation
page execute and read and write
6D6E000
stack
page read and write
4F70000
heap
page read and write
C71000
heap
page read and write
1916000
heap
page read and write
81A000
trusted library allocation
page execute and read and write
67AE000
stack
page read and write
AF5000
heap
page read and write
24BB000
trusted library allocation
page execute and read and write
C67000
heap
page read and write
5BE0000
heap
page read and write
129C000
trusted library allocation
page execute and read and write
4A70000
heap
page read and write
4B50000
trusted library allocation
page read and write
540F000
stack
page read and write
FD0000
heap
page read and write
4A40000
trusted library allocation
page execute and read and write
5E20000
heap
page read and write
1053000
heap
page read and write
68AF000
stack
page read and write
16D0000
heap
page read and write
5420000
trusted library allocation
page execute and read and write
680000
unkown
page readonly
152F000
heap
page read and write
1400000
heap
page read and write
185E000
stack
page read and write
67AE000
stack
page read and write
87AF000
stack
page read and write
8000000
heap
page read and write
11F0000
heap
page read and write
17E0000
trusted library allocation
page read and write
CAE000
heap
page read and write
CD0000
heap
page read and write
B10000
heap
page read and write
BB0000
heap
page read and write
F00000
heap
page read and write
600E000
stack
page read and write
4AA0000
heap
page read and write
BFE000
unkown
page read and write
8EE000
stack
page read and write
11D2000
trusted library allocation
page execute and read and write
1740000
heap
page read and write
F17000
heap
page read and write
17EC000
trusted library allocation
page execute and read and write
5283000
heap
page read and write
4F20000
heap
page read and write
EEE000
stack
page read and write
5598000
trusted library allocation
page read and write
5340000
trusted library section
page readonly
C59000
heap
page read and write
D9000
stack
page read and write
2783000
trusted library allocation
page read and write
1589000
heap
page read and write
5350000
heap
page read and write
12E7000
heap
page read and write
969000
heap
page read and write
6B6E000
stack
page read and write
69E000
unkown
page readonly
6C70000
trusted library allocation
page execute and read and write
7FD0000
heap
page read and write
C92000
trusted library allocation
page execute and read and write
1910000
heap
page read and write
8E0000
heap
page read and write
F8D000
heap
page read and write
1397000
trusted library allocation
page execute and read and write
670000
trusted library allocation
page read and write
4A40000
heap
page read and write
4F30000
heap
page read and write
1440000
heap
page execute and read and write
CD0000
heap
page read and write
802000
trusted library allocation
page execute and read and write
81D0000
heap
page read and write
18EE000
stack
page read and write
C20000
heap
page read and write
112E000
stack
page read and write
1874000
heap
page execute and read and write
2741000
trusted library allocation
page read and write
AFC000
stack
page read and write
610E000
stack
page read and write
E1E000
stack
page read and write
4933000
heap
page read and write
CBC000
heap
page read and write
822000
trusted library allocation
page read and write
5ACE000
stack
page read and write
C8C000
heap
page read and write
641D000
stack
page read and write
729000
stack
page read and write
B77000
heap
page read and write
158D000
heap
page read and write
D0F000
heap
page read and write
12A2000
trusted library allocation
page read and write
58E3000
heap
page read and write
6D8000
heap
page read and write
3632000
trusted library allocation
page read and write
5150000
heap
page read and write
67A000
trusted library allocation
page execute and read and write
4F2B000
stack
page read and write
6A7000
trusted library allocation
page execute and read and write
682000
unkown
page readonly
C60000
heap
page execute and read and write
CBF000
heap
page read and write
2785000
trusted library allocation
page read and write
52B000
heap
page read and write
1280000
heap
page read and write
D37000
heap
page read and write
1340000
heap
page read and write
598E000
stack
page read and write
CF5000
heap
page read and write
7BE000
stack
page read and write
544000
heap
page read and write
141A000
trusted library allocation
page execute and read and write
5E6F000
stack
page read and write
4A55000
heap
page read and write
F7A000
stack
page read and write
F70000
heap
page read and write
2700000
trusted library allocation
page read and write
CCE000
heap
page read and write
24B7000
trusted library allocation
page execute and read and write
1180000
heap
page read and write
11F0000
heap
page read and write
C7A000
heap
page read and write
BE5000
heap
page read and write
5355000
heap
page read and write
520F000
trusted library allocation
page read and write
CEE000
heap
page read and write
12A0000
trusted library allocation
page read and write
1430000
heap
page read and write
180A000
trusted library allocation
page execute and read and write
CC9000
heap
page read and write
6660000
heap
page read and write
F7E000
stack
page read and write
2472000
trusted library allocation
page execute and read and write
CC5000
heap
page read and write
4FCE000
heap
page read and write
17F0000
trusted library allocation
page read and write
2883000
trusted library allocation
page read and write
6952000
trusted library allocation
page read and write
4D90000
heap
page read and write
3146000
trusted library allocation
page read and write
C82000
trusted library allocation
page read and write
4F0000
heap
page read and write
F5C000
stack
page read and write
49ED000
stack
page read and write
17C2000
trusted library allocation
page execute and read and write
BD0000
heap
page read and write
C8B000
heap
page read and write
4C45000
heap
page read and write
2E78000
trusted library allocation
page read and write
58E0000
heap
page read and write
5260000
trusted library allocation
page execute and read and write
11E2000
trusted library allocation
page execute and read and write
88E000
stack
page read and write
C9A000
trusted library allocation
page execute and read and write
CB9000
heap
page read and write
1598000
heap
page read and write
11EC000
trusted library allocation
page execute and read and write
12F9000
stack
page read and write
1590000
heap
page read and write
35FE000
trusted library allocation
page read and write
4900000
trusted library section
page readonly
12B2000
trusted library allocation
page execute and read and write
31C1000
trusted library allocation
page read and write
C79000
heap
page read and write
1770000
heap
page read and write
60EF000
stack
page read and write
1F6000
stack
page read and write
CC9000
heap
page read and write
68EE000
stack
page read and write
5CF0000
heap
page read and write
FC8000
heap
page read and write
18E0000
trusted library allocation
page read and write
852E000
stack
page read and write
990000
trusted library allocation
page read and write
4940000
heap
page read and write
185E000
stack
page read and write
24A2000
trusted library allocation
page execute and read and write
12F6000
stack
page read and write
CF6000
heap
page read and write
69EF000
stack
page read and write
11FE000
stack
page read and write
52CE000
stack
page read and write
14E8000
heap
page read and write
6C6F000
stack
page read and write
139B000
trusted library allocation
page execute and read and write
4D8D000
stack
page read and write
4A20000
heap
page read and write
CB3000
heap
page read and write
2E71000
trusted library allocation
page read and write
136E000
stack
page read and write
40B1000
trusted library allocation
page read and write
CB3000
heap
page read and write
13EF000
stack
page read and write
C7C000
trusted library allocation
page execute and read and write
D0F000
heap
page read and write
4FC2000
heap
page read and write
4F10000
heap
page read and write
5830000
heap
page read and write
652000
trusted library allocation
page execute and read and write
1290000
trusted library allocation
page read and write
68A000
trusted library allocation
page execute and read and write
6D0000
heap
page read and write
6A2E000
stack
page read and write
4FD7000
heap
page read and write
4CE000
stack
page read and write
4A50000
heap
page read and write
CCB000
heap
page read and write
C8D000
heap
page read and write
66BE000
stack
page read and write
BF0000
heap
page read and write
6AB000
trusted library allocation
page execute and read and write
1402000
trusted library allocation
page read and write
CCB000
heap
page read and write
1D6000
stack
page read and write
4FC1000
heap
page read and write
93F000
heap
page read and write
18BC000
stack
page read and write
5F0000
heap
page read and write
C91000
heap
page read and write
157D000
heap
page read and write
3601000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
9BF000
stack
page read and write
5550000
heap
page read and write
C2E000
stack
page read and write
CC5000
heap
page read and write
57B0000
trusted library allocation
page execute and read and write
C69000
heap
page read and write
5B0E000
stack
page read and write
57A0000
trusted library allocation
page read and write
1017000
heap
page read and write
1390000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
4041000
trusted library allocation
page read and write
4E9F000
stack
page read and write
672000
trusted library allocation
page execute and read and write
4A50000
heap
page read and write
12BA000
trusted library allocation
page execute and read and write
890000
heap
page read and write
CBA000
heap
page read and write
116E000
stack
page read and write
CB0000
heap
page read and write
5300000
heap
page read and write
1400000
trusted library allocation
page read and write
842E000
stack
page read and write
24FE000
stack
page read and write
4044000
trusted library allocation
page read and write
4601000
trusted library allocation
page read and write
4EA0000
heap
page read and write
14C0000
trusted library allocation
page read and write
68AE000
stack
page read and write
128A000
trusted library allocation
page execute and read and write
53B3000
heap
page read and write
1513000
heap
page read and write
5030000
trusted library allocation
page execute and read and write
275F000
trusted library allocation
page read and write
84B000
trusted library allocation
page execute and read and write
82EE000
stack
page read and write
660000
heap
page read and write
623E000
stack
page read and write
4B63000
heap
page read and write
48AE000
stack
page read and write
133E000
stack
page read and write
6BB0000
heap
page read and write
CBC000
heap
page read and write
C87000
trusted library allocation
page execute and read and write
12C7000
trusted library allocation
page execute and read and write
67C000
trusted library allocation
page execute and read and write
18F0000
trusted library allocation
page execute and read and write
C8E000
heap
page read and write
5C0F000
stack
page read and write
12FF000
stack
page read and write
CC8000
heap
page read and write
D17000
heap
page read and write
4FCD000
heap
page read and write
780000
heap
page read and write
4FD3000
heap
page read and write
568E000
stack
page read and write
2752000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
CD0000
heap
page read and write
There are 806 hidden memdumps, click here to show them.