IOC Report
SjMIbKjuDL.exe

loading gif

Files

File Path
Type
Category
Malicious
SjMIbKjuDL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\SjMIbKjuDL.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\chargeable.exe.log
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SjMIbKjuDL.exe
"C:\Users\user\Desktop\SjMIbKjuDL.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
malicious
C:\Users\user\Desktop\SjMIbKjuDL.exe
"C:\Users\user\Desktop\SjMIbKjuDL.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\Desktop\SjMIbKjuDL.exe
"C:\Users\user\Desktop\SjMIbKjuDL.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
doddyfire.linkpc.net
http://www.sakkal.com
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
doddyfire.linkpc.net
41.248.119.194

IPs

IP
Domain
Country
Malicious
41.248.119.194
doddyfire.linkpc.net
Morocco

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
confuse
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SysMain
malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\e1a87040f2026369a233f9ae76301b7b
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
32D1000
trusted library allocation
page read and write
malicious
3661000
trusted library allocation
page read and write
malicious
32D1000
trusted library allocation
page read and write
malicious
5633000
heap
page read and write
4C60000
heap
page read and write
14F0000
heap
page read and write
501D000
stack
page read and write
14C7000
trusted library allocation
page execute and read and write
1103000
heap
page read and write
163A000
trusted library allocation
page execute and read and write
5540000
heap
page read and write
253E000
stack
page read and write
28C1000
trusted library allocation
page read and write
1110000
heap
page read and write
97A000
stack
page read and write
690000
heap
page read and write
14B2000
trusted library allocation
page execute and read and write
C08000
heap
page read and write
5140000
trusted library section
page readonly
17C0000
trusted library allocation
page read and write
640000
heap
page read and write
F60000
heap
page read and write
5550000
heap
page read and write
1394000
heap
page read and write
149A000
trusted library allocation
page execute and read and write
1150000
trusted library allocation
page execute and read and write
17A0000
trusted library allocation
page read and write
122B000
trusted library allocation
page execute and read and write
653E000
stack
page read and write
1383000
heap
page read and write
9E0000
heap
page read and write
49D0000
heap
page read and write
10F5000
heap
page read and write
1C4E000
stack
page read and write
11AE000
heap
page read and write
1677000
trusted library allocation
page execute and read and write
11CA000
trusted library allocation
page execute and read and write
6A90000
heap
page read and write
53AC000
stack
page read and write
3326000
trusted library allocation
page read and write
670000
trusted library allocation
page read and write
F00000
heap
page read and write
66C0000
heap
page read and write
18A7000
heap
page read and write
10FA000
heap
page read and write
10F6000
stack
page read and write
2F51000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
76B0000
heap
page read and write
10B0000
heap
page read and write
DBA000
stack
page read and write
EEE000
stack
page read and write
F40000
heap
page read and write
11C7000
heap
page read and write
11E5000
heap
page read and write
1130000
heap
page read and write
7E4E000
stack
page read and write
CF9000
stack
page read and write
E10000
heap
page read and write
5550000
trusted library allocation
page read and write
E20000
heap
page read and write
38C1000
trusted library allocation
page read and write
5980000
heap
page read and write
105B000
heap
page read and write
5562000
heap
page read and write
1160000
heap
page read and write
1106000
heap
page read and write
902000
heap
page read and write
1640000
trusted library allocation
page read and write
DC9000
heap
page read and write
5275000
heap
page read and write
10E3000
heap
page read and write
28D0000
trusted library allocation
page read and write
1440000
heap
page read and write
11F0000
trusted library allocation
page read and write
5F7F000
stack
page read and write
17E0000
heap
page read and write
11AC000
heap
page read and write
1A60000
trusted library section
page readonly
6ACE000
stack
page read and write
17B0000
heap
page read and write
11B0000
heap
page read and write
FB0000
heap
page read and write
C6B000
stack
page read and write
575B000
stack
page read and write
6A8E000
stack
page read and write
FD5000
heap
page read and write
2F81000
trusted library allocation
page read and write
172E000
stack
page read and write
14C0000
trusted library allocation
page read and write
11A2000
heap
page read and write
115F000
heap
page read and write
54EF000
stack
page read and write
115E000
heap
page read and write
4B30000
heap
page read and write
E70000
heap
page read and write
691F000
stack
page read and write
51A0000
heap
page read and write
820000
trusted library allocation
page read and write
5990000
heap
page read and write
113B000
heap
page read and write
838000
heap
page read and write
14FE000
heap
page read and write
1472000
trusted library allocation
page execute and read and write
5144000
trusted library section
page readonly
556F000
heap
page read and write
4C3D000
stack
page read and write
5CE000
stack
page read and write
11DA000
trusted library allocation
page execute and read and write
64AE000
stack
page read and write
1128000
heap
page read and write
4A46000
trusted library section
page readonly
109E000
stack
page read and write
10F5000
heap
page read and write
2916000
trusted library allocation
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
11A3000
heap
page read and write
5D53000
heap
page read and write
165A000
trusted library allocation
page execute and read and write
83E000
heap
page read and write
1657000
trusted library allocation
page execute and read and write
AFE000
stack
page read and write
178B000
stack
page read and write
5970000
heap
page read and write
112A000
heap
page read and write
1180000
heap
page read and write
DFF000
stack
page read and write
1422000
trusted library allocation
page execute and read and write
140E000
stack
page read and write
1102000
heap
page read and write
143E000
stack
page read and write
60E000
stack
page read and write
65AF000
stack
page read and write
9A7000
trusted library allocation
page execute and read and write
B4E000
stack
page read and write
3F84000
trusted library allocation
page read and write
F52000
trusted library allocation
page execute and read and write
4EA5000
trusted library section
page readonly
1626000
trusted library allocation
page read and write
583E000
stack
page read and write
698E000
stack
page read and write
BE000
unkown
page readonly
5561000
heap
page read and write
11AE000
heap
page read and write
982000
trusted library allocation
page read and write
112D000
heap
page read and write
1FE000
stack
page read and write
157F000
heap
page read and write
5570000
heap
page read and write
12F6000
stack
page read and write
1127000
heap
page read and write
3F81000
trusted library allocation
page read and write
556B000
heap
page read and write
119F000
stack
page read and write
497E000
stack
page read and write
98A000
trusted library allocation
page execute and read and write
5D0000
heap
page read and write
C50000
trusted library allocation
page execute and read and write
100C000
stack
page read and write
5C40000
heap
page read and write
7F4F000
stack
page read and write
10F8000
heap
page read and write
112F000
heap
page read and write
110B000
heap
page read and write
7C9000
stack
page read and write
556F000
heap
page read and write
49B0000
trusted library allocation
page execute and read and write
5577000
heap
page read and write
68A000
trusted library allocation
page execute and read and write
56E0000
unclassified section
page read and write
11DC000
trusted library allocation
page execute and read and write
14DE000
stack
page read and write
89F000
heap
page read and write
1200000
trusted library allocation
page read and write
1220000
heap
page read and write
FC9000
stack
page read and write
1450000
trusted library allocation
page execute and read and write
18A0000
heap
page read and write
5240000
heap
page read and write
509E000
stack
page read and write
8A7000
heap
page read and write
7E0F000
stack
page read and write
E7E000
heap
page read and write
5020000
heap
page read and write
4F9000
stack
page read and write
5B8E000
stack
page read and write
65BE000
stack
page read and write
66D9000
heap
page read and write
1643000
heap
page read and write
49C5000
heap
page read and write
119E000
heap
page read and write
120A000
trusted library allocation
page execute and read and write
4AE0000
heap
page read and write
10FA000
heap
page read and write
6D7000
trusted library allocation
page execute and read and write
692000
trusted library allocation
page execute and read and write
113D000
heap
page read and write
2EC1000
trusted library allocation
page read and write
D60000
heap
page read and write
112B000
heap
page read and write
54D0000
trusted library allocation
page execute and read and write
166A000
trusted library allocation
page execute and read and write
6F9E000
stack
page read and write
1480000
heap
page read and write
5250000
heap
page read and write
DC5000
heap
page read and write
1C90000
trusted library allocation
page execute and read and write
561C000
stack
page read and write
D80000
heap
page execute and read and write
E60000
heap
page read and write
4591000
trusted library allocation
page read and write
2881000
trusted library allocation
page read and write
D66000
stack
page read and write
1107000
heap
page read and write
E3A000
trusted library allocation
page execute and read and write
11A8000
heap
page read and write
5380000
heap
page read and write
1190000
heap
page read and write
7F8C000
stack
page read and write
559C000
stack
page read and write
1D20000
trusted library allocation
page read and write
5793000
heap
page read and write
11A5000
heap
page read and write
54D0000
heap
page read and write
A2000
unkown
page readonly
ECB000
stack
page read and write
1315000
heap
page read and write
1202000
trusted library allocation
page read and write
1126000
heap
page read and write
EF3000
stack
page read and write
1129000
heap
page read and write
681F000
stack
page read and write
1079000
heap
page read and write
5CB0000
heap
page read and write
657E000
stack
page read and write
515F000
stack
page read and write
646E000
stack
page read and write
10F9000
heap
page read and write
4A3C000
stack
page read and write
5C8E000
stack
page read and write
B99000
stack
page read and write
6680000
heap
page read and write
119E000
heap
page read and write
66CE000
heap
page read and write
121A000
trusted library allocation
page execute and read and write
688E000
stack
page read and write
52CE000
stack
page read and write
1C8E000
stack
page read and write
124E000
stack
page read and write
2CF6000
trusted library allocation
page read and write
10F9000
heap
page read and write
E20000
trusted library allocation
page read and write
112B000
heap
page read and write
1632000
trusted library allocation
page execute and read and write
1134000
heap
page read and write
1126000
heap
page read and write
1135000
heap
page read and write
11CA000
trusted library allocation
page execute and read and write
2C3E000
stack
page read and write
9B0000
heap
page read and write
C0E000
stack
page read and write
14A6000
heap
page read and write
49A0000
heap
page read and write
5576000
heap
page read and write
4C50000
heap
page read and write
F67000
trusted library allocation
page execute and read and write
67C0000
trusted library allocation
page execute and read and write
1170000
heap
page read and write
11FA000
trusted library allocation
page execute and read and write
568E000
stack
page read and write
6D5E000
stack
page read and write
1227000
trusted library allocation
page execute and read and write
9AB000
trusted library allocation
page execute and read and write
972000
trusted library allocation
page execute and read and write
11E0000
heap
page read and write
1107000
heap
page read and write
49C0000
heap
page read and write
580000
heap
page read and write
16FF000
trusted library allocation
page read and write
B50000
heap
page read and write
5579000
heap
page read and write
115F000
heap
page read and write
8B7000
heap
page read and write
115E000
heap
page read and write
6BA000
trusted library allocation
page execute and read and write
66BE000
stack
page read and write
1128000
heap
page read and write
120B000
trusted library allocation
page execute and read and write
A20000
heap
page read and write
2CB0000
trusted library allocation
page read and write
17B0000
trusted library allocation
page execute and read and write
7BF0000
heap
page read and write
60FE000
stack
page read and write
5153000
heap
page read and write
1240000
heap
page read and write
1436000
trusted library allocation
page execute and read and write
4ACD000
stack
page read and write
1A70000
heap
page execute and read and write
16D0000
heap
page execute and read and write
1260000
trusted library allocation
page execute and read and write
DCD000
heap
page read and write
115E000
heap
page read and write
E32000
trusted library allocation
page read and write
3881000
trusted library allocation
page read and write
10E2000
heap
page read and write
552E000
stack
page read and write
5678000
stack
page read and write
112D000
heap
page read and write
4B00000
heap
page read and write
112C000
heap
page read and write
590E000
stack
page read and write
1180000
heap
page execute and read and write
43A000
stack
page read and write
EF6000
stack
page read and write
5530000
heap
page read and write
DC0000
heap
page read and write
D4C000
stack
page read and write
49D3000
heap
page read and write
11F2000
trusted library allocation
page execute and read and write
166B000
trusted library allocation
page execute and read and write
5490000
trusted library section
page readonly
11C2000
trusted library allocation
page execute and read and write
7B50000
heap
page read and write
11AB000
heap
page read and write
1140000
trusted library allocation
page read and write
32CE000
trusted library allocation
page read and write
13CE000
stack
page read and write
1480000
heap
page read and write
11C2000
trusted library allocation
page execute and read and write
C6C000
heap
page read and write
528E000
stack
page read and write
3C61000
trusted library allocation
page read and write
59A0000
heap
page read and write
1380000
heap
page read and write
830000
heap
page read and write
12E0000
heap
page read and write
42D1000
trusted library allocation
page read and write
1128000
heap
page read and write
1137000
heap
page read and write
FC6000
stack
page read and write
1220000
trusted library allocation
page read and write
11D2000
trusted library allocation
page execute and read and write
54E0000
trusted library allocation
page execute and read and write
11A0000
heap
page read and write
142A000
trusted library allocation
page execute and read and write
1020000
heap
page execute and read and write
5495000
trusted library section
page readonly
11E7000
trusted library allocation
page execute and read and write
61FF000
stack
page read and write
4ED0000
heap
page read and write
FBE000
stack
page read and write
1473000
heap
page read and write
1487000
heap
page read and write
542E000
stack
page read and write
5985000
heap
page read and write
11E2000
trusted library allocation
page read and write
4BCE000
stack
page read and write
111F000
heap
page read and write
1108000
heap
page read and write
573E000
stack
page read and write
4D6E000
stack
page read and write
6D4000
heap
page read and write
5561000
heap
page read and write
1103000
heap
page read and write
7D0E000
stack
page read and write
E15000
heap
page read and write
56CE000
stack
page read and write
536000
stack
page read and write
119E000
heap
page read and write
C00000
heap
page read and write
1160000
trusted library allocation
page read and write
14A0000
heap
page read and write
2C61000
trusted library allocation
page read and write
1650000
heap
page execute and read and write
1137000
heap
page read and write
11D0000
trusted library allocation
page read and write
6B2000
trusted library allocation
page read and write
1080000
heap
page read and write
5030000
heap
page read and write
F9E000
stack
page read and write
4A40000
trusted library section
page readonly
149C000
trusted library allocation
page execute and read and write
10E7000
heap
page read and write
16EE000
stack
page read and write
14CB000
trusted library allocation
page execute and read and write
3241000
trusted library allocation
page read and write
53EE000
stack
page read and write
13FE000
stack
page read and write
F4E000
stack
page read and write
1270000
heap
page read and write
2B7E000
stack
page read and write
1137000
heap
page read and write
F4E000
unkown
page read and write
138F000
stack
page read and write
152F000
heap
page read and write
D60000
trusted library allocation
page read and write
112F000
heap
page read and write
14A000
stack
page read and write
120B000
trusted library allocation
page execute and read and write
2958000
trusted library allocation
page read and write
1460000
trusted library allocation
page read and write
5920000
heap
page read and write
11D6000
trusted library allocation
page execute and read and write
69A000
trusted library allocation
page execute and read and write
111C000
heap
page read and write
6C0E000
stack
page read and write
5790000
heap
page read and write
1628000
trusted library allocation
page read and write
4241000
trusted library allocation
page read and write
EFE000
stack
page read and write
6BCE000
stack
page read and write
4B14000
heap
page read and write
E22000
trusted library allocation
page execute and read and write
F77000
heap
page read and write
5C50000
heap
page read and write
167B000
trusted library allocation
page execute and read and write
667E000
stack
page read and write
E1A000
trusted library allocation
page execute and read and write
112B000
heap
page read and write
334A000
trusted library allocation
page read and write
4E80000
heap
page read and write
63E000
stack
page read and write
5A8E000
stack
page read and write
D94000
heap
page read and write
1200000
trusted library allocation
page read and write
1432000
trusted library allocation
page execute and read and write
5FBE000
stack
page read and write
1B0000
heap
page read and write
1672000
trusted library allocation
page read and write
10D0000
heap
page read and write
5150000
heap
page read and write
669E000
stack
page read and write
1448000
heap
page read and write
52D8000
trusted library allocation
page read and write
119E000
heap
page read and write
BC0000
heap
page read and write
86F000
heap
page read and write
E2C000
trusted library allocation
page execute and read and write
10A0000
heap
page read and write
115E000
heap
page read and write
147A000
trusted library allocation
page execute and read and write
1207000
trusted library allocation
page execute and read and write
144E000
stack
page read and write
4F70000
heap
page read and write
643E000
stack
page read and write
970000
trusted library allocation
page read and write
2F62000
trusted library allocation
page read and write
60BE000
heap
page read and write
16F0000
trusted library allocation
page read and write
6F0000
heap
page read and write
FB0000
heap
page read and write
1133000
heap
page read and write
E75000
heap
page read and write
16AE000
stack
page read and write
54C0000
heap
page read and write
5CD2000
trusted library allocation
page read and write
6AA000
trusted library allocation
page execute and read and write
99A000
trusted library allocation
page execute and read and write
6E5E000
stack
page read and write
164A000
trusted library allocation
page execute and read and write
112D000
heap
page read and write
D3E000
stack
page read and write
1730000
heap
page read and write
623E000
stack
page read and write
371D000
trusted library allocation
page read and write
1102000
heap
page read and write
158A000
heap
page read and write
1130000
heap
page read and write
537D000
stack
page read and write
328E000
stack
page read and write
709000
heap
page read and write
380E000
trusted library allocation
page read and write
1122000
heap
page read and write
61CE000
heap
page read and write
F49000
stack
page read and write
FF0000
heap
page read and write
539000
stack
page read and write
5520000
heap
page read and write
11B6000
heap
page read and write
FA0000
heap
page read and write
1490000
trusted library allocation
page read and write
11FC000
trusted library allocation
page execute and read and write
808C000
stack
page read and write
70C000
heap
page read and write
BF0000
heap
page read and write
A0000
unkown
page readonly
5260000
trusted library allocation
page execute and read and write
11EA000
trusted library allocation
page execute and read and write
594E000
stack
page read and write
4E85000
heap
page read and write
14FA000
heap
page read and write
67D0000
trusted library allocation
page read and write
6B7000
trusted library allocation
page execute and read and write
2911000
trusted library allocation
page read and write
6A0000
heap
page read and write
115E000
heap
page read and write
14AA000
trusted library allocation
page execute and read and write
505E000
stack
page read and write
158F000
stack
page read and write
11C0000
heap
page read and write
1134000
heap
page read and write
16E0000
heap
page read and write
C69000
heap
page read and write
1620000
trusted library allocation
page read and write
115E000
heap
page read and write
9D0000
heap
page read and write
126E000
stack
page read and write
556F000
heap
page read and write
5320000
heap
page read and write
5A4F000
stack
page read and write
81CF000
stack
page read and write
400000
remote allocation
page execute and read and write
4ED3000
heap
page read and write
1260000
heap
page execute and read and write
2F93000
trusted library allocation
page read and write
682000
trusted library allocation
page execute and read and write
11A9000
heap
page read and write
B50000
heap
page read and write
6C2000
trusted library allocation
page execute and read and write
4F6000
stack
page read and write
1102000
heap
page read and write
1170000
heap
page read and write
E37000
trusted library allocation
page execute and read and write
589D000
stack
page read and write
4B1F000
heap
page read and write
12E8000
heap
page read and write
12AE000
unkown
page read and write
66A0000
trusted library allocation
page read and write
35D1000
trusted library allocation
page read and write
987000
trusted library allocation
page execute and read and write
56CE000
stack
page read and write
548D000
stack
page read and write
112F000
stack
page read and write
562F000
stack
page read and write
5578000
heap
page read and write
10FC000
heap
page read and write
1101000
heap
page read and write
6480000
heap
page read and write
ABE000
stack
page read and write
F5A000
trusted library allocation
page execute and read and write
1492000
trusted library allocation
page execute and read and write
1280000
heap
page read and write
DF2000
heap
page read and write
697000
heap
page read and write
11E0000
trusted library allocation
page read and write
5270000
heap
page read and write
1CC0000
heap
page read and write
6DB000
trusted library allocation
page execute and read and write
7C00000
trusted library section
page read and write
12FE000
heap
page read and write
5930000
trusted library allocation
page execute and read and write
1640000
heap
page read and write
119E000
heap
page read and write
1700000
heap
page read and write
1642000
trusted library allocation
page execute and read and write
14A2000
trusted library allocation
page read and write
14A7000
trusted library allocation
page execute and read and write
112A000
heap
page read and write
163F000
stack
page read and write
6E9E000
stack
page read and write
119E000
heap
page read and write
633E000
stack
page read and write
6A0000
trusted library allocation
page read and write
11A0000
heap
page read and write
111C000
heap
page read and write
4EA0000
trusted library section
page readonly
F60000
heap
page read and write
F80000
heap
page read and write
533E000
stack
page read and write
1652000
trusted library allocation
page execute and read and write
11AE000
heap
page read and write
10E4000
heap
page read and write
1660000
trusted library allocation
page read and write
5E7E000
stack
page read and write
1109000
heap
page read and write
556F000
heap
page read and write
7FF000
stack
page read and write
115E000
stack
page read and write
5571000
heap
page read and write
143C000
trusted library allocation
page execute and read and write
1123000
heap
page read and write
1132000
heap
page read and write
11A0000
heap
page read and write
14BA000
trusted library allocation
page execute and read and write
F50000
heap
page read and write
10FD000
heap
page read and write
112F000
heap
page read and write
3591000
trusted library allocation
page read and write
57CE000
stack
page read and write
54C0000
trusted library allocation
page read and write
F3E000
stack
page read and write
2F6F000
trusted library allocation
page read and write
365E000
trusted library allocation
page read and write
1137000
heap
page read and write
8A3000
heap
page read and write
A2E000
stack
page read and write
B9B000
stack
page read and write
6F5000
heap
page read and write
2C86000
trusted library allocation
page read and write
1A0000
heap
page read and write
1560000
heap
page read and write
5D40000
heap
page read and write
1430000
trusted library allocation
page read and write
D0E000
stack
page read and write
12A0000
heap
page read and write
4953000
heap
page read and write
4950000
heap
page read and write
1161000
heap
page read and write
318E000
stack
page read and write
636D000
stack
page read and write
1410000
trusted library allocation
page read and write
15CB000
stack
page read and write
1212000
trusted library allocation
page execute and read and write
1122000
heap
page read and write
5630000
heap
page read and write
D68000
heap
page read and write
E00000
trusted library allocation
page read and write
CF6000
stack
page read and write
10FF000
heap
page read and write
4BD0000
heap
page read and write
104F000
stack
page read and write
6CA000
trusted library allocation
page execute and read and write
1667000
trusted library allocation
page execute and read and write
10F5000
heap
page read and write
680000
trusted library allocation
page read and write
684E000
stack
page read and write
538B000
stack
page read and write
F70000
heap
page read and write
1390000
heap
page read and write
60BE000
stack
page read and write
4DFE000
stack
page read and write
4F1B000
stack
page read and write
14AD000
heap
page read and write
11A7000
heap
page read and write
1585000
heap
page read and write
119E000
heap
page read and write
113C000
heap
page read and write
C34000
heap
page read and write
4AF0000
heap
page read and write
294E000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
1250000
trusted library allocation
page read and write
119E000
heap
page read and write
11DC000
trusted library allocation
page execute and read and write
1460000
heap
page read and write
4960000
trusted library section
page readonly
A35000
heap
page read and write
28A6000
trusted library allocation
page read and write
494B000
stack
page read and write
B90000
trusted library allocation
page read and write
519B000
stack
page read and write
FF8000
heap
page read and write
10F6000
heap
page read and write
1270000
trusted library allocation
page read and write
EF9000
stack
page read and write
11C0000
heap
page read and write
11B0000
trusted library allocation
page read and write
3EC1000
trusted library allocation
page read and write
1567000
heap
page read and write
C90000
heap
page execute and read and write
5AD0000
trusted library allocation
page execute and read and write
13B0000
heap
page read and write
2CF1000
trusted library allocation
page read and write
4AD0000
heap
page read and write
1E3F000
stack
page read and write
B9E000
stack
page read and write
11EA000
trusted library allocation
page execute and read and write
2951000
trusted library allocation
page read and write
113C000
heap
page read and write
10D0000
heap
page read and write
6D2000
trusted library allocation
page read and write
D50000
trusted library allocation
page execute and read and write
650000
heap
page read and write
E40000
heap
page read and write
EFB000
stack
page read and write
11D0000
trusted library allocation
page read and write
1122000
heap
page read and write
50A0000
trusted library allocation
page read and write
DE3000
heap
page read and write
E94000
heap
page read and write
5180000
trusted library allocation
page execute and read and write
96F000
stack
page read and write
1380000
heap
page read and write
67BF000
stack
page read and write
BA0000
heap
page read and write
1353000
heap
page read and write
1280000
heap
page read and write
6A2000
trusted library allocation
page execute and read and write
16BE000
stack
page read and write
1200000
trusted library allocation
page read and write
694E000
stack
page read and write
5200000
trusted library allocation
page read and write
11D2000
trusted library allocation
page execute and read and write
115E000
heap
page read and write
524E000
stack
page read and write
2F10000
trusted library allocation
page read and write
119F000
heap
page read and write
F85000
heap
page read and write
45D1000
trusted library allocation
page read and write
12A5000
heap
page read and write
1520000
heap
page read and write
113A000
heap
page read and write
1A64000
trusted library section
page readonly
6B90000
trusted library allocation
page read and write
7C6000
stack
page read and write
4C40000
heap
page read and write
6CA000
stack
page read and write
112A000
heap
page read and write
61B0000
heap
page read and write
5540000
heap
page read and write
4B10000
trusted library allocation
page execute and read and write
138F000
stack
page read and write
97C000
trusted library allocation
page execute and read and write
1089000
heap
page read and write
6A1F000
stack
page read and write
F2E000
stack
page read and write
119E000
heap
page read and write
62FE000
stack
page read and write
FD0000
heap
page read and write
110B000
heap
page read and write
1440000
trusted library allocation
page read and write
5390000
heap
page read and write
5620000
trusted library allocation
page execute and read and write
E0E000
stack
page read and write
5535000
heap
page read and write
1662000
trusted library allocation
page execute and read and write
111D000
heap
page read and write
6A9E000
heap
page read and write
11A8000
heap
page read and write
E12000
trusted library allocation
page execute and read and write
11F2000
trusted library allocation
page execute and read and write
60B0000
heap
page read and write
118F000
stack
page read and write
113A000
heap
page read and write
1133000
heap
page read and write
4F9B000
stack
page read and write
10BA000
heap
page read and write
5780000
heap
page read and write
6D0E000
stack
page read and write
11E2000
trusted library allocation
page execute and read and write
5572000
heap
page read and write
5F5000
heap
page read and write
1024000
heap
page read and write
65FE000
stack
page read and write
1207000
trusted library allocation
page execute and read and write
5170000
trusted library allocation
page read and write
580E000
stack
page read and write
7FBC0000
trusted library allocation
page execute and read and write
E68000
heap
page read and write
BC0000
heap
page read and write
B4C000
stack
page read and write
5F0000
heap
page read and write
11AA000
heap
page read and write
725000
heap
page read and write
4990000
heap
page read and write
4594000
trusted library allocation
page read and write
2EFF000
stack
page read and write
11AE000
heap
page read and write
145D000
heap
page read and write
54AE000
stack
page read and write
1670000
trusted library allocation
page read and write
BC7000
heap
page read and write
11FA000
trusted library allocation
page execute and read and write
113B000
heap
page read and write
992000
trusted library allocation
page execute and read and write
F6B000
trusted library allocation
page execute and read and write
6AC000
trusted library allocation
page execute and read and write
665E000
stack
page read and write
6A8000
heap
page read and write
1207000
trusted library allocation
page execute and read and write
1127000
heap
page read and write
12F9000
stack
page read and write
1050000
heap
page read and write
11D0000
trusted library allocation
page read and write
11A6000
heap
page read and write
671E000
stack
page read and write
4B35000
heap
page read and write
14A0000
trusted library allocation
page read and write
A30000
heap
page read and write
5578000
heap
page read and write
1564000
heap
page read and write
63FE000
stack
page read and write
110A000
heap
page read and write
2F8F000
stack
page read and write
11F2000
trusted library allocation
page execute and read and write
5540000
trusted library allocation
page read and write
106E000
stack
page read and write
80CD000
stack
page read and write
55DB000
stack
page read and write
FE0000
trusted library allocation
page read and write
517F000
trusted library allocation
page read and write
1129000
heap
page read and write
61C0000
heap
page read and write
1260000
heap
page execute and read and write
There are 786 hidden memdumps, click here to show them.