IOC Report
PRODUCT LIST.exe

loading gif

Files

File Path
Type
Category
Malicious
PRODUCT LIST.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PRODUCT LIST.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp2E0B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp2E2B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp2E2C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp2E4C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp2E4D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp2E5E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp2E5F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp2E70.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp2E71.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp665A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp666B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp667B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp668C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp669D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp66AD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp66BE.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp826A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp827B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp829B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp82AB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp82BC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp82CD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp9E3A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp9E5A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp9E6B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp9E7B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp9E8C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp9E9D.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpBC0E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpBC2E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpBC3F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpBC4F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpBC70.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD5AB.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpF553.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpF573.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpF594.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpF5A4.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PRODUCT LIST.exe
"C:\Users\user\Desktop\PRODUCT LIST.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
104.219.234.170:16383
malicious
http://104.219.234.170:16383/
104.219.234.170
malicious
http://104.219.234.170:16383t-
unknown
https://ipinfo.io/ip%appdata%
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
https://api.ip.sb
unknown
https://api.ip.sb/geoip
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE
unknown
https://api.ipify.orgcookies//settinString.Removeg
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
https://api.ipify.orgcookies//setti
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://104.219.234.170:16383
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://api.ipify.orgcoo
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb
unknown

IPs

IP
Domain
Country
Malicious
104.219.234.170
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRODUCT LIST_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRODUCT LIST_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRODUCT LIST_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRODUCT LIST_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRODUCT LIST_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRODUCT LIST_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRODUCT LIST_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRODUCT LIST_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRODUCT LIST_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRODUCT LIST_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRODUCT LIST_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRODUCT LIST_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRODUCT LIST_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRODUCT LIST_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1F2000
unkown
page execute read
malicious
6520000
trusted library allocation
page execute and read and write
808E000
stack
page read and write
62BE000
stack
page read and write
4155000
trusted library allocation
page read and write
BB0000
heap
page read and write
411A000
trusted library allocation
page read and write
6648000
trusted library allocation
page read and write
F29000
heap
page read and write
396000
unkown
page execute and read and write
54A1000
trusted library allocation
page read and write
216000
unkown
page execute and read and write
34B7000
trusted library allocation
page read and write
FD2000
trusted library allocation
page read and write
6655000
trusted library allocation
page read and write
28D0000
heap
page read and write
2E8C000
stack
page read and write
67E0000
trusted library allocation
page read and write
5A1D000
stack
page read and write
6B82000
trusted library allocation
page read and write
62D4000
heap
page read and write
32FE000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
E95000
heap
page read and write
5780000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
40A2000
trusted library allocation
page read and write
64C0000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
562D000
stack
page read and write
FD0000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
32A8000
trusted library allocation
page read and write
2E4F000
stack
page read and write
6660000
trusted library allocation
page read and write
6B76000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
5540000
trusted library allocation
page execute and read and write
6EFB000
stack
page read and write
390000
unkown
page execute and read and write
512B000
trusted library allocation
page read and write
39A000
unkown
page execute and read and write
6670000
trusted library allocation
page read and write
4109000
trusted library allocation
page read and write
6309000
heap
page read and write
FB2000
trusted library allocation
page read and write
416D000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
7480000
trusted library allocation
page read and write
1000000
trusted library allocation
page execute and read and write
7732000
heap
page read and write
3040000
heap
page execute and read and write
30F0000
trusted library allocation
page read and write
38A000
unkown
page execute and read and write
35ED000
trusted library allocation
page read and write
398000
unkown
page execute and read and write
55C0000
trusted library allocation
page read and write
411F000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
6675000
trusted library allocation
page read and write
651E000
stack
page read and write
6B78000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
4173000
trusted library allocation
page read and write
6B6E000
trusted library allocation
page read and write
FCA000
heap
page read and write
6B68000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
B37000
stack
page read and write
32B1000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
4051000
trusted library allocation
page read and write
4128000
trusted library allocation
page read and write
7761000
heap
page read and write
5160000
trusted library allocation
page read and write
112E000
stack
page read and write
E5E000
heap
page read and write
6B5C000
trusted library allocation
page read and write
4125000
trusted library allocation
page read and write
30E3000
trusted library allocation
page read and write
6630000
trusted library allocation
page read and write
675D000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
7470000
heap
page read and write
FB0000
trusted library allocation
page read and write
634D000
heap
page read and write
404000
unkown
page execute and read and write
4085000
trusted library allocation
page read and write
38E000
unkown
page execute and read and write
405E000
trusted library allocation
page read and write
F9D000
trusted library allocation
page execute and read and write
7730000
heap
page read and write
6664000
trusted library allocation
page read and write
5FE000
unkown
page execute read
31FF000
trusted library allocation
page read and write
40DA000
trusted library allocation
page read and write
414F000
trusted library allocation
page read and write
4168000
trusted library allocation
page read and write
3485000
trusted library allocation
page read and write
323F000
trusted library allocation
page read and write
55E0000
trusted library allocation
page execute and read and write
407E000
trusted library allocation
page read and write
FDB000
trusted library allocation
page execute and read and write
F93000
trusted library allocation
page execute and read and write
F22000
heap
page read and write
50DE000
stack
page read and write
6ACE000
stack
page read and write
A3B000
stack
page read and write
6D00000
trusted library allocation
page read and write
7520000
heap
page read and write
7FB70000
trusted library allocation
page execute and read and write
2E90000
heap
page read and write
6B71000
trusted library allocation
page read and write
6750000
trusted library allocation
page read and write
E5A000
heap
page read and write
384000
unkown
page execute and read and write
3433000
trusted library allocation
page read and write
6780000
heap
page read and write
E50000
heap
page read and write
408F000
trusted library allocation
page read and write
C50000
heap
page read and write
41B1000
trusted library allocation
page read and write
1F2000
unkown
page execute read
C3E000
stack
page read and write
1F0000
unkown
page readonly
7490000
trusted library allocation
page read and write
5164000
trusted library allocation
page read and write
5142000
trusted library allocation
page read and write
5480000
trusted library allocation
page read and write
40C4000
trusted library allocation
page read and write
20E000
unkown
page read and write
FB6000
trusted library allocation
page execute and read and write
6D60000
trusted library allocation
page execute and read and write
5050000
trusted library allocation
page read and write
74D0000
trusted library allocation
page execute and read and write
412E000
trusted library allocation
page read and write
6B64000
trusted library allocation
page read and write
318D000
trusted library allocation
page read and write
416B000
trusted library allocation
page read and write
665A000
trusted library allocation
page read and write
5170000
heap
page execute and read and write
5490000
trusted library allocation
page read and write
3271000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
347B000
trusted library allocation
page read and write
6B85000
trusted library allocation
page read and write
3119000
trusted library allocation
page read and write
20C000
unkown
page readonly
409A000
trusted library allocation
page read and write
577E000
stack
page read and write
30A0000
trusted library allocation
page read and write
20E000
unkown
page write copy
F80000
trusted library allocation
page read and write
4180000
trusted library allocation
page read and write
40E2000
trusted library allocation
page read and write
6D1D000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
4094000
trusted library allocation
page read and write
66ED000
stack
page read and write
664A000
trusted library allocation
page read and write
30E8000
trusted library allocation
page read and write
5A80000
trusted library allocation
page read and write
31C4000
trusted library allocation
page read and write
64BE000
stack
page read and write
514E000
trusted library allocation
page read and write
214000
unkown
page readonly
6BEE000
stack
page read and write
6B54000
trusted library allocation
page read and write
386000
unkown
page execute and read and write
5670000
trusted library allocation
page execute and read and write
38C000
unkown
page execute and read and write
392000
unkown
page execute and read and write
F50000
heap
page read and write
40CA000
trusted library allocation
page read and write
6CEE000
stack
page read and write
664F000
trusted library allocation
page read and write
672E000
stack
page read and write
547E000
stack
page read and write
665F000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
64D0000
trusted library allocation
page execute and read and write
FA0000
trusted library allocation
page read and write
61BF000
stack
page read and write
40ED000
trusted library allocation
page read and write
6B7D000
trusted library allocation
page read and write
527F000
stack
page read and write
64C2000
trusted library allocation
page read and write
4098000
trusted library allocation
page read and write
7753000
heap
page read and write
5120000
trusted library allocation
page read and write
31CD000
trusted library allocation
page read and write
E89000
heap
page read and write
3051000
trusted library allocation
page read and write
6D07000
trusted library allocation
page read and write
6382000
heap
page read and write
6D20000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
409D000
trusted library allocation
page read and write
6B0E000
stack
page read and write
F1C000
heap
page read and write
6740000
trusted library allocation
page execute and read and write
5A5E000
stack
page read and write
35FF000
trusted library allocation
page read and write
4123000
trusted library allocation
page read and write
FC7000
heap
page read and write
537E000
stack
page read and write
511E000
stack
page read and write
37E000
unkown
page execute and read and write
5131000
trusted library allocation
page read and write
6B56000
trusted library allocation
page read and write
6B4F000
stack
page read and write
6B5F000
trusted library allocation
page read and write
6672000
trusted library allocation
page read and write
FD7000
trusted library allocation
page execute and read and write
74E0000
trusted library allocation
page execute and read and write
344C000
trusted library allocation
page read and write
6635000
trusted library allocation
page read and write
62C0000
heap
page read and write
55A0000
trusted library allocation
page read and write
382000
unkown
page execute and read and write
3159000
trusted library allocation
page read and write
74F0000
trusted library allocation
page execute and read and write
4110000
trusted library allocation
page read and write
388000
unkown
page execute and read and write
762E000
stack
page read and write
415C000
trusted library allocation
page read and write
4062000
trusted library allocation
page read and write
40DD000
trusted library allocation
page read and write
30B4000
trusted library allocation
page read and write
344A000
trusted library allocation
page read and write
796D000
stack
page read and write
509E000
stack
page read and write
5520000
trusted library allocation
page read and write
303D000
stack
page read and write
2D4E000
stack
page read and write
BFE000
stack
page read and write
662E000
stack
page read and write
1020000
heap
page read and write
FC0000
heap
page read and write
639D000
heap
page read and write
408B000
trusted library allocation
page read and write
5590000
trusted library allocation
page read and write
40A7000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
415F000
trusted library allocation
page read and write
63B8000
heap
page read and write
62DC000
heap
page read and write
5530000
trusted library allocation
page read and write
FAD000
trusted library allocation
page execute and read and write
1010000
trusted library allocation
page read and write
40E8000
trusted library allocation
page read and write
30DD000
trusted library allocation
page read and write
4190000
trusted library allocation
page read and write
2EA8000
trusted library allocation
page read and write
1F0000
unkown
page readonly
4165000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
5510000
trusted library allocation
page execute and read and write
40E0000
trusted library allocation
page read and write
20A000
unkown
page readonly
516A000
trusted library allocation
page read and write
BA0000
heap
page read and write
566E000
stack
page read and write
55BA000
trusted library allocation
page read and write
E2E000
stack
page read and write
578B000
trusted library allocation
page read and write
4132000
trusted library allocation
page read and write
4116000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
6639000
trusted library allocation
page read and write
FD5000
trusted library allocation
page execute and read and write
55BD000
trusted library allocation
page read and write
F94000
trusted library allocation
page read and write
7500000
heap
page read and write
6632000
trusted library allocation
page read and write
380000
unkown
page execute and read and write
6D80000
trusted library allocation
page execute and read and write
635D000
heap
page read and write
40D1000
trusted library allocation
page read and write
67CE000
stack
page read and write
5136000
trusted library allocation
page read and write
394000
unkown
page execute and read and write
3236000
trusted library allocation
page read and write
40D4000
trusted library allocation
page read and write
There are 275 hidden memdumps, click here to show them.