IOC Report
9hYKnCVqcI.exe

loading gif

Files

File Path
Type
Category
Malicious
9hYKnCVqcI.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_bad_module_info_dcd3242e9fa4189184df4216daa4e4c7cdf1959_85207d7d_904f903c-d22d-4654-88dc-e0111fa256be\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4F40.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4F60.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\9hYKnCVqcI.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\chargeable.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\WER3F61.tmp.WERDataCollectionStatus.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\9hYKnCVqcI.exe
"C:\Users\user\Desktop\9hYKnCVqcI.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
malicious
C:\Users\user\Desktop\9hYKnCVqcI.exe
"C:\Users\user\Desktop\9hYKnCVqcI.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\Desktop\9hYKnCVqcI.exe
"C:\Users\user\Desktop\9hYKnCVqcI.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 12
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://www.sysinternals.com0
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
doddyfire.linkpc.net
http://www.sakkal.com
unknown
There are 17 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
doddyfire.linkpc.net
196.74.150.120

IPs

IP
Domain
Country
Malicious
196.74.150.120
doddyfire.linkpc.net
Morocco

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
confuse
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SysMain
malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\e1a87040f2026369a233f9ae76301b7b
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
2B41000
trusted library allocation
page read and write
malicious
35E1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
120E000
stack
page read and write
746000
heap
page read and write
5F6000
stack
page read and write
7E3000
heap
page read and write
5520000
trusted library allocation
page read and write
4D09000
heap
page read and write
6B6F000
stack
page read and write
BF0000
heap
page execute and read and write
16A0000
trusted library allocation
page read and write
74A000
heap
page read and write
5530000
trusted library allocation
page execute and read and write
4FAB000
stack
page read and write
7EA000
heap
page read and write
123B000
heap
page read and write
5F5000
heap
page read and write
4CFC000
heap
page read and write
857000
heap
page read and write
EBF000
stack
page read and write
30D1000
trusted library allocation
page read and write
1392000
trusted library allocation
page execute and read and write
5830000
heap
page read and write
69C0000
heap
page read and write
1680000
trusted library allocation
page read and write
766000
heap
page read and write
A10000
heap
page read and write
EAA000
trusted library allocation
page execute and read and write
C3F000
heap
page read and write
596D000
stack
page read and write
550E000
stack
page read and write
8C0000
heap
page read and write
6E2F000
stack
page read and write
12E5000
heap
page read and write
17CE000
stack
page read and write
5ABE000
stack
page read and write
339F000
trusted library allocation
page read and write
5DD0000
heap
page read and write
185C000
stack
page read and write
10E7000
heap
page read and write
5340000
heap
page read and write
17BA000
trusted library allocation
page execute and read and write
5A50000
heap
page read and write
4EF3000
heap
page read and write
2706000
trusted library allocation
page read and write
13F7000
trusted library allocation
page execute and read and write
4EA0000
heap
page read and write
1282000
trusted library allocation
page execute and read and write
7ED000
heap
page read and write
792000
heap
page read and write
4DBE000
stack
page read and write
1330000
heap
page execute and read and write
E92000
trusted library allocation
page execute and read and write
741000
heap
page read and write
77F000
heap
page read and write
AE0000
heap
page read and write
4CFD000
heap
page read and write
B6E000
heap
page read and write
75D000
heap
page read and write
D1E000
stack
page read and write
6CEE000
stack
page read and write
DB0000
heap
page read and write
50BE000
stack
page read and write
A70000
heap
page read and write
77E000
heap
page read and write
50E0000
heap
page read and write
8A0000
heap
page read and write
821E000
stack
page read and write
1387000
trusted library allocation
page execute and read and write
3392000
trusted library allocation
page read and write
5230000
heap
page read and write
748000
heap
page read and write
7E3000
heap
page read and write
B5D000
heap
page read and write
10F9000
stack
page read and write
18EE000
stack
page read and write
1770000
heap
page read and write
5725000
heap
page read and write
781000
heap
page read and write
6BAE000
stack
page read and write
4CB0000
trusted library allocation
page execute and read and write
577E000
stack
page read and write
13F0000
trusted library allocation
page read and write
318E000
stack
page read and write
175E000
stack
page read and write
959000
stack
page read and write
440000
heap
page read and write
168F000
stack
page read and write
73C000
heap
page read and write
9D0000
heap
page read and write
ADE000
stack
page read and write
13DD000
heap
page read and write
A62000
trusted library allocation
page execute and read and write
7EE000
heap
page read and write
3B85000
trusted library allocation
page read and write
F59000
stack
page read and write
533D000
stack
page read and write
16CE000
stack
page read and write
C0E000
heap
page read and write
139A000
trusted library allocation
page execute and read and write
1270000
trusted library allocation
page read and write
E9C000
trusted library allocation
page execute and read and write
797000
heap
page read and write
3E3000
stack
page read and write
142E000
stack
page read and write
139C000
heap
page read and write
142B000
heap
page read and write
706E000
stack
page read and write
3090000
trusted library allocation
page read and write
540E000
stack
page read and write
1A80000
heap
page read and write
4C65000
trusted library section
page readonly
86DC000
stack
page read and write
13EE000
stack
page read and write
47AE000
stack
page read and write
11A0000
trusted library allocation
page read and write
5280000
heap
page read and write
276F000
stack
page read and write
5F0000
heap
page read and write
4E00000
trusted library allocation
page read and write
4041000
trusted library allocation
page read and write
5360000
heap
page read and write
9CF000
stack
page read and write
78B000
heap
page read and write
827000
trusted library allocation
page execute and read and write
735000
heap
page read and write
789000
heap
page read and write
BEE000
stack
page read and write
9FD000
stack
page read and write
167A000
trusted library allocation
page execute and read and write
77F000
heap
page read and write
4EB0000
heap
page read and write
5A10000
trusted library allocation
page execute and read and write
14AE000
stack
page read and write
872E000
stack
page read and write
17C2000
trusted library allocation
page read and write
640D000
stack
page read and write
5770000
heap
page read and write
4CD0000
heap
page read and write
4E73000
heap
page read and write
12BA000
trusted library allocation
page execute and read and write
C9F000
heap
page read and write
10D0000
heap
page read and write
4E60000
heap
page read and write
CDE000
stack
page read and write
E8A000
trusted library allocation
page execute and read and write
59FE000
stack
page read and write
4B1000
heap
page read and write
74A000
heap
page read and write
53EF000
stack
page read and write
9BE000
stack
page read and write
E90000
trusted library allocation
page read and write
60BE000
stack
page read and write
EE0000
heap
page execute and read and write
420000
heap
page read and write
56A0000
trusted library allocation
page execute and read and write
14E3000
heap
page read and write
AEE000
heap
page read and write
13F5000
heap
page read and write
3381000
trusted library allocation
page read and write
6290000
heap
page read and write
748000
heap
page read and write
12A0000
trusted library allocation
page read and write
B3E000
stack
page read and write
7EC000
heap
page read and write
F8C000
stack
page read and write
115F000
heap
page read and write
6B60000
heap
page read and write
6890000
trusted library allocation
page execute and read and write
6930000
heap
page read and write
13AB000
trusted library allocation
page execute and read and write
766000
heap
page read and write
2EB000
stack
page read and write
11BE000
stack
page read and write
128A000
trusted library allocation
page execute and read and write
77E000
heap
page read and write
F30000
heap
page read and write
73B000
heap
page read and write
74A000
heap
page read and write
57D0000
trusted library allocation
page read and write
1360000
heap
page read and write
4CE0000
heap
page read and write
FA0000
heap
page read and write
1370000
trusted library allocation
page read and write
140A000
trusted library allocation
page execute and read and write
4DB0000
heap
page read and write
665E000
stack
page read and write
561B000
stack
page read and write
A52000
trusted library allocation
page execute and read and write
55F0000
trusted library allocation
page read and write
3AB1000
trusted library allocation
page read and write
5E50000
heap
page read and write
4CFC000
heap
page read and write
2B3E000
trusted library allocation
page read and write
1672000
trusted library allocation
page execute and read and write
4CFF000
heap
page read and write
AEA000
heap
page read and write
46AB000
stack
page read and write
1292000
trusted library allocation
page execute and read and write
835E000
stack
page read and write
75B000
heap
page read and write
7DF000
heap
page read and write
785000
heap
page read and write
12CB000
trusted library allocation
page execute and read and write
794000
heap
page read and write
1AE0000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
745000
heap
page read and write
73B000
heap
page read and write
5540000
trusted library allocation
page read and write
1336000
stack
page read and write
552E000
stack
page read and write
670000
heap
page read and write
77E000
heap
page read and write
579F000
stack
page read and write
D5B000
stack
page read and write
B84000
heap
page read and write
E9A000
trusted library allocation
page execute and read and write
660000
heap
page read and write
5720000
trusted library allocation
page read and write
17E0000
heap
page read and write
1410000
trusted library allocation
page read and write
A7A000
trusted library allocation
page execute and read and write
EC7000
trusted library allocation
page execute and read and write
49C000
stack
page read and write
2CAE000
trusted library allocation
page read and write
3121000
trusted library allocation
page read and write
12B2000
trusted library allocation
page execute and read and write
5220000
trusted library section
page read and write
51D4000
trusted library section
page readonly
693E000
heap
page read and write
4FBE000
stack
page read and write
4DA0000
trusted library allocation
page execute and read and write
2CB8000
trusted library allocation
page read and write
748000
heap
page read and write
4CA0000
heap
page read and write
788000
heap
page read and write
EA7000
trusted library allocation
page execute and read and write
B79000
heap
page read and write
6DEE000
stack
page read and write
4CFD000
heap
page read and write
44D1000
trusted library allocation
page read and write
17D0000
trusted library allocation
page read and write
16C0000
heap
page read and write
582D000
stack
page read and write
1380000
trusted library allocation
page read and write
521E000
stack
page read and write
123A000
stack
page read and write
9BF000
unkown
page read and write
82A0000
heap
page read and write
E3F000
stack
page read and write
81A000
trusted library allocation
page execute and read and write
77E0000
heap
page read and write
12E0000
heap
page read and write
69CE000
heap
page read and write
6C4E000
stack
page read and write
4A70000
trusted library allocation
page read and write
77F000
heap
page read and write
58E0000
trusted library allocation
page execute and read and write
1170000
heap
page read and write
539F000
heap
page read and write
7EE000
heap
page read and write
12C7000
trusted library allocation
page execute and read and write
5A0000
unkown
page readonly
795000
heap
page read and write
17B2000
trusted library allocation
page execute and read and write
4D07000
heap
page read and write
849E000
stack
page read and write
3EB000
stack
page read and write
784000
heap
page read and write
97E000
stack
page read and write
50C0000
heap
page read and write
7E6000
heap
page read and write
585C000
stack
page read and write
89E000
stack
page read and write
4CD1000
heap
page read and write
798000
heap
page read and write
85DB000
stack
page read and write
790000
heap
page read and write
4D4E000
stack
page read and write
13C8000
heap
page read and write
17C0000
trusted library allocation
page read and write
78B000
heap
page read and write
6DEE000
stack
page read and write
C86000
heap
page read and write
12D0000
heap
page read and write
365A000
trusted library allocation
page read and write
367D000
trusted library allocation
page read and write
C00000
heap
page read and write
75F000
heap
page read and write
A8A000
trusted library allocation
page execute and read and write
F8B000
stack
page read and write
731000
heap
page read and write
50AD000
stack
page read and write
14A0000
heap
page read and write
51DE000
stack
page read and write
48F0000
heap
page read and write
F2E000
stack
page read and write
55AE000
stack
page read and write
576D000
stack
page read and write
13A2000
trusted library allocation
page execute and read and write
1800000
heap
page read and write
1388000
heap
page read and write
51D0000
trusted library section
page readonly
75B000
heap
page read and write
DB6000
heap
page read and write
11EF000
heap
page read and write
859E000
stack
page read and write
1690000
heap
page execute and read and write
1290000
trusted library allocation
page read and write
232F000
stack
page read and write
2D4F000
stack
page read and write
882F000
stack
page read and write
10C0000
heap
page read and write
845F000
stack
page read and write
1230000
heap
page read and write
77E000
heap
page read and write
78B000
heap
page read and write
A5A000
trusted library allocation
page execute and read and write
1710000
heap
page read and write
DE0000
heap
page read and write
4CFC000
heap
page read and write
1B6000
stack
page read and write
1404000
heap
page read and write
474000
heap
page read and write
D9E000
stack
page read and write
1372000
trusted library allocation
page execute and read and write
6C70000
trusted library allocation
page read and write
4CF0000
heap
page read and write
400000
remote allocation
page execute and read and write
1AC0000
trusted library allocation
page execute and read and write
FA0000
heap
page read and write
77E000
heap
page read and write
FB0000
heap
page read and write
6F2E000
stack
page read and write
10F0000
heap
page read and write
109E000
stack
page read and write
4C60000
trusted library section
page readonly
4CF2000
heap
page read and write
807000
trusted library allocation
page execute and read and write
4DF0000
trusted library allocation
page execute and read and write
746000
heap
page read and write
A80000
heap
page read and write
4D07000
heap
page read and write
5A71000
heap
page read and write
A6A000
trusted library allocation
page execute and read and write
16B0000
trusted library allocation
page execute and read and write
14CF000
stack
page read and write
587E000
stack
page read and write
5830000
heap
page read and write
742000
heap
page read and write
6FC0000
trusted library allocation
page execute and read and write
5FBE000
stack
page read and write
794000
heap
page read and write
1B9000
stack
page read and write
2671000
trusted library allocation
page read and write
11E3000
heap
page read and write
A36000
heap
page read and write
51C0000
trusted library allocation
page execute and read and write
168A000
trusted library allocation
page execute and read and write
12AA000
trusted library allocation
page execute and read and write
9D5000
heap
page read and write
566E000
stack
page read and write
6CEE000
stack
page read and write
153A000
heap
page read and write
1223000
heap
page read and write
1AB0000
trusted library allocation
page read and write
2CFE000
stack
page read and write
EB2000
trusted library allocation
page execute and read and write
4D8E000
stack
page read and write
FE4000
heap
page read and write
766000
heap
page read and write
7EB000
heap
page read and write
6DCE000
stack
page read and write
117A000
heap
page read and write
FE0000
heap
page read and write
5361000
heap
page read and write
C8A000
heap
page read and write
1352000
trusted library allocation
page execute and read and write
6B4E000
stack
page read and write
E5A000
stack
page read and write
123F000
heap
page read and write
7D0000
trusted library allocation
page read and write
AE0000
heap
page read and write
9A0000
heap
page read and write
5844000
trusted library section
page readonly
123D000
heap
page read and write
56F0000
heap
page read and write
6F6E000
stack
page read and write
7C20000
heap
page read and write
589C000
stack
page read and write
6B79000
heap
page read and write
5AFE000
stack
page read and write
56B0000
heap
page read and write
180E000
stack
page read and write
531F000
stack
page read and write
562F000
stack
page read and write
75D000
heap
page read and write
58F3000
heap
page read and write
A9B000
trusted library allocation
page execute and read and write
143B000
stack
page read and write
16D0000
heap
page execute and read and write
4C90000
heap
page read and write
8350000
heap
page read and write
1876000
heap
page read and write
56B3000
heap
page read and write
6CEE000
stack
page read and write
1047000
heap
page read and write
78B000
heap
page read and write
1065000
heap
page read and write
790000
heap
page read and write
79B000
heap
page read and write
30E0000
trusted library allocation
page read and write
59BE000
stack
page read and write
7CF000
stack
page read and write
58F0000
heap
page read and write
623E000
stack
page read and write
85A000
stack
page read and write
168C000
stack
page read and write
6A6D000
stack
page read and write
5DE0000
heap
page read and write
B5A000
heap
page read and write
74A000
heap
page read and write
42F1000
trusted library allocation
page read and write
850000
heap
page read and write
1790000
heap
page read and write
4EF0000
heap
page read and write
5393000
heap
page read and write
741000
heap
page read and write
6D8E000
stack
page read and write
10E0000
heap
page read and write
5840000
heap
page read and write
12C0000
trusted library allocation
page read and write
7ED000
heap
page read and write
A30000
heap
page read and write
EBA000
trusted library allocation
page execute and read and write
50FB000
stack
page read and write
A82000
trusted library allocation
page execute and read and write
72F000
heap
page read and write
32F1000
trusted library allocation
page read and write
735000
heap
page read and write
73D000
heap
page read and write
FF0000
heap
page read and write
E82000
trusted library allocation
page execute and read and write
A60000
trusted library allocation
page read and write
5A60000
heap
page read and write
55D0000
trusted library allocation
page read and write
82B000
trusted library allocation
page execute and read and write
5A55000
heap
page read and write
AA0000
heap
page read and write
59BE000
stack
page read and write
741000
heap
page read and write
5840000
heap
page read and write
850000
heap
page read and write
1180000
trusted library allocation
page read and write
58D9000
stack
page read and write
17CB000
trusted library allocation
page execute and read and write
5830000
heap
page read and write
5700000
trusted library allocation
page execute and read and write
121F000
heap
page read and write
516B000
stack
page read and write
3EE000
stack
page read and write
48EE000
stack
page read and write
3113000
trusted library allocation
page read and write
5233000
heap
page read and write
1AF0000
heap
page read and write
791000
heap
page read and write
5635000
trusted library section
page readonly
2701000
trusted library allocation
page read and write
5623000
heap
page read and write
3671000
trusted library allocation
page read and write
5BE000
stack
page read and write
80A000
trusted library allocation
page execute and read and write
4C5D000
stack
page read and write
56FB000
stack
page read and write
1A7E000
stack
page read and write
1050000
heap
page execute and read and write
7E2000
trusted library allocation
page execute and read and write
10F8000
heap
page read and write
51F5000
heap
page read and write
13E4000
heap
page read and write
A90000
heap
page read and write
526E000
stack
page read and write
EF9000
stack
page read and write
650E000
stack
page read and write
1690000
heap
page read and write
6280000
heap
page read and write
742000
heap
page read and write
26C0000
trusted library allocation
page read and write
12A7000
trusted library allocation
page execute and read and write
787000
heap
page read and write
4A3E000
stack
page read and write
84B0000
heap
page read and write
1450000
heap
page read and write
7E2000
heap
page read and write
6DE000
unkown
page read and write
735000
heap
page read and write
629E000
heap
page read and write
14A0000
heap
page read and write
4A50000
heap
page read and write
BE0000
heap
page read and write
61FF000
stack
page read and write
13A7000
trusted library allocation
page execute and read and write
726000
heap
page read and write
5695000
trusted library section
page readonly
A80000
heap
page execute and read and write
655E000
stack
page read and write
797000
heap
page read and write
1650000
trusted library allocation
page read and write
4CFC000
heap
page read and write
766000
heap
page read and write
13C0000
heap
page read and write
78D000
heap
page read and write
5863000
heap
page read and write
736000
heap
page read and write
DF0000
heap
page read and write
1187000
heap
page read and write
695000
heap
page read and write
711000
heap
page read and write
5620000
heap
page read and write
57E000
stack
page read and write
137C000
trusted library allocation
page execute and read and write
7FC000
trusted library allocation
page execute and read and write
B79000
stack
page read and write
50B0000
heap
page read and write
64C2000
trusted library allocation
page read and write
13FA000
trusted library allocation
page execute and read and write
4CD0000
heap
page read and write
1530000
heap
page read and write
4EBF000
stack
page read and write
2CB1000
trusted library allocation
page read and write
7F2000
trusted library allocation
page execute and read and write
1380000
heap
page read and write
17AA000
trusted library allocation
page execute and read and write
4CFA000
heap
page read and write
4A53000
heap
page read and write
448000
heap
page read and write
EC2000
trusted library allocation
page read and write
749000
heap
page read and write
50D0000
heap
page read and write
ECB000
trusted library allocation
page execute and read and write
679F000
stack
page read and write
17DE000
stack
page read and write
13A0000
trusted library allocation
page read and write
6E2E000
stack
page read and write
2AB1000
trusted library allocation
page read and write
690000
heap
page read and write
5A2000
unkown
page readonly
792000
heap
page read and write
13B4000
heap
page read and write
6C8E000
stack
page read and write
546E000
stack
page read and write
17A7000
trusted library allocation
page execute and read and write
4D08000
heap
page read and write
749000
heap
page read and write
137A000
trusted library allocation
page execute and read and write
711000
heap
page read and write
781000
heap
page read and write
A72000
trusted library allocation
page read and write
11AC000
trusted library allocation
page execute and read and write
14B5000
heap
page read and write
2696000
trusted library allocation
page read and write
13B2000
trusted library allocation
page execute and read and write
58BE000
stack
page read and write
1707000
trusted library allocation
page execute and read and write
33C3000
trusted library allocation
page read and write
6E2E000
stack
page read and write
A77000
trusted library allocation
page execute and read and write
A00000
heap
page read and write
14B8000
heap
page read and write
12F6000
stack
page read and write
30B6000
trusted library allocation
page read and write
782000
heap
page read and write
69D9000
heap
page read and write
1870000
heap
page read and write
121B000
heap
page read and write
119A000
trusted library allocation
page execute and read and write
5710000
heap
page read and write
1460000
heap
page read and write
129C000
trusted library allocation
page execute and read and write
50C5000
heap
page read and write
7E0000
heap
page read and write
4C4E000
stack
page read and write
60FE000
stack
page read and write
11A2000
trusted library allocation
page execute and read and write
145E000
stack
page read and write
7EA000
heap
page read and write
7F0000
trusted library allocation
page read and write
791000
heap
page read and write
FDE000
stack
page read and write
51F0000
heap
page read and write
1060000
heap
page read and write
100E000
stack
page read and write
69B0000
heap
page read and write
17C7000
trusted library allocation
page execute and read and write
4FA000
stack
page read and write
A40000
trusted library allocation
page read and write
DB4000
heap
page read and write
3126000
trusted library allocation
page read and write
B1E000
heap
page read and write
669E000
stack
page read and write
5840000
trusted library section
page readonly
5100000
trusted library section
page readonly
68A0000
heap
page read and write
11B0000
heap
page read and write
116F000
stack
page read and write
1340000
trusted library allocation
page read and write
1660000
heap
page execute and read and write
14B0000
heap
page read and write
5D50000
trusted library allocation
page execute and read and write
5960000
unclassified section
page read and write
5210000
heap
page read and write
792000
heap
page read and write
566E000
stack
page read and write
55E8000
trusted library allocation
page read and write
831F000
stack
page read and write
4E6E000
heap
page read and write
6390000
trusted library allocation
page read and write
A6C000
trusted library allocation
page execute and read and write
1380000
heap
page read and write
3041000
trusted library allocation
page read and write
C08000
heap
page read and write
45E1000
trusted library allocation
page read and write
1122000
heap
page read and write
13B6000
trusted library allocation
page execute and read and write
782000
heap
page read and write
7F570000
trusted library allocation
page execute and read and write
1402000
trusted library allocation
page execute and read and write
4D90000
trusted library allocation
page read and write
138A000
trusted library allocation
page execute and read and write
11B8000
heap
page read and write
D3E000
stack
page read and write
CE2000
heap
page read and write
748000
heap
page read and write
10CE000
stack
page read and write
F50000
heap
page read and write
797000
heap
page read and write
75D000
heap
page read and write
410000
heap
page read and write
52CE000
stack
page read and write
7DF000
heap
page read and write
493E000
stack
page read and write
650000
heap
page read and write
5690000
heap
page read and write
1682000
trusted library allocation
page execute and read and write
13AA000
trusted library allocation
page execute and read and write
581C000
stack
page read and write
5690000
trusted library section
page readonly
5725000
heap
page read and write
1543000
heap
page read and write
749000
heap
page read and write
794000
heap
page read and write
6F0000
heap
page read and write
790000
heap
page read and write
797000
heap
page read and write
64A0000
trusted library allocation
page read and write
73A000
heap
page read and write
398C000
trusted library allocation
page read and write
77E000
heap
page read and write
5720000
heap
page read and write
569F000
trusted library allocation
page read and write
6B6E000
heap
page read and write
5385000
heap
page read and write
6FA000
heap
page read and write
135A000
trusted library allocation
page execute and read and write
3340000
trusted library allocation
page read and write
170B000
trusted library allocation
page execute and read and write
11C0000
heap
page read and write
5F9000
stack
page read and write
4CF2000
heap
page read and write
115B000
heap
page read and write
2C21000
trusted library allocation
page read and write
129A000
trusted library allocation
page execute and read and write
6AD0000
trusted library allocation
page read and write
54EE000
stack
page read and write
D8A000
stack
page read and write
4CF0000
heap
page read and write
794000
heap
page read and write
55E0000
trusted library allocation
page execute and read and write
4CF6000
heap
page read and write
781000
heap
page read and write
5A00000
heap
page read and write
30E2000
trusted library allocation
page read and write
6D2E000
stack
page read and write
3DE000
stack
page read and write
5FD0000
heap
page read and write
133E000
stack
page read and write
C63000
heap
page read and write
1390000
trusted library allocation
page read and write
582B000
stack
page read and write
4091000
trusted library allocation
page read and write
1385000
heap
page read and write
4CFC000
heap
page read and write
13EF000
stack
page read and write
14B0000
heap
page read and write
1192000
trusted library allocation
page execute and read and write
C8D000
heap
page read and write
4AD000
heap
page read and write
535E000
stack
page read and write
141B000
heap
page read and write
789000
heap
page read and write
53CE000
stack
page read and write
77E000
heap
page read and write
1382000
trusted library allocation
page read and write
B56000
heap
page read and write
7EA000
trusted library allocation
page execute and read and write
54AE000
stack
page read and write
1490000
heap
page read and write
16F2000
trusted library allocation
page execute and read and write
582D000
stack
page read and write
4607000
trusted library allocation
page read and write
44D4000
trusted library allocation
page read and write
EF6000
stack
page read and write
4CF1000
heap
page read and write
30EF000
trusted library allocation
page read and write
3091000
trusted library allocation
page read and write
786000
heap
page read and write
784000
heap
page read and write
5350000
heap
page read and write
FE0000
heap
page read and write
1417000
trusted library allocation
page execute and read and write
12EE000
stack
page read and write
56E0000
heap
page read and write
10F6000
stack
page read and write
1040000
heap
page read and write
812000
trusted library allocation
page execute and read and write
13B0000
trusted library allocation
page read and write
34D1000
trusted library allocation
page read and write
4D07000
heap
page read and write
4C9000
heap
page read and write
374E000
trusted library allocation
page read and write
6BED000
stack
page read and write
956000
stack
page read and write
12EF000
stack
page read and write
141B000
trusted library allocation
page execute and read and write
79C000
heap
page read and write
14EE000
heap
page read and write
4D0A000
heap
page read and write
47E000
heap
page read and write
AE5000
heap
page read and write
EA2000
trusted library allocation
page read and write
12A2000
trusted library allocation
page read and write
13BC000
trusted library allocation
page execute and read and write
13EE000
stack
page read and write
16C4000
heap
page read and write
4B5C000
stack
page read and write
51B0000
heap
page read and write
13F2000
trusted library allocation
page read and write
3636000
trusted library allocation
page read and write
4CD5000
heap
page read and write
3C21000
trusted library allocation
page read and write
6F2F000
stack
page read and write
4EC0000
trusted library allocation
page read and write
4CFC000
heap
page read and write
6CAF000
stack
page read and write
766000
heap
page read and write
A97000
trusted library allocation
page execute and read and write
729000
heap
page read and write
4DE0000
trusted library allocation
page read and write
78B000
heap
page read and write
795000
heap
page read and write
BD0000
heap
page read and write
802000
trusted library allocation
page read and write
5720000
heap
page read and write
5630000
trusted library section
page readonly
73F000
heap
page read and write
6ECE000
stack
page read and write
1470000
heap
page read and write
5690000
trusted library allocation
page read and write
795000
heap
page read and write
F56000
stack
page read and write
4A80000
trusted library allocation
page execute and read and write
47EE000
stack
page read and write
BA000
stack
page read and write
633E000
stack
page read and write
28DE000
stack
page read and write
930000
heap
page read and write
4A9000
heap
page read and write
5860000
heap
page read and write
151D000
heap
page read and write
There are 772 hidden memdumps, click here to show them.