IOC Report
Kayla Dennis CV.exe

loading gif

Files

File Path
Type
Category
Malicious
Kayla Dennis CV.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Kayla Dennis CV.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp796.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\lyKbfEsVYfQfU.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dije5tfe.4l3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hbx3wcr4.v1o.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_idfwexfp.szr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rw1q1ujt.44t.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sv33tv2a.etd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_udqbplrx.3c3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v1xs4nun.ptp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ylwee3hn.xov.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp2EE5.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Kayla Dennis CV.exe
"C:\Users\user\Desktop\Kayla Dennis CV.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Kayla Dennis CV.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp796.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe
C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp2EE5.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://crl.microHy1s.
unknown
http://checkip.dyndns.org/
132.226.247.73
http://checkip.dyndns.org/q
unknown
https://www.google.com/#q=
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
https://reallyfreegeoip.org/xml/155.94.241.187$
unknown
https://reallyfreegeoip.org/xml/155.94.241.187
188.114.96.3
https://reallyfreegeoip.org/xml/
unknown
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
checkip.dyndns.com
132.226.247.73
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
188.114.96.3
reallyfreegeoip.org
European Union
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2FD1000
trusted library allocation
page read and write
malicious
2A81000
trusted library allocation
page read and write
malicious
31A1000
trusted library allocation
page read and write
malicious
4421000
trusted library allocation
page read and write
malicious
2C4F000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
1242000
trusted library allocation
page read and write
35B3000
trusted library allocation
page read and write
2EBC000
trusted library allocation
page read and write
18B0000
heap
page read and write
6920000
heap
page read and write
2B85000
trusted library allocation
page read and write
FF2000
unkown
page readonly
14C6000
trusted library allocation
page execute and read and write
A41E000
stack
page read and write
560E000
stack
page read and write
3213000
trusted library allocation
page read and write
B7CC000
stack
page read and write
185D000
trusted library allocation
page execute and read and write
54D0000
trusted library allocation
page read and write
6770000
trusted library allocation
page execute and read and write
313C000
trusted library allocation
page read and write
61EE000
stack
page read and write
C92000
unkown
page readonly
312F000
trusted library allocation
page read and write
6560000
trusted library allocation
page execute and read and write
2CD9000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
3265000
trusted library allocation
page read and write
B55E000
stack
page read and write
3113000
trusted library allocation
page read and write
3603000
trusted library allocation
page read and write
2CC6000
trusted library allocation
page read and write
5CBD000
stack
page read and write
7701000
heap
page read and write
41C6000
trusted library allocation
page read and write
1840000
trusted library allocation
page read and write
18B8000
heap
page read and write
14F0000
trusted library allocation
page read and write
FAF000
heap
page read and write
54C0000
trusted library allocation
page read and write
859E000
stack
page read and write
2B2A000
trusted library allocation
page read and write
AD8C000
stack
page read and write
3AA9000
trusted library allocation
page read and write
1586000
heap
page read and write
B1D0000
trusted library allocation
page execute and read and write
1530000
heap
page read and write
ADCD000
stack
page read and write
1560000
trusted library allocation
page read and write
E90000
heap
page read and write
A7A0000
heap
page read and write
1AE0000
trusted library allocation
page read and write
64EE000
stack
page read and write
54BD000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
1860000
trusted library allocation
page read and write
5ACE000
stack
page read and write
4069000
trusted library allocation
page read and write
1890000
trusted library allocation
page read and write
2E6C000
stack
page read and write
AD1E000
stack
page read and write
3FD1000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
16DB000
heap
page read and write
7D50000
trusted library allocation
page execute and read and write
4F92000
trusted library allocation
page read and write
2E46000
trusted library allocation
page read and write
40FB000
trusted library allocation
page read and write
9FD000
stack
page read and write
2E74000
trusted library allocation
page read and write
2FB1000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
615E000
stack
page read and write
D90000
heap
page read and write
3081000
trusted library allocation
page read and write
1030000
heap
page execute and read and write
787F000
stack
page read and write
7980000
trusted library allocation
page read and write
6AE0000
trusted library allocation
page execute and read and write
2BD1000
trusted library allocation
page read and write
1877000
trusted library allocation
page execute and read and write
4FC4000
trusted library allocation
page read and write
184D000
trusted library allocation
page execute and read and write
DDE000
stack
page read and write
130E000
stack
page read and write
5080000
heap
page read and write
596B000
trusted library allocation
page read and write
160A000
heap
page read and write
14C0000
trusted library allocation
page read and write
FD3000
heap
page read and write
4F9E000
trusted library allocation
page read and write
30DB000
trusted library allocation
page read and write
567E000
stack
page read and write
C80000
heap
page read and write
3127000
trusted library allocation
page read and write
1010000
trusted library allocation
page execute and read and write
7FBE000
stack
page read and write
5130000
heap
page read and write
58A0000
trusted library allocation
page execute and read and write
636E000
stack
page read and write
8000000
trusted library allocation
page read and write
5940000
trusted library section
page readonly
292E000
stack
page read and write
61F0000
heap
page read and write
1308000
heap
page read and write
14C2000
trusted library allocation
page read and write
5892000
trusted library allocation
page read and write
2EB9000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
3181000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
1510000
trusted library allocation
page read and write
2E76000
trusted library allocation
page read and write
157E000
stack
page read and write
1872000
trusted library allocation
page read and write
7A0000
heap
page read and write
3AEB000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
15F0000
trusted library allocation
page read and write
B0A0000
heap
page read and write
6600000
heap
page read and write
6575000
heap
page read and write
2C41000
trusted library allocation
page read and write
557B000
stack
page read and write
5630000
trusted library allocation
page execute and read and write
58D5000
trusted library allocation
page read and write
6670000
trusted library allocation
page read and write
1574000
trusted library allocation
page read and write
1600000
heap
page read and write
2D0E000
trusted library allocation
page read and write
1040000
heap
page read and write
78D7000
heap
page read and write
E8F000
stack
page read and write
A8DE000
stack
page read and write
65FE000
stack
page read and write
14A4000
trusted library allocation
page read and write
1190000
heap
page read and write
6840000
trusted library allocation
page read and write
5CEE000
stack
page read and write
FA4000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
551B000
stack
page read and write
54F0000
heap
page read and write
532F000
stack
page read and write
68FE000
stack
page read and write
FDB000
trusted library allocation
page execute and read and write
2CC0000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
6A00000
trusted library allocation
page execute and read and write
3193000
trusted library allocation
page read and write
65B0000
heap
page read and write
168F000
stack
page read and write
30C9000
trusted library allocation
page read and write
1225000
heap
page read and write
5F6E000
stack
page read and write
2E95000
trusted library allocation
page read and write
66BE000
trusted library allocation
page read and write
2BD5000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
8112000
trusted library allocation
page read and write
14B0000
trusted library allocation
page read and write
2B77000
trusted library allocation
page read and write
DD8000
heap
page read and write
54F4000
heap
page read and write
312B000
trusted library allocation
page read and write
561E000
stack
page read and write
31AB000
heap
page read and write
5864000
trusted library allocation
page read and write
13EE000
heap
page read and write
1260000
trusted library allocation
page read and write
E0F000
unkown
page read and write
5A80000
trusted library allocation
page read and write
3421000
trusted library allocation
page read and write
5494000
trusted library allocation
page read and write
2BDD000
trusted library allocation
page read and write
5590000
heap
page read and write
320E000
trusted library allocation
page read and write
1490000
trusted library allocation
page read and write
1628000
heap
page read and write
1500000
trusted library allocation
page execute and read and write
3410000
heap
page execute and read and write
5E2F000
stack
page read and write
AF0E000
stack
page read and write
588D000
trusted library allocation
page read and write
6690000
trusted library allocation
page execute and read and write
6A30000
trusted library allocation
page read and write
3223000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
A10000
heap
page read and write
7C80000
trusted library allocation
page read and write
124B000
trusted library allocation
page execute and read and write
789F000
heap
page read and write
186A000
trusted library allocation
page execute and read and write
FD7000
trusted library allocation
page execute and read and write
6450000
heap
page read and write
6A2E000
trusted library allocation
page read and write
768E000
heap
page read and write
3089000
trusted library allocation
page read and write
111A000
stack
page read and write
5AF0000
trusted library allocation
page read and write
3158000
trusted library allocation
page read and write
6A70000
heap
page read and write
7B4E000
stack
page read and write
5890000
trusted library allocation
page read and write
1A08000
trusted library allocation
page read and write
FF0000
unkown
page readonly
CA0000
heap
page read and write
1850000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
2E41000
trusted library allocation
page read and write
586B000
trusted library allocation
page read and write
132A000
heap
page read and write
322C000
trusted library allocation
page read and write
33AF000
stack
page read and write
683F000
stack
page read and write
1862000
trusted library allocation
page read and write
148E000
stack
page read and write
2C33000
trusted library allocation
page read and write
3185000
trusted library allocation
page read and write
7990000
trusted library allocation
page execute and read and write
FAD000
trusted library allocation
page execute and read and write
A55D000
stack
page read and write
666E000
stack
page read and write
1200000
trusted library allocation
page read and write
561C000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
2B89000
trusted library allocation
page read and write
B21D000
stack
page read and write
E91000
heap
page read and write
63AE000
stack
page read and write
589E000
stack
page read and write
5990000
heap
page read and write
1236000
trusted library allocation
page execute and read and write
A9DE000
stack
page read and write
14AD000
trusted library allocation
page execute and read and write
2B8D000
trusted library allocation
page read and write
6665000
heap
page read and write
2EB7000
trusted library allocation
page read and write
B77000
stack
page read and write
2B62000
trusted library allocation
page read and write
4048000
trusted library allocation
page read and write
17FE000
stack
page read and write
2CE2000
trusted library allocation
page read and write
AC8C000
stack
page read and write
3084000
trusted library allocation
page read and write
5930000
heap
page read and write
644E000
stack
page read and write
2970000
heap
page read and write
134E000
stack
page read and write
652F000
stack
page read and write
1055000
heap
page read and write
3405000
trusted library allocation
page read and write
F37000
stack
page read and write
6254000
heap
page read and write
1240000
trusted library allocation
page read and write
A79D000
stack
page read and write
131E000
heap
page read and write
2E3A000
trusted library allocation
page read and write
2CDE000
trusted library allocation
page read and write
66BA000
trusted library allocation
page read and write
AECE000
stack
page read and write
311B000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
6947000
heap
page read and write
7FFE000
trusted library allocation
page read and write
7D60000
trusted library allocation
page read and write
AF5F000
stack
page read and write
6675000
trusted library allocation
page read and write
1203000
trusted library allocation
page execute and read and write
68BE000
stack
page read and write
2CBB000
trusted library allocation
page read and write
FA0000
trusted library allocation
page read and write
3400000
trusted library allocation
page read and write
5AD0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page execute and read and write
2E60000
heap
page execute and read and write
514A000
stack
page read and write
7C90000
trusted library allocation
page read and write
1039000
heap
page read and write
2E90000
trusted library allocation
page read and write
2B3E000
trusted library allocation
page read and write
1740000
trusted library allocation
page read and write
595E000
stack
page read and write
4F8E000
trusted library allocation
page read and write
587E000
trusted library allocation
page read and write
10C0000
heap
page read and write
54CD000
stack
page read and write
694F000
heap
page read and write
5B4E000
stack
page read and write
3FF9000
trusted library allocation
page read and write
19FE000
stack
page read and write
45F0000
trusted library allocation
page read and write
7C8D000
trusted library allocation
page read and write
FB7000
heap
page read and write
F9E000
heap
page read and write
56C0000
trusted library allocation
page read and write
7DDE000
stack
page read and write
6700000
heap
page read and write
33B0000
heap
page read and write
18A0000
trusted library allocation
page execute and read and write
314A000
trusted library allocation
page read and write
60EE000
stack
page read and write
5860000
trusted library allocation
page read and write
B030000
trusted library allocation
page execute and read and write
4FD0000
trusted library allocation
page read and write
6B20000
heap
page read and write
14CA000
trusted library allocation
page execute and read and write
3231000
trusted library allocation
page read and write
3117000
trusted library allocation
page read and write
121D000
trusted library allocation
page execute and read and write
5619000
trusted library allocation
page read and write
4160000
trusted library allocation
page read and write
AE5E000
stack
page read and write
B25D000
stack
page read and write
AF9D000
stack
page read and write
2B2D000
trusted library allocation
page read and write
54B6000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
869E000
stack
page read and write
1520000
trusted library allocation
page read and write
3DE000
unkown
page read and write
4FA1000
trusted library allocation
page read and write
F90000
heap
page read and write
AE1F000
stack
page read and write
2E3E000
trusted library allocation
page read and write
19BE000
stack
page read and write
4F60000
heap
page read and write
11F0000
trusted library allocation
page read and write
1220000
heap
page read and write
4061000
trusted library allocation
page read and write
5980000
heap
page execute and read and write
7880000
heap
page read and write
1580000
heap
page read and write
F98000
heap
page read and write
7C50000
heap
page read and write
65B000
heap
page read and write
4FC6000
trusted library allocation
page read and write
5950000
heap
page read and write
16BA000
heap
page read and write
2B81000
trusted library allocation
page read and write
B6CC000
stack
page read and write
2ED000
stack
page read and write
5620000
trusted library allocation
page execute and read and write
2EA0000
heap
page execute and read and write
66F0000
trusted library allocation
page execute and read and write
6905000
heap
page read and write
2C06000
trusted library allocation
page read and write
5968000
heap
page read and write
14D2000
trusted library allocation
page read and write
3140000
heap
page read and write
621F000
heap
page read and write
65E0000
heap
page read and write
5617000
trusted library allocation
page read and write
BE0000
heap
page read and write
F80000
heap
page read and write
1ADB000
stack
page read and write
5593000
heap
page read and write
2BD9000
trusted library allocation
page read and write
69FF000
stack
page read and write
6C90000
heap
page read and write
54B1000
trusted library allocation
page read and write
4632000
trusted library allocation
page read and write
144E000
stack
page read and write
DA8000
heap
page read and write
65D0000
heap
page read and write
66A0000
trusted library allocation
page read and write
656E000
stack
page read and write
2B4A000
trusted library allocation
page read and write
AA1E000
stack
page read and write
311F000
trusted library allocation
page read and write
65C0000
trusted library section
page readonly
A65E000
stack
page read and write
5B0D000
stack
page read and write
2FAF000
stack
page read and write
FD5000
trusted library allocation
page execute and read and write
1644000
heap
page read and write
1300000
heap
page read and write
10F0000
heap
page read and write
1843000
trusted library allocation
page execute and read and write
3B06000
trusted library allocation
page read and write
5881000
trusted library allocation
page read and write
12AE000
stack
page read and write
D90000
trusted library allocation
page read and write
3B10000
trusted library allocation
page read and write
E5F000
heap
page read and write
66C0000
trusted library allocation
page read and write
2BC1000
trusted library allocation
page read and write
4C1E000
stack
page read and write
31A0000
heap
page read and write
594B000
stack
page read and write
3679000
trusted library allocation
page read and write
313D000
trusted library allocation
page read and write
30D3000
trusted library allocation
page read and write
5083000
heap
page read and write
3259000
trusted library allocation
page read and write
63FF000
stack
page read and write
3209000
trusted library allocation
page read and write
1AF0000
heap
page read and write
554E000
stack
page read and write
A3DE000
stack
page read and write
33D0000
trusted library allocation
page read and write
505D000
stack
page read and write
14D7000
trusted library allocation
page execute and read and write
558D000
stack
page read and write
400000
remote allocation
page execute and read and write
7891000
heap
page read and write
C70000
heap
page read and write
2D18000
trusted library allocation
page read and write
E4E000
stack
page read and write
307C000
trusted library allocation
page read and write
AB1E000
stack
page read and write
5AC0000
trusted library allocation
page execute and read and write
58F0000
heap
page read and write
58B0000
trusted library allocation
page read and write
68F0000
trusted library section
page read and write
1580000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
2EC0000
heap
page read and write
FBD000
trusted library allocation
page execute and read and write
D80000
heap
page read and write
2BCD000
trusted library allocation
page read and write
5FAE000
stack
page read and write
308D000
trusted library allocation
page read and write
A79000
stack
page read and write
50CE000
stack
page read and write
1636000
heap
page read and write
D29000
stack
page read and write
2D12000
trusted library allocation
page read and write
1245000
trusted library allocation
page execute and read and write
5E6E000
stack
page read and write
10F5000
heap
page read and write
FC2000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
61FF000
stack
page read and write
667B000
trusted library allocation
page read and write
FA3000
trusted library allocation
page execute and read and write
5520000
heap
page execute and read and write
2EB0000
trusted library allocation
page read and write
FC6000
trusted library allocation
page execute and read and write
187B000
trusted library allocation
page execute and read and write
6900000
heap
page read and write
2E4D000
trusted library allocation
page read and write
4FA6000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
64FE000
stack
page read and write
30DF000
trusted library allocation
page read and write
14DB000
trusted library allocation
page execute and read and write
78B1000
heap
page read and write
4F80000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
ACDE000
stack
page read and write
4095000
trusted library allocation
page read and write
DA0000
heap
page read and write
5886000
trusted library allocation
page read and write
6580000
heap
page read and write
5630000
trusted library allocation
page execute and read and write
65AB000
stack
page read and write
2D0C000
trusted library allocation
page read and write
56BE000
stack
page read and write
2C13000
trusted library allocation
page read and write
FD2000
trusted library allocation
page read and write
B31D000
stack
page read and write
2D49000
trusted library allocation
page read and write
30D7000
trusted library allocation
page read and write
1336000
heap
page read and write
7BDE000
stack
page read and write
78AB000
heap
page read and write
7D70000
trusted library allocation
page execute and read and write
3235000
trusted library allocation
page read and write
7C80000
heap
page read and write
5490000
trusted library allocation
page read and write
6590000
heap
page read and write
7C4E000
stack
page read and write
682D000
stack
page read and write
1B06000
heap
page read and write
1844000
trusted library allocation
page read and write
3123000
trusted library allocation
page read and write
14F7000
stack
page read and write
B7D0000
heap
page read and write
1204000
trusted library allocation
page read and write
3E0000
heap
page read and write
7680000
heap
page read and write
2B32000
trusted library allocation
page read and write
549B000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
1247000
trusted library allocation
page execute and read and write
55CE000
stack
page read and write
296E000
stack
page read and write
4058000
trusted library allocation
page read and write
632E000
stack
page read and write
B010000
heap
page read and write
2FCE000
stack
page read and write
13C8000
heap
page read and write
390000
heap
page read and write
7FF0000
trusted library allocation
page read and write
2BC5000
trusted library allocation
page read and write
5964000
heap
page read and write
2C2F000
trusted library allocation
page read and write
120D000
trusted library allocation
page execute and read and write
14D0000
trusted library allocation
page read and write
5B00000
heap
page execute and read and write
7A10000
heap
page read and write
12F0000
trusted library allocation
page execute and read and write
6A20000
trusted library allocation
page read and write
2BF8000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
325F000
trusted library allocation
page read and write
55DD000
stack
page read and write
64AE000
stack
page read and write
3090000
trusted library allocation
page read and write
41C3000
trusted library allocation
page read and write
120E000
stack
page read and write
C90000
unkown
page readonly
5340000
heap
page execute and read and write
309A000
trusted library allocation
page read and write
123A000
trusted library allocation
page execute and read and write
84F0000
trusted library section
page read and write
329C000
trusted library allocation
page read and write
2E2E000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
5EAF000
stack
page read and write
655F000
stack
page read and write
56E0000
heap
page read and write
5620000
trusted library allocation
page execute and read and write
4FAD000
trusted library allocation
page read and write
14FF000
stack
page read and write
5A70000
trusted library allocation
page read and write
6670000
trusted library allocation
page execute and read and write
592C000
stack
page read and write
F70000
heap
page read and write
1232000
trusted library allocation
page read and write
4FFF000
trusted library allocation
page read and write
60AE000
stack
page read and write
B09D000
stack
page read and write
B41E000
stack
page read and write
309C000
trusted library allocation
page read and write
1866000
trusted library allocation
page execute and read and write
B45D000
stack
page read and write
2BEA000
trusted library allocation
page read and write
687E000
stack
page read and write
4FF0000
trusted library allocation
page read and write
5A60000
trusted library allocation
page execute and read and write
7CDE000
stack
page read and write
DE0000
heap
page read and write
2E2B000
trusted library allocation
page read and write
5D2E000
stack
page read and write
4027000
trusted library allocation
page read and write
11DE000
stack
page read and write
14BD000
trusted library allocation
page execute and read and write
4FB8000
trusted library allocation
page read and write
33F0000
trusted library allocation
page read and write
3219000
trusted library allocation
page read and write
1B00000
heap
page read and write
183D000
stack
page read and write
58D0000
trusted library allocation
page read and write
11E5000
heap
page read and write
5500000
trusted library allocation
page read and write
E3A000
stack
page read and write
14A3000
trusted library allocation
page execute and read and write
2E80000
trusted library allocation
page read and write
8BE000
stack
page read and write
3B1C000
trusted library allocation
page read and write
C9A000
unkown
page readonly
6231000
heap
page read and write
4FC0000
trusted library allocation
page read and write
1870000
trusted library allocation
page read and write
62FF000
stack
page read and write
56E0000
heap
page read and write
2BC9000
trusted library allocation
page read and write
2B48000
trusted library allocation
page read and write
6910000
heap
page read and write
6226000
heap
page read and write
30B4000
trusted library allocation
page read and write
4F9A000
trusted library allocation
page read and write
32A000
stack
page read and write
1180000
heap
page read and write
66B5000
trusted library allocation
page read and write
5A7E000
stack
page read and write
3A81000
trusted library allocation
page read and write
A69D000
stack
page read and write
5904000
heap
page read and write
DCE000
unkown
page read and write
5960000
heap
page read and write
1760000
heap
page read and write
B00F000
stack
page read and write
4F86000
trusted library allocation
page read and write
2B3B000
trusted library allocation
page read and write
78E000
stack
page read and write
54C2000
trusted library allocation
page read and write
66AB000
trusted library allocation
page read and write
655D000
stack
page read and write
5900000
heap
page read and write
6570000
heap
page read and write
F9E000
stack
page read and write
C85000
heap
page read and write
403C000
trusted library allocation
page read and write
C2E000
stack
page read and write
58F4000
heap
page read and write
673E000
stack
page read and write
4180000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
160E000
heap
page read and write
5A8E000
stack
page read and write
5AF5000
trusted library allocation
page read and write
406D000
trusted library allocation
page read and write
650000
heap
page read and write
422B000
trusted library allocation
page read and write
1590000
heap
page read and write
1210000
trusted library allocation
page read and write
4088000
trusted library allocation
page read and write
5A74000
trusted library allocation
page read and write
63F000
unkown
page read and write
10B0000
heap
page read and write
1540000
heap
page read and write
10F7000
stack
page read and write
6A1B000
trusted library allocation
page read and write
625E000
stack
page read and write
3FB1000
trusted library allocation
page read and write
5ABE000
stack
page read and write
58A0000
trusted library allocation
page read and write
B9DF000
stack
page read and write
C3A000
stack
page read and write
2D06000
trusted library allocation
page read and write
A51E000
stack
page read and write
12EE000
stack
page read and write
3601000
trusted library allocation
page read and write
78DC000
heap
page read and write
11E0000
heap
page read and write
2B79000
trusted library allocation
page read and write
5908000
heap
page read and write
DCA000
heap
page read and write
4FB2000
trusted library allocation
page read and write
FE0000
heap
page read and write
3165000
trusted library allocation
page read and write
2A7E000
stack
page read and write
FCA000
trusted library allocation
page execute and read and write
B8DE000
stack
page read and write
There are 630 hidden memdumps, click here to show them.