IOC Report
KZWCMNWmmqi9lvI.exe

loading gif

Files

File Path
Type
Category
Malicious
KZWCMNWmmqi9lvI.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp49BA.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\YNmvek.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\KZWCMNWmmqi9lvI.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\YNmvek.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gfi0k00s.isw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nhvu330s.tec.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oagov45b.m4x.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_omrjao3l.utv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oyt3zhbi.mjn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_shtukor0.umb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_upojdrbg.g5x.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ytug4shr.www.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5A64.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\YNmvek.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\KZWCMNWmmqi9lvI.exe
"C:\Users\user\Desktop\KZWCMNWmmqi9lvI.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\KZWCMNWmmqi9lvI.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YNmvek.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNmvek" /XML "C:\Users\user\AppData\Local\Temp\tmp49BA.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\YNmvek.exe
C:\Users\user\AppData\Roaming\YNmvek.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNmvek" /XML "C:\Users\user\AppData\Local\Temp\tmp5A64.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.12.205
https://api.ipify.org
unknown
https://sectigo.com/CPS0
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://mail.morabitur.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
mail.morabitur.com
198.46.88.214
malicious
api.ipify.org
104.26.12.205

IPs

IP
Domain
Country
Malicious
198.46.88.214
mail.morabitur.com
United States
malicious
104.26.12.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2831000
trusted library allocation
page read and write
malicious
285C000
trusted library allocation
page read and write
malicious
2F64000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2F31000
trusted library allocation
page read and write
malicious
2F5C000
trusted library allocation
page read and write
malicious
2864000
trusted library allocation
page read and write
malicious
43EE000
trusted library allocation
page read and write
malicious
51EE000
trusted library allocation
page read and write
malicious
5CA0000
heap
page read and write
95A000
heap
page read and write
F75C000
stack
page read and write
DE40000
heap
page read and write
E46C000
stack
page read and write
3F09000
trusted library allocation
page read and write
4D0E000
trusted library allocation
page read and write
5C80000
heap
page execute and read and write
EFED000
stack
page read and write
CC0000
heap
page read and write
ACD000
trusted library allocation
page execute and read and write
56EE000
stack
page read and write
5AAC000
stack
page read and write
2F5A000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
1A2E000
stack
page read and write
4DD0000
heap
page read and write
28E1000
trusted library allocation
page read and write
2823000
trusted library allocation
page read and write
5BC2000
heap
page read and write
4BC2000
trusted library allocation
page read and write
5A00000
heap
page read and write
16F2000
heap
page read and write
6DD0000
trusted library section
page read and write
12B2000
trusted library allocation
page read and write
9C0000
heap
page read and write
57FC000
stack
page read and write
27F1000
trusted library allocation
page read and write
5F70000
heap
page read and write
F4BE000
stack
page read and write
E36B000
stack
page read and write
69D7000
trusted library allocation
page read and write
6203000
trusted library allocation
page read and write
4C62000
trusted library allocation
page read and write
54A3000
heap
page read and write
4DC3000
heap
page read and write
408E000
trusted library allocation
page read and write
6960000
trusted library allocation
page read and write
A30000
heap
page read and write
7FC50000
trusted library allocation
page execute and read and write
28F9000
trusted library allocation
page read and write
5A9000
stack
page read and write
280F000
trusted library allocation
page read and write
F27D000
stack
page read and write
12D0000
trusted library allocation
page read and write
43AF000
trusted library allocation
page read and write
778E000
heap
page read and write
1750000
trusted library allocation
page read and write
28B7000
trusted library allocation
page read and write
26BD000
stack
page read and write
7890000
trusted library allocation
page read and write
44B9000
trusted library allocation
page read and write
2827000
trusted library allocation
page read and write
11A6000
heap
page read and write
26AE000
stack
page read and write
AA6000
heap
page read and write
28BB000
trusted library allocation
page read and write
4FCC000
stack
page read and write
2F70000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
27B5000
trusted library allocation
page read and write
5A30000
trusted library allocation
page execute and read and write
1290000
heap
page read and write
875000
heap
page read and write
28A1000
trusted library allocation
page read and write
2839000
trusted library allocation
page read and write
4BD5000
trusted library allocation
page read and write
3450000
trusted library allocation
page read and write
2C9F000
stack
page read and write
28CF000
trusted library allocation
page read and write
55AF000
stack
page read and write
28ED000
trusted library allocation
page read and write
E00000
heap
page read and write
C07000
trusted library allocation
page execute and read and write
27B9000
trusted library allocation
page read and write
6210000
trusted library allocation
page read and write
269F000
stack
page read and write
B10000
heap
page read and write
D1E000
stack
page read and write
86E000
stack
page read and write
5F20000
trusted library allocation
page read and write
AC5000
heap
page read and write
47E8000
trusted library allocation
page read and write
27E5000
trusted library allocation
page read and write
685E000
stack
page read and write
5040000
heap
page read and write
1220000
heap
page read and write
E1CE000
stack
page read and write
302B000
trusted library allocation
page read and write
285B000
trusted library allocation
page read and write
DBB000
stack
page read and write
12BB000
trusted library allocation
page execute and read and write
59FE000
stack
page read and write
528E000
stack
page read and write
28D5000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
438F000
trusted library allocation
page read and write
176D000
trusted library allocation
page execute and read and write
53E1000
trusted library allocation
page read and write
4D2D000
trusted library allocation
page read and write
285D000
trusted library allocation
page read and write
27B0000
trusted library allocation
page read and write
33F0000
trusted library allocation
page read and write
3411000
trusted library allocation
page read and write
26C0000
heap
page read and write
28F7000
trusted library allocation
page read and write
4B9B000
trusted library allocation
page read and write
27EF000
trusted library allocation
page read and write
16FE000
heap
page read and write
2803000
trusted library allocation
page read and write
1776000
trusted library allocation
page execute and read and write
2883000
trusted library allocation
page read and write
2C1F000
unkown
page read and write
53D2000
trusted library allocation
page read and write
4C70000
trusted library allocation
page execute and read and write
6200000
trusted library allocation
page read and write
6ED0000
heap
page read and write
EBAE000
stack
page read and write
2845000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
5C00000
heap
page read and write
27ED000
trusted library allocation
page read and write
11B0000
heap
page read and write
6270000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
33F4000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page read and write
2D40000
trusted library allocation
page read and write
7620000
heap
page read and write
27E7000
trusted library allocation
page read and write
165E000
heap
page read and write
2819000
trusted library allocation
page read and write
5E7E000
stack
page read and write
7910000
trusted library allocation
page read and write
2895000
trusted library allocation
page read and write
795E000
stack
page read and write
4BD0000
trusted library allocation
page read and write
1FD000
stack
page read and write
3422000
trusted library allocation
page read and write
7F230000
trusted library allocation
page execute and read and write
1B40000
heap
page read and write
2DD0000
heap
page read and write
7740000
heap
page read and write
4FF0000
trusted library allocation
page read and write
289B000
trusted library allocation
page read and write
5AB0000
heap
page read and write
28BB000
heap
page read and write
2DAE000
stack
page read and write
16D6000
heap
page read and write
281D000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
17EE000
stack
page read and write
288F000
trusted library allocation
page read and write
2815000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page execute and read and write
510F000
stack
page read and write
4FD0000
heap
page read and write
2D60000
heap
page execute and read and write
D920000
trusted library allocation
page execute and read and write
4CE3000
heap
page read and write
DD0000
heap
page read and write
3EE1000
trusted library allocation
page read and write
EFAF000
stack
page read and write
5AB3000
heap
page read and write
5C20000
heap
page read and write
43A000
stack
page read and write
D30000
heap
page read and write
EEAE000
stack
page read and write
14DF000
heap
page read and write
6F30000
trusted library allocation
page execute and read and write
AD6000
trusted library allocation
page execute and read and write
14C7000
heap
page read and write
6CDE000
stack
page read and write
C0B000
trusted library allocation
page execute and read and write
5F90000
heap
page read and write
5280000
trusted library allocation
page read and write
5B36000
heap
page read and write
28A9000
trusted library allocation
page read and write
6E00000
trusted library allocation
page read and write
C90000
heap
page read and write
ABD000
trusted library allocation
page execute and read and write
55B0000
heap
page read and write
95E000
heap
page read and write
7FD50000
trusted library allocation
page execute and read and write
649B000
stack
page read and write
5C10000
trusted library allocation
page read and write
4DA3000
trusted library allocation
page read and write
AC3000
trusted library allocation
page read and write
2861000
trusted library allocation
page read and write
286F000
trusted library allocation
page read and write
69B8000
trusted library allocation
page read and write
2EE1000
trusted library allocation
page read and write
288B000
trusted library allocation
page read and write
2825000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
11FE000
stack
page read and write
C1F000
stack
page read and write
28C1000
trusted library allocation
page read and write
1486000
heap
page read and write
BD4000
trusted library allocation
page read and write
36B1000
trusted library allocation
page read and write
27BF000
trusted library allocation
page read and write
5C40000
trusted library allocation
page execute and read and write
4C80000
trusted library allocation
page execute and read and write
54A0000
heap
page read and write
C60000
trusted library allocation
page read and write
4BB6000
trusted library allocation
page read and write
EBF0000
trusted library allocation
page execute and read and write
4EE000
unkown
page read and write
61F8000
trusted library allocation
page read and write
5A2E000
stack
page read and write
53E6000
trusted library allocation
page read and write
27B3000
trusted library allocation
page read and write
284F000
trusted library allocation
page read and write
1770000
trusted library allocation
page read and write
6E9E000
stack
page read and write
2AE0000
heap
page read and write
27D9000
trusted library allocation
page read and write
BF6000
trusted library allocation
page execute and read and write
6D5F000
stack
page read and write
2877000
trusted library allocation
page read and write
1810000
trusted library allocation
page execute and read and write
2F2D000
trusted library allocation
page read and write
1684000
heap
page read and write
7A5F000
stack
page read and write
6A30000
trusted library allocation
page read and write
28FB000
trusted library allocation
page read and write
147A000
heap
page read and write
27DB000
trusted library allocation
page read and write
BED000
trusted library allocation
page execute and read and write
27E1000
trusted library allocation
page read and write
11A0000
heap
page read and write
178B000
trusted library allocation
page execute and read and write
910000
heap
page read and write
6850000
heap
page read and write
DE4000
trusted library allocation
page read and write
6D9E000
stack
page read and write
28D7000
trusted library allocation
page read and write
5900000
heap
page read and write
6780000
heap
page read and write
FF0000
unkown
page readonly
28A5000
trusted library allocation
page read and write
27DF000
trusted library allocation
page read and write
1820000
heap
page read and write
53F2000
trusted library allocation
page read and write
1B90000
trusted library allocation
page read and write
192E000
stack
page read and write
D20000
trusted library allocation
page execute and read and write
5A12000
trusted library allocation
page read and write
6285000
heap
page read and write
ADA000
trusted library allocation
page execute and read and write
6367000
trusted library allocation
page read and write
F3BD000
stack
page read and write
28F3000
trusted library allocation
page read and write
1297000
heap
page read and write
281F000
trusted library allocation
page read and write
EBEE000
stack
page read and write
28B3000
trusted library allocation
page read and write
286D000
trusted library allocation
page read and write
2790000
heap
page read and write
61EE000
stack
page read and write
1B30000
trusted library allocation
page read and write
1B2E000
stack
page read and write
2916000
trusted library allocation
page read and write
4D21000
trusted library allocation
page read and write
65A0000
trusted library allocation
page read and write
C84000
trusted library allocation
page read and write
7E0000
heap
page read and write
3416000
trusted library allocation
page read and write
2F16000
trusted library allocation
page read and write
69BE000
stack
page read and write
28A3000
trusted library allocation
page read and write
26BF000
stack
page read and write
12F0000
heap
page read and write
285F000
trusted library allocation
page read and write
6300000
heap
page read and write
1760000
trusted library allocation
page read and write
282F000
trusted library allocation
page read and write
34A0000
heap
page execute and read and write
6260000
trusted library allocation
page execute and read and write
5025000
heap
page read and write
35AC000
trusted library allocation
page read and write
6ADF000
stack
page read and write
6208000
trusted library allocation
page read and write
1528000
heap
page read and write
27F3000
trusted library allocation
page read and write
DE6000
trusted library allocation
page read and write
28C5000
trusted library allocation
page read and write
F37E000
stack
page read and write
2D30000
trusted library allocation
page read and write
27C5000
trusted library allocation
page read and write
C02000
trusted library allocation
page read and write
27D3000
trusted library allocation
page read and write
DF8E000
stack
page read and write
5F50000
heap
page read and write
5FAE000
stack
page read and write
27E1000
trusted library allocation
page read and write
DF0000
heap
page read and write
146E000
heap
page read and write
DC0000
heap
page execute and read and write
2D44000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
2863000
trusted library allocation
page read and write
2855000
trusted library allocation
page read and write
AB3000
trusted library allocation
page execute and read and write
534E000
stack
page read and write
4C40000
heap
page read and write
56F0000
heap
page execute and read and write
CEB000
heap
page read and write
46B8000
trusted library allocation
page read and write
4CD0000
heap
page read and write
2EDE000
stack
page read and write
281F000
trusted library allocation
page read and write
6370000
trusted library allocation
page read and write
12A2000
trusted library allocation
page read and write
27C3000
trusted library allocation
page read and write
F87F000
stack
page read and write
543C000
stack
page read and write
7B5E000
stack
page read and write
2809000
trusted library allocation
page read and write
F13D000
stack
page read and write
AEB000
trusted library allocation
page execute and read and write
28B0000
heap
page read and write
35B0000
trusted library allocation
page read and write
6A1D000
stack
page read and write
5B7E000
stack
page read and write
2805000
trusted library allocation
page read and write
3445000
trusted library allocation
page read and write
6A40000
trusted library allocation
page execute and read and write
A09000
heap
page read and write
12B7000
trusted library allocation
page execute and read and write
53CE000
trusted library allocation
page read and write
AE2000
trusted library allocation
page read and write
DE0000
heap
page read and write
6F20000
heap
page read and write
48BC000
stack
page read and write
4BAE000
trusted library allocation
page read and write
679000
stack
page read and write
2D50000
trusted library allocation
page read and write
4FFC000
trusted library allocation
page read and write
283F000
trusted library allocation
page read and write
2CA0000
heap
page read and write
2869000
trusted library allocation
page read and write
284B000
trusted library allocation
page read and write
4E80000
heap
page execute and read and write
2847000
trusted library allocation
page read and write
28E7000
trusted library allocation
page read and write
9FB000
heap
page read and write
977000
heap
page read and write
C50000
heap
page execute and read and write
C40000
trusted library allocation
page read and write
E6EE000
stack
page read and write
2889000
trusted library allocation
page read and write
53DE000
trusted library allocation
page read and write
53CB000
trusted library allocation
page read and write
776C000
heap
page read and write
28CB000
trusted library allocation
page read and write
5B30000
heap
page read and write
1190000
heap
page read and write
4D07000
trusted library allocation
page read and write
7C1E000
stack
page read and write
2875000
trusted library allocation
page read and write
DCDE000
stack
page read and write
2F1F000
trusted library allocation
page read and write
2821000
trusted library allocation
page read and write
1650000
heap
page read and write
12B5000
trusted library allocation
page execute and read and write
287B000
trusted library allocation
page read and write
27CB000
trusted library allocation
page read and write
777D000
heap
page read and write
4D7C000
stack
page read and write
6B20000
trusted library allocation
page read and write
82E000
stack
page read and write
1274000
trusted library allocation
page read and write
166F000
heap
page read and write
286B000
trusted library allocation
page read and write
4296000
trusted library allocation
page read and write
1763000
trusted library allocation
page read and write
5A20000
trusted library allocation
page execute and read and write
128D000
trusted library allocation
page execute and read and write
E0CE000
stack
page read and write
5A10000
trusted library allocation
page read and write
675E000
stack
page read and write
3440000
trusted library allocation
page read and write
289D000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
5F30000
trusted library section
page read and write
28B1000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
259E000
stack
page read and write
285A000
trusted library allocation
page read and write
282D000
trusted library allocation
page read and write
661D000
stack
page read and write
811D000
heap
page read and write
D91E000
stack
page read and write
E07000
heap
page read and write
5020000
heap
page read and write
507E000
stack
page read and write
341D000
trusted library allocation
page read and write
28C3000
trusted library allocation
page read and write
E08E000
stack
page read and write
6280000
trusted library allocation
page execute and read and write
2885000
trusted library allocation
page read and write
6B27000
trusted library allocation
page read and write
3470000
trusted library allocation
page read and write
28BF000
trusted library allocation
page read and write
2801000
trusted library allocation
page read and write
DE1D000
stack
page read and write
28E5000
trusted library allocation
page read and write
80B0000
heap
page read and write
4E8E000
trusted library allocation
page read and write
2843000
trusted library allocation
page read and write
A60000
heap
page read and write
65D0000
heap
page read and write
2750000
heap
page read and write
2807000
trusted library allocation
page read and write
1780000
trusted library allocation
page read and write
1273000
trusted library allocation
page execute and read and write
14F7000
stack
page read and write
27EB000
trusted library allocation
page read and write
28F1000
trusted library allocation
page read and write
283D000
trusted library allocation
page read and write
281B000
trusted library allocation
page read and write
340E000
trusted library allocation
page read and write
1484000
heap
page read and write
28D3000
trusted library allocation
page read and write
6274000
trusted library allocation
page read and write
7B60000
trusted library section
page read and write
5F10000
trusted library section
page read and write
4A0000
heap
page read and write
27AC000
trusted library allocation
page read and write
10F8000
stack
page read and write
7D22000
trusted library allocation
page read and write
28EF000
trusted library allocation
page read and write
13FF000
stack
page read and write
282B000
trusted library allocation
page read and write
177A000
trusted library allocation
page execute and read and write
28E3000
trusted library allocation
page read and write
28E9000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
27F9000
trusted library allocation
page read and write
BE0000
trusted library allocation
page read and write
C05000
trusted library allocation
page execute and read and write
26FA000
stack
page read and write
2897000
trusted library allocation
page read and write
1696000
heap
page read and write
1450000
heap
page read and write
5A19000
trusted library allocation
page read and write
5F55000
heap
page read and write
280B000
trusted library allocation
page read and write
6D1E000
stack
page read and write
D8F000
heap
page read and write
287D000
trusted library allocation
page read and write
625D000
stack
page read and write
5B3F000
stack
page read and write
2841000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
28FF000
trusted library allocation
page read and write
2865000
trusted library allocation
page read and write
27D1000
trusted library allocation
page read and write
17A0000
trusted library allocation
page read and write
2840000
heap
page read and write
E5AE000
stack
page read and write
BF0000
trusted library allocation
page read and write
2833000
trusted library allocation
page read and write
1511000
heap
page read and write
28AF000
trusted library allocation
page read and write
127D000
trusted library allocation
page execute and read and write
E5EE000
stack
page read and write
6CD0000
trusted library allocation
page read and write
16EE000
heap
page read and write
2D2C000
stack
page read and write
C20000
trusted library allocation
page read and write
AC0000
trusted library allocation
page read and write
4DC0000
heap
page read and write
4DB0000
heap
page read and write
B00000
trusted library allocation
page read and write
28FD000
trusted library allocation
page read and write
33FB000
trusted library allocation
page read and write
2817000
trusted library allocation
page read and write
2760000
heap
page read and write
2811000
trusted library allocation
page read and write
27F5000
trusted library allocation
page read and write
4115000
trusted library allocation
page read and write
27FB000
trusted library allocation
page read and write
2837000
trusted library allocation
page read and write
2903000
trusted library allocation
page read and write
69B0000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
27E3000
trusted library allocation
page read and write
7794000
heap
page read and write
28EB000
trusted library allocation
page read and write
28A7000
trusted library allocation
page read and write
27C9000
trusted library allocation
page read and write
D69000
heap
page read and write
27CD000
trusted library allocation
page read and write
5BF0000
heap
page read and write
28DB000
trusted library allocation
page read and write
27DE000
unkown
page read and write
5B50000
heap
page read and write
2829000
trusted library allocation
page read and write
4D12000
trusted library allocation
page read and write
27CF000
trusted library allocation
page read and write
4B90000
trusted library allocation
page read and write
4D1E000
trusted library allocation
page read and write
AC0000
heap
page read and write
4ECC000
stack
page read and write
28DF000
trusted library allocation
page read and write
26B1000
trusted library allocation
page read and write
D8DE000
stack
page read and write
514D000
stack
page read and write
5A3D000
stack
page read and write
1534000
heap
page read and write
82AE000
stack
page read and write
28D1000
trusted library allocation
page read and write
2857000
trusted library allocation
page read and write
28B5000
trusted library allocation
page read and write
CF6000
heap
page read and write
1458000
heap
page read and write
2893000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
69D0000
trusted library allocation
page read and write
992000
heap
page read and write
524E000
stack
page read and write
762E000
heap
page read and write
113A000
stack
page read and write
288D000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
BF2000
trusted library allocation
page read and write
1B8C000
stack
page read and write
F0F0000
trusted library allocation
page read and write
785E000
stack
page read and write
E4AE000
stack
page read and write
2879000
trusted library allocation
page read and write
2817000
trusted library allocation
page read and write
950000
heap
page read and write
160E000
stack
page read and write
C86000
trusted library allocation
page read and write
28F5000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
27C7000
trusted library allocation
page read and write
4C00000
trusted library allocation
page read and write
2966000
trusted library allocation
page read and write
27EC000
trusted library allocation
page read and write
5C3C000
trusted library allocation
page read and write
284D000
trusted library allocation
page read and write
620D000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
1BA7000
heap
page read and write
2C5E000
stack
page read and write
53DA000
trusted library allocation
page read and write
6360000
trusted library allocation
page read and write
5F6E000
stack
page read and write
7F9B0000
trusted library allocation
page execute and read and write
699F000
stack
page read and write
F97E000
stack
page read and write
E2F0000
trusted library allocation
page read and write
287F000
trusted library allocation
page read and write
685E000
heap
page read and write
DD0000
trusted library allocation
page read and write
4D1A000
trusted library allocation
page read and write
28C7000
trusted library allocation
page read and write
1734000
heap
page read and write
3430000
trusted library allocation
page read and write
28D9000
trusted library allocation
page read and write
1BA0000
heap
page read and write
28B9000
trusted library allocation
page read and write
28CD000
trusted library allocation
page read and write
4BBD000
trusted library allocation
page read and write
3358000
trusted library allocation
page read and write
4CC0000
trusted library section
page readonly
A34000
heap
page read and write
419C000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page read and write
289F000
trusted library allocation
page read and write
55AC000
stack
page read and write
4312000
trusted library allocation
page read and write
27BD000
trusted library allocation
page read and write
2859000
trusted library allocation
page read and write
5C7D000
stack
page read and write
AD0000
trusted library allocation
page read and write
EDAF000
stack
page read and write
AA0000
trusted library allocation
page read and write
1754000
trusted library allocation
page read and write
4D26000
trusted library allocation
page read and write
2873000
trusted library allocation
page read and write
60EE000
stack
page read and write
5000000
trusted library allocation
page execute and read and write
777000
stack
page read and write
2835000
trusted library allocation
page read and write
34B1000
trusted library allocation
page read and write
6260000
heap
page read and write
61F0000
trusted library allocation
page read and write
172C000
heap
page read and write
175D000
trusted library allocation
page execute and read and write
2867000
trusted library allocation
page read and write
F0ED000
stack
page read and write
F17E000
stack
page read and write
2891000
trusted library allocation
page read and write
FF2000
unkown
page readonly
AB0000
trusted library allocation
page read and write
12AA000
trusted library allocation
page execute and read and write
3FA3000
trusted library allocation
page read and write
2856000
trusted library allocation
page read and write
5F40000
trusted library allocation
page execute and read and write
2AEA000
heap
page read and write
4FCE000
stack
page read and write
27C1000
trusted library allocation
page read and write
60AD000
stack
page read and write
28C9000
trusted library allocation
page read and write
631F000
stack
page read and write
984000
heap
page read and write
4D55000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
53C6000
trusted library allocation
page read and write
5F60000
heap
page read and write
2813000
trusted library allocation
page read and write
A32000
heap
page read and write
5B60000
trusted library section
page readonly
267E000
stack
page read and write
484C000
stack
page read and write
27DD000
trusted library allocation
page read and write
5B34000
heap
page read and write
28AB000
trusted library allocation
page read and write
C30000
trusted library allocation
page execute and read and write
6217000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
DBDE000
stack
page read and write
51AF000
trusted library allocation
page read and write
8F9000
stack
page read and write
4CE0000
heap
page read and write
1787000
trusted library allocation
page execute and read and write
58FF000
stack
page read and write
5BCF000
heap
page read and write
500E000
stack
page read and write
3809000
trusted library allocation
page read and write
282D000
trusted library allocation
page read and write
44B1000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
17F0000
heap
page read and write
4D0B000
trusted library allocation
page read and write
2770000
heap
page read and write
27FD000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
6A20000
trusted library allocation
page execute and read and write
4D00000
trusted library allocation
page read and write
630B000
heap
page read and write
27D5000
trusted library allocation
page read and write
3848000
trusted library allocation
page read and write
D6A000
stack
page read and write
28AD000
trusted library allocation
page read and write
6620000
trusted library allocation
page execute and read and write
4BB1000
trusted library allocation
page read and write
2913000
trusted library allocation
page read and write
12E0000
trusted library allocation
page execute and read and write
525E000
stack
page read and write
2831000
trusted library allocation
page read and write
58F0000
heap
page read and write
4B94000
trusted library allocation
page read and write
69CD000
trusted library allocation
page read and write
689E000
stack
page read and write
4C50000
heap
page read and write
27D7000
trusted library allocation
page read and write
A50000
heap
page read and write
6ABE000
stack
page read and write
12F5000
heap
page read and write
F65B000
stack
page read and write
BDD000
trusted library allocation
page execute and read and write
120E000
stack
page read and write
80EC000
heap
page read and write
2853000
trusted library allocation
page read and write
37E1000
trusted library allocation
page read and write
CF8000
heap
page read and write
7D0000
heap
page read and write
3F49000
trusted library allocation
page read and write
870000
heap
page read and write
2871000
trusted library allocation
page read and write
143E000
stack
page read and write
4D06000
trusted library allocation
page read and write
2870000
trusted library allocation
page read and write
5030000
heap
page read and write
AD2000
trusted library allocation
page read and write
49BE000
stack
page read and write
2901000
trusted library allocation
page read and write
2851000
trusted library allocation
page read and write
548E000
stack
page read and write
CC8000
heap
page read and write
5EF0000
trusted library allocation
page read and write
2899000
trusted library allocation
page read and write
283B000
trusted library allocation
page read and write
8136000
heap
page read and write
1772000
trusted library allocation
page read and write
4C69000
trusted library allocation
page read and write
DADF000
stack
page read and write
27F7000
trusted library allocation
page read and write
6B1E000
stack
page read and write
AB4000
trusted library allocation
page read and write
D7E000
stack
page read and write
27BB000
trusted library allocation
page read and write
28DD000
trusted library allocation
page read and write
27B7000
trusted library allocation
page read and write
671E000
stack
page read and write
6E4E000
stack
page read and write
1546000
heap
page read and write
36B9000
trusted library allocation
page read and write
52F000
unkown
page read and write
12A6000
trusted library allocation
page execute and read and write
AA0000
heap
page read and write
4EE8000
trusted library allocation
page read and write
4D32000
trusted library allocation
page read and write
A60000
heap
page read and write
69C0000
trusted library allocation
page read and write
1753000
trusted library allocation
page execute and read and write
27FF000
trusted library allocation
page read and write
28BD000
trusted library allocation
page read and write
C70000
heap
page execute and read and write
3713000
trusted library allocation
page read and write
2887000
trusted library allocation
page read and write
639E000
stack
page read and write
1782000
trusted library allocation
page read and write
2849000
trusted library allocation
page read and write
BFA000
trusted library allocation
page execute and read and write
4219000
trusted library allocation
page read and write
DD1D000
stack
page read and write
280D000
trusted library allocation
page read and write
2881000
trusted library allocation
page read and write
AE7000
trusted library allocation
page execute and read and write
4FE0000
trusted library allocation
page read and write
2F58000
trusted library allocation
page read and write
5C60000
trusted library section
page read and write
BD3000
trusted library allocation
page execute and read and write
1640000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
There are 734 hidden memdumps, click here to show them.