IOC Report
WF3hhjIwy0.exe

loading gif

Files

File Path
Type
Category
Malicious
WF3hhjIwy0.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\WF3hhjIwy0.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\chargeable.exe.log
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\WF3hhjIwy0.exe
"C:\Users\user\Desktop\WF3hhjIwy0.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
malicious
C:\Users\user\Desktop\WF3hhjIwy0.exe
"C:\Users\user\Desktop\WF3hhjIwy0.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\Desktop\WF3hhjIwy0.exe
"C:\Users\user\Desktop\WF3hhjIwy0.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
doddyfire.linkpc.net
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://go.microsoft.
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://go.microsoft.LinkId=42127
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://www.sysinternals.com0
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
doddyfire.linkpc.net
105.157.150.238
malicious

IPs

IP
Domain
Country
Malicious
105.157.150.238
doddyfire.linkpc.net
Morocco
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
confuse
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SysMain
malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\e1a87040f2026369a233f9ae76301b7b
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
2EC1000
trusted library allocation
page read and write
malicious
2B51000
trusted library allocation
page read and write
malicious
1030000
trusted library allocation
page read and write
4A80000
heap
page read and write
C3E000
heap
page read and write
1282000
heap
page read and write
F2A000
trusted library allocation
page execute and read and write
5790000
heap
page read and write
12F0000
heap
page read and write
FF2000
trusted library allocation
page execute and read and write
550E000
stack
page read and write
F00000
trusted library allocation
page read and write
E10000
heap
page read and write
ED0000
heap
page execute and read and write
109A000
trusted library allocation
page execute and read and write
100B000
trusted library allocation
page execute and read and write
3006000
trusted library allocation
page read and write
1654000
heap
page read and write
5851000
heap
page read and write
1368000
heap
page read and write
B96000
stack
page read and write
582E000
heap
page read and write
5090000
heap
page read and write
12C6000
heap
page read and write
2E4E000
trusted library allocation
page read and write
81C0000
heap
page read and write
6584000
heap
page read and write
12F4000
heap
page read and write
F4E000
stack
page read and write
4F94000
trusted library section
page readonly
E82000
trusted library allocation
page execute and read and write
141E000
stack
page read and write
EA0000
heap
page read and write
5720000
heap
page read and write
5090000
trusted library allocation
page execute and read and write
F55000
heap
page read and write
3076000
trusted library allocation
page read and write
B36000
stack
page read and write
2FE6000
trusted library allocation
page read and write
5199000
stack
page read and write
12EF000
heap
page read and write
542E000
stack
page read and write
1364000
heap
page read and write
EBE000
stack
page read and write
12C3000
heap
page read and write
131E000
heap
page read and write
A82000
trusted library allocation
page execute and read and write
3EE7000
trusted library allocation
page read and write
12A6000
heap
page read and write
4D0E000
stack
page read and write
570000
heap
page read and write
12E7000
heap
page read and write
5415000
heap
page read and write
FA0000
heap
page read and write
12F8000
heap
page read and write
120E000
unkown
page read and write
13E0000
heap
page read and write
154E000
stack
page read and write
676E000
heap
page read and write
1A96000
trusted library allocation
page execute and read and write
4EFE000
stack
page read and write
5050000
trusted library allocation
page execute and read and write
99E000
stack
page read and write
58AE000
stack
page read and write
185F000
stack
page read and write
AB7000
trusted library allocation
page execute and read and write
12DF000
heap
page read and write
27B0000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
5850000
heap
page read and write
12BA000
heap
page read and write
F22000
trusted library allocation
page execute and read and write
5140000
heap
page read and write
53C5000
heap
page read and write
5C0000
heap
page read and write
1250000
heap
page read and write
F0A000
trusted library allocation
page execute and read and write
950000
heap
page read and write
12B2000
heap
page read and write
4BBC000
stack
page read and write
12FF000
heap
page read and write
283F000
stack
page read and write
B50000
trusted library allocation
page read and write
3056000
trusted library allocation
page read and write
109E000
stack
page read and write
F17000
trusted library allocation
page execute and read and write
4CB0000
heap
page read and write
4F6E000
stack
page read and write
5820000
heap
page read and write
1050000
trusted library allocation
page read and write
12EC000
heap
page read and write
4CD0000
heap
page read and write
1360000
heap
page read and write
5851000
heap
page read and write
12F5000
heap
page read and write
4CC0000
trusted library section
page readonly
12CB000
heap
page read and write
1B0E000
stack
page read and write
10AC000
trusted library allocation
page execute and read and write
1184000
heap
page read and write
5856000
heap
page read and write
AD0000
heap
page read and write
EFA000
trusted library allocation
page execute and read and write
160F000
stack
page read and write
5876000
heap
page read and write
131E000
heap
page read and write
12F8000
heap
page read and write
6AEE000
stack
page read and write
5857000
heap
page read and write
B1E000
stack
page read and write
532E000
stack
page read and write
E0E000
stack
page read and write
131E000
heap
page read and write
CEE000
stack
page read and write
5550000
heap
page read and write
F5D000
heap
page read and write
93E000
stack
page read and write
580000
heap
page read and write
4CAC000
stack
page read and write
2761000
trusted library allocation
page read and write
136D000
heap
page read and write
52C0000
trusted library allocation
page read and write
12ED000
heap
page read and write
12F1000
heap
page read and write
136E000
heap
page read and write
4DF0000
heap
page read and write
E60000
trusted library allocation
page read and write
83C0000
trusted library section
page read and write
8F6000
stack
page read and write
105A000
trusted library allocation
page execute and read and write
5600000
heap
page read and write
FEA000
trusted library allocation
page execute and read and write
702000
unkown
page readonly
AB2000
trusted library allocation
page execute and read and write
3111000
trusted library allocation
page read and write
FF0000
heap
page read and write
C94000
heap
page read and write
5877000
heap
page read and write
5B0E000
stack
page read and write
1C0F000
stack
page read and write
5C4B000
stack
page read and write
2833000
trusted library allocation
page read and write
63DE000
stack
page read and write
68FE000
stack
page read and write
5878000
heap
page read and write
12C6000
heap
page read and write
3FC1000
trusted library allocation
page read and write
483C000
stack
page read and write
10B1000
heap
page read and write
608000
heap
page read and write
1190000
heap
page read and write
5515000
heap
page read and write
700000
unkown
page readonly
5F0000
trusted library allocation
page read and write
C8E000
stack
page read and write
ABB000
trusted library allocation
page execute and read and write
4DA0000
heap
page read and write
639E000
stack
page read and write
FD0000
trusted library allocation
page read and write
BD0000
heap
page read and write
FCA000
trusted library allocation
page execute and read and write
5C0000
heap
page read and write
5810000
heap
page read and write
DA8000
heap
page read and write
85CE000
stack
page read and write
10EF000
stack
page read and write
53D0000
heap
page read and write
12FB000
heap
page read and write
5130000
heap
page read and write
F0C000
trusted library allocation
page execute and read and write
A3B000
stack
page read and write
4D60000
heap
page read and write
1310000
heap
page read and write
12FB000
heap
page read and write
1070000
heap
page read and write
AD5000
heap
page read and write
8EA000
stack
page read and write
5463000
heap
page read and write
3AC1000
trusted library allocation
page read and write
5680000
heap
page read and write
539000
stack
page read and write
1320000
heap
page read and write
BD0000
heap
page read and write
99A000
trusted library allocation
page execute and read and write
1E20000
heap
page read and write
9A0000
heap
page read and write
497E000
stack
page read and write
4CD5000
heap
page read and write
10FE000
stack
page read and write
5150000
heap
page read and write
1A20000
heap
page read and write
A35000
heap
page read and write
E15000
heap
page read and write
B00000
heap
page read and write
F37000
trusted library allocation
page execute and read and write
1628000
heap
page read and write
1E1E000
stack
page read and write
E72000
trusted library allocation
page execute and read and write
CA0000
heap
page read and write
2DC1000
trusted library allocation
page read and write
A9A000
trusted library allocation
page execute and read and write
1070000
heap
page read and write
4CC4000
trusted library section
page readonly
5940000
heap
page read and write
12F9000
heap
page read and write
1360000
heap
page execute and read and write
515C000
stack
page read and write
67FE000
stack
page read and write
4F2E000
stack
page read and write
9F0000
heap
page read and write
5070000
heap
page read and write
6A20000
heap
page read and write
AC7000
trusted library allocation
page execute and read and write
14D7000
heap
page read and write
A80000
trusted library allocation
page read and write
36A6000
heap
page read and write
1363000
heap
page read and write
54B0000
heap
page read and write
9A2000
trusted library allocation
page read and write
67BE000
stack
page read and write
4A7F000
stack
page read and write
584A000
heap
page read and write
870E000
stack
page read and write
6692000
trusted library allocation
page read and write
63E000
heap
page read and write
CA5000
heap
page read and write
8F9000
stack
page read and write
E08000
heap
page read and write
DCF000
stack
page read and write
B7A000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
6570000
heap
page read and write
52DE000
stack
page read and write
9D0000
heap
page read and write
12F5000
heap
page read and write
9A0000
heap
page read and write
5010000
heap
page read and write
5C50000
heap
page execute and read and write
5900000
heap
page read and write
6760000
heap
page read and write
51B0000
trusted library section
page readonly
4F80000
trusted library allocation
page read and write
10E3000
heap
page read and write
B74000
heap
page read and write
990000
trusted library allocation
page read and write
AF6000
stack
page read and write
12FD000
heap
page read and write
5360000
trusted library section
page readonly
5850000
heap
page read and write
1290000
heap
page read and write
FD2000
trusted library allocation
page execute and read and write
5920000
trusted library allocation
page execute and read and write
EA2000
trusted library allocation
page execute and read and write
10FB000
stack
page read and write
27F1000
trusted library allocation
page read and write
5460000
heap
page read and write
51B5000
trusted library section
page readonly
53A0000
trusted library allocation
page execute and read and write
84CE000
stack
page read and write
1A8A000
trusted library allocation
page execute and read and write
5440000
trusted library allocation
page read and write
13CF000
stack
page read and write
12EB000
heap
page read and write
AF9000
stack
page read and write
509B000
stack
page read and write
3FE1000
trusted library allocation
page read and write
10F3000
stack
page read and write
12ED000
heap
page read and write
4CBE000
stack
page read and write
B62000
trusted library allocation
page read and write
E80000
heap
page execute and read and write
5A0F000
stack
page read and write
2F17000
trusted library allocation
page read and write
1A90000
trusted library allocation
page read and write
12F5000
heap
page read and write
5060000
heap
page read and write
1052000
trusted library allocation
page execute and read and write
E90000
heap
page read and write
5200000
trusted library allocation
page execute and read and write
2F3C000
trusted library allocation
page read and write
9E9000
stack
page read and write
4ACE000
stack
page read and write
12F0000
heap
page execute and read and write
12DD000
heap
page read and write
50DC000
stack
page read and write
888E000
stack
page read and write
5C90000
heap
page read and write
1082000
trusted library allocation
page read and write
4F80000
heap
page read and write
4BD0000
trusted library allocation
page execute and read and write
4F50000
trusted library allocation
page execute and read and write
12B1000
heap
page read and write
BD8000
heap
page read and write
511E000
stack
page read and write
8CE000
stack
page read and write
524C000
stack
page read and write
12DC000
heap
page read and write
105E000
stack
page read and write
12F8000
heap
page read and write
B35000
heap
page read and write
E9F000
stack
page read and write
131E000
heap
page read and write
6D2E000
stack
page read and write
98A000
trusted library allocation
page execute and read and write
3DC1000
trusted library allocation
page read and write
6C2E000
stack
page read and write
5340000
heap
page read and write
E7A000
trusted library allocation
page execute and read and write
1AC0000
trusted library allocation
page read and write
1ACB000
trusted library allocation
page execute and read and write
5260000
trusted library allocation
page execute and read and write
1010000
heap
page read and write
5E0000
heap
page read and write
A00000
heap
page read and write
657E000
stack
page read and write
7D5E000
stack
page read and write
5600000
trusted library allocation
page execute and read and write
5790000
trusted library allocation
page read and write
12C4000
heap
page read and write
EAA000
trusted library allocation
page execute and read and write
10E0000
heap
page read and write
5170000
heap
page read and write
12E8000
heap
page read and write
5180000
heap
page read and write
DF5000
heap
page read and write
884C000
stack
page read and write
5B0000
heap
page read and write
2B81000
trusted library allocation
page read and write
57A0000
trusted library allocation
page execute and read and write
B90000
heap
page read and write
1350000
trusted library allocation
page read and write
B67000
trusted library allocation
page execute and read and write
AAA000
trusted library allocation
page execute and read and write
9A7000
trusted library allocation
page execute and read and write
E9A000
trusted library allocation
page execute and read and write
C28000
heap
page read and write
36A0000
heap
page read and write
C8D000
heap
page read and write
F3B000
trusted library allocation
page execute and read and write
B70000
heap
page read and write
1060000
trusted library allocation
page read and write
12E3000
heap
page read and write
117C000
stack
page read and write
12EB000
heap
page read and write
D30000
heap
page read and write
F9E000
stack
page read and write
634000
heap
page read and write
12BE000
heap
page read and write
1610000
heap
page read and write
5553000
heap
page read and write
94A000
stack
page read and write
5A0000
heap
page read and write
63F0000
trusted library allocation
page read and write
BDE000
stack
page read and write
4F80000
heap
page read and write
5780000
heap
page read and write
1362000
heap
page read and write
1180000
heap
page read and write
5879000
heap
page read and write
12FA000
heap
page read and write
9B0000
heap
page read and write
5876000
heap
page read and write
12F4000
heap
page read and write
1D1E000
stack
page read and write
12EF000
heap
page read and write
646D000
stack
page read and write
62FE000
heap
page read and write
60E0000
trusted library allocation
page read and write
542F000
heap
page read and write
10D7000
trusted library allocation
page execute and read and write
12E8000
heap
page read and write
5300000
heap
page read and write
4F40000
trusted library allocation
page read and write
136E000
stack
page read and write
4DDD000
stack
page read and write
EE0000
trusted library allocation
page read and write
5876000
heap
page read and write
5390000
heap
page read and write
553B000
stack
page read and write
DB0000
heap
page read and write
600000
heap
page read and write
2C2F000
trusted library allocation
page read and write
12EF000
heap
page read and write
F50000
heap
page read and write
898F000
stack
page read and write
B30000
trusted library allocation
page read and write
12E5000
heap
page read and write
50C0000
heap
page read and write
9C0000
heap
page read and write
2D91000
trusted library allocation
page read and write
F24000
heap
page read and write
F77000
heap
page read and write
5710000
heap
page read and write
1007000
trusted library allocation
page execute and read and write
670000
heap
page read and write
5BFD000
stack
page read and write
10CE000
stack
page read and write
5020000
trusted library allocation
page execute and read and write
FFA000
trusted library allocation
page execute and read and write
7C40000
heap
page read and write
175E000
stack
page read and write
4E8E000
stack
page read and write
3010000
trusted library allocation
page read and write
50DE000
stack
page read and write
3EC1000
trusted library allocation
page read and write
584C000
heap
page read and write
12F5000
heap
page read and write
2802000
trusted library allocation
page read and write
97E000
stack
page read and write
1087000
trusted library allocation
page execute and read and write
517F000
stack
page read and write
D36000
heap
page read and write
131F000
heap
page read and write
A56000
heap
page read and write
A60000
trusted library allocation
page read and write
12DC000
heap
page read and write
13F0000
heap
page read and write
F50000
trusted library allocation
page read and write
108B000
trusted library allocation
page execute and read and write
B30000
heap
page read and write
B42000
trusted library allocation
page execute and read and write
12E5000
heap
page read and write
ACB000
trusted library allocation
page execute and read and write
540E000
stack
page read and write
58EE000
stack
page read and write
1110000
heap
page read and write
5210000
unclassified section
page read and write
507C000
stack
page read and write
66BE000
stack
page read and write
106F000
stack
page read and write
1285000
heap
page read and write
EF2000
trusted library allocation
page execute and read and write
12EB000
heap
page read and write
241F000
stack
page read and write
1100000
heap
page read and write
12C4000
heap
page read and write
53C0000
heap
page read and write
53F1000
heap
page read and write
570D000
stack
page read and write
4FFF000
stack
page read and write
367F000
stack
page read and write
4FBF000
stack
page read and write
13AE000
stack
page read and write
DD0000
heap
page read and write
4F90000
trusted library allocation
page execute and read and write
5840000
heap
page read and write
A97000
trusted library allocation
page execute and read and write
860E000
stack
page read and write
EF8000
heap
page read and write
874C000
stack
page read and write
50F0000
heap
page read and write
F9F000
stack
page read and write
3B81000
trusted library allocation
page read and write
9EE000
stack
page read and write
4D4E000
stack
page read and write
1050000
heap
page read and write
127A000
heap
page read and write
5841000
heap
page read and write
3D91000
trusted library allocation
page read and write
12B7000
heap
page read and write
12DE000
stack
page read and write
D30000
heap
page read and write
12EB000
heap
page read and write
493E000
stack
page read and write
6ADE000
stack
page read and write
1361000
heap
page read and write
1430000
heap
page read and write
12FC000
heap
page read and write
5605000
heap
page read and write
F60000
heap
page read and write
5841000
heap
page read and write
1367000
heap
page read and write
90D000
stack
page read and write
5085000
trusted library section
page readonly
1386000
stack
page read and write
B5A000
trusted library allocation
page execute and read and write
52CE000
stack
page read and write
6520000
heap
page read and write
53CF000
stack
page read and write
1870000
heap
page read and write
4EB0000
heap
page read and write
CF6000
stack
page read and write
12E9000
heap
page read and write
1A92000
trusted library allocation
page execute and read and write
2C9E000
stack
page read and write
6440000
heap
page read and write
A13000
heap
page read and write
142E000
stack
page read and write
128B000
stack
page read and write
5063000
heap
page read and write
67FE000
stack
page read and write
534D000
stack
page read and write
C6C000
heap
page read and write
4784000
trusted library allocation
page read and write
12C8000
heap
page read and write
51CF000
stack
page read and write
F02000
trusted library allocation
page execute and read and write
10A6000
trusted library allocation
page execute and read and write
107A000
trusted library allocation
page execute and read and write
3D94000
trusted library allocation
page read and write
5000000
trusted library allocation
page execute and read and write
E3D000
heap
page read and write
B39000
stack
page read and write
51DE000
stack
page read and write
982000
trusted library allocation
page execute and read and write
4D5E000
stack
page read and write
9AA000
trusted library allocation
page execute and read and write
10C2000
trusted library allocation
page execute and read and write
146E000
unkown
page read and write
A72000
trusted library allocation
page execute and read and write
5470000
trusted library allocation
page read and write
12E1000
heap
page read and write
560000
heap
page read and write
104A000
trusted library allocation
page execute and read and write
DD3000
heap
page read and write
DF0000
heap
page read and write
1092000
trusted library allocation
page execute and read and write
12BE000
heap
page read and write
C5C000
heap
page read and write
12DE000
heap
page read and write
ED0000
heap
page read and write
FE2000
trusted library allocation
page read and write
55F0000
heap
page read and write
525D000
stack
page read and write
1620000
heap
page read and write
D34000
heap
page read and write
54C0000
trusted library allocation
page execute and read and write
F60000
heap
page read and write
4F4F000
trusted library allocation
page read and write
4BCF000
stack
page read and write
10DB000
trusted library allocation
page execute and read and write
1A9C000
trusted library allocation
page execute and read and write
2FE1000
trusted library allocation
page read and write
C4A000
heap
page read and write
DA0000
heap
page read and write
516D000
stack
page read and write
12EC000
heap
page read and write
1C30000
heap
page execute and read and write
3761000
trusted library allocation
page read and write
A40000
heap
page execute and read and write
1330000
heap
page read and write
505E000
stack
page read and write
62F0000
heap
page read and write
5846000
heap
page read and write
6C2E000
stack
page read and write
9E6000
stack
page read and write
509E000
stack
page read and write
E80000
trusted library allocation
page read and write
644E000
heap
page read and write
C5D000
heap
page read and write
D4B000
stack
page read and write
10EE000
stack
page read and write
E97000
trusted library allocation
page execute and read and write
501E000
stack
page read and write
12C4000
heap
page read and write
12FC000
heap
page read and write
136C000
heap
page read and write
10A0000
trusted library allocation
page read and write
6A28000
heap
page read and write
4DE0000
heap
page read and write
14B0000
heap
page read and write
F61000
heap
page read and write
5876000
heap
page read and write
B6A000
trusted library allocation
page execute and read and write
12F8000
heap
page read and write
C3A000
heap
page read and write
8F6000
stack
page read and write
BF0000
heap
page read and write
507E000
stack
page read and write
5080000
trusted library section
page readonly
B60000
heap
page read and write
5545000
trusted library section
page readonly
EBB000
trusted library allocation
page execute and read and write
12AF000
heap
page read and write
126E000
stack
page read and write
B99000
stack
page read and write
7AA000
stack
page read and write
E92000
trusted library allocation
page read and write
12F3000
heap
page read and write
12C6000
heap
page read and write
4E6E000
stack
page read and write
5180000
trusted library allocation
page read and write
12B7000
heap
page read and write
10D0000
trusted library allocation
page read and write
1A50000
heap
page read and write
4781000
trusted library allocation
page read and write
12E5000
heap
page read and write
B4A000
trusted library allocation
page execute and read and write
F1A000
trusted library allocation
page execute and read and write
689000
heap
page read and write
5335000
heap
page read and write
5879000
heap
page read and write
4F90000
trusted library section
page readonly
2C22000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
12C9000
heap
page read and write
12F3000
heap
page read and write
277E000
stack
page read and write
69AE000
stack
page read and write
1033000
trusted library allocation
page read and write
A0E000
stack
page read and write
C40000
heap
page read and write
3781000
trusted library allocation
page read and write
280F000
trusted library allocation
page read and write
1042000
trusted library allocation
page execute and read and write
C03000
heap
page read and write
1270000
heap
page read and write
AF0000
heap
page read and write
5070000
trusted library allocation
page read and write
3030000
trusted library allocation
page read and write
FDC000
trusted library allocation
page execute and read and write
5060000
heap
page read and write
629E000
stack
page read and write
5660000
heap
page read and write
10DB000
heap
page read and write
565E000
stack
page read and write
536000
stack
page read and write
12CA000
heap
page read and write
5330000
heap
page read and write
FC2000
trusted library allocation
page execute and read and write
1196000
heap
page read and write
12DE000
heap
page read and write
1080000
trusted library allocation
page read and write
656E000
stack
page read and write
B50000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
1364000
heap
page read and write
8F9000
stack
page read and write
3051000
trusted library allocation
page read and write
C20000
heap
page read and write
2AC1000
trusted library allocation
page read and write
66BE000
stack
page read and write
AA2000
trusted library allocation
page execute and read and write
1A70000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
5850000
heap
page read and write
12B7000
heap
page read and write
519000
stack
page read and write
9EE000
heap
page read and write
6F1E000
stack
page read and write
163E000
heap
page read and write
5E5000
heap
page read and write
10A5000
heap
page read and write
14AF000
stack
page read and write
583F000
stack
page read and write
1280000
heap
page execute and read and write
67BE000
stack
page read and write
4BE0000
trusted library allocation
page read and write
69DE000
stack
page read and write
10DF000
heap
page read and write
6459000
heap
page read and write
12FC000
heap
page read and write
DC0000
heap
page read and write
12BB000
heap
page read and write
136E000
heap
page read and write
A10000
heap
page read and write
6AAE000
stack
page read and write
5C9B000
heap
page read and write
1363000
heap
page read and write
BBD000
stack
page read and write
F4E000
stack
page read and write
6EDE000
stack
page read and write
5AE000
stack
page read and write
B3E000
stack
page read and write
13E0000
trusted library allocation
page read and write
5422000
heap
page read and write
439000
stack
page read and write
5040000
trusted library allocation
page read and write
12C2000
heap
page read and write
6F5E000
stack
page read and write
14D0000
heap
page read and write
585C000
heap
page read and write
2B7E000
stack
page read and write
2A7F000
stack
page read and write
6BEE000
stack
page read and write
CF9000
stack
page read and write
992000
trusted library allocation
page execute and read and write
519E000
stack
page read and write
668000
heap
page read and write
5063000
heap
page read and write
51D0000
heap
page read and write
5540000
trusted library section
page readonly
5879000
heap
page read and write
667F000
stack
page read and write
B63000
heap
page read and write
13C0000
trusted library allocation
page read and write
CAE000
stack
page read and write
53E0000
heap
page read and write
12B1000
heap
page read and write
10E0000
heap
page execute and read and write
B87000
trusted library allocation
page execute and read and write
2E51000
trusted library allocation
page read and write
6D6E000
stack
page read and write
E7C000
stack
page read and write
1AC7000
trusted library allocation
page execute and read and write
D35000
heap
page read and write
D00000
heap
page read and write
BD8000
heap
page read and write
F32000
trusted library allocation
page read and write
615E000
stack
page read and write
A7A000
trusted library allocation
page execute and read and write
12B2000
heap
page read and write
5D9E000
stack
page read and write
5876000
heap
page read and write
6670000
trusted library allocation
page read and write
4EBE000
stack
page read and write
4FA0000
trusted library allocation
page read and write
52A0000
heap
page read and write
4FFE000
stack
page read and write
64DE000
stack
page read and write
1430000
heap
page read and write
12F6000
heap
page read and write
12F1000
heap
page read and write
13D0000
trusted library allocation
page execute and read and write
106A000
trusted library allocation
page execute and read and write
12FC000
heap
page read and write
FB0000
trusted library allocation
page read and write
B8B000
trusted library allocation
page execute and read and write
586E000
stack
page read and write
2C53000
trusted library allocation
page read and write
EB7000
trusted library allocation
page execute and read and write
5450000
trusted library allocation
page execute and read and write
1AB2000
trusted library allocation
page execute and read and write
125E000
stack
page read and write
5510000
heap
page read and write
4FD0000
trusted library allocation
page read and write
2B4E000
trusted library allocation
page read and write
4D9E000
stack
page read and write
521E000
stack
page read and write
1067000
trusted library allocation
page execute and read and write
1020000
heap
page execute and read and write
12E5000
heap
page read and write
12F0000
heap
page read and write
B5C000
trusted library allocation
page execute and read and write
4EAE000
stack
page read and write
4ED0000
trusted library allocation
page execute and read and write
F0F000
stack
page read and write
5220000
heap
page read and write
99C000
trusted library allocation
page execute and read and write
5550000
heap
page read and write
2E58000
trusted library allocation
page read and write
579F000
trusted library allocation
page read and write
689E000
stack
page read and write
2C11000
trusted library allocation
page read and write
B72000
trusted library allocation
page execute and read and write
625F000
stack
page read and write
12BB000
heap
page read and write
EF0000
heap
page read and write
5350000
heap
page read and write
12A9000
heap
page read and write
1389000
stack
page read and write
4EFC000
stack
page read and write
541B000
stack
page read and write
ABA000
trusted library allocation
page execute and read and write
A92000
trusted library allocation
page read and write
E8C000
trusted library allocation
page execute and read and write
1072000
trusted library allocation
page execute and read and write
C46000
heap
page read and write
12BD000
heap
page read and write
1315000
heap
page read and write
7930000
heap
page read and write
6579000
heap
page read and write
83B0000
heap
page read and write
C53000
heap
page read and write
C3D000
heap
page read and write
5153000
heap
page read and write
5840000
heap
page read and write
4F90000
heap
page read and write
2BD0000
trusted library allocation
page read and write
4FA0000
heap
page read and write
12F4000
heap
page read and write
5093000
heap
page read and write
1366000
heap
page read and write
B7E000
stack
page read and write
F2E000
heap
page read and write
66C000
heap
page read and write
121E000
stack
page read and write
81BF000
stack
page read and write
BCE000
stack
page read and write
10A2000
trusted library allocation
page execute and read and write
12DE000
heap
page read and write
12E3000
heap
page read and write
F7B000
heap
page read and write
4EE0000
trusted library allocation
page read and write
6D2F000
stack
page read and write
5670000
heap
page read and write
6530000
heap
page read and write
12CE000
stack
page read and write
6B1E000
stack
page read and write
4FA5000
heap
page read and write
10FA000
heap
page read and write
9D7000
heap
page read and write
12DE000
heap
page read and write
555E000
heap
page read and write
1078000
heap
page read and write
699F000
stack
page read and write
53DE000
stack
page read and write
12FB000
heap
page read and write
1290000
heap
page read and write
B10000
heap
page read and write
5FA000
stack
page read and write
5C0E000
stack
page read and write
5854000
heap
page read and write
FE7000
trusted library allocation
page execute and read and write
129B000
stack
page read and write
1435000
heap
page read and write
F50000
heap
page read and write
B52000
trusted library allocation
page execute and read and write
A99000
stack
page read and write
5350000
heap
page read and write
5AFB000
stack
page read and write
E3E000
stack
page read and write
BE0000
heap
page read and write
5500000
heap
page read and write
2FC1000
trusted library allocation
page read and write
C90000
heap
page read and write
12FC000
heap
page read and write
A3C000
heap
page read and write
12FA000
heap
page read and write
5850000
heap
page read and write
C0F000
heap
page read and write
F12000
trusted library allocation
page read and write
E24000
heap
page read and write
3071000
trusted library allocation
page read and write
10F8000
trusted library allocation
page read and write
6DDE000
stack
page read and write
9BA000
heap
page read and write
4FEB000
stack
page read and write
1290000
heap
page read and write
BDE000
heap
page read and write
9BE000
heap
page read and write
A8C000
trusted library allocation
page execute and read and write
12F4000
heap
page read and write
A39000
heap
page read and write
1A82000
trusted library allocation
page execute and read and write
C0E000
heap
page read and write
5852000
heap
page read and write
F0E000
stack
page read and write
6C1E000
stack
page read and write
5847000
heap
page read and write
7F020000
trusted library allocation
page execute and read and write
511C000
stack
page read and write
10E4000
heap
page execute and read and write
131F000
heap
page read and write
4F9E000
heap
page read and write
4C5E000
stack
page read and write
A8A000
trusted library allocation
page execute and read and write
503E000
stack
page read and write
There are 839 hidden memdumps, click here to show them.