IOC Report
product11221.exe

loading gif

Files

File Path
Type
Category
Malicious
product11221.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp8776.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\xOqrCwLHNYO.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\product11221.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\xOqrCwLHNYO.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4yatiyy5.5ka.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_daymgxph.rka.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wzbv2lsy.4vz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z5xn21dc.2n2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp94C4.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\xOqrCwLHNYO.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\product11221.exe
"C:\Users\user\Desktop\product11221.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xOqrCwLHNYO.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xOqrCwLHNYO" /XML "C:\Users\user\AppData\Local\Temp\tmp8776.tmp"
malicious
C:\Users\user\Desktop\product11221.exe
"C:\Users\user\Desktop\product11221.exe"
malicious
C:\Users\user\AppData\Roaming\xOqrCwLHNYO.exe
C:\Users\user\AppData\Roaming\xOqrCwLHNYO.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xOqrCwLHNYO" /XML "C:\Users\user\AppData\Local\Temp\tmp94C4.tmp"
malicious
C:\Users\user\AppData\Roaming\xOqrCwLHNYO.exe
"C:\Users\user\AppData\Roaming\xOqrCwLHNYO.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.12.205
http://torosdental.com
unknown
https://api.ipify.org
unknown
http://www.ctvnews.ca/rss/business/ctv-news-business-headlines-1.867648
unknown
https://account.dyn.com/
unknown
http://www.ctvnews.ca/rss/ctvnews-ca-top-stories-public-rss-1.822009
unknown
http://xml.weather.yahoo.com/ns/rss/1.0
unknown
http://weather.yahooapis.com/forecastrss?w=4118
unknown
http://ip-api.com
unknown
http://mail.torosdental.com
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.torosdental.com
unknown
malicious
torosdental.com
159.253.43.92
api.ipify.org
104.26.12.205
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
104.26.12.205
api.ipify.org
United States
159.253.43.92
torosdental.com
Turkey

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\product11221_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\product11221_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\product11221_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\product11221_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\product11221_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\product11221_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\product11221_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\product11221_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\product11221_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\product11221_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\product11221_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\product11221_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\product11221_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\product11221_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xOqrCwLHNYO_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xOqrCwLHNYO_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xOqrCwLHNYO_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xOqrCwLHNYO_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xOqrCwLHNYO_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xOqrCwLHNYO_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xOqrCwLHNYO_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xOqrCwLHNYO_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xOqrCwLHNYO_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xOqrCwLHNYO_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xOqrCwLHNYO_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xOqrCwLHNYO_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xOqrCwLHNYO_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\xOqrCwLHNYO_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2C6C000
trusted library allocation
page read and write
malicious
3485000
trusted library allocation
page read and write
malicious
391B000
trusted library allocation
page read and write
malicious
3BF9000
trusted library allocation
page read and write
malicious
5110000
heap
page read and write
18E0000
heap
page read and write
726B000
trusted library allocation
page read and write
1B77000
heap
page read and write
7BFF000
stack
page read and write
5620000
heap
page read and write
8A7E000
stack
page read and write
6E80000
trusted library allocation
page read and write
1021000
heap
page read and write
932E000
stack
page read and write
26C2000
trusted library allocation
page read and write
6F6D000
stack
page read and write
3455000
trusted library allocation
page read and write
5F2C000
stack
page read and write
38B1000
trusted library allocation
page read and write
6D0C000
heap
page read and write
28F9000
trusted library allocation
page read and write
D00000
heap
page read and write
9F0000
heap
page read and write
5330000
trusted library allocation
page read and write
4708000
trusted library allocation
page read and write
95FF000
stack
page read and write
48C0000
trusted library allocation
page execute and read and write
57B0000
trusted library allocation
page read and write
4688000
trusted library allocation
page read and write
10A7000
heap
page read and write
511D000
trusted library allocation
page read and write
83B5000
heap
page read and write
638C000
heap
page read and write
EE0000
trusted library allocation
page read and write
7110000
trusted library allocation
page read and write
3897000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
46C8000
trusted library allocation
page read and write
4EB0000
heap
page read and write
11BC000
stack
page read and write
E7D000
trusted library allocation
page execute and read and write
79BE000
stack
page read and write
46A8000
trusted library allocation
page read and write
724E000
stack
page read and write
287C000
stack
page read and write
1736000
heap
page read and write
595C000
stack
page read and write
1A70000
trusted library allocation
page read and write
2942000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
1620000
trusted library allocation
page read and write
5360000
heap
page read and write
F6A000
heap
page read and write
551D000
stack
page read and write
68FF000
stack
page read and write
17E4000
heap
page read and write
6E10000
trusted library section
page read and write
738E000
stack
page read and write
728E000
stack
page read and write
674E000
stack
page read and write
2B7A000
stack
page read and write
4DE0000
trusted library allocation
page read and write
15FD000
trusted library allocation
page execute and read and write
ED0000
trusted library allocation
page read and write
34FA000
trusted library allocation
page read and write
341E000
stack
page read and write
8360000
heap
page read and write
456E000
trusted library allocation
page read and write
43A000
remote allocation
page execute and read and write
FA8000
heap
page read and write
6CE0000
heap
page read and write
7980000
heap
page read and write
5150000
trusted library allocation
page read and write
29E6000
trusted library allocation
page read and write
CC2000
heap
page read and write
556C000
stack
page read and write
844A000
heap
page read and write
4421000
trusted library allocation
page read and write
941D000
heap
page read and write
976E000
trusted library allocation
page read and write
5116000
trusted library allocation
page read and write
4EB3000
heap
page read and write
273E000
stack
page read and write
B84000
heap
page read and write
E67000
heap
page read and write
8EBD000
stack
page read and write
2B70000
trusted library allocation
page execute and read and write
40B000
remote allocation
page execute and read and write
62D7000
heap
page read and write
3010000
heap
page read and write
D05000
heap
page read and write
2BF0000
heap
page read and write
797F000
stack
page read and write
1650000
trusted library allocation
page execute and read and write
EF5000
trusted library allocation
page execute and read and write
26CB000
trusted library allocation
page execute and read and write
6D2E000
heap
page read and write
1100000
trusted library allocation
page read and write
5630000
heap
page read and write
1220000
heap
page read and write
53A0000
trusted library section
page readonly
29BE000
unkown
page read and write
51F0000
heap
page read and write
295B000
trusted library allocation
page execute and read and write
8BBF000
stack
page read and write
26C0000
trusted library allocation
page read and write
7170000
heap
page read and write
5044000
trusted library allocation
page read and write
8378000
heap
page read and write
690C000
stack
page read and write
5220000
heap
page read and write
7080000
trusted library allocation
page read and write
4748000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
3656000
trusted library allocation
page read and write
8372000
heap
page read and write
A3A000
stack
page read and write
40D000
remote allocation
page execute and read and write
28B1000
trusted library allocation
page read and write
EDD000
trusted library allocation
page execute and read and write
160D000
trusted library allocation
page execute and read and write
2A60000
heap
page read and write
35FB000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
4608000
trusted library allocation
page read and write
7130000
trusted library allocation
page execute and read and write
15F4000
trusted library allocation
page read and write
660E000
stack
page read and write
40C000
remote allocation
page execute and read and write
6C3C000
heap
page read and write
EC0000
trusted library allocation
page read and write
CA7000
heap
page read and write
301A000
heap
page read and write
5183000
heap
page read and write
E80000
heap
page read and write
EEA000
trusted library allocation
page execute and read and write
5A80000
heap
page read and write
5320000
trusted library allocation
page read and write
EE2000
trusted library allocation
page read and write
6E00000
trusted library section
page read and write
9445000
heap
page read and write
2FDF000
stack
page read and write
E50000
heap
page read and write
409000
remote allocation
page execute and read and write
50FB000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
1A10000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
EF2000
trusted library allocation
page read and write
7260000
trusted library allocation
page read and write
1AE0000
heap
page execute and read and write
43A2000
trusted library allocation
page read and write
1009000
heap
page read and write
5240000
heap
page read and write
6EFD000
stack
page read and write
5650000
heap
page read and write
E7E000
stack
page read and write
83DF000
heap
page read and write
6F7C000
stack
page read and write
5072000
trusted library allocation
page read and write
1610000
trusted library allocation
page read and write
6F6E000
trusted library allocation
page read and write
6EFD000
stack
page read and write
2946000
trusted library allocation
page execute and read and write
5977000
heap
page read and write
5090000
heap
page execute and read and write
5350000
heap
page read and write
516C000
stack
page read and write
637C000
heap
page read and write
404000
remote allocation
page execute and read and write
50F0000
trusted library allocation
page read and write
5CDC000
stack
page read and write
43E7000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
32E0000
heap
page read and write
C60000
heap
page read and write
1011000
heap
page read and write
443F000
trusted library allocation
page read and write
5122000
trusted library allocation
page read and write
513D000
trusted library allocation
page read and write
2E41000
trusted library allocation
page read and write
842B000
heap
page read and write
6F1F000
stack
page read and write
650E000
stack
page read and write
4A4C000
stack
page read and write
83BD000
heap
page read and write
3421000
trusted library allocation
page read and write
435000
remote allocation
page execute and read and write
4E70000
trusted library allocation
page read and write
5DDD000
stack
page read and write
6BDE000
stack
page read and write
369E000
trusted library allocation
page read and write
635D000
heap
page read and write
4E60000
heap
page read and write
4318000
trusted library allocation
page read and write
1A76000
trusted library allocation
page read and write
1808000
trusted library allocation
page read and write
7070000
trusted library allocation
page read and write
72CE000
stack
page read and write
6F60000
trusted library allocation
page read and write
1775000
heap
page read and write
46E8000
trusted library allocation
page read and write
4DBD000
trusted library allocation
page read and write
77ED000
stack
page read and write
6B40000
heap
page read and write
420000
remote allocation
page execute and read and write
294A000
trusted library allocation
page execute and read and write
FE90000
trusted library allocation
page read and write
8FAC000
stack
page read and write
B70000
heap
page read and write
B37000
stack
page read and write
CB4000
heap
page read and write
5139000
trusted library allocation
page read and write
706E000
stack
page read and write
EDD000
trusted library allocation
page execute and read and write
8452000
heap
page read and write
7F690000
trusted library allocation
page execute and read and write
6CFF000
heap
page read and write
448A000
trusted library allocation
page read and write
1708000
heap
page read and write
3B99000
trusted library allocation
page read and write
5061000
trusted library allocation
page read and write
29AE000
trusted library allocation
page read and write
4DAE000
trusted library allocation
page read and write
3608000
trusted library allocation
page read and write
3CBA000
trusted library allocation
page read and write
5132000
trusted library allocation
page read and write
1797000
heap
page read and write
C70000
heap
page read and write
66FB000
stack
page read and write
50F0000
trusted library section
page readonly
45E8000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
45B8000
trusted library allocation
page read and write
2880000
trusted library allocation
page execute and read and write
161A000
trusted library allocation
page execute and read and write
3739000
trusted library allocation
page read and write
883D000
stack
page read and write
1A42000
trusted library allocation
page read and write
7074000
trusted library allocation
page read and write
78EE000
stack
page read and write
B95000
heap
page read and write
2C11000
trusted library allocation
page read and write
974C000
stack
page read and write
841F000
heap
page read and write
F10000
trusted library allocation
page read and write
B5A000
heap
page read and write
4483000
trusted library allocation
page read and write
DE7000
heap
page read and write
C7F000
stack
page read and write
6F3F000
stack
page read and write
5070000
trusted library allocation
page read and write
1640000
trusted library allocation
page read and write
8417000
heap
page read and write
51AE000
stack
page read and write
1210000
trusted library allocation
page read and write
28A0000
heap
page execute and read and write
93BE000
stack
page read and write
11F0000
trusted library allocation
page read and write
8382000
heap
page read and write
112A000
stack
page read and write
4D90000
trusted library allocation
page read and write
427000
remote allocation
page execute and read and write
984C000
stack
page read and write
CFE000
stack
page read and write
7060000
trusted library allocation
page execute and read and write
69F0000
heap
page read and write
9390000
heap
page read and write
4DC2000
trusted library allocation
page read and write
8BFE000
stack
page read and write
6C7E000
stack
page read and write
5610000
heap
page read and write
7F5A0000
trusted library allocation
page execute and read and write
5120000
trusted library allocation
page read and write
539C000
stack
page read and write
3471000
trusted library allocation
page read and write
50F0000
heap
page read and write
717C000
stack
page read and write
1180000
heap
page read and write
18A0000
trusted library allocation
page read and write
2B80000
heap
page execute and read and write
B92000
heap
page read and write
4CCB000
stack
page read and write
6FB0000
trusted library allocation
page read and write
5A90000
heap
page read and write
680B000
stack
page read and write
1A5D000
trusted library allocation
page read and write
F30000
trusted library allocation
page read and write
4648000
trusted library allocation
page read and write
1A80000
trusted library allocation
page read and write
50A5000
trusted library allocation
page read and write
922E000
stack
page read and write
5111000
trusted library allocation
page read and write
2E19000
trusted library allocation
page read and write
91EE000
stack
page read and write
4628000
trusted library allocation
page read and write
1A4E000
trusted library allocation
page read and write
2970000
heap
page read and write
4E00000
trusted library allocation
page read and write
556E000
stack
page read and write
6CDF000
stack
page read and write
72D0000
heap
page read and write
94D7000
heap
page read and write
2C41000
trusted library allocation
page read and write
70FB000
stack
page read and write
EF6000
trusted library allocation
page execute and read and write
1A3B000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
18E7000
heap
page read and write
839C000
heap
page read and write
283F000
stack
page read and write
2F0E000
unkown
page read and write
192F000
stack
page read and write
EFB000
trusted library allocation
page execute and read and write
913E000
stack
page read and write
B5E000
heap
page read and write
E2E000
stack
page read and write
4DAD000
stack
page read and write
52F0000
trusted library allocation
page execute and read and write
B5E000
stack
page read and write
4768000
trusted library allocation
page read and write
2933000
trusted library allocation
page read and write
6E20000
trusted library allocation
page execute and read and write
8A3D000
stack
page read and write
1A30000
trusted library allocation
page read and write
1AC0000
heap
page execute and read and write
2F10000
heap
page read and write
1A74000
trusted library allocation
page read and write
5730000
trusted library allocation
page execute and read and write
CBE000
stack
page read and write
41D000
remote allocation
page execute and read and write
5230000
heap
page read and write
8E3E000
stack
page read and write
2DEB000
trusted library allocation
page read and write
2DEB000
heap
page read and write
16BE000
stack
page read and write
5170000
heap
page execute and read and write
57DD000
trusted library allocation
page read and write
1627000
trusted library allocation
page execute and read and write
E9E000
stack
page read and write
424000
remote allocation
page execute and read and write
843C000
heap
page read and write
7070000
trusted library section
page read and write
1733000
heap
page read and write
57C0000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
1700000
heap
page read and write
3107000
trusted library allocation
page read and write
10BE000
stack
page read and write
923F000
stack
page read and write
5074000
trusted library allocation
page read and write
30C7000
trusted library allocation
page read and write
1120000
trusted library allocation
page read and write
8260000
heap
page read and write
400000
remote allocation
page execute and read and write
107E000
stack
page read and write
2B91000
trusted library allocation
page read and write
6CEB000
heap
page read and write
988E000
stack
page read and write
2DE0000
heap
page read and write
1B70000
heap
page read and write
6E7E000
stack
page read and write
576E000
stack
page read and write
3C39000
trusted library allocation
page read and write
F8F000
stack
page read and write
2E90000
trusted library allocation
page read and write
B1E000
stack
page read and write
2DF8000
trusted library allocation
page read and write
2F8B000
trusted library allocation
page read and write
694C000
stack
page read and write
727E000
stack
page read and write
8435000
heap
page read and write
2D4F000
stack
page read and write
604D000
stack
page read and write
4DA0000
trusted library allocation
page read and write
5050000
trusted library allocation
page read and write
B75000
heap
page read and write
3948000
trusted library allocation
page read and write
7090000
heap
page read and write
8486000
heap
page read and write
2BD9000
trusted library allocation
page read and write
2D0E000
stack
page read and write
6361000
heap
page read and write
4C18000
trusted library allocation
page read and write
7113000
trusted library allocation
page read and write
94B0000
heap
page read and write
5180000
heap
page read and write
2C48000
trusted library allocation
page read and write
1670000
heap
page read and write
73F2000
trusted library allocation
page read and write
8499000
heap
page read and write
624B000
stack
page read and write
4DD0000
trusted library allocation
page read and write
7080000
heap
page read and write
15F3000
trusted library allocation
page execute and read and write
83E4000
heap
page read and write
108E000
stack
page read and write
2C56000
trusted library allocation
page read and write
9DF0000
trusted library allocation
page read and write
2EC3000
trusted library allocation
page read and write
8ABE000
stack
page read and write
11D0000
heap
page read and write
EE0000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
29BE000
stack
page read and write
1622000
trusted library allocation
page read and write
1A56000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
E88000
heap
page read and write
6384000
heap
page read and write
EF2000
trusted library allocation
page read and write
6350000
heap
page read and write
438000
remote allocation
page execute and read and write
1B2C000
stack
page read and write
F20000
trusted library allocation
page execute and read and write
6E1E000
stack
page read and write
EF7000
trusted library allocation
page execute and read and write
15F0000
trusted library allocation
page read and write
505E000
trusted library allocation
page read and write
EE3000
trusted library allocation
page read and write
C8E000
heap
page read and write
837C000
heap
page read and write
436000
remote allocation
page execute and read and write
7266000
trusted library allocation
page read and write
1200000
trusted library allocation
page read and write
6046000
trusted library allocation
page read and write
11E0000
heap
page read and write
10A0000
heap
page read and write
434000
remote allocation
page execute and read and write
4BCC000
stack
page read and write
6B30000
trusted library allocation
page execute and read and write
3C9A000
trusted library allocation
page read and write
F77000
heap
page read and write
1660000
trusted library allocation
page read and write
62A5000
heap
page read and write
6BEB000
heap
page read and write
6290000
heap
page read and write
2BCE000
stack
page read and write
83A2000
heap
page read and write
4E7D000
trusted library allocation
page read and write
7FA90000
trusted library allocation
page execute and read and write
758E000
stack
page read and write
2957000
trusted library allocation
page execute and read and write
8890000
heap
page read and write
798A000
heap
page read and write
2C35000
trusted library allocation
page read and write
3B91000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
117E000
stack
page read and write
57C3000
trusted library allocation
page read and write
94BA000
heap
page read and write
ECD000
trusted library allocation
page execute and read and write
DE0000
heap
page read and write
4449000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
4435000
trusted library allocation
page read and write
ED3000
trusted library allocation
page execute and read and write
4668000
trusted library allocation
page read and write
566E000
stack
page read and write
927D000
stack
page read and write
70A0000
heap
page read and write
2940000
trusted library allocation
page read and write
69A000
stack
page read and write
428000
remote allocation
page execute and read and write
6F50000
trusted library allocation
page execute and read and write
83AD000
heap
page read and write
162B000
trusted library allocation
page execute and read and write
6990000
trusted library allocation
page read and write
6C2A000
heap
page read and write
52DE000
stack
page read and write
3799000
trusted library allocation
page read and write
57D3000
trusted library allocation
page read and write
3C7A000
trusted library allocation
page read and write
84CD000
heap
page read and write
3651000
trusted library allocation
page read and write
4422000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
939D000
heap
page read and write
C4C000
heap
page read and write
6DBE000
stack
page read and write
403000
remote allocation
page execute and read and write
5100000
heap
page read and write
4DF0000
trusted library allocation
page read and write
C8A000
heap
page read and write
5960000
heap
page read and write
52E0000
trusted library allocation
page read and write
11C0000
heap
page read and write
17BC000
heap
page read and write
5010000
heap
page read and write
6C0000
unkown
page readonly
45C8000
trusted library allocation
page read and write
44A1000
trusted library allocation
page read and write
7190000
trusted library allocation
page read and write
70B0000
trusted library allocation
page execute and read and write
69A0000
trusted library allocation
page execute and read and write
90ED000
stack
page read and write
E74000
trusted library allocation
page read and write
2E26000
trusted library allocation
page read and write
6EBE000
stack
page read and write
48D0000
trusted library allocation
page read and write
93B1000
heap
page read and write
99A000
stack
page read and write
2D50000
heap
page read and write
14F8000
stack
page read and write
2952000
trusted library allocation
page read and write
3C11000
trusted library allocation
page read and write
664E000
stack
page read and write
5102000
trusted library allocation
page read and write
1675000
heap
page read and write
8D3E000
stack
page read and write
2A2D000
stack
page read and write
F00000
heap
page read and write
84D1000
heap
page read and write
53C0000
heap
page read and write
706E000
stack
page read and write
402000
remote allocation
page execute and read and write
6F6E000
stack
page read and write
8F30000
heap
page read and write
118E000
stack
page read and write
2E38000
trusted library allocation
page read and write
1B6E000
stack
page read and write
5E8C000
stack
page read and write
4E20000
trusted library allocation
page read and write
2940000
heap
page read and write
7250000
trusted library allocation
page execute and read and write
93F1000
heap
page read and write
838E000
heap
page read and write
7350000
heap
page read and write
937E000
stack
page read and write
CC0000
heap
page read and write
29D0000
trusted library allocation
page execute and read and write
93BC000
heap
page read and write
EC4000
trusted library allocation
page read and write
6FAE000
stack
page read and write
A3D0000
trusted library section
page read and write
6D7E000
stack
page read and write
29FF000
unkown
page read and write
2F5F000
unkown
page read and write
4DA4000
trusted library allocation
page read and write
6C27000
heap
page read and write
B50000
heap
page read and write
CF9000
stack
page read and write
18B0000
heap
page read and write
6C2C000
heap
page read and write
5A94000
heap
page read and write
196C000
stack
page read and write
7120000
trusted library allocation
page read and write
BFC000
heap
page read and write
8CFE000
stack
page read and write
94FE000
stack
page read and write
439000
remote allocation
page execute and read and write
ED0000
trusted library allocation
page read and write
2970000
trusted library allocation
page read and write
600B000
stack
page read and write
5130000
trusted library allocation
page read and write
8EC0000
heap
page read and write
B8F000
heap
page read and write
1616000
trusted library allocation
page execute and read and write
90AC000
stack
page read and write
D45000
heap
page read and write
797000
stack
page read and write
ED4000
trusted library allocation
page read and write
5ECC000
stack
page read and write
41A3000
trusted library allocation
page read and write
2E46000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
EF0000
trusted library allocation
page read and write
74FC000
stack
page read and write
3915000
trusted library allocation
page read and write
53B0000
heap
page read and write
707C000
stack
page read and write
1A51000
trusted library allocation
page read and write
38D9000
trusted library allocation
page read and write
748E000
stack
page read and write
EE6000
trusted library allocation
page execute and read and write
48D8000
trusted library allocation
page read and write
7194000
trusted library allocation
page read and write
6B92000
heap
page read and write
5080000
trusted library allocation
page execute and read and write
1204000
trusted library allocation
page read and write
787E000
stack
page read and write
5345000
heap
page read and write
7103000
trusted library allocation
page read and write
4E72000
trusted library allocation
page read and write
2B3D000
stack
page read and write
84AD000
heap
page read and write
8840000
heap
page read and write
19F0000
trusted library allocation
page read and write
5090000
trusted library allocation
page read and write
2C92000
trusted library allocation
page read and write
67CE000
stack
page read and write
88A0000
heap
page read and write
533E000
stack
page read and write
2BE0000
heap
page read and write
1600000
trusted library allocation
page read and write
3629000
trusted library allocation
page read and write
2F9E000
stack
page read and write
2D06000
trusted library allocation
page read and write
4728000
trusted library allocation
page read and write
77C000
unkown
page readonly
491D000
stack
page read and write
6CF0000
heap
page read and write
6AA0000
heap
page read and write
15E0000
trusted library allocation
page read and write
847A000
heap
page read and write
28BD000
stack
page read and write
F74000
heap
page read and write
1612000
trusted library allocation
page read and write
734E000
stack
page read and write
38B9000
trusted library allocation
page read and write
5340000
heap
page read and write
423000
remote allocation
page execute and read and write
E80000
heap
page read and write
FB5000
heap
page read and write
4DB7000
trusted library allocation
page read and write
EC3000
trusted library allocation
page execute and read and write
7EE70000
trusted library allocation
page execute and read and write
C80000
heap
page read and write
6900000
heap
page read and write
428E000
trusted library allocation
page read and write
2B6E000
stack
page read and write
83CA000
heap
page read and write
40A000
remote allocation
page execute and read and write
E73000
trusted library allocation
page execute and read and write
57AC000
stack
page read and write
5F9B000
stack
page read and write
11CE000
stack
page read and write
6A20000
trusted library allocation
page execute and read and write
702D000
stack
page read and write
83A8000
heap
page read and write
5720000
trusted library allocation
page read and write
5125000
trusted library allocation
page read and write
510E000
trusted library allocation
page read and write
8363000
heap
page read and write
41F000
remote allocation
page execute and read and write
26E0000
trusted library allocation
page read and write
1130000
trusted library allocation
page execute and read and write
4DD6000
trusted library allocation
page read and write
5060000
heap
page read and write
293D000
trusted library allocation
page execute and read and write
6B6C000
heap
page read and write
5340000
trusted library allocation
page execute and read and write
3BB9000
trusted library allocation
page read and write
405000
remote allocation
page execute and read and write
6323000
heap
page read and write
720E000
stack
page read and write
5FDD000
stack
page read and write
E55000
heap
page read and write
4E80000
trusted library allocation
page execute and read and write
5615000
heap
page read and write
8ED0000
heap
page read and write
5EEE000
stack
page read and write
B77000
heap
page read and write
6E30000
trusted library allocation
page read and write
50FE000
trusted library allocation
page read and write
83C5000
heap
page read and write
7240000
heap
page read and write
7AFE000
stack
page read and write
5070000
trusted library allocation
page read and write
E1E000
stack
page read and write
7F0000
heap
page read and write
AD0000
heap
page read and write
7340000
heap
page read and write
90FE000
stack
page read and write
EFA000
trusted library allocation
page execute and read and write
5FCE000
stack
page read and write
2CC0000
trusted library allocation
page read and write
7180000
heap
page read and write
51E0000
heap
page execute and read and write
5140000
trusted library allocation
page execute and read and write
E60000
heap
page read and write
346D000
trusted library allocation
page read and write
614E000
stack
page read and write
6C2000
unkown
page readonly
2890000
trusted library allocation
page read and write
1A20000
trusted library allocation
page execute and read and write
DD0000
heap
page read and write
45D8000
trusted library allocation
page read and write
1625000
trusted library allocation
page execute and read and write
1230000
heap
page read and write
2C00000
heap
page execute and read and write
421000
remote allocation
page execute and read and write
4E79000
trusted library allocation
page read and write
EED000
trusted library allocation
page execute and read and write
998E000
stack
page read and write
172A000
heap
page read and write
2C5A000
trusted library allocation
page read and write
93DC000
heap
page read and write
57D0000
trusted library allocation
page read and write
9476000
heap
page read and write
48D6000
trusted library allocation
page read and write
506D000
trusted library allocation
page read and write
8397000
heap
page read and write
2DFD000
trusted library allocation
page read and write
7100000
trusted library allocation
page read and write
16FC000
stack
page read and write
5224000
heap
page read and write
3519000
trusted library allocation
page read and write
2CA5000
trusted library allocation
page read and write
50EB000
stack
page read and write
5066000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
41E000
remote allocation
page execute and read and write
1A3E000
trusted library allocation
page read and write
7359000
heap
page read and write
5120000
heap
page read and write
4520000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
3080000
heap
page read and write
345F000
trusted library allocation
page read and write
1227000
heap
page read and write
7ABF000
stack
page read and write
422000
remote allocation
page execute and read and write
19AE000
stack
page read and write
EC0000
trusted library allocation
page read and write
8270000
heap
page read and write
7360000
trusted library allocation
page read and write
678E000
stack
page read and write
6040000
trusted library allocation
page read and write
18C0000
heap
page read and write
28F9000
stack
page read and write
F40000
heap
page read and write
29E0000
trusted library allocation
page read and write
72C0000
trusted library allocation
page execute and read and write
5970000
heap
page read and write
90BD000
stack
page read and write
4DF5000
trusted library allocation
page read and write
26F0000
heap
page read and write
94BE000
stack
page read and write
26C7000
trusted library allocation
page execute and read and write
711E000
trusted library allocation
page read and write
There are 728 hidden memdumps, click here to show them.