IOC Report
j76l1AiIHm.exe

loading gif

Files

File Path
Type
Category
Malicious
j76l1AiIHm.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_bad_module_info_f5b4a6202a53ee73c263cc4c99e711b13cd935ac_85207d7d_c504f05f-5d11-4b56-951d-b01763bc91d6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3DF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3FF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\chargeable.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\j76l1AiIHm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\WERF40F.tmp.WERDataCollectionStatus.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\j76l1AiIHm.exe
"C:\Users\user\Desktop\j76l1AiIHm.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
malicious
C:\Users\user\Desktop\j76l1AiIHm.exe
"C:\Users\user\Desktop\j76l1AiIHm.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\Desktop\j76l1AiIHm.exe
"C:\Users\user\Desktop\j76l1AiIHm.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7528 -s 8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
doddyfire.linkpc.net
http://www.sakkal.com
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
doddyfire.linkpc.net
41.249.48.248

IPs

IP
Domain
Country
Malicious
41.249.48.248
doddyfire.linkpc.net
Morocco

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
confuse
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SysMain
malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\e1a87040f2026369a233f9ae76301b7b
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
3631000
trusted library allocation
page read and write
malicious
31A1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
647E000
stack
page read and write
4C65000
heap
page read and write
3A26000
heap
page read and write
F5E000
heap
page read and write
644E000
stack
page read and write
3B04000
trusted library allocation
page read and write
54D0000
heap
page read and write
2F1000
stack
page read and write
369E000
heap
page read and write
36B2000
heap
page read and write
1367000
heap
page read and write
1817000
trusted library allocation
page execute and read and write
542E000
stack
page read and write
36FD000
heap
page read and write
1370000
heap
page read and write
193F000
stack
page read and write
BF2000
trusted library allocation
page execute and read and write
27BF000
stack
page read and write
FB0000
heap
page read and write
16A0000
trusted library allocation
page read and write
5545000
heap
page read and write
10A5000
heap
page read and write
C5D000
heap
page read and write
5330000
heap
page read and write
7C6000
stack
page read and write
13B0000
heap
page read and write
36BE000
heap
page read and write
5813000
heap
page read and write
4A13000
heap
page read and write
862F000
stack
page read and write
1332000
trusted library allocation
page execute and read and write
CAB000
heap
page read and write
FF0000
heap
page read and write
58D0000
heap
page read and write
6730000
heap
page read and write
4D3E000
stack
page read and write
1025000
heap
page read and write
C30000
heap
page read and write
197E000
stack
page read and write
549D000
stack
page read and write
66CE000
stack
page read and write
4F5E000
stack
page read and write
62EE000
stack
page read and write
B6E000
unkown
page readonly
1170000
trusted library allocation
page read and write
365F000
heap
page read and write
4C70000
heap
page read and write
1312000
trusted library allocation
page execute and read and write
F40000
heap
page read and write
B60000
heap
page read and write
C37000
trusted library allocation
page execute and read and write
F73000
heap
page read and write
66F0000
trusted library allocation
page execute and read and write
2E63000
trusted library allocation
page read and write
1142000
trusted library allocation
page execute and read and write
1213000
heap
page read and write
F00000
heap
page execute and read and write
1360000
heap
page read and write
12EE000
stack
page read and write
13E2000
trusted library allocation
page execute and read and write
17D2000
trusted library allocation
page execute and read and write
367C000
heap
page read and write
559F000
heap
page read and write
5B42000
heap
page read and write
367C000
heap
page read and write
3686000
heap
page read and write
101E000
stack
page read and write
5594000
heap
page read and write
36E5000
heap
page read and write
62E9000
heap
page read and write
A6E000
stack
page read and write
365D000
heap
page read and write
7A0000
heap
page read and write
1292000
trusted library allocation
page execute and read and write
320F000
trusted library allocation
page read and write
14E0000
heap
page execute and read and write
8F6000
stack
page read and write
5B52000
heap
page read and write
B52000
unkown
page readonly
370E000
heap
page read and write
90A000
trusted library allocation
page execute and read and write
36FD000
heap
page read and write
52CE000
stack
page read and write
137F000
stack
page read and write
C00000
heap
page read and write
36A3000
heap
page read and write
3702000
heap
page read and write
505F000
stack
page read and write
147E000
stack
page read and write
390E000
stack
page read and write
1352000
trusted library allocation
page execute and read and write
52E0000
heap
page read and write
633E000
stack
page read and write
1437000
trusted library allocation
page execute and read and write
36BE000
heap
page read and write
14F0000
heap
page read and write
11EE000
stack
page read and write
17D0000
trusted library allocation
page read and write
31F6000
trusted library allocation
page read and write
61AE000
stack
page read and write
F60000
heap
page read and write
57EE000
stack
page read and write
4FE4000
trusted library section
page readonly
6E4E000
stack
page read and write
3668000
heap
page read and write
5B52000
heap
page read and write
F20000
heap
page read and write
B90000
heap
page read and write
13E0000
heap
page read and write
370E000
heap
page read and write
365A000
heap
page read and write
5480000
heap
page read and write
1490000
heap
page execute and read and write
5B49000
heap
page read and write
7E9000
stack
page read and write
17B0000
trusted library allocation
page read and write
D30000
heap
page read and write
668F000
stack
page read and write
5B52000
heap
page read and write
3686000
heap
page read and write
36AA000
heap
page read and write
5B53000
heap
page read and write
1400000
heap
page read and write
5AB4000
trusted library section
page readonly
17C2000
trusted library allocation
page execute and read and write
370E000
heap
page read and write
3659000
heap
page read and write
63EF000
stack
page read and write
36E2000
heap
page read and write
B4B000
trusted library allocation
page execute and read and write
927000
trusted library allocation
page execute and read and write
141A000
trusted library allocation
page execute and read and write
AF6000
stack
page read and write
1000000
heap
page execute and read and write
12A0000
trusted library allocation
page read and write
88BE000
stack
page read and write
2846000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
4C20000
heap
page read and write
3701000
heap
page read and write
3656000
heap
page read and write
7F3000
heap
page read and write
A75000
heap
page read and write
10A0000
heap
page read and write
8C3E000
stack
page read and write
4BDD000
stack
page read and write
1544000
heap
page read and write
BEC000
stack
page read and write
49F0000
trusted library allocation
page read and write
4FE0000
trusted library section
page readonly
5550000
heap
page read and write
1417000
trusted library allocation
page execute and read and write
53BC000
stack
page read and write
556E000
stack
page read and write
135A000
trusted library allocation
page execute and read and write
54A0000
trusted library section
page readonly
51A0000
heap
page read and write
14A0000
heap
page execute and read and write
BE0000
heap
page read and write
1390000
heap
page read and write
5AB0000
trusted library section
page readonly
5010000
heap
page read and write
36FD000
heap
page read and write
4BE5000
trusted library section
page readonly
2E21000
trusted library allocation
page read and write
577E000
stack
page read and write
4C10000
heap
page read and write
B47000
trusted library allocation
page execute and read and write
14B7000
heap
page read and write
13FF000
stack
page read and write
4ADB000
stack
page read and write
19B0000
heap
page read and write
4DD0000
heap
page read and write
2D15000
trusted library allocation
page read and write
367A000
heap
page read and write
10E7000
heap
page read and write
3631000
heap
page read and write
114A000
trusted library allocation
page execute and read and write
131A000
trusted library allocation
page execute and read and write
F3F000
stack
page read and write
FFB000
stack
page read and write
1326000
heap
page read and write
BD2000
heap
page read and write
543C000
stack
page read and write
57F5000
heap
page read and write
B1C000
trusted library allocation
page execute and read and write
3C9000
stack
page read and write
111E000
stack
page read and write
11A0000
heap
page read and write
367B000
heap
page read and write
365B000
heap
page read and write
52A0000
trusted library allocation
page execute and read and write
8010000
heap
page read and write
2DE0000
trusted library allocation
page read and write
5FB000
stack
page read and write
1347000
trusted library allocation
page execute and read and write
F12000
trusted library allocation
page execute and read and write
4D0F000
trusted library allocation
page read and write
89BF000
stack
page read and write
4FDB000
stack
page read and write
8F0000
trusted library allocation
page read and write
103A000
trusted library allocation
page execute and read and write
1360000
trusted library allocation
page read and write
B40000
heap
page read and write
41A1000
trusted library allocation
page read and write
14D0000
heap
page read and write
1140000
heap
page read and write
5DF0000
heap
page read and write
3667000
heap
page read and write
1092000
trusted library allocation
page execute and read and write
62AE000
stack
page read and write
3645000
heap
page read and write
10B0000
heap
page read and write
1289000
stack
page read and write
800E000
stack
page read and write
5010000
heap
page read and write
B27000
trusted library allocation
page execute and read and write
F20000
heap
page read and write
17EA000
trusted library allocation
page execute and read and write
1040000
trusted library allocation
page read and write
3A20000
heap
page read and write
36B4000
heap
page read and write
4C80000
heap
page read and write
B0B000
stack
page read and write
36FD000
heap
page read and write
61C0000
heap
page read and write
127F000
stack
page read and write
109C000
trusted library allocation
page execute and read and write
6C80000
trusted library allocation
page read and write
6DFE000
stack
page read and write
15A0000
trusted library allocation
page read and write
3669000
heap
page read and write
117B000
trusted library allocation
page execute and read and write
4F1E000
stack
page read and write
4FDD000
stack
page read and write
369F000
heap
page read and write
FAD000
heap
page read and write
887E000
stack
page read and write
EF6000
stack
page read and write
14DE000
heap
page read and write
2C90000
trusted library allocation
page read and write
A20000
heap
page read and write
13F2000
trusted library allocation
page execute and read and write
D37000
heap
page read and write
7B50000
heap
page read and write
3664000
heap
page read and write
10B9000
heap
page read and write
114C000
trusted library allocation
page execute and read and write
365A000
heap
page read and write
3662000
heap
page read and write
835000
heap
page read and write
B5E000
stack
page read and write
36E0000
heap
page read and write
546E000
stack
page read and write
5B56000
heap
page read and write
1410000
trusted library allocation
page read and write
321C000
trusted library allocation
page read and write
367C000
heap
page read and write
1042000
trusted library allocation
page read and write
362E000
trusted library allocation
page read and write
6B70000
heap
page read and write
C8D000
stack
page read and write
3B01000
trusted library allocation
page read and write
30E1000
trusted library allocation
page read and write
62D0000
heap
page read and write
1300000
trusted library allocation
page read and write
5540000
heap
page read and write
1380000
heap
page read and write
36E5000
heap
page read and write
CB0000
heap
page read and write
1090000
heap
page execute and read and write
BA8000
heap
page read and write
11A5000
heap
page read and write
5578000
heap
page read and write
C06000
trusted library allocation
page execute and read and write
36E5000
heap
page read and write
181B000
trusted library allocation
page execute and read and write
527E000
stack
page read and write
509E000
stack
page read and write
3704000
heap
page read and write
B2A000
trusted library allocation
page execute and read and write
5030000
trusted library allocation
page execute and read and write
3666000
heap
page read and write
1980000
heap
page read and write
5810000
heap
page read and write
1415000
heap
page read and write
149E000
stack
page read and write
1157000
trusted library allocation
page execute and read and write
8580000
heap
page read and write
2E2E000
stack
page read and write
6740000
trusted library allocation
page read and write
49BE000
stack
page read and write
81C000
heap
page read and write
A70000
heap
page read and write
3663000
heap
page read and write
13D5000
heap
page read and write
13F0000
heap
page read and write
BF0000
heap
page read and write
367D000
heap
page read and write
66BF000
stack
page read and write
12F4000
stack
page read and write
369E000
heap
page read and write
539C000
stack
page read and write
B50000
heap
page read and write
28B6000
trusted library allocation
page read and write
2CD1000
trusted library allocation
page read and write
36E5000
heap
page read and write
11A0000
heap
page read and write
6B40000
heap
page read and write
36A0000
heap
page read and write
1193000
heap
page read and write
6A3E000
stack
page read and write
1228000
heap
page read and write
6B80000
heap
page read and write
4171000
trusted library allocation
page read and write
F1A000
trusted library allocation
page execute and read and write
1174000
heap
page read and write
36A8000
heap
page read and write
3D91000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
D35000
heap
page read and write
2CE2000
trusted library allocation
page read and write
7D4000
heap
page read and write
36BB000
heap
page read and write
36E5000
heap
page read and write
35A1000
trusted library allocation
page read and write
1020000
heap
page read and write
3704000
heap
page read and write
10B7000
heap
page read and write
49D0000
trusted library allocation
page read and write
B1A000
trusted library allocation
page execute and read and write
3662000
heap
page read and write
B32000
trusted library allocation
page execute and read and write
1096000
trusted library allocation
page execute and read and write
5320000
heap
page read and write
B02000
trusted library allocation
page execute and read and write
15B0000
heap
page read and write
17E2000
trusted library allocation
page read and write
C3B000
trusted library allocation
page execute and read and write
115A000
trusted library allocation
page execute and read and write
F50000
heap
page read and write
11DF000
heap
page read and write
143B000
trusted library allocation
page execute and read and write
2821000
trusted library allocation
page read and write
14BE000
stack
page read and write
B10000
trusted library allocation
page read and write
63D0000
trusted library allocation
page read and write
133B000
stack
page read and write
55AE000
stack
page read and write
36BE000
heap
page read and write
1150000
trusted library allocation
page read and write
4EDB000
stack
page read and write
FD5000
heap
page read and write
2E5E000
stack
page read and write
FED000
stack
page read and write
616E000
stack
page read and write
C48000
heap
page read and write
902000
trusted library allocation
page execute and read and write
370B000
heap
page read and write
36B2000
heap
page read and write
1700000
heap
page read and write
3658000
heap
page read and write
179F000
stack
page read and write
367B000
heap
page read and write
3218000
trusted library allocation
page read and write
B22000
trusted library allocation
page read and write
C0C000
trusted library allocation
page execute and read and write
E20000
heap
page read and write
36A9000
heap
page read and write
12AB000
trusted library allocation
page execute and read and write
12FE000
stack
page read and write
EEE000
stack
page read and write
1120000
trusted library allocation
page read and write
1020000
heap
page read and write
36AA000
heap
page read and write
17CA000
trusted library allocation
page execute and read and write
6F4E000
stack
page read and write
147F000
trusted library allocation
page read and write
4E1E000
stack
page read and write
36A5000
heap
page read and write
36A8000
heap
page read and write
36AC000
heap
page read and write
4E3F000
stack
page read and write
10FE000
stack
page read and write
31F1000
trusted library allocation
page read and write
1410000
heap
page read and write
EF9000
stack
page read and write
2E32000
trusted library allocation
page read and write
BC9000
stack
page read and write
BA0000
heap
page read and write
D10000
heap
page read and write
2B01000
trusted library allocation
page read and write
1032000
trusted library allocation
page execute and read and write
551D000
stack
page read and write
7C9000
stack
page read and write
5015000
heap
page read and write
5BA0000
heap
page read and write
67C0000
trusted library allocation
page execute and read and write
2A4F000
stack
page read and write
36B3000
heap
page read and write
28B1000
trusted library allocation
page read and write
127E000
stack
page read and write
4DCB000
stack
page read and write
92A000
trusted library allocation
page execute and read and write
C0C000
heap
page read and write
103C000
trusted library allocation
page execute and read and write
369E000
heap
page read and write
5320000
heap
page read and write
6CFE000
stack
page read and write
8F9000
stack
page read and write
7180000
trusted library allocation
page execute and read and write
6CA000
stack
page read and write
1540000
heap
page read and write
102E000
stack
page read and write
BFA000
trusted library allocation
page execute and read and write
A6E000
stack
page read and write
3656000
heap
page read and write
4C30000
trusted library allocation
page execute and read and write
3C6000
stack
page read and write
B3A000
trusted library allocation
page execute and read and write
370D000
heap
page read and write
FE5000
heap
page read and write
370E000
heap
page read and write
16F0000
trusted library section
page readonly
5BB0000
heap
page read and write
606E000
stack
page read and write
C00000
trusted library allocation
page read and write
1132000
trusted library allocation
page execute and read and write
1430000
trusted library allocation
page read and write
3206000
trusted library allocation
page read and write
57A0000
trusted library allocation
page execute and read and write
17DC000
trusted library allocation
page execute and read and write
54E0000
trusted library allocation
page execute and read and write
369E000
heap
page read and write
31FE000
trusted library allocation
page read and write
712E000
stack
page read and write
1386000
stack
page read and write
3196000
trusted library allocation
page read and write
3281000
trusted library allocation
page read and write
4ECE000
stack
page read and write
AF0000
heap
page read and write
947000
trusted library allocation
page execute and read and write
685000
heap
page read and write
36A6000
heap
page read and write
B50000
unkown
page readonly
4BE0000
trusted library section
page readonly
17DA000
trusted library allocation
page execute and read and write
36E5000
heap
page read and write
1360000
heap
page read and write
3213000
trusted library allocation
page read and write
3666000
heap
page read and write
5AA0000
heap
page read and write
7F700000
trusted library allocation
page execute and read and write
D15000
heap
page read and write
5560000
heap
page read and write
1362000
trusted library allocation
page read and write
1320000
heap
page read and write
56AE000
stack
page read and write
D19000
heap
page read and write
4D10000
trusted library allocation
page execute and read and write
EF6000
stack
page read and write
116A000
trusted library allocation
page execute and read and write
36BA000
heap
page read and write
8AFC000
stack
page read and write
1367000
trusted library allocation
page execute and read and write
693E000
stack
page read and write
1070000
trusted library allocation
page read and write
EEE000
stack
page read and write
A70000
heap
page read and write
380E000
unkown
page read and write
8510000
heap
page read and write
4D90000
trusted library allocation
page read and write
325E000
stack
page read and write
12E0000
heap
page execute and read and write
106B000
trusted library allocation
page execute and read and write
1140000
trusted library allocation
page read and write
514D000
stack
page read and write
5B53000
heap
page read and write
620000
heap
page read and write
3648000
heap
page read and write
5540000
heap
page read and write
65BE000
stack
page read and write
3666000
heap
page read and write
BFA000
stack
page read and write
B8E000
stack
page read and write
365F000
heap
page read and write
13FC000
trusted library allocation
page execute and read and write
93A000
trusted library allocation
page execute and read and write
680000
heap
page read and write
950000
heap
page read and write
C21000
heap
page read and write
369E000
heap
page read and write
52B0000
trusted library allocation
page read and write
36B8000
heap
page read and write
5160000
heap
page read and write
56EE000
stack
page read and write
36E0000
heap
page read and write
169E000
stack
page read and write
BEE000
stack
page read and write
113A000
trusted library allocation
page execute and read and write
5B52000
heap
page read and write
B12000
trusted library allocation
page execute and read and write
105A000
trusted library allocation
page execute and read and write
708F000
stack
page read and write
BAE000
stack
page read and write
12DE000
stack
page read and write
36AF000
heap
page read and write
89FC000
stack
page read and write
C40000
heap
page read and write
658E000
stack
page read and write
369E000
heap
page read and write
8C0000
heap
page execute and read and write
EA0000
heap
page read and write
12E0000
heap
page read and write
108A000
trusted library allocation
page execute and read and write
5020000
heap
page read and write
36B6000
heap
page read and write
1152000
trusted library allocation
page read and write
2D91000
trusted library allocation
page read and write
36FD000
heap
page read and write
36E0000
heap
page read and write
36AA000
heap
page read and write
C04000
heap
page read and write
E13000
heap
page read and write
1190000
heap
page read and write
62C0000
trusted library allocation
page read and write
1480000
trusted library allocation
page execute and read and write
5A20000
trusted library allocation
page execute and read and write
45A1000
trusted library allocation
page read and write
36B8000
heap
page read and write
1380000
trusted library allocation
page execute and read and write
670000
heap
page read and write
94B000
trusted library allocation
page execute and read and write
54E0000
heap
page read and write
66E0000
heap
page read and write
3686000
heap
page read and write
126E000
stack
page read and write
EAF000
stack
page read and write
1028000
heap
page read and write
932000
trusted library allocation
page execute and read and write
3207000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
51DC000
stack
page read and write
F00000
trusted library allocation
page read and write
4CE0000
heap
page read and write
EF9000
stack
page read and write
104A000
trusted library allocation
page execute and read and write
144E000
stack
page read and write
36C0000
heap
page read and write
36B8000
heap
page read and write
36E0000
heap
page read and write
AA0000
heap
page read and write
1810000
trusted library allocation
page read and write
36B5000
heap
page read and write
654E000
stack
page read and write
14F8000
trusted library allocation
page read and write
15F0000
heap
page read and write
910000
trusted library allocation
page read and write
3610000
heap
page read and write
B7F000
stack
page read and write
2E3F000
trusted library allocation
page read and write
61B0000
heap
page read and write
36E5000
heap
page read and write
36E5000
heap
page read and write
5525000
heap
page read and write
150F000
heap
page read and write
A5E000
stack
page read and write
36A2000
heap
page read and write
1370000
trusted library allocation
page read and write
54F0000
trusted library allocation
page execute and read and write
15C0000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
36E0000
heap
page read and write
643F000
stack
page read and write
57B0000
trusted library allocation
page read and write
7C50000
heap
page read and write
5323000
heap
page read and write
1800000
heap
page execute and read and write
4C60000
heap
page read and write
3662000
heap
page read and write
136B000
trusted library allocation
page execute and read and write
59B0000
heap
page read and write
1047000
trusted library allocation
page execute and read and write
13D0000
heap
page read and write
1162000
trusted library allocation
page execute and read and write
361B000
heap
page read and write
40E1000
trusted library allocation
page read and write
3288000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
36AC000
heap
page read and write
5B41000
heap
page read and write
526E000
stack
page read and write
EF6000
stack
page read and write
5310000
trusted library allocation
page read and write
17FA000
trusted library allocation
page execute and read and write
2D13000
trusted library allocation
page read and write
C22000
trusted library allocation
page execute and read and write
4F70000
heap
page read and write
3668000
heap
page read and write
134A000
trusted library allocation
page execute and read and write
3686000
heap
page read and write
159E000
stack
page read and write
657E000
stack
page read and write
36E0000
heap
page read and write
5045000
heap
page read and write
367A000
heap
page read and write
36BC000
heap
page read and write
52DE000
stack
page read and write
369F000
heap
page read and write
912000
trusted library allocation
page execute and read and write
36AA000
heap
page read and write
538E000
stack
page read and write
67CE000
stack
page read and write
FE0000
heap
page read and write
3C41000
trusted library allocation
page read and write
1217000
heap
page read and write
FD0000
heap
page read and write
91C000
trusted library allocation
page execute and read and write
36A4000
heap
page read and write
703E000
stack
page read and write
2CA000
stack
page read and write
D7E000
stack
page read and write
5300000
trusted library allocation
page read and write
53FC000
stack
page read and write
1412000
trusted library allocation
page read and write
602E000
stack
page read and write
5B52000
heap
page read and write
133A000
trusted library allocation
page execute and read and write
40E4000
trusted library allocation
page read and write
1067000
trusted library allocation
page execute and read and write
61CE000
heap
page read and write
4F73000
heap
page read and write
17F2000
trusted library allocation
page execute and read and write
541B000
stack
page read and write
122B000
stack
page read and write
36B5000
heap
page read and write
5290000
trusted library allocation
page read and write
36FD000
heap
page read and write
3201000
trusted library allocation
page read and write
C74000
heap
page read and write
5479000
stack
page read and write
6B7E000
stack
page read and write
369F000
heap
page read and write
C02000
trusted library allocation
page execute and read and write
8B3E000
stack
page read and write
68FF000
stack
page read and write
36E0000
heap
page read and write
36AC000
heap
page read and write
5B4B000
heap
page read and write
4FE5000
trusted library section
page readonly
1030000
trusted library allocation
page read and write
B9E000
stack
page read and write
36A5000
heap
page read and write
1060000
trusted library allocation
page read and write
922000
trusted library allocation
page read and write
5B52000
heap
page read and write
2870000
trusted library allocation
page read and write
6F3E000
stack
page read and write
400000
remote allocation
page execute and read and write
367B000
heap
page read and write
1330000
trusted library allocation
page read and write
BF0000
heap
page read and write
142A000
trusted library allocation
page execute and read and write
4A10000
heap
page read and write
EF9000
stack
page read and write
B80000
heap
page read and write
877F000
stack
page read and write
17E7000
trusted library allocation
page execute and read and write
1580000
heap
page read and write
4FE0000
trusted library section
page readonly
320B000
trusted library allocation
page read and write
17E0000
trusted library allocation
page read and write
519E000
stack
page read and write
AF5000
heap
page read and write
3656000
heap
page read and write
BE0000
trusted library allocation
page read and write
36B2000
heap
page read and write
1148000
heap
page read and write
54A5000
trusted library section
page readonly
3821000
trusted library allocation
page read and write
36FD000
heap
page read and write
950000
heap
page read and write
59AD000
stack
page read and write
E30000
heap
page read and write
66E000
stack
page read and write
C08000
heap
page read and write
7DA000
heap
page read and write
567C000
stack
page read and write
7750000
heap
page read and write
F10000
heap
page read and write
127C000
heap
page read and write
5790000
trusted library allocation
page read and write
12FB000
stack
page read and write
36AA000
heap
page read and write
399E000
stack
page read and write
AE0000
trusted library allocation
page read and write
13AD000
unkown
page read and write
4EF0000
trusted library allocation
page read and write
13C0000
trusted library allocation
page read and write
6F8E000
stack
page read and write
6DFF000
stack
page read and write
70CE000
stack
page read and write
57F0000
heap
page read and write
6762000
trusted library allocation
page read and write
1082000
heap
page read and write
1422000
trusted library allocation
page execute and read and write
370E000
heap
page read and write
11A8000
heap
page read and write
5333000
heap
page read and write
12F0000
heap
page read and write
54F0000
unclassified section
page read and write
36A7000
heap
page read and write
EF6000
stack
page read and write
AF9000
stack
page read and write
3668000
heap
page read and write
E7E000
stack
page read and write
66B0000
heap
page read and write
E10000
heap
page read and write
36AC000
heap
page read and write
5150000
heap
page read and write
327E000
trusted library allocation
page read and write
8570000
trusted library section
page read and write
59C0000
heap
page read and write
155E000
heap
page read and write
36A4000
heap
page read and write
121B000
heap
page read and write
1082000
trusted library allocation
page execute and read and write
36A2000
heap
page read and write
12A7000
trusted library allocation
page execute and read and write
1172000
trusted library allocation
page read and write
14B0000
heap
page read and write
1470000
trusted library allocation
page read and write
3701000
heap
page read and write
5520000
heap
page read and write
70EE000
stack
page read and write
1290000
trusted library allocation
page execute and read and write
D0E000
stack
page read and write
2CEF000
trusted library allocation
page read and write
CB8000
heap
page read and write
F48000
heap
page read and write
3667000
heap
page read and write
1830000
heap
page read and write
5ACF000
stack
page read and write
6BBE000
stack
page read and write
7D8000
heap
page read and write
B89000
stack
page read and write
79E000
stack
page read and write
1040000
heap
page read and write
11A9000
heap
page read and write
12EE000
stack
page read and write
11F0000
heap
page read and write
49E0000
trusted library allocation
page execute and read and write
36FD000
heap
page read and write
36A9000
heap
page read and write
1540000
heap
page read and write
1177000
trusted library allocation
page execute and read and write
1052000
trusted library allocation
page execute and read and write
3669000
heap
page read and write
67FE000
stack
page read and write
36A7000
heap
page read and write
1090000
trusted library allocation
page read and write
52E0000
trusted library allocation
page execute and read and write
36AA000
heap
page read and write
CE4000
heap
page read and write
13EA000
trusted library allocation
page execute and read and write
5030000
heap
page read and write
15AE000
stack
page read and write
530E000
stack
page read and write
6EFE000
stack
page read and write
B0A000
trusted library allocation
page execute and read and write
36E0000
heap
page read and write
157C000
stack
page read and write
5530000
heap
page read and write
FAD000
stack
page read and write
7A8000
heap
page read and write
1052000
heap
page read and write
4BDE000
stack
page read and write
36A5000
heap
page read and write
149E000
stack
page read and write
3171000
trusted library allocation
page read and write
5020000
heap
page read and write
36DF000
heap
page read and write
369E000
heap
page read and write
58AB000
stack
page read and write
5F2D000
stack
page read and write
5B20000
heap
page read and write
14EE000
stack
page read and write
36B8000
heap
page read and write
4CDE000
stack
page read and write
1587000
heap
page read and write
11AE000
heap
page read and write
145E000
stack
page read and write
36A8000
heap
page read and write
1389000
stack
page read and write
36FE000
heap
page read and write
2C41000
trusted library allocation
page read and write
56D0000
heap
page read and write
5B60000
heap
page read and write
6A7E000
stack
page read and write
10E0000
heap
page read and write
5040000
heap
page read and write
13D0000
heap
page read and write
F20000
heap
page read and write
41F1000
trusted library allocation
page read and write
370E000
heap
page read and write
B70000
heap
page read and write
13F0000
trusted library allocation
page read and write
542E000
stack
page read and write
4EE0000
trusted library allocation
page execute and read and write
There are 802 hidden memdumps, click here to show them.