Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Kayla Dennis CV.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Kayla Dennis CV.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp796.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\lyKbfEsVYfQfU.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dije5tfe.4l3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hbx3wcr4.v1o.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_idfwexfp.szr.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rw1q1ujt.44t.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sv33tv2a.etd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_udqbplrx.3c3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v1xs4nun.ptp.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ylwee3hn.xov.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp2EE5.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Kayla Dennis CV.exe
|
"C:\Users\user\Desktop\Kayla Dennis CV.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Kayla Dennis
CV.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp796.tmp"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe
|
C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp2EE5.tmp"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 5 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://crl.microHy1s.
|
unknown
|
||
http://checkip.dyndns.org/
|
132.226.247.73
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://www.google.com/#q=
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://checkip.dyndns.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
|
unknown
|
||
https://reallyfreegeoip.org/xml/155.94.241.187$
|
unknown
|
||
https://reallyfreegeoip.org/xml/155.94.241.187
|
188.114.96.3
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 3 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.96.3
|
||
checkip.dyndns.com
|
132.226.247.73
|
||
checkip.dyndns.org
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.96.3
|
reallyfreegeoip.org
|
European Union
|
||
132.226.247.73
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2FD1000
|
trusted library allocation
|
page read and write
|
||
2A81000
|
trusted library allocation
|
page read and write
|
||
31A1000
|
trusted library allocation
|
page read and write
|
||
4421000
|
trusted library allocation
|
page read and write
|
||
2C4F000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
1242000
|
trusted library allocation
|
page read and write
|
||
35B3000
|
trusted library allocation
|
page read and write
|
||
2EBC000
|
trusted library allocation
|
page read and write
|
||
18B0000
|
heap
|
page read and write
|
||
6920000
|
heap
|
page read and write
|
||
2B85000
|
trusted library allocation
|
page read and write
|
||
FF2000
|
unkown
|
page readonly
|
||
14C6000
|
trusted library allocation
|
page execute and read and write
|
||
A41E000
|
stack
|
page read and write
|
||
560E000
|
stack
|
page read and write
|
||
3213000
|
trusted library allocation
|
page read and write
|
||
B7CC000
|
stack
|
page read and write
|
||
185D000
|
trusted library allocation
|
page execute and read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
6770000
|
trusted library allocation
|
page execute and read and write
|
||
313C000
|
trusted library allocation
|
page read and write
|
||
61EE000
|
stack
|
page read and write
|
||
C92000
|
unkown
|
page readonly
|
||
312F000
|
trusted library allocation
|
page read and write
|
||
6560000
|
trusted library allocation
|
page execute and read and write
|
||
2CD9000
|
trusted library allocation
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
2E20000
|
trusted library allocation
|
page read and write
|
||
3265000
|
trusted library allocation
|
page read and write
|
||
B55E000
|
stack
|
page read and write
|
||
3113000
|
trusted library allocation
|
page read and write
|
||
3603000
|
trusted library allocation
|
page read and write
|
||
2CC6000
|
trusted library allocation
|
page read and write
|
||
5CBD000
|
stack
|
page read and write
|
||
7701000
|
heap
|
page read and write
|
||
41C6000
|
trusted library allocation
|
page read and write
|
||
1840000
|
trusted library allocation
|
page read and write
|
||
18B8000
|
heap
|
page read and write
|
||
14F0000
|
trusted library allocation
|
page read and write
|
||
FAF000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
859E000
|
stack
|
page read and write
|
||
2B2A000
|
trusted library allocation
|
page read and write
|
||
AD8C000
|
stack
|
page read and write
|
||
3AA9000
|
trusted library allocation
|
page read and write
|
||
1586000
|
heap
|
page read and write
|
||
B1D0000
|
trusted library allocation
|
page execute and read and write
|
||
1530000
|
heap
|
page read and write
|
||
ADCD000
|
stack
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
A7A0000
|
heap
|
page read and write
|
||
1AE0000
|
trusted library allocation
|
page read and write
|
||
64EE000
|
stack
|
page read and write
|
||
54BD000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
1860000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
stack
|
page read and write
|
||
4069000
|
trusted library allocation
|
page read and write
|
||
1890000
|
trusted library allocation
|
page read and write
|
||
2E6C000
|
stack
|
page read and write
|
||
AD1E000
|
stack
|
page read and write
|
||
3FD1000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
16DB000
|
heap
|
page read and write
|
||
7D50000
|
trusted library allocation
|
page execute and read and write
|
||
4F92000
|
trusted library allocation
|
page read and write
|
||
2E46000
|
trusted library allocation
|
page read and write
|
||
40FB000
|
trusted library allocation
|
page read and write
|
||
9FD000
|
stack
|
page read and write
|
||
2E74000
|
trusted library allocation
|
page read and write
|
||
2FB1000
|
trusted library allocation
|
page read and write
|
||
326B000
|
trusted library allocation
|
page read and write
|
||
615E000
|
stack
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
3081000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page execute and read and write
|
||
787F000
|
stack
|
page read and write
|
||
7980000
|
trusted library allocation
|
page read and write
|
||
6AE0000
|
trusted library allocation
|
page execute and read and write
|
||
2BD1000
|
trusted library allocation
|
page read and write
|
||
1877000
|
trusted library allocation
|
page execute and read and write
|
||
4FC4000
|
trusted library allocation
|
page read and write
|
||
184D000
|
trusted library allocation
|
page execute and read and write
|
||
DDE000
|
stack
|
page read and write
|
||
130E000
|
stack
|
page read and write
|
||
5080000
|
heap
|
page read and write
|
||
596B000
|
trusted library allocation
|
page read and write
|
||
160A000
|
heap
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page read and write
|
||
FD3000
|
heap
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
30DB000
|
trusted library allocation
|
page read and write
|
||
567E000
|
stack
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
3127000
|
trusted library allocation
|
page read and write
|
||
1010000
|
trusted library allocation
|
page execute and read and write
|
||
7FBE000
|
stack
|
page read and write
|
||
5130000
|
heap
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page execute and read and write
|
||
636E000
|
stack
|
page read and write
|
||
8000000
|
trusted library allocation
|
page read and write
|
||
5940000
|
trusted library section
|
page readonly
|
||
292E000
|
stack
|
page read and write
|
||
61F0000
|
heap
|
page read and write
|
||
1308000
|
heap
|
page read and write
|
||
14C2000
|
trusted library allocation
|
page read and write
|
||
5892000
|
trusted library allocation
|
page read and write
|
||
2EB9000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
trusted library allocation
|
page read and write
|
||
3181000
|
trusted library allocation
|
page read and write
|
||
33E0000
|
trusted library allocation
|
page read and write
|
||
1510000
|
trusted library allocation
|
page read and write
|
||
2E76000
|
trusted library allocation
|
page read and write
|
||
157E000
|
stack
|
page read and write
|
||
1872000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
3AEB000
|
trusted library allocation
|
page read and write
|
||
2E70000
|
trusted library allocation
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
B0A0000
|
heap
|
page read and write
|
||
6600000
|
heap
|
page read and write
|
||
6575000
|
heap
|
page read and write
|
||
2C41000
|
trusted library allocation
|
page read and write
|
||
557B000
|
stack
|
page read and write
|
||
5630000
|
trusted library allocation
|
page execute and read and write
|
||
58D5000
|
trusted library allocation
|
page read and write
|
||
6670000
|
trusted library allocation
|
page read and write
|
||
1574000
|
trusted library allocation
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
2D0E000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
78D7000
|
heap
|
page read and write
|
||
E8F000
|
stack
|
page read and write
|
||
A8DE000
|
stack
|
page read and write
|
||
65FE000
|
stack
|
page read and write
|
||
14A4000
|
trusted library allocation
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
5CEE000
|
stack
|
page read and write
|
||
FA4000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
551B000
|
stack
|
page read and write
|
||
54F0000
|
heap
|
page read and write
|
||
532F000
|
stack
|
page read and write
|
||
68FE000
|
stack
|
page read and write
|
||
FDB000
|
trusted library allocation
|
page execute and read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
trusted library allocation
|
page read and write
|
||
6A00000
|
trusted library allocation
|
page execute and read and write
|
||
3193000
|
trusted library allocation
|
page read and write
|
||
65B0000
|
heap
|
page read and write
|
||
168F000
|
stack
|
page read and write
|
||
30C9000
|
trusted library allocation
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
5F6E000
|
stack
|
page read and write
|
||
2E95000
|
trusted library allocation
|
page read and write
|
||
66BE000
|
trusted library allocation
|
page read and write
|
||
2BD5000
|
trusted library allocation
|
page read and write
|
||
6A10000
|
trusted library allocation
|
page read and write
|
||
8112000
|
trusted library allocation
|
page read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
2B77000
|
trusted library allocation
|
page read and write
|
||
DD8000
|
heap
|
page read and write
|
||
54F4000
|
heap
|
page read and write
|
||
312B000
|
trusted library allocation
|
page read and write
|
||
561E000
|
stack
|
page read and write
|
||
31AB000
|
heap
|
page read and write
|
||
5864000
|
trusted library allocation
|
page read and write
|
||
13EE000
|
heap
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
E0F000
|
unkown
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
3421000
|
trusted library allocation
|
page read and write
|
||
5494000
|
trusted library allocation
|
page read and write
|
||
2BDD000
|
trusted library allocation
|
page read and write
|
||
5590000
|
heap
|
page read and write
|
||
320E000
|
trusted library allocation
|
page read and write
|
||
1490000
|
trusted library allocation
|
page read and write
|
||
1628000
|
heap
|
page read and write
|
||
1500000
|
trusted library allocation
|
page execute and read and write
|
||
3410000
|
heap
|
page execute and read and write
|
||
5E2F000
|
stack
|
page read and write
|
||
AF0E000
|
stack
|
page read and write
|
||
588D000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page execute and read and write
|
||
6A30000
|
trusted library allocation
|
page read and write
|
||
3223000
|
trusted library allocation
|
page read and write
|
||
1230000
|
trusted library allocation
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
124B000
|
trusted library allocation
|
page execute and read and write
|
||
789F000
|
heap
|
page read and write
|
||
186A000
|
trusted library allocation
|
page execute and read and write
|
||
FD7000
|
trusted library allocation
|
page execute and read and write
|
||
6450000
|
heap
|
page read and write
|
||
6A2E000
|
trusted library allocation
|
page read and write
|
||
768E000
|
heap
|
page read and write
|
||
3089000
|
trusted library allocation
|
page read and write
|
||
111A000
|
stack
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page read and write
|
||
3158000
|
trusted library allocation
|
page read and write
|
||
6A70000
|
heap
|
page read and write
|
||
7B4E000
|
stack
|
page read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
1A08000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
unkown
|
page readonly
|
||
CA0000
|
heap
|
page read and write
|
||
1850000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
2E41000
|
trusted library allocation
|
page read and write
|
||
586B000
|
trusted library allocation
|
page read and write
|
||
132A000
|
heap
|
page read and write
|
||
322C000
|
trusted library allocation
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
683F000
|
stack
|
page read and write
|
||
1862000
|
trusted library allocation
|
page read and write
|
||
148E000
|
stack
|
page read and write
|
||
2C33000
|
trusted library allocation
|
page read and write
|
||
3185000
|
trusted library allocation
|
page read and write
|
||
7990000
|
trusted library allocation
|
page execute and read and write
|
||
FAD000
|
trusted library allocation
|
page execute and read and write
|
||
A55D000
|
stack
|
page read and write
|
||
666E000
|
stack
|
page read and write
|
||
1200000
|
trusted library allocation
|
page read and write
|
||
561C000
|
trusted library allocation
|
page read and write
|
||
58C0000
|
trusted library allocation
|
page read and write
|
||
2B89000
|
trusted library allocation
|
page read and write
|
||
B21D000
|
stack
|
page read and write
|
||
E91000
|
heap
|
page read and write
|
||
63AE000
|
stack
|
page read and write
|
||
589E000
|
stack
|
page read and write
|
||
5990000
|
heap
|
page read and write
|
||
1236000
|
trusted library allocation
|
page execute and read and write
|
||
A9DE000
|
stack
|
page read and write
|
||
14AD000
|
trusted library allocation
|
page execute and read and write
|
||
2B8D000
|
trusted library allocation
|
page read and write
|
||
6665000
|
heap
|
page read and write
|
||
2EB7000
|
trusted library allocation
|
page read and write
|
||
B77000
|
stack
|
page read and write
|
||
2B62000
|
trusted library allocation
|
page read and write
|
||
4048000
|
trusted library allocation
|
page read and write
|
||
17FE000
|
stack
|
page read and write
|
||
2CE2000
|
trusted library allocation
|
page read and write
|
||
AC8C000
|
stack
|
page read and write
|
||
3084000
|
trusted library allocation
|
page read and write
|
||
5930000
|
heap
|
page read and write
|
||
644E000
|
stack
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
652F000
|
stack
|
page read and write
|
||
1055000
|
heap
|
page read and write
|
||
3405000
|
trusted library allocation
|
page read and write
|
||
F37000
|
stack
|
page read and write
|
||
6254000
|
heap
|
page read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
A79D000
|
stack
|
page read and write
|
||
131E000
|
heap
|
page read and write
|
||
2E3A000
|
trusted library allocation
|
page read and write
|
||
2CDE000
|
trusted library allocation
|
page read and write
|
||
66BA000
|
trusted library allocation
|
page read and write
|
||
AECE000
|
stack
|
page read and write
|
||
311B000
|
trusted library allocation
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
6947000
|
heap
|
page read and write
|
||
7FFE000
|
trusted library allocation
|
page read and write
|
||
7D60000
|
trusted library allocation
|
page read and write
|
||
AF5F000
|
stack
|
page read and write
|
||
6675000
|
trusted library allocation
|
page read and write
|
||
1203000
|
trusted library allocation
|
page execute and read and write
|
||
68BE000
|
stack
|
page read and write
|
||
2CBB000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page read and write
|
||
3400000
|
trusted library allocation
|
page read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
6A60000
|
trusted library allocation
|
page execute and read and write
|
||
2E60000
|
heap
|
page execute and read and write
|
||
514A000
|
stack
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
1039000
|
heap
|
page read and write
|
||
2E90000
|
trusted library allocation
|
page read and write
|
||
2B3E000
|
trusted library allocation
|
page read and write
|
||
1740000
|
trusted library allocation
|
page read and write
|
||
595E000
|
stack
|
page read and write
|
||
4F8E000
|
trusted library allocation
|
page read and write
|
||
587E000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
54CD000
|
stack
|
page read and write
|
||
694F000
|
heap
|
page read and write
|
||
5B4E000
|
stack
|
page read and write
|
||
3FF9000
|
trusted library allocation
|
page read and write
|
||
19FE000
|
stack
|
page read and write
|
||
45F0000
|
trusted library allocation
|
page read and write
|
||
7C8D000
|
trusted library allocation
|
page read and write
|
||
FB7000
|
heap
|
page read and write
|
||
F9E000
|
heap
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
7DDE000
|
stack
|
page read and write
|
||
6700000
|
heap
|
page read and write
|
||
33B0000
|
heap
|
page read and write
|
||
18A0000
|
trusted library allocation
|
page execute and read and write
|
||
314A000
|
trusted library allocation
|
page read and write
|
||
60EE000
|
stack
|
page read and write
|
||
5860000
|
trusted library allocation
|
page read and write
|
||
B030000
|
trusted library allocation
|
page execute and read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
heap
|
page read and write
|
||
14CA000
|
trusted library allocation
|
page execute and read and write
|
||
3231000
|
trusted library allocation
|
page read and write
|
||
3117000
|
trusted library allocation
|
page read and write
|
||
121D000
|
trusted library allocation
|
page execute and read and write
|
||
5619000
|
trusted library allocation
|
page read and write
|
||
4160000
|
trusted library allocation
|
page read and write
|
||
AE5E000
|
stack
|
page read and write
|
||
B25D000
|
stack
|
page read and write
|
||
AF9D000
|
stack
|
page read and write
|
||
2B2D000
|
trusted library allocation
|
page read and write
|
||
54B6000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
trusted library allocation
|
page read and write
|
||
869E000
|
stack
|
page read and write
|
||
1520000
|
trusted library allocation
|
page read and write
|
||
3DE000
|
unkown
|
page read and write
|
||
4FA1000
|
trusted library allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
AE1F000
|
stack
|
page read and write
|
||
2E3E000
|
trusted library allocation
|
page read and write
|
||
19BE000
|
stack
|
page read and write
|
||
4F60000
|
heap
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
4061000
|
trusted library allocation
|
page read and write
|
||
5980000
|
heap
|
page execute and read and write
|
||
7880000
|
heap
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
F98000
|
heap
|
page read and write
|
||
7C50000
|
heap
|
page read and write
|
||
65B000
|
heap
|
page read and write
|
||
4FC6000
|
trusted library allocation
|
page read and write
|
||
5950000
|
heap
|
page read and write
|
||
16BA000
|
heap
|
page read and write
|
||
2B81000
|
trusted library allocation
|
page read and write
|
||
B6CC000
|
stack
|
page read and write
|
||
2ED000
|
stack
|
page read and write
|
||
5620000
|
trusted library allocation
|
page execute and read and write
|
||
2EA0000
|
heap
|
page execute and read and write
|
||
66F0000
|
trusted library allocation
|
page execute and read and write
|
||
6905000
|
heap
|
page read and write
|
||
2C06000
|
trusted library allocation
|
page read and write
|
||
5968000
|
heap
|
page read and write
|
||
14D2000
|
trusted library allocation
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
621F000
|
heap
|
page read and write
|
||
65E0000
|
heap
|
page read and write
|
||
5617000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
1ADB000
|
stack
|
page read and write
|
||
5593000
|
heap
|
page read and write
|
||
2BD9000
|
trusted library allocation
|
page read and write
|
||
69FF000
|
stack
|
page read and write
|
||
6C90000
|
heap
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
4632000
|
trusted library allocation
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
DA8000
|
heap
|
page read and write
|
||
65D0000
|
heap
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
656E000
|
stack
|
page read and write
|
||
2B4A000
|
trusted library allocation
|
page read and write
|
||
AA1E000
|
stack
|
page read and write
|
||
311F000
|
trusted library allocation
|
page read and write
|
||
65C0000
|
trusted library section
|
page readonly
|
||
A65E000
|
stack
|
page read and write
|
||
5B0D000
|
stack
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
FD5000
|
trusted library allocation
|
page execute and read and write
|
||
1644000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
1843000
|
trusted library allocation
|
page execute and read and write
|
||
3B06000
|
trusted library allocation
|
page read and write
|
||
5881000
|
trusted library allocation
|
page read and write
|
||
12AE000
|
stack
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
3B10000
|
trusted library allocation
|
page read and write
|
||
E5F000
|
heap
|
page read and write
|
||
66C0000
|
trusted library allocation
|
page read and write
|
||
2BC1000
|
trusted library allocation
|
page read and write
|
||
4C1E000
|
stack
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
594B000
|
stack
|
page read and write
|
||
3679000
|
trusted library allocation
|
page read and write
|
||
313D000
|
trusted library allocation
|
page read and write
|
||
30D3000
|
trusted library allocation
|
page read and write
|
||
5083000
|
heap
|
page read and write
|
||
3259000
|
trusted library allocation
|
page read and write
|
||
63FF000
|
stack
|
page read and write
|
||
3209000
|
trusted library allocation
|
page read and write
|
||
1AF0000
|
heap
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
A3DE000
|
stack
|
page read and write
|
||
33D0000
|
trusted library allocation
|
page read and write
|
||
505D000
|
stack
|
page read and write
|
||
14D7000
|
trusted library allocation
|
page execute and read and write
|
||
558D000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
7891000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
2D18000
|
trusted library allocation
|
page read and write
|
||
E4E000
|
stack
|
page read and write
|
||
307C000
|
trusted library allocation
|
page read and write
|
||
AB1E000
|
stack
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page execute and read and write
|
||
58F0000
|
heap
|
page read and write
|
||
58B0000
|
trusted library allocation
|
page read and write
|
||
68F0000
|
trusted library section
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
FBD000
|
trusted library allocation
|
page execute and read and write
|
||
D80000
|
heap
|
page read and write
|
||
2BCD000
|
trusted library allocation
|
page read and write
|
||
5FAE000
|
stack
|
page read and write
|
||
308D000
|
trusted library allocation
|
page read and write
|
||
A79000
|
stack
|
page read and write
|
||
50CE000
|
stack
|
page read and write
|
||
1636000
|
heap
|
page read and write
|
||
D29000
|
stack
|
page read and write
|
||
2D12000
|
trusted library allocation
|
page read and write
|
||
1245000
|
trusted library allocation
|
page execute and read and write
|
||
5E6E000
|
stack
|
page read and write
|
||
10F5000
|
heap
|
page read and write
|
||
FC2000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
61FF000
|
stack
|
page read and write
|
||
667B000
|
trusted library allocation
|
page read and write
|
||
FA3000
|
trusted library allocation
|
page execute and read and write
|
||
5520000
|
heap
|
page execute and read and write
|
||
2EB0000
|
trusted library allocation
|
page read and write
|
||
FC6000
|
trusted library allocation
|
page execute and read and write
|
||
187B000
|
trusted library allocation
|
page execute and read and write
|
||
6900000
|
heap
|
page read and write
|
||
2E4D000
|
trusted library allocation
|
page read and write
|
||
4FA6000
|
trusted library allocation
|
page read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
64FE000
|
stack
|
page read and write
|
||
30DF000
|
trusted library allocation
|
page read and write
|
||
14DB000
|
trusted library allocation
|
page execute and read and write
|
||
78B1000
|
heap
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
ACDE000
|
stack
|
page read and write
|
||
4095000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
5886000
|
trusted library allocation
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
5630000
|
trusted library allocation
|
page execute and read and write
|
||
65AB000
|
stack
|
page read and write
|
||
2D0C000
|
trusted library allocation
|
page read and write
|
||
56BE000
|
stack
|
page read and write
|
||
2C13000
|
trusted library allocation
|
page read and write
|
||
FD2000
|
trusted library allocation
|
page read and write
|
||
B31D000
|
stack
|
page read and write
|
||
2D49000
|
trusted library allocation
|
page read and write
|
||
30D7000
|
trusted library allocation
|
page read and write
|
||
1336000
|
heap
|
page read and write
|
||
7BDE000
|
stack
|
page read and write
|
||
78AB000
|
heap
|
page read and write
|
||
7D70000
|
trusted library allocation
|
page execute and read and write
|
||
3235000
|
trusted library allocation
|
page read and write
|
||
7C80000
|
heap
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
6590000
|
heap
|
page read and write
|
||
7C4E000
|
stack
|
page read and write
|
||
682D000
|
stack
|
page read and write
|
||
1B06000
|
heap
|
page read and write
|
||
1844000
|
trusted library allocation
|
page read and write
|
||
3123000
|
trusted library allocation
|
page read and write
|
||
14F7000
|
stack
|
page read and write
|
||
B7D0000
|
heap
|
page read and write
|
||
1204000
|
trusted library allocation
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
7680000
|
heap
|
page read and write
|
||
2B32000
|
trusted library allocation
|
page read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
5330000
|
trusted library allocation
|
page read and write
|
||
5970000
|
trusted library allocation
|
page read and write
|
||
1247000
|
trusted library allocation
|
page execute and read and write
|
||
55CE000
|
stack
|
page read and write
|
||
296E000
|
stack
|
page read and write
|
||
4058000
|
trusted library allocation
|
page read and write
|
||
632E000
|
stack
|
page read and write
|
||
B010000
|
heap
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
13C8000
|
heap
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
2BC5000
|
trusted library allocation
|
page read and write
|
||
5964000
|
heap
|
page read and write
|
||
2C2F000
|
trusted library allocation
|
page read and write
|
||
120D000
|
trusted library allocation
|
page execute and read and write
|
||
14D0000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
heap
|
page execute and read and write
|
||
7A10000
|
heap
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page execute and read and write
|
||
6A20000
|
trusted library allocation
|
page read and write
|
||
2BF8000
|
trusted library allocation
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
325F000
|
trusted library allocation
|
page read and write
|
||
55DD000
|
stack
|
page read and write
|
||
64AE000
|
stack
|
page read and write
|
||
3090000
|
trusted library allocation
|
page read and write
|
||
41C3000
|
trusted library allocation
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
C90000
|
unkown
|
page readonly
|
||
5340000
|
heap
|
page execute and read and write
|
||
309A000
|
trusted library allocation
|
page read and write
|
||
123A000
|
trusted library allocation
|
page execute and read and write
|
||
84F0000
|
trusted library section
|
page read and write
|
||
329C000
|
trusted library allocation
|
page read and write
|
||
2E2E000
|
trusted library allocation
|
page read and write
|
||
5970000
|
trusted library allocation
|
page read and write
|
||
5EAF000
|
stack
|
page read and write
|
||
655F000
|
stack
|
page read and write
|
||
56E0000
|
heap
|
page read and write
|
||
5620000
|
trusted library allocation
|
page execute and read and write
|
||
4FAD000
|
trusted library allocation
|
page read and write
|
||
14FF000
|
stack
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
6670000
|
trusted library allocation
|
page execute and read and write
|
||
592C000
|
stack
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
1232000
|
trusted library allocation
|
page read and write
|
||
4FFF000
|
trusted library allocation
|
page read and write
|
||
60AE000
|
stack
|
page read and write
|
||
B09D000
|
stack
|
page read and write
|
||
B41E000
|
stack
|
page read and write
|
||
309C000
|
trusted library allocation
|
page read and write
|
||
1866000
|
trusted library allocation
|
page execute and read and write
|
||
B45D000
|
stack
|
page read and write
|
||
2BEA000
|
trusted library allocation
|
page read and write
|
||
687E000
|
stack
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
5A60000
|
trusted library allocation
|
page execute and read and write
|
||
7CDE000
|
stack
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
2E2B000
|
trusted library allocation
|
page read and write
|
||
5D2E000
|
stack
|
page read and write
|
||
4027000
|
trusted library allocation
|
page read and write
|
||
11DE000
|
stack
|
page read and write
|
||
14BD000
|
trusted library allocation
|
page execute and read and write
|
||
4FB8000
|
trusted library allocation
|
page read and write
|
||
33F0000
|
trusted library allocation
|
page read and write
|
||
3219000
|
trusted library allocation
|
page read and write
|
||
1B00000
|
heap
|
page read and write
|
||
183D000
|
stack
|
page read and write
|
||
58D0000
|
trusted library allocation
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
E3A000
|
stack
|
page read and write
|
||
14A3000
|
trusted library allocation
|
page execute and read and write
|
||
2E80000
|
trusted library allocation
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
3B1C000
|
trusted library allocation
|
page read and write
|
||
C9A000
|
unkown
|
page readonly
|
||
6231000
|
heap
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
1870000
|
trusted library allocation
|
page read and write
|
||
62FF000
|
stack
|
page read and write
|
||
56E0000
|
heap
|
page read and write
|
||
2BC9000
|
trusted library allocation
|
page read and write
|
||
2B48000
|
trusted library allocation
|
page read and write
|
||
6910000
|
heap
|
page read and write
|
||
6226000
|
heap
|
page read and write
|
||
30B4000
|
trusted library allocation
|
page read and write
|
||
4F9A000
|
trusted library allocation
|
page read and write
|
||
32A000
|
stack
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
66B5000
|
trusted library allocation
|
page read and write
|
||
5A7E000
|
stack
|
page read and write
|
||
3A81000
|
trusted library allocation
|
page read and write
|
||
A69D000
|
stack
|
page read and write
|
||
5904000
|
heap
|
page read and write
|
||
DCE000
|
unkown
|
page read and write
|
||
5960000
|
heap
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
B00F000
|
stack
|
page read and write
|
||
4F86000
|
trusted library allocation
|
page read and write
|
||
2B3B000
|
trusted library allocation
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
54C2000
|
trusted library allocation
|
page read and write
|
||
66AB000
|
trusted library allocation
|
page read and write
|
||
655D000
|
stack
|
page read and write
|
||
5900000
|
heap
|
page read and write
|
||
6570000
|
heap
|
page read and write
|
||
F9E000
|
stack
|
page read and write
|
||
C85000
|
heap
|
page read and write
|
||
403C000
|
trusted library allocation
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
58F4000
|
heap
|
page read and write
|
||
673E000
|
stack
|
page read and write
|
||
4180000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
trusted library allocation
|
page read and write
|
||
160E000
|
heap
|
page read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
406D000
|
trusted library allocation
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
422B000
|
trusted library allocation
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
1210000
|
trusted library allocation
|
page read and write
|
||
4088000
|
trusted library allocation
|
page read and write
|
||
5A74000
|
trusted library allocation
|
page read and write
|
||
63F000
|
unkown
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
10F7000
|
stack
|
page read and write
|
||
6A1B000
|
trusted library allocation
|
page read and write
|
||
625E000
|
stack
|
page read and write
|
||
3FB1000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
stack
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
B9DF000
|
stack
|
page read and write
|
||
C3A000
|
stack
|
page read and write
|
||
2D06000
|
trusted library allocation
|
page read and write
|
||
A51E000
|
stack
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
3601000
|
trusted library allocation
|
page read and write
|
||
78DC000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
2B79000
|
trusted library allocation
|
page read and write
|
||
5908000
|
heap
|
page read and write
|
||
DCA000
|
heap
|
page read and write
|
||
4FB2000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
3165000
|
trusted library allocation
|
page read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
FCA000
|
trusted library allocation
|
page execute and read and write
|
||
B8DE000
|
stack
|
page read and write
|
There are 630 hidden memdumps, click here to show them.