IOC Report
w1czRQJC7H.exe

loading gif

Files

File Path
Type
Category
Malicious
w1czRQJC7H.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\w1czRQJC7H.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\chargeable.exe.log
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\w1czRQJC7H.exe
"C:\Users\user\Desktop\w1czRQJC7H.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
malicious
C:\Users\user\Desktop\w1czRQJC7H.exe
"C:\Users\user\Desktop\w1czRQJC7H.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\Desktop\w1czRQJC7H.exe
"C:\Users\user\Desktop\w1czRQJC7H.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

Domains

Name
IP
Malicious
doddyfire.linkpc.net
191.78.43.147
malicious

IPs

IP
Domain
Country
Malicious
191.78.43.147
doddyfire.linkpc.net
Colombia
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
confuse
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SysMain
malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\e1a87040f2026369a233f9ae76301b7b
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
2FC1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2A01000
trusted library allocation
page read and write
malicious
68BF000
stack
page read and write
13BB000
stack
page read and write
686E000
stack
page read and write
4BDF000
trusted library section
page readonly
4B80000
trusted library allocation
page read and write
D6E000
stack
page read and write
D20000
heap
page execute and read and write
867E000
stack
page read and write
F7F000
stack
page read and write
4E20000
heap
page read and write
303C000
heap
page read and write
CF6000
stack
page read and write
522E000
stack
page read and write
303B000
heap
page read and write
13F0000
heap
page read and write
D80000
trusted library allocation
page read and write
300B000
heap
page read and write
1260000
trusted library allocation
page read and write
EB8000
heap
page read and write
814000
heap
page read and write
11AE000
stack
page read and write
2971000
trusted library allocation
page read and write
302B000
heap
page read and write
105E000
stack
page read and write
300C000
heap
page read and write
1210000
heap
page execute and read and write
3036000
heap
page read and write
676E000
stack
page read and write
50D0000
trusted library allocation
page execute and read and write
2BE0000
heap
page read and write
3030000
heap
page read and write
F7C000
heap
page read and write
3030000
heap
page read and write
CF9000
stack
page read and write
CF9000
stack
page read and write
524D000
stack
page read and write
1270000
trusted library allocation
page read and write
D0B000
trusted library allocation
page execute and read and write
127F000
trusted library allocation
page read and write
3008000
heap
page read and write
C7F000
stack
page read and write
53E0000
trusted library section
page readonly
D8C000
trusted library allocation
page execute and read and write
2B6E000
stack
page read and write
306F000
heap
page read and write
A13000
heap
page read and write
2FF8000
heap
page read and write
960000
trusted library allocation
page execute and read and write
AD0000
trusted library section
page readonly
65F0000
trusted library allocation
page read and write
4F6000
stack
page read and write
10E7000
heap
page read and write
3BF7000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
11D0000
heap
page read and write
3049000
heap
page read and write
303F000
heap
page read and write
50D0000
trusted library allocation
page read and write
DB0000
heap
page read and write
53FD000
stack
page read and write
30B9000
heap
page read and write
301A000
heap
page read and write
50E0000
trusted library allocation
page read and write
DF0000
heap
page read and write
4BE3000
heap
page read and write
2FC0000
heap
page read and write
4C7B000
stack
page read and write
2E91000
trusted library allocation
page read and write
65D0000
heap
page read and write
1022000
trusted library allocation
page execute and read and write
3051000
trusted library allocation
page read and write
5250000
heap
page read and write
747000
trusted library allocation
page execute and read and write
4A90000
heap
page read and write
5E0000
trusted library allocation
page read and write
4A60000
trusted library allocation
page execute and read and write
11C0000
heap
page read and write
65E9000
heap
page read and write
108B000
trusted library allocation
page execute and read and write
970000
heap
page read and write
50CE000
stack
page read and write
50C0000
heap
page read and write
AD7000
trusted library allocation
page execute and read and write
F80000
heap
page read and write
69DE000
stack
page read and write
2F70000
heap
page read and write
3701000
trusted library allocation
page read and write
84A000
heap
page read and write
52F0000
heap
page read and write
AF0000
heap
page read and write
BD6000
stack
page read and write
135B000
trusted library allocation
page execute and read and write
5417000
heap
page read and write
5423000
heap
page read and write
4B50000
heap
page read and write
D30000
heap
page read and write
1430000
heap
page read and write
D16000
trusted library allocation
page execute and read and write
5290000
trusted library allocation
page execute and read and write
7D0000
trusted library allocation
page read and write
5090000
heap
page read and write
DD3000
heap
page read and write
1310000
trusted library allocation
page execute and read and write
E5E000
stack
page read and write
303D000
heap
page read and write
10B6000
trusted library allocation
page execute and read and write
5410000
heap
page read and write
106F000
stack
page read and write
1006000
heap
page read and write
987000
heap
page read and write
676E000
stack
page read and write
125C000
trusted library allocation
page execute and read and write
14D0000
heap
page read and write
10D0000
trusted library allocation
page read and write
8E0000
heap
page read and write
11BF000
stack
page read and write
8DE000
stack
page read and write
2791000
trusted library allocation
page read and write
E68000
trusted library allocation
page read and write
970000
heap
page read and write
74B000
trusted library allocation
page execute and read and write
CF6000
stack
page read and write
3034000
heap
page read and write
65A000
stack
page read and write
5D5E000
stack
page read and write
101A000
trusted library allocation
page execute and read and write
E30000
heap
page read and write
2B7E000
stack
page read and write
CD0000
trusted library allocation
page read and write
6B1E000
stack
page read and write
2F3E000
unkown
page read and write
303C000
heap
page read and write
5263000
heap
page read and write
975000
heap
page read and write
D92000
trusted library allocation
page read and write
306F000
heap
page read and write
910000
unkown
page readonly
CF2000
trusted library allocation
page execute and read and write
B0B000
trusted library allocation
page execute and read and write
1002000
heap
page read and write
5520000
heap
page read and write
536D000
stack
page read and write
10F0000
heap
page read and write
64A0000
heap
page read and write
1287000
trusted library allocation
page execute and read and write
893D000
stack
page read and write
1002000
trusted library allocation
page execute and read and write
F10000
heap
page read and write
611E000
stack
page read and write
5424000
heap
page read and write
5423000
heap
page read and write
300A000
heap
page read and write
1420000
trusted library allocation
page execute and read and write
1250000
trusted library allocation
page read and write
63E0000
heap
page read and write
685E000
stack
page read and write
8F6000
stack
page read and write
134F000
stack
page read and write
5E9E000
stack
page read and write
11F0000
heap
page read and write
86BE000
stack
page read and write
4D10000
heap
page read and write
4CB0000
heap
page read and write
70CE000
stack
page read and write
3058000
trusted library allocation
page read and write
1BE000
stack
page read and write
D10000
trusted library allocation
page read and write
52CD000
stack
page read and write
B20000
heap
page read and write
1360000
heap
page read and write
D8E000
stack
page read and write
103E000
heap
page read and write
50C5000
heap
page read and write
11DF000
stack
page read and write
9E6000
stack
page read and write
51FB000
stack
page read and write
E50000
heap
page read and write
DA8000
heap
page read and write
5429000
heap
page read and write
579000
stack
page read and write
10A0000
trusted library allocation
page execute and read and write
3015000
heap
page read and write
5370000
heap
page read and write
912000
unkown
page readonly
92E000
unkown
page readonly
4B70000
trusted library allocation
page execute and read and write
306F000
heap
page read and write
64F0000
heap
page read and write
1237000
trusted library allocation
page execute and read and write
5420000
heap
page read and write
3E54000
trusted library allocation
page read and write
E6F000
stack
page read and write
306F000
heap
page read and write
7F60000
heap
page read and write
10A4000
heap
page read and write
2C4A000
trusted library allocation
page read and write
4BE0000
heap
page read and write
300A000
heap
page read and write
3046000
heap
page read and write
536E000
stack
page read and write
9CE000
stack
page read and write
51CB000
stack
page read and write
5490000
heap
page read and write
5430000
heap
page read and write
9F0000
heap
page read and write
30D1000
trusted library allocation
page read and write
A3B000
stack
page read and write
E38000
heap
page read and write
52E0000
heap
page read and write
3005000
trusted library allocation
page read and write
300E000
heap
page read and write
300E000
heap
page read and write
3018000
heap
page read and write
675E000
stack
page read and write
5FB9000
heap
page read and write
3037000
heap
page read and write
EE4000
heap
page read and write
CDA000
trusted library allocation
page execute and read and write
4D33000
heap
page read and write
E90000
trusted library allocation
page read and write
7A5000
heap
page read and write
532E000
stack
page read and write
FC0000
heap
page read and write
2BD0000
heap
page read and write
10EB000
trusted library allocation
page execute and read and write
1240000
heap
page read and write
FDF000
heap
page read and write
5FA000
trusted library allocation
page execute and read and write
2FF5000
heap
page read and write
3161000
trusted library allocation
page read and write
4F4F000
stack
page read and write
53F0000
heap
page read and write
6BB2000
trusted library allocation
page read and write
12BE000
stack
page read and write
514B000
stack
page read and write
1262000
trusted library allocation
page read and write
2701000
trusted library allocation
page read and write
492B000
stack
page read and write
3005000
heap
page read and write
5412000
heap
page read and write
DBE000
heap
page read and write
3033000
heap
page read and write
3971000
trusted library allocation
page read and write
1242000
trusted library allocation
page execute and read and write
FEE000
stack
page read and write
31A5000
trusted library allocation
page read and write
3014000
heap
page read and write
13D0000
heap
page read and write
909000
stack
page read and write
1060000
heap
page read and write
10B0000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
30B3000
heap
page read and write
65C0000
heap
page read and write
D10000
heap
page read and write
3E94000
trusted library allocation
page read and write
126A000
trusted library allocation
page execute and read and write
14C0000
trusted library section
page readonly
304E000
heap
page read and write
D32000
trusted library allocation
page execute and read and write
52F0000
heap
page read and write
52DE000
stack
page read and write
304E000
heap
page read and write
F00000
heap
page read and write
6A5E000
stack
page read and write
D47000
trusted library allocation
page execute and read and write
1460000
trusted library allocation
page read and write
10E0000
trusted library allocation
page read and write
D87000
heap
page read and write
5F9E000
stack
page read and write
9CA000
stack
page read and write
5412000
heap
page read and write
CA0000
heap
page read and write
CF9000
stack
page read and write
52D5000
heap
page read and write
5429000
heap
page read and write
503E000
stack
page read and write
6A9E000
stack
page read and write
E80000
heap
page read and write
4A80000
heap
page read and write
600000
trusted library allocation
page read and write
D4B000
trusted library allocation
page execute and read and write
3007000
heap
page read and write
303C000
heap
page read and write
3F01000
trusted library allocation
page read and write
14E0000
heap
page read and write
E18000
heap
page read and write
EE5000
heap
page read and write
40D1000
trusted library allocation
page read and write
F50000
heap
page execute and read and write
611E000
stack
page read and write
11EE000
stack
page read and write
1232000
trusted library allocation
page read and write
30B7000
heap
page read and write
732000
trusted library allocation
page execute and read and write
F78000
heap
page read and write
4AA0000
heap
page read and write
E2E000
stack
page read and write
2BEE000
stack
page read and write
3033000
heap
page read and write
30BE000
heap
page read and write
5417000
heap
page read and write
10B2000
trusted library allocation
page execute and read and write
50E0000
trusted library allocation
page execute and read and write
2FCB000
heap
page read and write
7F320000
trusted library allocation
page execute and read and write
3BD1000
trusted library allocation
page read and write
CD2000
trusted library allocation
page execute and read and write
5E5E000
stack
page read and write
4F9000
stack
page read and write
1450000
trusted library allocation
page execute and read and write
112E000
stack
page read and write
11F0000
trusted library allocation
page read and write
73A000
trusted library allocation
page execute and read and write
10F7000
heap
page read and write
9F9000
heap
page read and write
3172000
trusted library allocation
page read and write
300A000
heap
page read and write
3050000
heap
page read and write
E7E000
stack
page read and write
970000
heap
page read and write
63D0000
heap
page read and write
1270000
heap
page read and write
304A000
heap
page read and write
123A000
trusted library allocation
page execute and read and write
14D5000
heap
page read and write
10E7000
trusted library allocation
page execute and read and write
4D7C000
stack
page read and write
70D0000
trusted library allocation
page execute and read and write
121C000
trusted library allocation
page execute and read and write
301A000
heap
page read and write
950000
heap
page read and write
5E0000
heap
page read and write
1120000
trusted library allocation
page execute and read and write
699E000
stack
page read and write
7E8000
heap
page read and write
4B4E000
stack
page read and write
3008000
heap
page read and write
64FE000
heap
page read and write
5427000
heap
page read and write
3013000
heap
page read and write
CE7000
trusted library allocation
page execute and read and write
128B000
trusted library allocation
page execute and read and write
12DE000
stack
page read and write
7C0000
heap
page read and write
5D0000
heap
page read and write
9B9000
stack
page read and write
107E000
stack
page read and write
9F5000
heap
page read and write
1230000
trusted library allocation
page read and write
CFA000
trusted library allocation
page execute and read and write
5380000
heap
page read and write
3032000
heap
page read and write
CBA000
trusted library allocation
page execute and read and write
FFA000
trusted library allocation
page execute and read and write
50BE000
stack
page read and write
3049000
heap
page read and write
E14000
heap
page read and write
3017000
heap
page read and write
2750000
trusted library allocation
page read and write
100C000
trusted library allocation
page execute and read and write
B28000
heap
page read and write
4A1E000
stack
page read and write
D82000
trusted library allocation
page execute and read and write
306F000
heap
page read and write
29FE000
trusted library allocation
page read and write
F74000
heap
page read and write
8460000
heap
page read and write
EC0000
heap
page read and write
1222000
trusted library allocation
page read and write
ECE000
heap
page read and write
5190000
trusted library section
page readonly
541E000
stack
page read and write
DA2000
trusted library allocation
page execute and read and write
960000
heap
page read and write
2EF0000
heap
page read and write
3040000
heap
page read and write
303F000
heap
page read and write
960000
heap
page read and write
DA0000
heap
page read and write
D9A000
trusted library allocation
page execute and read and write
620000
heap
page read and write
AC2000
trusted library allocation
page execute and read and write
8F0000
heap
page read and write
4E39000
stack
page read and write
1130000
heap
page read and write
1480000
heap
page execute and read and write
3049000
heap
page read and write
10D2000
trusted library allocation
page execute and read and write
5423000
heap
page read and write
621E000
stack
page read and write
10E0000
heap
page read and write
D90000
heap
page read and write
1357000
trusted library allocation
page execute and read and write
526E000
stack
page read and write
4DBB000
stack
page read and write
CF0000
trusted library allocation
page read and write
69FE000
stack
page read and write
D62000
trusted library allocation
page execute and read and write
3120000
trusted library allocation
page read and write
306F000
heap
page read and write
13D7000
heap
page read and write
5150000
trusted library allocation
page read and write
7F5E000
stack
page read and write
D12000
trusted library allocation
page execute and read and write
8A3F000
stack
page read and write
1227000
trusted library allocation
page execute and read and write
30B4000
heap
page read and write
2BD1000
trusted library allocation
page read and write
9B5000
heap
page read and write
5103000
heap
page read and write
55B0000
heap
page read and write
977000
heap
page read and write
9D0000
heap
page read and write
317F000
trusted library allocation
page read and write
689E000
stack
page read and write
8F9000
stack
page read and write
5423000
heap
page read and write
6BD0000
trusted library allocation
page execute and read and write
2726000
trusted library allocation
page read and write
52FC000
stack
page read and write
51B5000
heap
page read and write
2BC0000
heap
page read and write
72F000
stack
page read and write
300B000
heap
page read and write
1252000
trusted library allocation
page execute and read and write
1012000
trusted library allocation
page read and write
A7F000
stack
page read and write
306F000
heap
page read and write
2BE6000
heap
page read and write
5FA0000
heap
page read and write
10BC000
trusted library allocation
page execute and read and write
13EC000
stack
page read and write
7E0000
heap
page read and write
1030000
heap
page read and write
E31000
heap
page read and write
6FCD000
stack
page read and write
602000
trusted library allocation
page execute and read and write
519F000
trusted library section
page readonly
60A0000
trusted library allocation
page read and write
2FBE000
trusted library allocation
page read and write
3E91000
trusted library allocation
page read and write
DAA000
trusted library allocation
page execute and read and write
304E000
heap
page read and write
303B000
heap
page read and write
12CE000
stack
page read and write
14E7000
heap
page read and write
10B9000
heap
page read and write
857F000
stack
page read and write
120A000
trusted library allocation
page execute and read and write
1340000
trusted library allocation
page read and write
1340000
heap
page execute and read and write
3036000
heap
page read and write
2FE0000
heap
page read and write
9AB000
stack
page read and write
1202000
trusted library allocation
page execute and read and write
66E0000
trusted library allocation
page read and write
2EF5000
heap
page read and write
31A3000
trusted library allocation
page read and write
3071000
heap
page read and write
DA5000
heap
page read and write
F3C000
stack
page read and write
679E000
stack
page read and write
BD9000
stack
page read and write
5FDE000
stack
page read and write
1087000
trusted library allocation
page execute and read and write
3019000
heap
page read and write
3004000
heap
page read and write
50F0000
heap
page read and write
4CA0000
heap
page read and write
124A000
trusted library allocation
page execute and read and write
1212000
trusted library allocation
page execute and read and write
122A000
trusted library allocation
page execute and read and write
60C000
trusted library allocation
page execute and read and write
AF6000
heap
page read and write
E30000
heap
page read and write
64B0000
heap
page read and write
A22000
heap
page read and write
759000
stack
page read and write
4D20000
trusted library allocation
page execute and read and write
AE2000
trusted library allocation
page execute and read and write
30B2000
heap
page read and write
10C0000
trusted library allocation
page read and write
5416000
heap
page read and write
3070000
heap
page read and write
306F000
heap
page read and write
F8B000
heap
page read and write
E3E000
stack
page read and write
5424000
heap
page read and write
E7E000
stack
page read and write
125E000
stack
page read and write
C40000
heap
page read and write
675E000
stack
page read and write
D07000
trusted library allocation
page execute and read and write
123B000
trusted library allocation
page execute and read and write
CC0000
heap
page read and write
93E000
stack
page read and write
302B000
heap
page read and write
4B60000
trusted library allocation
page read and write
D50000
trusted library allocation
page read and write
301A000
heap
page read and write
1017000
trusted library allocation
page execute and read and write
2B7B000
stack
page read and write
30BB000
heap
page read and write
306F000
heap
page read and write
10CE000
stack
page read and write
5423000
heap
page read and write
7B0000
heap
page read and write
1000000
trusted library allocation
page read and write
4FCE000
stack
page read and write
5550000
heap
page read and write
6ADE000
stack
page read and write
D10000
heap
page read and write
1230000
trusted library allocation
page read and write
88FC000
stack
page read and write
551F000
stack
page read and write
3015000
heap
page read and write
CA0000
trusted library allocation
page read and write
508E000
stack
page read and write
4E30000
heap
page read and write
300F000
heap
page read and write
4F8E000
stack
page read and write
F94000
heap
page read and write
4A4B000
stack
page read and write
2C6F000
trusted library allocation
page read and write
23BE000
stack
page read and write
5C10000
heap
page read and write
10A8000
heap
page read and write
2B73000
stack
page read and write
100A000
trusted library allocation
page execute and read and write
303B000
heap
page read and write
1210000
trusted library allocation
page read and write
CB2000
trusted library allocation
page execute and read and write
5418000
heap
page read and write
4F3C000
stack
page read and write
CEA000
trusted library allocation
page execute and read and write
B07000
trusted library allocation
page execute and read and write
2BBE000
stack
page read and write
30BE000
heap
page read and write
68FE000
stack
page read and write
3E51000
trusted library allocation
page read and write
51B0000
heap
page read and write
53F1000
heap
page read and write
AD9000
stack
page read and write
303B000
heap
page read and write
AA0000
trusted library allocation
page read and write
546E000
stack
page read and write
7E50000
heap
page read and write
5F2000
trusted library allocation
page execute and read and write
D0A000
trusted library allocation
page execute and read and write
10AF000
stack
page read and write
ABA000
trusted library allocation
page execute and read and write
30B8000
heap
page read and write
7580000
heap
page read and write
9F5000
heap
page read and write
D02000
trusted library allocation
page execute and read and write
757F000
stack
page read and write
665E000
stack
page read and write
5100000
heap
page read and write
635E000
stack
page read and write
3049000
heap
page read and write
5163000
heap
page read and write
131C000
stack
page read and write
5C1E000
heap
page read and write
30BC000
heap
page read and write
12D0000
heap
page execute and read and write
2FC1000
trusted library allocation
page read and write
3F31000
trusted library allocation
page read and write
625E000
stack
page read and write
BD1000
heap
page read and write
4A50000
heap
page read and write
CDC000
trusted library allocation
page execute and read and write
541B000
heap
page read and write
869000
heap
page read and write
D7E000
stack
page read and write
539F000
stack
page read and write
519E000
stack
page read and write
D97000
trusted library allocation
page execute and read and write
53F0000
heap
page read and write
1272000
trusted library allocation
page execute and read and write
1250000
heap
page read and write
5130000
heap
page read and write
78E000
stack
page read and write
A80000
trusted library allocation
page read and write
1090000
trusted library allocation
page read and write
106F000
heap
page read and write
B53000
heap
page read and write
D1E000
stack
page read and write
4A2D000
stack
page read and write
2F96000
trusted library allocation
page read and write
31BE000
unkown
page read and write
2F50000
trusted library allocation
page read and write
61A000
trusted library allocation
page execute and read and write
2C7E000
stack
page read and write
689E000
stack
page read and write
3041000
heap
page read and write
1280000
trusted library allocation
page read and write
3010000
heap
page read and write
1C0000
heap
page read and write
68AE000
stack
page read and write
EE0000
heap
page read and write
E80000
heap
page read and write
68DE000
stack
page read and write
2FE0000
heap
page read and write
4A40000
heap
page read and write
980000
heap
page read and write
3019000
heap
page read and write
1071000
heap
page read and write
AC0000
trusted library allocation
page read and write
1080000
heap
page read and write
666D000
stack
page read and write
130F000
trusted library allocation
page read and write
ACA000
trusted library allocation
page execute and read and write
1080000
trusted library allocation
page read and write
3049000
heap
page read and write
3004000
heap
page read and write
4A30000
heap
page read and write
2A45000
trusted library allocation
page read and write
CF6000
stack
page read and write
122F000
stack
page read and write
612000
trusted library allocation
page read and write
2F26000
trusted library allocation
page read and write
FA4000
heap
page read and write
1232000
trusted library allocation
page execute and read and write
4B1F000
stack
page read and write
50C0000
trusted library allocation
page read and write
2F91000
trusted library allocation
page read and write
B02000
trusted library allocation
page read and write
5230000
trusted library allocation
page execute and read and write
B95000
heap
page read and write
4D30000
heap
page read and write
B67000
heap
page read and write
11E0000
heap
page read and write
4CCE000
stack
page read and write
10A0000
heap
page read and write
4D00000
heap
page read and write
7A0000
heap
page read and write
5210000
heap
page read and write
D80000
heap
page read and write
5220000
heap
page read and write
1350000
trusted library allocation
page read and write
1430000
heap
page read and write
5310000
heap
page read and write
4DFC000
stack
page read and write
93E000
stack
page read and write
69AF000
stack
page read and write
D3E000
stack
page read and write
D20000
heap
page read and write
CD0000
heap
page read and write
400000
remote allocation
page execute and read and write
69E0000
trusted library allocation
page execute and read and write
170000
heap
page read and write
3017000
heap
page read and write
2796000
trusted library allocation
page read and write
7D70000
heap
page read and write
DE4000
heap
page read and write
60DE000
stack
page read and write
CE2000
trusted library allocation
page read and write
3019000
heap
page read and write
301A000
heap
page read and write
51EF000
stack
page read and write
EA2000
trusted library allocation
page execute and read and write
B6F000
heap
page read and write
8EB000
stack
page read and write
303C000
heap
page read and write
50F0000
trusted library allocation
page read and write
53DE000
stack
page read and write
5413000
heap
page read and write
5260000
heap
page read and write
1300000
trusted library allocation
page read and write
2E51000
trusted library allocation
page read and write
C90000
heap
page read and write
1267000
trusted library allocation
page execute and read and write
125A000
trusted library allocation
page execute and read and write
639E000
stack
page read and write
5410000
heap
page read and write
5423000
heap
page read and write
1310000
heap
page execute and read and write
30B8000
heap
page read and write
3038000
heap
page read and write
52D0000
heap
page read and write
304E000
trusted library allocation
page read and write
11F0000
heap
page execute and read and write
303B000
heap
page read and write
CC7000
heap
page read and write
1280000
heap
page read and write
4BD0000
trusted library section
page readonly
10BE000
stack
page read and write
91E000
stack
page read and write
CF6000
stack
page read and write
2D8E000
stack
page read and write
3010000
heap
page read and write
2B4E000
stack
page read and write
5419000
heap
page read and write
D1C000
trusted library allocation
page execute and read and write
C8E000
stack
page read and write
D6A000
trusted library allocation
page execute and read and write
756000
stack
page read and write
4A55000
heap
page read and write
302B000
heap
page read and write
AE0000
heap
page execute and read and write
FF2000
trusted library allocation
page execute and read and write
4C10000
heap
page read and write
4E20000
heap
page read and write
F44000
heap
page read and write
1440000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
101F000
heap
page read and write
306F000
heap
page read and write
DA0000
heap
page read and write
139E000
stack
page read and write
ADA000
trusted library allocation
page execute and read and write
D70000
heap
page read and write
69DF000
stack
page read and write
3FC1000
trusted library allocation
page read and write
BC5000
heap
page read and write
B7F000
stack
page read and write
12E0000
trusted library allocation
page read and write
121A000
trusted library allocation
page execute and read and write
EB0000
heap
page read and write
8470000
trusted library section
page read and write
67BE000
stack
page read and write
30B6000
heap
page read and write
3033000
heap
page read and write
4EA0000
unclassified section
page read and write
87FC000
stack
page read and write
302E000
heap
page read and write
2C26000
trusted library allocation
page read and write
504F000
stack
page read and write
102A000
trusted library allocation
page execute and read and write
4E1D000
stack
page read and write
50CF000
stack
page read and write
489E000
stack
page read and write
123E000
stack
page read and write
2F31000
trusted library allocation
page read and write
3011000
heap
page read and write
5510000
heap
page read and write
3033000
heap
page read and write
F05000
heap
page read and write
F8E000
heap
page read and write
AB2000
trusted library allocation
page execute and read and write
AEA000
trusted library allocation
page execute and read and write
303C000
heap
page read and write
2F01000
trusted library allocation
page read and write
2ED0000
heap
page read and write
3030000
heap
page read and write
529E000
stack
page read and write
127A000
trusted library allocation
page execute and read and write
CD5000
heap
page read and write
5160000
heap
page read and write
980000
heap
page read and write
529E000
stack
page read and write
87BF000
stack
page read and write
5260000
heap
page read and write
EBE000
stack
page read and write
11A000
stack
page read and write
3070000
heap
page read and write
651E000
stack
page read and write
4A83000
heap
page read and write
3004000
heap
page read and write
4CC0000
trusted library allocation
page execute and read and write
4D15000
heap
page read and write
95B000
stack
page read and write
649E000
stack
page read and write
661E000
stack
page read and write
E1C000
heap
page read and write
617000
trusted library allocation
page execute and read and write
EAA000
trusted library allocation
page execute and read and write
50B0000
trusted library section
page readonly
DB8000
heap
page read and write
F18000
heap
page read and write
There are 764 hidden memdumps, click here to show them.