IOC Report
TST.ps1

loading gif

Files

File Path
Type
Category
Malicious
TST.ps1
ASCII text, with very long lines (530), with CRLF line terminators
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage user DataBase, version 0x620, checksum 0xd694f33f, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rtci5fqi.0eg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xoirv3ba.02d.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\D0S9SLJQSX2CW1XZMXN5.temp
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\TST.ps1"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://api.ip.sb/ip
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://147.45.H
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://g.live.com/odclientsettings/ProdV21C:
unknown
http://crl.ver)
unknown
https://api.ip.s
unknown
https://github.com/Pester/Pester
unknown
http://147.45.44XBk
unknown
http://147.45.44.131
unknown
http://147.45.44.131/files/mservice64.exe
unknown
https://g.live.com/odclientsettings/Prod1C:
unknown
http://147.45.44.131/files
unknown
http://147.45.44.131/files/TTF.exe
147.45.44.131
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://discord.com/api/v9/users/
unknown
https://oneget.orgX
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://147.45.44
unknown
https://oneget.org
unknown
There are 17 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
147.45.44.131
unknown
Russian Federation
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
2C3D70F0000
trusted library allocation
page read and write
malicious
2C3EF2E0000
trusted library section
page read and write
malicious
2C3E6D1F000
trusted library allocation
page read and write
malicious
2C3D84B3000
trusted library allocation
page read and write
malicious
2C3E6FA8000
trusted library allocation
page read and write
malicious
2C3D84A6000
trusted library allocation
page read and write
malicious
7FFD345FC000
trusted library allocation
page execute and read and write
2C3D8692000
trusted library allocation
page read and write
21AAC400000
heap
page read and write
15CD000
heap
page read and write
21AAC500000
heap
page read and write
2C3D66F0000
heap
page readonly
158C000
heap
page read and write
21AACD02000
heap
page read and write
2C3EEE30000
heap
page read and write
59E0000
heap
page read and write
2C3EEFD6000
heap
page read and write
3393000
trusted library allocation
page read and write
FA04BFE000
stack
page read and write
49343FE000
unkown
page readonly
2C3EEE50000
heap
page read and write
7636000
heap
page read and write
21AAC65C000
heap
page read and write
21AB19E0000
trusted library allocation
page read and write
2C3D6D38000
trusted library allocation
page read and write
7FFD34770000
trusted library allocation
page read and write
2C3D4EA0000
heap
page read and write
5C15000
heap
page read and write
5665000
trusted library allocation
page read and write
FA04DFF000
stack
page read and write
21AAD5D0000
trusted library section
page readonly
5BCD000
stack
page read and write
2C3EED98000
heap
page read and write
21AAC68C000
heap
page read and write
49358FE000
unkown
page readonly
33FF000
trusted library allocation
page read and write
21AAC695000
heap
page read and write
15C9000
heap
page read and write
3386000
trusted library allocation
page read and write
21AAD600000
trusted library section
page readonly
2C3D6770000
trusted library allocation
page read and write
2C3EECF4000
heap
page read and write
3401000
trusted library allocation
page read and write
593B000
stack
page read and write
21AAD5F0000
trusted library section
page readonly
21AAD3E0000
trusted library allocation
page read and write
3397000
trusted library allocation
page read and write
2C3E6CB1000
trusted library allocation
page read and write
21AB1A10000
trusted library allocation
page read and write
4935E7E000
stack
page read and write
13ED000
trusted library allocation
page execute and read and write
7FFD34780000
trusted library allocation
page read and write
2C3D8556000
trusted library allocation
page read and write
2C3D4D20000
heap
page read and write
156A000
heap
page read and write
33D3000
trusted library allocation
page read and write
3358000
trusted library allocation
page read and write
141A000
trusted library allocation
page execute and read and write
21AB1CF9000
heap
page read and write
FA05039000
stack
page read and write
21AB1A3E000
trusted library allocation
page read and write
49347FE000
unkown
page readonly
3350000
trusted library allocation
page read and write
49349FE000
unkown
page readonly
7FFD346FA000
trusted library allocation
page read and write
49354FE000
unkown
page readonly
1440000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
2C3EED7D000
heap
page read and write
142B000
trusted library allocation
page execute and read and write
1427000
trusted library allocation
page execute and read and write
7FFD346F1000
trusted library allocation
page read and write
21AB1CCF000
heap
page read and write
33EA000
trusted library allocation
page read and write
FA04CFB000
stack
page read and write
2C3D4E86000
heap
page read and write
21AB1CE7000
heap
page read and write
7FFD3454D000
trusted library allocation
page execute and read and write
13F3000
trusted library allocation
page read and write
5636000
trusted library allocation
page read and write
1460000
heap
page execute and read and write
21AB1B30000
trusted library allocation
page read and write
7FFD34870000
trusted library allocation
page read and write
33E6000
trusted library allocation
page read and write
4935EFE000
unkown
page readonly
14EB000
heap
page read and write
2C3D715F000
trusted library allocation
page read and write
2C3EED4B000
heap
page read and write
12F0000
heap
page read and write
49357FB000
stack
page read and write
2C3D6CB1000
trusted library allocation
page read and write
4171000
trusted library allocation
page read and write
7FFD34725000
trusted library allocation
page read and write
2C3D67A0000
trusted library allocation
page read and write
21AAC670000
heap
page read and write
21AAC713000
heap
page read and write
1450000
trusted library allocation
page execute and read and write
2C3D8A5E000
trusted library allocation
page read and write
21AB1B20000
trusted library allocation
page read and write
FA04D7E000
stack
page read and write
7FFD347E0000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
2C3D6757000
heap
page execute and read and write
FA04F3E000
stack
page read and write
2C3EEF59000
heap
page read and write
5D20000
heap
page read and write
4934BFE000
unkown
page readonly
7FFD34880000
trusted library allocation
page read and write
336B000
trusted library allocation
page read and write
2C3D8534000
trusted library allocation
page read and write
21AAC6A0000
heap
page read and write
3380000
trusted library allocation
page read and write
FA052BC000
stack
page read and write
2C3D4DE0000
heap
page read and write
30BF000
stack
page read and write
2C3EEF30000
heap
page read and write
4933EFE000
unkown
page readonly
21AB19D0000
trusted library allocation
page read and write
1422000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
21AACC02000
heap
page read and write
2C3D4E7F000
heap
page read and write
7FFD34710000
trusted library allocation
page execute and read and write
13FD000
trusted library allocation
page execute and read and write
331E000
trusted library allocation
page read and write
56E0000
heap
page read and write
1594000
heap
page read and write
21AB1D05000
heap
page read and write
33FD000
trusted library allocation
page read and write
331A000
trusted library allocation
page read and write
2C3EEF4C000
heap
page read and write
21AB1B80000
remote allocation
page read and write
2C3D5075000
heap
page read and write
49341FE000
unkown
page readonly
3331000
trusted library allocation
page read and write
5600000
trusted library allocation
page execute and read and write
2C3D6760000
heap
page read and write
5C20000
heap
page read and write
3352000
trusted library allocation
page read and write
21AAD620000
trusted library section
page readonly
33D9000
trusted library allocation
page read and write
FA04AFE000
stack
page read and write
21AAD5E0000
trusted library section
page readonly
58B0000
trusted library allocation
page read and write
FA04E7D000
stack
page read and write
21AB1C4E000
heap
page read and write
21AAC6FE000
heap
page read and write
14D0000
trusted library allocation
page read and write
1412000
trusted library allocation
page read and write
2EBF000
stack
page read and write
1518000
heap
page read and write
3295000
trusted library allocation
page read and write
21AB1C00000
heap
page read and write
5A20000
trusted library allocation
page read and write
3312000
trusted library allocation
page read and write
7FFD34722000
trusted library allocation
page read and write
7FFD34660000
trusted library allocation
page execute and read and write
1780000
trusted library allocation
page read and write
5C30000
heap
page read and write
21AB1A00000
trusted library allocation
page read and write
33B4000
trusted library allocation
page read and write
2C3EECF1000
heap
page read and write
21AB1CF4000
heap
page read and write
33BC000
trusted library allocation
page read and write
21AAC640000
heap
page read and write
21AAC702000
heap
page read and write
21AB1D02000
heap
page read and write
7FFD34730000
trusted library allocation
page execute and read and write
49356FE000
unkown
page readonly
493537E000
stack
page read and write
7FFD34800000
trusted library allocation
page read and write
21AAC6B2000
heap
page read and write
3320000
trusted library allocation
page read and write
2C3EED36000
heap
page read and write
5AB0000
trusted library allocation
page execute and read and write
2C3D4EC9000
heap
page read and write
3314000
trusted library allocation
page read and write
15D5000
heap
page read and write
2C3D66B0000
trusted library allocation
page read and write
4AA000
remote allocation
page execute and read and write
3340000
trusted library allocation
page read and write
32A0000
trusted library allocation
page read and write
3299000
trusted library allocation
page read and write
21AB1A24000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
7FFD34544000
trusted library allocation
page read and write
3407000
trusted library allocation
page read and write
33BA000
trusted library allocation
page read and write
21AAC729000
heap
page read and write
5650000
trusted library allocation
page read and write
3160000
heap
page read and write
3403000
trusted library allocation
page read and write
5642000
trusted library allocation
page read and write
21AACD1A000
heap
page read and write
339D000
trusted library allocation
page read and write
21AAC68E000
heap
page read and write
21AB19E1000
trusted library allocation
page read and write
49344F9000
stack
page read and write
33B6000
trusted library allocation
page read and write
21AAC420000
heap
page read and write
2C3EEFAE000
heap
page read and write
FA04C7E000
stack
page read and write
782E000
stack
page read and write
7FFD345F6000
trusted library allocation
page read and write
33D5000
trusted library allocation
page read and write
FA05D4E000
stack
page read and write
7B52000
trusted library allocation
page read and write
7FFD3455B000
trusted library allocation
page read and write
4934AFE000
unkown
page readonly
7FFD347D0000
trusted library allocation
page read and write
607E000
stack
page read and write
5690000
trusted library allocation
page read and write
21AB1C2D000
heap
page read and write
21AB19E0000
trusted library allocation
page read and write
7DF429460000
trusted library allocation
page execute and read and write
33C7000
trusted library allocation
page read and write
2C3D6700000
trusted library allocation
page read and write
7FFD34810000
trusted library allocation
page read and write
FA0513E000
stack
page read and write
5A10000
trusted library allocation
page execute and read and write
334E000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
FA05E0D000
stack
page read and write
493517E000
stack
page read and write
21AAC667000
heap
page read and write
135E000
stack
page read and write
13D0000
trusted library allocation
page read and write
2C3D4D60000
heap
page read and write
7FFD34540000
trusted library allocation
page read and write
2C3D6710000
heap
page read and write
3369000
trusted library allocation
page read and write
7FFD347C0000
trusted library allocation
page read and write
56C0000
trusted library allocation
page execute and read and write
FA05F0C000
stack
page read and write
2C3D67E5000
heap
page read and write
317E000
trusted library allocation
page read and write
7FFD34600000
trusted library allocation
page execute and read and write
1210000
heap
page read and write
49355FB000
stack
page read and write
561B000
trusted library allocation
page read and write
1524000
heap
page read and write
21AB1B30000
trusted library allocation
page read and write
3322000
trusted library allocation
page read and write
1400000
heap
page read and write
21AB1C41000
heap
page read and write
21AB1CD4000
heap
page read and write
FA05E8D000
stack
page read and write
2C3D849E000
trusted library allocation
page read and write
33B0000
trusted library allocation
page read and write
2C3D4DE8000
heap
page read and write
21AB2000000
heap
page read and write
49345FE000
unkown
page readonly
21AB1D0A000
heap
page read and write
33CD000
trusted library allocation
page read and write
21AB1D00000
heap
page read and write
21AAD240000
trusted library allocation
page read and write
59D0000
heap
page read and write
563D000
trusted library allocation
page read and write
21AAD3F0000
trusted library allocation
page read and write
7FFD34700000
trusted library allocation
page execute and read and write
21AACB90000
trusted library allocation
page read and write
1770000
trusted library allocation
page read and write
4934E7E000
stack
page read and write
57F0000
heap
page read and write
21AAD970000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
21AB1AB0000
trusted library allocation
page read and write
33B2000
trusted library allocation
page read and write
7FFD34542000
trusted library allocation
page read and write
3337000
trusted library allocation
page read and write
21AAD4F0000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page read and write
3384000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page read and write
21AACD13000
heap
page read and write
4934DFE000
unkown
page readonly
21AB1A10000
trusted library allocation
page read and write
2C3EEF98000
heap
page read and write
FA7000
stack
page read and write
763E000
heap
page read and write
2C3EEF6C000
heap
page read and write
21AB19C0000
trusted library allocation
page read and write
21AB1C84000
heap
page read and write
2C3D8564000
trusted library allocation
page read and write
49352FD000
stack
page read and write
21AB1B80000
remote allocation
page read and write
5660000
trusted library allocation
page read and write
32EE000
trusted library allocation
page read and write
4934D7E000
stack
page read and write
5C10000
heap
page read and write
FA04A75000
stack
page read and write
2C3D67E0000
heap
page read and write
333B000
trusted library allocation
page read and write
2C3D8A62000
trusted library allocation
page read and write
2C3EEF5C000
heap
page read and write
21AB1CEB000
heap
page read and write
49342FE000
stack
page read and write
330D000
trusted library allocation
page read and write
493547E000
unkown
page readonly
2C3D4ECD000
heap
page read and write
13CE000
stack
page read and write
15A2000
heap
page read and write
33EE000
trusted library allocation
page read and write
3171000
trusted library allocation
page read and write
3318000
trusted library allocation
page read and write
2C3D4E8A000
heap
page read and write
49350FE000
unkown
page readonly
21AACBA0000
trusted library section
page read and write
2C3D4DF2000
heap
page read and write
14AE000
stack
page read and write
15DA000
heap
page read and write
335B000
trusted library allocation
page read and write
1592000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
3399000
trusted library allocation
page read and write
1380000
heap
page read and write
1550000
heap
page read and write
49348FB000
stack
page read and write
7FFD3455D000
trusted library allocation
page execute and read and write
7FFD34760000
trusted library allocation
page read and write
4934CFE000
unkown
page readonly
339B000
trusted library allocation
page read and write
21AB1CF0000
heap
page read and write
21AB1CC3000
heap
page read and write
21AB1AC0000
trusted library allocation
page read and write
2FBE000
stack
page read and write
33C5000
trusted library allocation
page read and write
603E000
stack
page read and write
2C3D6CA0000
heap
page execute and read and write
2C3D8999000
trusted library allocation
page read and write
21AB1B10000
trusted library allocation
page read and write
FA05D8F000
stack
page read and write
52AD000
stack
page read and write
15BE000
heap
page read and write
21AAD3B1000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page read and write
5C0E000
stack
page read and write
51AC000
stack
page read and write
33B8000
trusted library allocation
page read and write
7FFD34750000
trusted library allocation
page read and write
339F000
trusted library allocation
page read and write
7FFD346E0000
trusted library allocation
page read and write
13E4000
trusted library allocation
page read and write
2C3D6750000
heap
page execute and read and write
14E0000
heap
page read and write
49351FE000
unkown
page readonly
21AAC600000
heap
page read and write
49346FC000
stack
page read and write
FA0523F000
stack
page read and write
21AACD00000
heap
page read and write
21AB1C54000
heap
page read and write
7FFD347F0000
trusted library allocation
page read and write
5614000
trusted library allocation
page read and write
21AAD610000
trusted library section
page readonly
21AB1B40000
trusted library allocation
page read and write
32C1000
trusted library allocation
page read and write
3333000
trusted library allocation
page read and write
5940000
trusted library section
page readonly
21AACD1A000
heap
page read and write
21AAC6AE000
heap
page read and write
336F000
trusted library allocation
page read and write
3395000
trusted library allocation
page read and write
1407000
heap
page read and write
5800000
heap
page execute and read and write
2C3EEFB8000
heap
page read and write
5FFE000
stack
page read and write
341E000
trusted library allocation
page read and write
59F0000
heap
page read and write
33F7000
trusted library allocation
page read and write
2C3D7191000
trusted library allocation
page read and write
2C3D86BD000
trusted library allocation
page read and write
2C3D6B3C000
heap
page read and write
333D000
trusted library allocation
page read and write
2C3D5070000
heap
page read and write
FA050B7000
stack
page read and write
21AACC15000
heap
page read and write
33F1000
trusted library allocation
page read and write
562E000
trusted library allocation
page read and write
336D000
trusted library allocation
page read and write
3382000
trusted library allocation
page read and write
4934FFE000
stack
page read and write
159D000
heap
page read and write
561E000
trusted library allocation
page read and write
21AACC00000
heap
page read and write
3405000
trusted library allocation
page read and write
13E0000
trusted library allocation
page read and write
2C3D7B91000
trusted library allocation
page read and write
1386000
heap
page read and write
33C1000
trusted library allocation
page read and write
FA0533B000
stack
page read and write
2C3D4C20000
heap
page read and write
2C3E6CC0000
trusted library allocation
page read and write
14B0000
heap
page read and write
796E000
stack
page read and write
21AB1A20000
trusted library allocation
page read and write
21AAC613000
heap
page read and write
400000
remote allocation
page execute and read and write
21AAC66C000
heap
page read and write
7FFD34626000
trusted library allocation
page execute and read and write
58B2000
trusted library allocation
page read and write
3316000
trusted library allocation
page read and write
33BF000
trusted library allocation
page read and write
2C3D4D00000
heap
page read and write
4933A7B000
stack
page read and write
7FFD34740000
trusted library allocation
page read and write
FA051BE000
stack
page read and write
5631000
trusted library allocation
page read and write
FA05F8E000
stack
page read and write
21AAC690000
heap
page read and write
5A70000
trusted library allocation
page execute and read and write
21AAC62B000
heap
page read and write
3325000
trusted library allocation
page read and write
15B6000
heap
page read and write
7FFD34830000
trusted library allocation
page read and write
7631000
heap
page read and write
49340FE000
stack
page read and write
4934A7E000
stack
page read and write
1790000
trusted library allocation
page read and write
7A6E000
stack
page read and write
21AB1AB0000
trusted library allocation
page read and write
4934B7E000
stack
page read and write
2C3EECB0000
heap
page read and write
2C3EF130000
heap
page execute and read and write
7FFD34543000
trusted library allocation
page execute and read and write
58E0000
trusted library allocation
page read and write
21AB1C61000
heap
page read and write
1578000
heap
page read and write
EA9000
stack
page read and write
7FFD348A0000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
33CF000
trusted library allocation
page read and write
2C3EECDD000
heap
page read and write
33A2000
trusted library allocation
page read and write
3339000
trusted library allocation
page read and write
FA04B7E000
stack
page read and write
56E3000
heap
page read and write
7FFD345F0000
trusted library allocation
page read and write
FA04EF9000
stack
page read and write
33D1000
trusted library allocation
page read and write
2C3D66E0000
trusted library allocation
page read and write
2C3D6ED8000
trusted library allocation
page read and write
58C0000
trusted library allocation
page execute and read and write
21AB1CC5000
heap
page read and write
4934EFE000
unkown
page readonly
4933DF7000
stack
page read and write
21AB1C20000
heap
page read and write
792E000
stack
page read and write
21AB1CFC000
heap
page read and write
21AACD5A000
heap
page read and write
17A0000
heap
page read and write
3371000
trusted library allocation
page read and write
21AB1B80000
remote allocation
page read and write
5670000
trusted library allocation
page read and write
4934C7E000
stack
page read and write
7FFD34840000
trusted library allocation
page read and write
2C3D8717000
trusted library allocation
page read and write
5C54000
heap
page read and write
7FFD34550000
trusted library allocation
page read and write
21AACF01000
trusted library allocation
page read and write
2C3D4E8E000
heap
page read and write
13E3000
trusted library allocation
page execute and read and write
565F000
trusted library allocation
page read and write
2C3D4EC7000
heap
page read and write
3335000
trusted library allocation
page read and write
FA050BE000
stack
page read and write
1792000
trusted library allocation
page read and write
FA04FB7000
stack
page read and write
2C3EECE9000
heap
page read and write
331C000
trusted library allocation
page read and write
326A000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
2C3E6F09000
trusted library allocation
page read and write
1416000
trusted library allocation
page execute and read and write
There are 465 hidden memdumps, click here to show them.